commit
c9552ceff2
|
@ -3,6 +3,7 @@ info:
|
|||
name: Maccmsv10 Backdoor
|
||||
author: princechaddha
|
||||
severity: critical
|
||||
description: A backdoor has been found in Maccmsv10, the backdoor is accessible via the '/index.php/bbs/index/download' endpoint and the special 'getpwd' parameter value of 'WorldFilledWithLove'.
|
||||
tags: maccmsv10,rce
|
||||
|
||||
requests:
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
author: pikpikcu
|
||||
severity: high
|
||||
reference: https://paper.seebug.org/676/
|
||||
description: A vulnerability in MetInfo allows remote unauthenticated attackers access to locally stored files and their content.
|
||||
tags: metinfo,lfi
|
||||
|
||||
requests:
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: OpenSNS Remote Code Execution Vulnerability
|
||||
author: gy741
|
||||
severity: critical
|
||||
description: A vulnerability in OpenSNS allows remote unauthenticated attackers to cause the product to execute arbitrary code via the 'shareBox' endpoint.
|
||||
reference:
|
||||
- http://www.0dayhack.net/index.php/2417/
|
||||
- https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: RockMongo V1.1.8 XSS
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
description: A vulnerability in RockMongo allows attackers to inject arbitrary javascript into the response returned by the application.
|
||||
reference: https://packetstormsecurity.com/files/136658/RockMongo-1.1.8-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
|
||||
tags: rockmongo,xss
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Ruijie Networks Switch eWeb S29_RGOS 11.4 LFI
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
description: A vulnerability in Ruijie Networks Switch allows remote unauthenticated attackers to access locally stored files and retrieve their content via the 'download.do' endpoint.
|
||||
reference: https://exploit-db.com/exploits/48755
|
||||
tags: ruijie,lfi
|
||||
|
||||
|
|
|
@ -3,6 +3,7 @@ info:
|
|||
name: SeaCMS V6.4.5 RCE
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
description: A vulnerability in SeaCMS allows remote unauthenticated attackers to execute arbitrary PHP code.
|
||||
reference: https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/
|
||||
tags: seacms,rce
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Sonicwall SSLVPN ShellShock RCE
|
||||
author: PR3R00T
|
||||
severity: critical
|
||||
description: A vulnerability in Sonicwall SSLVPN contains a 'ShellShock' vulnerability which allows remote unauthenticated attackers to execute arbitrary commands.
|
||||
reference:
|
||||
- https://twitter.com/chybeta/status/1353974652540882944
|
||||
- https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/
|
||||
|
|
|
@ -5,6 +5,7 @@ info:
|
|||
author: pikpikcu
|
||||
severity: critical
|
||||
tags: yapi,rce
|
||||
description: A vulnerability in Yapi allows remote unauthenticated attackers to cause the product to execute arbitrary code.
|
||||
reference:
|
||||
- https://www.secpulse.com/archives/162502.html
|
||||
- https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b
|
||||
|
|
|
@ -5,6 +5,7 @@ info:
|
|||
author: pdteam
|
||||
severity: low
|
||||
tags: apache,rce
|
||||
description: A vulnerability in Apache Yarn ResourceManager allows remote unauthenticated users to cause the product to execute arbitrary code.
|
||||
reference: https://neerajsabharwal.medium.com/hadoop-yarn-hack-9a72cc1328b6
|
||||
|
||||
requests:
|
||||
|
|
|
@ -1,9 +1,10 @@
|
|||
id: zhiyuan-oa-session-leak
|
||||
|
||||
info:
|
||||
name: Zhiyuan Oa Session Leak
|
||||
name: Zhiyuan OA Session Leak
|
||||
author: pikpikcu
|
||||
severity: medium
|
||||
description: A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint.
|
||||
reference: https://www.zhihuifly.com/t/topic/3345
|
||||
tags: zhiyuan,leak,disclosure
|
||||
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Zimbra Collaboration Suite (ZCS) - SSRF
|
||||
author: gy741
|
||||
severity: critical
|
||||
description: A vulnerability in Zimbra Collaboration Suite allows remote unauthenticated attackers to cause the product to include content returned by third-party servers and use it as its own code.
|
||||
reference:
|
||||
- https://www.adminxe.com/2183.html
|
||||
tags: zimbra,ssrf,oast
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Zoo Management System 1.0 - Authentication Bypass
|
||||
author: dwisiswant0
|
||||
severity: high
|
||||
description: A vulnerability in Zoo Management allows remote attackers to bypass the authentication mechanism via an SQL injection vulnerability.
|
||||
reference: https://www.exploit-db.com/exploits/48880
|
||||
tags: auth-bypass,zms
|
||||
|
||||
|
|
Loading…
Reference in New Issue