commit
f47c4da9e8
|
@ -1,7 +1,7 @@
|
|||
id: adobe-component-login
|
||||
|
||||
info:
|
||||
name: Adobe Component Brower Login
|
||||
name: Adobe Component Browser Login
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
reference: https://www.exploit-db.com/ghdb/6846
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: bower.json file disclosure
|
||||
author: oppsec
|
||||
severity: info
|
||||
description: Bower is a package manager which stores packages informations in bower.json file
|
||||
description: Bower is a package manager which stores package information in the bower.json file
|
||||
tags: exposure
|
||||
|
||||
requests:
|
||||
|
|
|
@ -3,7 +3,7 @@ id: squid-analysis-report-generator
|
|||
info:
|
||||
name: Squid Analysis Report Generator
|
||||
author: geeknik
|
||||
description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with informations about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports.
|
||||
description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with information about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports.
|
||||
reference: https://sourceforge.net/projects/sarg/
|
||||
severity: high
|
||||
tags: sarg,exposure,logs
|
||||
|
|
|
@ -244,7 +244,7 @@ requests:
|
|||
- "(?i)rabbitmq[_-]?password(=| =|:| :)"
|
||||
- "(?i)quip[_-]?token(=| =|:| :)"
|
||||
- "(?i)qiita[_-]?token(=| =|:| :)"
|
||||
- "(?i)pypi[_-]?passowrd(=| =|:| :)"
|
||||
- "(?i)pypi[_-]?password(=| =|:| :)"
|
||||
- "(?i)pushover[_-]?token(=| =|:| :)"
|
||||
- "(?i)publish[_-]?secret(=| =|:| :)"
|
||||
- "(?i)publish[_-]?key(=| =|:| :)"
|
||||
|
@ -254,7 +254,7 @@ requests:
|
|||
- "(?i)prod[_-]?password(=| =|:| :)"
|
||||
- "(?i)prod[_-]?access[_-]?key[_-]?id(=| =|:| :)"
|
||||
- "(?i)private[_-]?signing[_-]?password(=| =|:| :)"
|
||||
- "(?i)pring[_-]?mail[_-]?username(=| =|:| :)"
|
||||
- "(?i)print[_-]?mail[_-]?username(=| =|:| :)"
|
||||
- "(?i)preferred[_-]?username(=| =|:| :)"
|
||||
- "(?i)prebuild[_-]?auth(=| =|:| :)"
|
||||
- "(?i)postgresql[_-]?pass(=| =|:| :)"
|
||||
|
|
|
@ -34,7 +34,7 @@ file:
|
|||
regex:
|
||||
- 'fcntl'
|
||||
- type: regex
|
||||
# The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice.
|
||||
# The second argument specifying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice.
|
||||
regex:
|
||||
- 'bind'
|
||||
- type: regex
|
||||
|
@ -50,7 +50,7 @@ file:
|
|||
regex:
|
||||
- 'syscall'
|
||||
- type: regex
|
||||
# The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data.
|
||||
# The second argument specifying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data.
|
||||
regex:
|
||||
- 'connect'
|
||||
- type: regex
|
||||
|
@ -58,7 +58,7 @@ file:
|
|||
regex:
|
||||
- 'system'
|
||||
- type: regex
|
||||
# The filename argument of open should be carefully checked if it is being created with any user-supplied string as a compontent of it. Strings should be checked for occurences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed.
|
||||
# The filename argument of open should be carefully checked if it is being created with any user-supplied string as a component of it. Strings should be checked for occurrences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed.
|
||||
regex:
|
||||
- 'open'
|
||||
- type: regex
|
||||
|
|
|
@ -3,7 +3,7 @@ info:
|
|||
name: iis-shortname
|
||||
author: nodauf
|
||||
severity: info
|
||||
description: When IIS uses an old .Net Framwork it's possible to enumeration folder with the symbol ~.
|
||||
description: When IIS uses an old .Net Framework it's possible to enumeration folder with the symbol ~.
|
||||
tags: fuzz
|
||||
|
||||
reference:
|
||||
|
|
|
@ -3,7 +3,7 @@ id: google-floc-disabled
|
|||
info:
|
||||
name: Google FLoC Disabled
|
||||
author: geeknik
|
||||
description: The detected website has decided to explicilty exclude itself from Google FLoC tracking.
|
||||
description: The detected website has decided to explicitly exclude itself from Google FLoC tracking.
|
||||
reference: https://www.bleepingcomputer.com/news/security/github-disables-google-floc-user-tracking-on-its-website/
|
||||
severity: info
|
||||
tags: google,floc,misc
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: rack-mini-profiler
|
||||
|
||||
info:
|
||||
name: rack-mini-profiler environmnet information discloure
|
||||
name: rack-mini-profiler environmnet information disclosure
|
||||
author: vzamanillo
|
||||
severity: high
|
||||
tags: config,debug
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Detect Microsoft SQL Server Reporting
|
||||
author: puzzlepeaches
|
||||
severity: info
|
||||
tags: tech,micrsoft
|
||||
tags: tech,microsoft
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: jenkins-script
|
||||
|
||||
info:
|
||||
name: Jenkins RCE due to accesible script functionality
|
||||
name: Jenkins RCE due to accessible script functionality
|
||||
author: philippedelteil
|
||||
severity: critical
|
||||
reference: https://hackerone.com/reports/403402
|
||||
|
|
Loading…
Reference in New Issue