commit
c9552ceff2
|
@ -3,6 +3,7 @@ info:
|
||||||
name: Maccmsv10 Backdoor
|
name: Maccmsv10 Backdoor
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: critical
|
severity: critical
|
||||||
|
description: A backdoor has been found in Maccmsv10, the backdoor is accessible via the '/index.php/bbs/index/download' endpoint and the special 'getpwd' parameter value of 'WorldFilledWithLove'.
|
||||||
tags: maccmsv10,rce
|
tags: maccmsv10,rce
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
reference: https://paper.seebug.org/676/
|
reference: https://paper.seebug.org/676/
|
||||||
|
description: A vulnerability in MetInfo allows remote unauthenticated attackers access to locally stored files and their content.
|
||||||
tags: metinfo,lfi
|
tags: metinfo,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: OpenSNS Remote Code Execution Vulnerability
|
name: OpenSNS Remote Code Execution Vulnerability
|
||||||
author: gy741
|
author: gy741
|
||||||
severity: critical
|
severity: critical
|
||||||
|
description: A vulnerability in OpenSNS allows remote unauthenticated attackers to cause the product to execute arbitrary code via the 'shareBox' endpoint.
|
||||||
reference:
|
reference:
|
||||||
- http://www.0dayhack.net/index.php/2417/
|
- http://www.0dayhack.net/index.php/2417/
|
||||||
- https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E
|
- https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: RockMongo V1.1.8 XSS
|
name: RockMongo V1.1.8 XSS
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
|
description: A vulnerability in RockMongo allows attackers to inject arbitrary javascript into the response returned by the application.
|
||||||
reference: https://packetstormsecurity.com/files/136658/RockMongo-1.1.8-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
|
reference: https://packetstormsecurity.com/files/136658/RockMongo-1.1.8-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
|
||||||
tags: rockmongo,xss
|
tags: rockmongo,xss
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: Ruijie Networks Switch eWeb S29_RGOS 11.4 LFI
|
name: Ruijie Networks Switch eWeb S29_RGOS 11.4 LFI
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
|
description: A vulnerability in Ruijie Networks Switch allows remote unauthenticated attackers to access locally stored files and retrieve their content via the 'download.do' endpoint.
|
||||||
reference: https://exploit-db.com/exploits/48755
|
reference: https://exploit-db.com/exploits/48755
|
||||||
tags: ruijie,lfi
|
tags: ruijie,lfi
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@ info:
|
||||||
name: SeaCMS V6.4.5 RCE
|
name: SeaCMS V6.4.5 RCE
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
|
description: A vulnerability in SeaCMS allows remote unauthenticated attackers to execute arbitrary PHP code.
|
||||||
reference: https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/
|
reference: https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/
|
||||||
tags: seacms,rce
|
tags: seacms,rce
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: Sonicwall SSLVPN ShellShock RCE
|
name: Sonicwall SSLVPN ShellShock RCE
|
||||||
author: PR3R00T
|
author: PR3R00T
|
||||||
severity: critical
|
severity: critical
|
||||||
|
description: A vulnerability in Sonicwall SSLVPN contains a 'ShellShock' vulnerability which allows remote unauthenticated attackers to execute arbitrary commands.
|
||||||
reference:
|
reference:
|
||||||
- https://twitter.com/chybeta/status/1353974652540882944
|
- https://twitter.com/chybeta/status/1353974652540882944
|
||||||
- https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/
|
- https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/
|
||||||
|
|
|
@ -5,6 +5,7 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: critical
|
severity: critical
|
||||||
tags: yapi,rce
|
tags: yapi,rce
|
||||||
|
description: A vulnerability in Yapi allows remote unauthenticated attackers to cause the product to execute arbitrary code.
|
||||||
reference:
|
reference:
|
||||||
- https://www.secpulse.com/archives/162502.html
|
- https://www.secpulse.com/archives/162502.html
|
||||||
- https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b
|
- https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b
|
||||||
|
|
|
@ -5,6 +5,7 @@ info:
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
tags: apache,rce
|
tags: apache,rce
|
||||||
|
description: A vulnerability in Apache Yarn ResourceManager allows remote unauthenticated users to cause the product to execute arbitrary code.
|
||||||
reference: https://neerajsabharwal.medium.com/hadoop-yarn-hack-9a72cc1328b6
|
reference: https://neerajsabharwal.medium.com/hadoop-yarn-hack-9a72cc1328b6
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -1,9 +1,10 @@
|
||||||
id: zhiyuan-oa-session-leak
|
id: zhiyuan-oa-session-leak
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Zhiyuan Oa Session Leak
|
name: Zhiyuan OA Session Leak
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
|
description: A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint.
|
||||||
reference: https://www.zhihuifly.com/t/topic/3345
|
reference: https://www.zhihuifly.com/t/topic/3345
|
||||||
tags: zhiyuan,leak,disclosure
|
tags: zhiyuan,leak,disclosure
|
||||||
|
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: Zimbra Collaboration Suite (ZCS) - SSRF
|
name: Zimbra Collaboration Suite (ZCS) - SSRF
|
||||||
author: gy741
|
author: gy741
|
||||||
severity: critical
|
severity: critical
|
||||||
|
description: A vulnerability in Zimbra Collaboration Suite allows remote unauthenticated attackers to cause the product to include content returned by third-party servers and use it as its own code.
|
||||||
reference:
|
reference:
|
||||||
- https://www.adminxe.com/2183.html
|
- https://www.adminxe.com/2183.html
|
||||||
tags: zimbra,ssrf,oast
|
tags: zimbra,ssrf,oast
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: Zoo Management System 1.0 - Authentication Bypass
|
name: Zoo Management System 1.0 - Authentication Bypass
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: high
|
severity: high
|
||||||
|
description: A vulnerability in Zoo Management allows remote attackers to bypass the authentication mechanism via an SQL injection vulnerability.
|
||||||
reference: https://www.exploit-db.com/exploits/48880
|
reference: https://www.exploit-db.com/exploits/48880
|
||||||
tags: auth-bypass,zms
|
tags: auth-bypass,zms
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue