Fixing: severity mismatches, trailing spaces, other cleanups

patch-1
sullo 2023-01-23 22:06:12 -08:00
parent 5e9af456ed
commit e9e29939f7
73 changed files with 84 additions and 84 deletions

View File

@ -15,7 +15,7 @@ info:
cvss-score: 8.2 cvss-score: 8.2
cve-id: CVE-2017-10075 cve-id: CVE-2017-10075
metadata: metadata:
google-dork: inurl:"/cs/idcplg" google-query: inurl:"/cs/idcplg"
verified: "true" verified: "true"
tags: cve,cve2017,xss,oracle tags: cve,cve2017,xss,oracle

View File

@ -5,7 +5,7 @@ info:
author: ritikchaddha author: ritikchaddha
severity: medium severity: medium
description: | description: |
Cross Site Scripting vulnerabilty in Monstra CMS 3.0.4 via the 'page' feature in admin/index.php. Cross Site Scripting vulnerability in Monstra CMS 3.0.4 via the 'page' feature in admin/index.php.
reference: reference:
- https://github.com/monstra-cms/monstra/issues/463 - https://github.com/monstra-cms/monstra/issues/463
- https://nvd.nist.gov/vuln/detail/CVE-2020-23697 - https://nvd.nist.gov/vuln/detail/CVE-2020-23697

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2022-0234 cve-id: CVE-2022-0234
cwe-id: CWE-79 cwe-id: CWE-79
metadata: metadata:
google-dork: inurl:"wp-content/plugins/woocommerce-currency-switcher" google-query: inurl:"wp-content/plugins/woocommerce-currency-switcher"
verified: "true" verified: "true"
tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,woocs tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,woocs

View File

@ -16,7 +16,7 @@ info:
cve-id: CVE-2022-1168 cve-id: CVE-2022-1168
cwe-id: CWE-79 cwe-id: CWE-79
metadata: metadata:
google-dork: inurl:"wp-content/plugins/wp-jobsearch" google-query: inurl:"wp-content/plugins/wp-jobsearch"
verified: "true" verified: "true"
tags: wp-jobsearch",wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss tags: wp-jobsearch",wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2022-1442 cve-id: CVE-2022-1442
cwe-id: CWE-862 cwe-id: CWE-862
metadata: metadata:
google-dork: inurl:/wp-content/plugins/metform google-query: inurl:/wp-content/plugins/metform
verified: "true" verified: "true"
tags: wpscan,cve2022,wordpress,wp-plugin,disclosure,unauth,metform,cve,wp tags: wpscan,cve2022,wordpress,wp-plugin,disclosure,unauth,metform,cve,wp

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2022-25356 cve-id: CVE-2022-25356
cwe-id: CWE-91 cwe-id: CWE-91
metadata: metadata:
google-dork: inurl:"/SecurityGateway.dll" google-query: inurl:"/SecurityGateway.dll"
verified: "true" verified: "true"
tags: cve,cve2022,altn,gateway,xml,injection tags: cve,cve2022,altn,gateway,xml,injection

View File

@ -16,7 +16,7 @@ info:
cwe-id: CWE-80 cwe-id: CWE-80
metadata: metadata:
verified: true verified: true
google-dork: inurl:/u8sl/WebHelp google-query: inurl:/u8sl/WebHelp
tags: cve,cve2022,yonyou,xss tags: cve,cve2022,yonyou,xss
headless: headless:

View File

@ -17,7 +17,7 @@ info:
cve-id: CVE-2022-33965 cve-id: CVE-2022-33965
cwe-id: CWE-89 cwe-id: CWE-89
metadata: metadata:
google-dork: inurl:"/wp-content/plugins/wp-stats-manager" google-query: inurl:"/wp-content/plugins/wp-stats-manager"
verified: "true" verified: "true"
tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager

View File

@ -16,7 +16,7 @@ info:
cwe-id: CWE-79 cwe-id: CWE-79
metadata: metadata:
verified: true verified: true
google-dork: inurl:wp-content/plugins/wpb-show-core/modules/jplayer_new/jplayer_twitter_ver_1.php google-query: inurl:wp-content/plugins/wpb-show-core/modules/jplayer_new/jplayer_twitter_ver_1.php
tags: wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss,wpb-show-core tags: wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss,wpb-show-core
requests: requests:

View File

@ -3,7 +3,7 @@ id: panabit-default-login
info: info:
name: Panabit Gateway Default Login name: Panabit Gateway Default Login
author: pikpikcu,ritikchaddha author: pikpikcu,ritikchaddha
severity: high severity: medium
description: Panabit Gateway default credentials were discovered. description: Panabit Gateway default credentials were discovered.
reference: reference:
- https://max.book118.com/html/2017/0623/117514590.shtm - https://max.book118.com/html/2017/0623/117514590.shtm

View File

@ -10,7 +10,7 @@ info:
classification: classification:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
shodan-dork: http.title:"Aerohive NetConfig UI" shodan-query: http.title:"Aerohive NetConfig UI"
tags: panel,tech,hiveos,aerohive tags: panel,tech,hiveos,aerohive
requests: requests:

View File

@ -3,7 +3,7 @@ id: aws-opensearch-login
info: info:
name: AWS OpenSearch Login - Detect name: AWS OpenSearch Login - Detect
author: Higor Melgaço (eremit4) author: Higor Melgaço (eremit4)
severity: medium severity: info
description: AWS OpenSearch login page was detected. description: AWS OpenSearch login page was detected.
reference: reference:
- https://aws.amazon.com/pt/blogs/opensource/introducing-opensearch/ - https://aws.amazon.com/pt/blogs/opensource/introducing-opensearch/

View File

@ -13,7 +13,7 @@ info:
- https://www.exploit-db.com/ghdb/5669 - https://www.exploit-db.com/ghdb/5669
metadata: metadata:
verified: true verified: true
shodan-dork: title:"Claris FileMaker WebDirect" shodan-query: title:"Claris FileMaker WebDirect"
tags: panel,edb tags: panel,edb
requests: requests:

View File

@ -11,7 +11,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
verified: true verified: true
shodan-dork: http.title:"code-server login" shodan-query: http.title:"code-server login"
tags: panel,detect,misc tags: panel,detect,misc
requests: requests:

View File

@ -3,7 +3,7 @@ id: couchdb-fauxton
info: info:
name: Apache CouchDB Fauxton Panel - Detect name: Apache CouchDB Fauxton Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Apache CouchDB Fauxton panel was detected. description: Apache CouchDB Fauxton panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: druid-console-exposure
info: info:
name: Alibaba Druid Panel - Detect name: Alibaba Druid Panel - Detect
author: pdteam author: pdteam
severity: medium severity: info
description: Alibaba Druid panel was detected. description: Alibaba Druid panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: exposed-webalizer
info: info:
name: Webalizer Panel - Detect name: Webalizer Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Webalizer panel was detected. description: Webalizer panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: hadoop-exposure
info: info:
name: Apache Hadoop Panel - Detect name: Apache Hadoop Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Apache Hadoop panel was detected. description: Apache Hadoop panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: hangfire-dashboard
info: info:
name: Hangfire Dashboard Panel - Detect name: Hangfire Dashboard Panel - Detect
author: DhiyaneshDk author: DhiyaneshDk
severity: low severity: info
description: Hangfire Dashboard panel was detected. description: Hangfire Dashboard panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: hydra-dashboard
info: info:
name: Hydra Router Dashboard - Detect name: Hydra Router Dashboard - Detect
author: tess author: tess
severity: low severity: info
description: Hydra router dashboard was detected. description: Hydra router dashboard was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: hypertest-dashboard
info: info:
name: HyperTest Common Dashboard - Detect name: HyperTest Common Dashboard - Detect
author: DhiyaneshDk author: DhiyaneshDk
severity: high severity: info
description: HyperTest Common Dashboard was detected. description: HyperTest Common Dashboard was detected.
reference: reference:
- https://www.facebook.com/photo?fbid=487809593389565&set=a.467014098802448 - https://www.facebook.com/photo?fbid=487809593389565&set=a.467014098802448

View File

@ -3,7 +3,7 @@ id: jmx-console
info: info:
name: JBoss JMX Management Console Login Panel - Detect name: JBoss JMX Management Console Login Panel - Detect
author: yashanand155 author: yashanand155
severity: low severity: info
description: JBoss JMX Management Console login panel was detected. description: JBoss JMX Management Console login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: kafka-connect-ui
info: info:
name: Apache Kafka Connect UI Login Panel - Detect name: Apache Kafka Connect UI Login Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Apache Kafka Connect UI login panel was detected. description: Apache Kafka Connect UI login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: kafka-consumer-monitor
info: info:
name: Apache Kafka Consumer Offset Monitor Panel - Detect name: Apache Kafka Consumer Offset Monitor Panel - Detect
author: dhiyaneshDK author: dhiyaneshDK
severity: low severity: info
description: Apache Kafka Consumer Offset Monitor panel was detected. description: Apache Kafka Consumer Offset Monitor panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: kafka-monitoring
info: info:
name: Apache Kafka Monitor Login Panel - Detect name: Apache Kafka Monitor Login Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Apache Kafka Monitor login panel was detected. description: Apache Kafka Monitor login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: kafka-topics-ui
info: info:
name: Apache Kafka Topics Panel - Detect name: Apache Kafka Topics Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Apache Kafka Topics panel was detected. description: Apache Kafka Topics panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: kaes-file-manager
info: info:
name: Kae's File Manager Login Panel - Detect name: Kae's File Manager Login Panel - Detect
author: princechaddha author: princechaddha
severity: unknown severity: info
description: Kae's File Manager login panel was detected. description: Kae's File Manager login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: kubernetes-dashboard
info: info:
name: Kubernetes Dashboard Panel - Detect name: Kubernetes Dashboard Panel - Detect
author: pdteam author: pdteam
severity: low severity: info
description: Kubernetes Dashboard panel was detected. description: Kubernetes Dashboard panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: linkerd-panel
info: info:
name: Linkerd Panel - Detect name: Linkerd Panel - Detect
author: tess author: tess
severity: high severity: info
description: | description: |
Linkerd panel was detected. Linkerd panel was detected.
classification: classification:

View File

@ -3,7 +3,7 @@ id: mcloud-panel
info: info:
name: mCloud Login Panel - Detect name: mCloud Login Panel - Detect
author: ritikchaddha author: ritikchaddha
severity: high severity: info
description: mCloud login panel was detected. description: mCloud login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: microfocus-admin-server
info: info:
name: Micro Focus Enterprise Server Admin Panel - Detect name: Micro Focus Enterprise Server Admin Panel - Detect
author: theabhinavgaur author: theabhinavgaur
severity: medium severity: info
description: Micro Focus Enterprise Server Admin panel was detected. description: Micro Focus Enterprise Server Admin panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: monitorix-exposure
info: info:
name: Monitorix Panel - Detect name: Monitorix Panel - Detect
author: geeknik author: geeknik
severity: low severity: info
description: Monitorix panel was detected. description: Monitorix panel was detected.
reference: reference:
- https://www.monitorix.org/ - https://www.monitorix.org/

View File

@ -3,7 +3,7 @@ id: netdata-panel
info: info:
name: Netdata Panel - Detect name: Netdata Panel - Detect
author: TechbrunchFR author: TechbrunchFR
severity: low severity: info
description: | description: |
Netdata panel was detected. Netdata panel was detected.
reference: reference:

View File

@ -3,7 +3,7 @@ id: nginx-ui-dashboard
info: info:
name: Nginx UI Panel - Detect name: Nginx UI Panel - Detect
author: gy741 author: gy741
severity: low severity: info
description: Nginx UI panel was detected. description: Nginx UI panel was detected.
reference: reference:
- https://github.com/schenkd/nginx-ui - https://github.com/schenkd/nginx-ui

View File

@ -11,7 +11,7 @@ info:
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
verified: true verified: true
shodan-dork: http.title:"noVNC" shodan-query: http.title:"noVNC"
tags: panel,novnc tags: panel,novnc
requests: requests:

View File

@ -3,7 +3,7 @@ id: np-data-cache
info: info:
name: NP Data Cache Panel - Detect name: NP Data Cache Panel - Detect
author: tess author: tess
severity: unknown severity: info
description: NP Data Cache panel was detected. description: NP Data Cache panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -1,15 +1,15 @@
id: openvpn-monitor id: openvpn-monitor
info: info:
name: OpenVPN Monitor Disclosure name: OpenVPN Monitor - Detect
author: geeknik author: geeknik
severity: high severity: info
description: openvpn-monitor was discovered. OpenVPN Monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all its current connections. description: openvpn-monitor was discovered. OpenVPN Monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all its current connections.
reference: reference:
- https://openvpn-monitor.openbytes.ie/ - https://openvpn-monitor.openbytes.ie/
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 5.3 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: openvpn,disclosure,panel tags: openvpn,disclosure,panel

View File

@ -3,7 +3,7 @@ id: openvpn-router-management
info: info:
name: OpenVPN Server Router Management Panel - Detect name: OpenVPN Server Router Management Panel - Detect
author: ritikchaddha author: ritikchaddha
severity: low severity: info
description: OpenVPN Server Router Management Panel was detected. description: OpenVPN Server Router Management Panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: polycom-admin-detect
info: info:
name: Polycom Admin Panel - Detect name: Polycom Admin Panel - Detect
author: e_schultze_ author: e_schultze_
severity: low severity: info
description: Polycom admin panel was detected. description: Polycom admin panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: powerlogic-ion
info: info:
name: PowerLogic ION Panel - Detect name: PowerLogic ION Panel - Detect
author: dhiyaneshDK author: dhiyaneshDK
severity: low severity: info
description: PowerLogic ION panel was detected. description: PowerLogic ION panel was detected.
reference: reference:
- https://www.exploit-db.com/ghdb/6810 - https://www.exploit-db.com/ghdb/6810

View File

@ -3,7 +3,7 @@ id: prometheus-pushgateway-exposed-panel
info: info:
name: Prometheus Pushgateway Panel - Detect name: Prometheus Pushgateway Panel - Detect
author: codexlynx author: codexlynx
severity: low severity: info
description: Prometheus Pushgateway panel was detected. description: Prometheus Pushgateway panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: redis-commander-exposure
info: info:
name: Redis Commander Panel - Detect name: Redis Commander Panel - Detect
author: dahse89 author: dahse89
severity: low severity: info
description: Redis Commander panel was detected. description: Redis Commander panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
verified: "true" verified: "true"
shodan-dork: title:"Login - SAP SuccessFactors" shodan-query: title:"Login - SAP SuccessFactors"
tags: sap,detect tags: sap,detect
requests: requests:

View File

@ -3,7 +3,7 @@ id: securityspy-detect
info: info:
name: SecuritySpy Camera Panel - Detect name: SecuritySpy Camera Panel - Detect
author: pussycat0x author: pussycat0x
severity: medium severity: info
description: SecuritySpy Camera panel was detected. description: SecuritySpy Camera panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: selenium-grid
info: info:
name: Selenium Grid Panel - Detect name: Selenium Grid Panel - Detect
author: pussycat0x author: pussycat0x
severity: unknown severity: info
description: Selenium Grid panel was detected. description: Selenium Grid panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: selenoid-ui-exposure
info: info:
name: Selenoid UI Login Panel - Detect name: Selenoid UI Login Panel - Detect
author: pdteam author: pdteam
severity: medium severity: info
description: Selenoid UI login panel was detected. description: Selenoid UI login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: smartping-dashboard
info: info:
name: SmartPing Dashboard Panel - Detect name: SmartPing Dashboard Panel - Detect
author: DhiyaneshDk author: DhiyaneshDk
severity: low severity: info
description: SmartPing Dashboard panel was detected. description: SmartPing Dashboard panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,7 +3,7 @@ id: syncthru-web-service
info: info:
name: SyncThru Web Service Panel - Detect name: SyncThru Web Service Panel - Detect
author: DhiyaneshDk author: DhiyaneshDk
severity: low severity: info
description: SyncThru Web Service panel was detected. description: SyncThru Web Service panel was detected.
reference: reference:
- https://www.exploit-db.com/ghdb/7843 - https://www.exploit-db.com/ghdb/7843

View File

@ -3,7 +3,7 @@ id: tekton-dashboard
info: info:
name: Tekton Dashboard Panel - Detect name: Tekton Dashboard Panel - Detect
author: DhiyaneshDk author: DhiyaneshDk
severity: low severity: info
description: Tekton Dashboard panel was detected. description: Tekton Dashboard panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

View File

@ -3,11 +3,11 @@ id: unauth-xproxy-dashboard
info: info:
name: X-Proxy Dashboard Panel - Detect name: X-Proxy Dashboard Panel - Detect
author: pussycat0x author: pussycat0x
severity: high severity: info
description: X-Proxy Dashboard panel was detected. description: X-Proxy Dashboard panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 5.3 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
fofa-query: "X-Proxy Dashboard" fofa-query: "X-Proxy Dashboard"

View File

@ -1,7 +1,7 @@
id: unauthenticated-frp id: unauthenticated-frp
info: info:
name: FRPS Dashboard - Detect name: FRPS Dashboard - Detect
author: pikpikcu author: pikpikcu
severity: info severity: info
description: FRPS Dashboard panel was detected. description: FRPS Dashboard panel was detected.

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
verified: true verified: true
shodan-dork: title:"Welcome to VMware Cloud Director" shodan-query: title:"Welcome to VMware Cloud Director"
tags: panel,vmware tags: panel,vmware
requests: requests:

View File

@ -5,9 +5,9 @@ info:
author: kishore-hariram author: kishore-hariram
severity: info severity: info
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
verified: true verified: true
shodan-query: title:"Wagtail - Sign in" shodan-query: title:"Wagtail - Sign in"

View File

@ -5,7 +5,7 @@ info:
author: pussycat0x author: pussycat0x
severity: info severity: info
metadata: metadata:
shodan-dork: 'http.title:"XDS-AMR - status"' shodan-query: 'http.title:"XDS-AMR - status"'
tags: panel,tech,xamr,xds tags: panel,tech,xamr,xds
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: medium severity: medium
metadata: metadata:
verified: true verified: true
shodan-dork: title:"Froxlor Server Management Panel" shodan-query: title:"Froxlor Server Management Panel"
tags: froxlor,backup,exposure,disclosure tags: froxlor,backup,exposure,disclosure
requests: requests:

View File

@ -3,7 +3,7 @@ id: suspicious-sql-error-messages
info: info:
name: SQL - Error Messages name: SQL - Error Messages
author: geeknik author: geeknik
severity: high severity: critical
description: SQL error messages that indicate probing for an injection attack were detected. description: SQL error messages that indicate probing for an injection attack were detected.
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

View File

@ -9,9 +9,9 @@ info:
reference: reference:
- https://www.wpwhitesecurity.com/strong-wordpress-passwords-wpscan/ - https://www.wpwhitesecurity.com/strong-wordpress-passwords-wpscan/
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 5.8 cvss-score: 9.3
cwe-id: CWE-522 cwe-id: CWE-1391
tags: wordpress,default-login,fuzz tags: wordpress,default-login,fuzz
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
verified: "true" verified: "true"
shodan-dork: http.title:"Snapdrop" shodan-query: http.title:"Snapdrop"
tags: iot,snapdrop tags: iot,snapdrop
requests: requests:

View File

@ -3,7 +3,7 @@ id: openbmcs-ssrf
info: info:
name: OpenBMCS 2.4 - Server-Side Request Forgery / Remote File Inclusion name: OpenBMCS 2.4 - Server-Side Request Forgery / Remote File Inclusion
author: dhiyaneshDK author: dhiyaneshDK
severity: medium severity: medium
description: OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter 'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. description: OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter 'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host.
reference: reference:
- https://www.exploit-db.com/exploits/50670 - https://www.exploit-db.com/exploits/50670

View File

@ -6,7 +6,7 @@ info:
severity: medium severity: medium
metadata: metadata:
verified: "true" verified: "true"
shodan-dork: http.title:"LDAP Account Manager" shodan-query: http.title:"LDAP Account Manager"
tags: ldap,misconfig,unauth tags: ldap,misconfig,unauth
requests: requests:

View File

@ -3,7 +3,7 @@ id: cisco-smi-exposure
info: info:
name: Cisco Smart Install Endpoints Exposure name: Cisco Smart Install Endpoints Exposure
author: dwisiswant0 author: dwisiswant0
severity: info severity: medium
description: Cisco Smart Install endpoints were discovered. Exposure of SMI to untrusted networks could allow complete compromise of the switch. description: Cisco Smart Install endpoints were discovered. Exposure of SMI to untrusted networks could allow complete compromise of the switch.
reference: reference:
- https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html - https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html

View File

@ -3,7 +3,7 @@ id: tidb-native-password
info: info:
name: TiDB - Password Vulnerability name: TiDB - Password Vulnerability
author: lu4nx author: lu4nx
severity: info severity: medium
description: TiDB queries with enabled native password support are susceptible to password brute-force attacks. description: TiDB queries with enabled native password support are susceptible to password brute-force attacks.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
verified: "true" verified: "true"
shodan-dork: html:"DashRenderer" shodan-query: html:"DashRenderer"
tags: tech,dash tags: tech,dash
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
metadata: metadata:
verified: true verified: true
shodan-dork: title:"Default Parallels Plesk Panel Page" shodan-query: title:"Default Parallels Plesk Panel Page"
tags: tech,default-page,parallels,plesk tags: tech,default-page,parallels,plesk
requests: requests:

View File

@ -8,7 +8,7 @@ info:
reference: https://www.gitbook.com/ reference: https://www.gitbook.com/
metadata: metadata:
verified: true verified: true
shodan-dork: http.title:"gitbook" shodan-query: http.title:"gitbook"
fofa: app="Introduction-GitBook" fofa: app="Introduction-GitBook"
tags: tech,gitbook tags: tech,gitbook

View File

@ -12,7 +12,7 @@ info:
- https://hackertarget.com/attacking-enumerating-joomla/ - https://hackertarget.com/attacking-enumerating-joomla/
metadata: metadata:
verified: true verified: true
google-dork: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer" google-query: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer"
tags: tech,joomla,cms,oss tags: tech,joomla,cms,oss
requests: requests:

View File

@ -10,8 +10,8 @@ info:
- https://www.ovirt.org/ - https://www.ovirt.org/
- https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html - https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 5.3 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
metadata: metadata:
shodan-query: title:"Ovirt-Engine" shodan-query: title:"Ovirt-Engine"

View File

@ -5,7 +5,7 @@ info:
author: pussycat0x author: pussycat0x
severity: info severity: info
metadata: metadata:
fofa-dork: 'app="puppet-Node-Manager"' fofa-query: 'app="puppet-Node-Manager"'
tags: node,tech tags: node,tech
requests: requests:
@ -21,4 +21,4 @@ requests:
- type: status - type: status
status: status:
- 200 - 200

View File

@ -10,7 +10,7 @@ info:
metadata: metadata:
verified: true verified: true
shodan-query: title:"Powered By vBulletin" shodan-query: title:"Powered By vBulletin"
google-dork: intext:"Powered By vBulletin" google-query: intext:"Powered By vBulletin"
tags: tech,vbulletin tags: tech,vbulletin
requests: requests:

View File

@ -8,7 +8,7 @@ info:
The user must click the forgot password link in order to execute this XSS. The user must click the forgot password link in order to execute this XSS.
metadata: metadata:
verified: true verified: true
shodan-dork: title:"Froxlor Server Management Panel" shodan-query: title:"Froxlor Server Management Panel"
tags: froxlor,xss tags: froxlor,xss
requests: requests:

View File

@ -3,7 +3,7 @@ id: aerocms-sqli
info: info:
name: AeroCMS 0.0.1 - SQL Injection name: AeroCMS 0.0.1 - SQL Injection
author: shivampand3y author: shivampand3y
severity: high severity: critical
description: | description: |
AeroCMS 0.0.1 contains a SQL injection vulnerability via the author parameter. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. AeroCMS 0.0.1 contains a SQL injection vulnerability via the author parameter. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
reference: reference:

View File

@ -3,7 +3,7 @@ id: wp-grimag-open-redirect
info: info:
name: WordPress Grimag <1.1.1 - Open Redirection name: WordPress Grimag <1.1.1 - Open Redirection
author: 0x_Akoko author: 0x_Akoko
severity: medium severity: medium
description: WordPress Grimag theme before 1.1.1 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. description: WordPress Grimag theme before 1.1.1 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
remediation: Fixed in 1.1.1. remediation: Fixed in 1.1.1.
reference: reference:

View File

@ -3,7 +3,7 @@ id: wp-multiple-theme-ssrf
info: info:
name: WordPress Themes - Code Injection name: WordPress Themes - Code Injection
author: madrobot author: madrobot
severity: high severity: critical
description: Fifteen WordPress themes are susceptible to code injection using a version of epsilon-framework, due to lack of capability and CSRF nonce checks in AJAX actions. description: Fifteen WordPress themes are susceptible to code injection using a version of epsilon-framework, due to lack of capability and CSRF nonce checks in AJAX actions.
reference: reference:
- https://www.exploit-db.com/exploits/49327 - https://www.exploit-db.com/exploits/49327