more typos
parent
9976e74fc7
commit
ed91c0813e
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: cve,cve2017,trixbox,traversal
|
tags: cve,cve2017,trixbox,traversal
|
||||||
|
|
||||||
# Refrence:-https://nvd.nist.gov/vuln/detail/CVE-2017-14537
|
# reference:-https://nvd.nist.gov/vuln/detail/CVE-2017-14537
|
||||||
# https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/
|
# https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/
|
||||||
# Product vendor:-https://sourceforge.net/projects/asteriskathome/
|
# Product vendor:-https://sourceforge.net/projects/asteriskathome/
|
||||||
|
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Nextjs v2.4.1 LFI
|
name: Nextjs v2.4.1 LFI
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
refrence: https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9
|
reference: https://medium.com/@theRaz0r/arbitrary-file-reading-in-next-js-2-4-1-34104c4e75e9
|
||||||
tags: cve,cve2017,nextjs,lfi
|
tags: cve,cve2017,nextjs,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
|
|
||||||
# Vendor Homepage: https://www.getfuelcms.com/
|
# Vendor Homepage: https://www.getfuelcms.com/
|
||||||
# Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1
|
# Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1
|
||||||
# Refrence: https://www.exploit-db.com/exploits/47138
|
# reference: https://www.exploit-db.com/exploits/47138
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: SolarWinds Database Performance Analyzer 11.1. 457 - Cross Site Scripting
|
name: SolarWinds Database Performance Analyzer 11.1. 457 - Cross Site Scripting
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
refrence: https://www.cvedetails.com/cve/CVE-2018-19386/
|
reference: https://www.cvedetails.com/cve/CVE-2018-19386/
|
||||||
tags: cve,cve2018,solarwinds,xss
|
tags: cve,cve2018,solarwinds,xss
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
|
|
||||||
# Vendor Homepage: https://webport.se/
|
# Vendor Homepage: https://webport.se/
|
||||||
# Software Link: https://webport.se/nedladdningar/
|
# Software Link: https://webport.se/nedladdningar/
|
||||||
# Refrence: https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS
|
# reference: https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: eMerge E3 1.00-06 - Remote Code Execution
|
name: eMerge E3 1.00-06 - Remote Code Execution
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: critical
|
severity: critical
|
||||||
refrence: https://www.exploit-db.com/exploits/47619
|
reference: https://www.exploit-db.com/exploits/47619
|
||||||
tags: cve,cve2019,emerge,rce
|
tags: cve,cve2019,emerge,rce
|
||||||
|
|
||||||
# Vendor Homepage: http://linear-solutions.com/nsc_family/e3-series/
|
# Vendor Homepage: http://linear-solutions.com/nsc_family/e3-series/
|
||||||
|
|
|
@ -8,7 +8,7 @@ info:
|
||||||
SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
|
SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
|
||||||
SVN, and GitLab credentials via the api/settings/values URI.
|
SVN, and GitLab credentials via the api/settings/values URI.
|
||||||
NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it."
|
NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it."
|
||||||
refrences: https://nvd.nist.gov/vuln/detail/CVE-2020-27986
|
references: https://nvd.nist.gov/vuln/detail/CVE-2020-27986
|
||||||
tags: cve,cve2020,sonarqube
|
tags: cve,cve2020,sonarqube
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
reference: https://github.com/LandGrey/flink-unauth-rce
|
reference: https://github.com/LandGrey/flink-unauth-rce
|
||||||
tags: apache,flink,rce
|
tags: apache,flink,rce
|
||||||
|
|
||||||
# Refrence:
|
# reference:
|
||||||
# https://www.exploit-db.com/exploits/48978
|
# https://www.exploit-db.com/exploits/48978
|
||||||
# https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3
|
# https://adamc95.medium.com/apache-flink-1-9-x-part-1-set-up-5d85fd2770f3
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: high
|
severity: high
|
||||||
tags: bullwark,lfi
|
tags: bullwark,lfi
|
||||||
|
|
||||||
# Refrence:-https://www.exploit-db.com/exploits/47773
|
# reference:-https://www.exploit-db.com/exploits/47773
|
||||||
# Vendor Homepage: http://www.bullwark.net/
|
# Vendor Homepage: http://www.bullwark.net/
|
||||||
# Version : Bullwark Momentum Series Web Server JAWS/1.0
|
# Version : Bullwark Momentum Series Web Server JAWS/1.0
|
||||||
# Software Link : http://www.bullwark.net/Kategoriler.aspx?KategoriID=24
|
# Software Link : http://www.bullwark.net/Kategoriler.aspx?KategoriID=24
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: DuomiCMS SQL Injection
|
name: DuomiCMS SQL Injection
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
refrence: https://redn3ck.github.io/2016/11/01/duomiCMS/
|
reference: https://redn3ck.github.io/2016/11/01/duomiCMS/
|
||||||
tags: duomicms,sqli
|
tags: duomicms,sqli
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Finereport 8.0 Path Traversal
|
name: Finereport 8.0 Path Traversal
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
refrence: http://foreversong.cn/archives/1378
|
reference: http://foreversong.cn/archives/1378
|
||||||
tags: finereport,lfi
|
tags: finereport,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
Loading…
Reference in New Issue