Commit Graph

8156 Commits (4e498a647851507b6adadc6379c5211c2698cd8c)

Author SHA1 Message Date
Geeknik Labs 76a82eba55
Create php-scanner.yaml 2021-08-04 19:18:37 -05:00
Geeknik Labs d669c81dcd
Create perl-scanner.yaml 2021-08-04 19:17:11 -05:00
Prince Chaddha 977ee39529
Merge pull request #2080 from pratikkhalane/master
Tieline Default Credentials - Create CVE-2021-35336
2021-08-05 00:05:48 +05:30
pussycat0x 2ad4805bcd
Add files via upload 2021-08-04 22:43:45 +05:30
pussycat0x ed8ba1451d
Update springboot-metrics.yaml 2021-08-04 22:17:33 +05:30
pussycat0x cb63ec5176
Update springboot-dump.yaml 2021-08-04 22:17:01 +05:30
Prince Chaddha 255fe969b5
Update tieline.yaml 2021-08-04 22:11:10 +05:30
pussycat0x 4715314c2b
Add files via upload 2021-08-04 22:08:47 +05:30
GwanYeong Kim cb0483267a Create qdpm-info-leak.yaml
The password and connection string for the database are stored in a yml file. To access the yml file you can go to http://<website>/core/config/databases.yml file and download.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-05 01:36:27 +09:00
Prince Chaddha 878508b887
Update tieline.yaml 2021-08-04 22:05:51 +05:30
Prince Chaddha 3dc1196970
Update and rename default-logins/Tieline/Tieline.yaml to default-logins/tieline/tieline.yaml 2021-08-04 22:04:06 +05:30
Sandeep Singh 41dfa0e69e
Merge pull request #2190 from meme-lord/master
Added Prestashop module fuzz template
2021-08-04 21:59:34 +05:30
sandeep d50fc14b74 Update prestashop-module-fuzz.yaml 2021-08-04 21:58:54 +05:30
sandeep 3c9b6e955c Additional matchers 2021-08-04 21:55:59 +05:30
GwanYeong Kim 6d04bd3757 Update favicon-detection.yaml
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-05 01:21:36 +09:00
sandeep 40f3693456 Added page specific matcher 2021-08-04 21:32:50 +05:30
sandeep 3ba7cb6221 misc update 2021-08-04 20:44:32 +05:30
Prince Chaddha c7871dc7a6
Merge pull request #2021 from daffainfo/patch-59
Create CVE-2021-24235.yaml
2021-08-04 20:02:01 +05:30
Prince Chaddha 98e5c69560
Update CVE-2021-24235.yaml 2021-08-04 20:00:11 +05:30
Prince Chaddha fc0085797b
Merge pull request #2321 from daffainfo/patch-129
Create CVE-2015-2807.yaml
2021-08-04 14:10:46 +05:30
Prince Chaddha ca92425071
Update CVE-2015-2807.yaml 2021-08-04 14:07:35 +05:30
Prince Chaddha 2dec4a0326
Merge pull request #2320 from daffainfo/patch-128
Create CVE-2015-9414.yaml
2021-08-04 14:06:00 +05:30
Prince Chaddha 80f52746e3
Update CVE-2015-9414.yaml 2021-08-04 14:03:38 +05:30
Prince Chaddha 325c8a53f6
Merge pull request #2322 from gy741/rule-add-v51
Create CVE-2018-15745.yaml, CVE-2018-15517.yaml
2021-08-04 13:46:10 +05:30
Prince Chaddha 0b3a307294
Update CVE-2018-15517.yaml 2021-08-04 13:44:42 +05:30
Prince Chaddha 8cc213cec1
Update CVE-2018-15745.yaml 2021-08-04 13:42:14 +05:30
Sandeep Singh c90fad00cc
Merge pull request #2323 from projectdiscovery/CVE-2021-28151-fix
CVE-2021-28151 Fix
2021-08-04 12:12:49 +05:30
sandeep 515d469506 strict matchers 2021-08-04 12:10:24 +05:30
GwanYeong Kim 812d4faca2 Create CVE-2018-15517.yaml
Using a web browser or script SSRF can be initiated against internal/external systems to conduct port scans by leveraging D LINKs MailConnect component. The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI. This can undermine accountability of where scan or connections actually came from and or bypass the FW etc. This can be automated via script or using Web Browser.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-04 14:25:54 +09:00
GwanYeong Kim adce7d2c39 Create CVE-2018-15745.yaml
Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-04 14:16:24 +09:00
Muhammad Daffa 1d888e8b4e
Create CVE-2015-2807.yaml 2021-08-04 00:09:09 +07:00
Muhammad Daffa e9313b15be
Create CVE-2015-9414.yaml 2021-08-04 00:07:14 +07:00
Sandeep Singh 5965a3e44c
Merge pull request #2319 from dwisiswant0/add/CVE-2021-37216
Add CVE-2021-37216
2021-08-03 20:40:52 +05:30
Prince Chaddha a4628d1f58
Merge pull request #2195 from daffainfo/patch-107
Create CVE-2016-1000153.yaml
2021-08-03 20:34:28 +05:30
Prince Chaddha cc715bd005
Merge pull request #2196 from daffainfo/patch-108
Create CVE-2016-1000155.yaml
2021-08-03 20:33:18 +05:30
Prince Chaddha a5f74e0484
Update CVE-2016-1000153.yaml 2021-08-03 20:33:02 +05:30
Prince Chaddha e6ea819b9c
Update CVE-2016-1000155.yaml 2021-08-03 20:31:20 +05:30
sandeep a3347504fe minor update 2021-08-03 20:18:40 +05:30
sandeep 1b5420bc4b updated matcher 2021-08-03 20:14:14 +05:30
Prince Chaddha 62bcd6932d
Merge pull request #2198 from gy741/rule-add-v43
Create CVE-2021-32305.yaml
2021-08-03 20:02:32 +05:30
Dwi Siswanto f59905ced2 Add CVE-2021-37216 2021-08-03 21:31:33 +07:00
sandeep 2e95c0a74f Revert "Auto Generated Templates Stats [Tue Jul 27 00:25:35 UTC 2021] 🤖"
This reverts commit 44c0757a23.
2021-08-03 19:59:39 +05:30
Prince Chaddha 3395eff8a0
Merge pull request #2316 from gy741/rule-add-v49
Create CVE-2020-7796.yaml
2021-08-03 19:57:45 +05:30
Prince Chaddha c581a94bf4
Merge pull request #2318 from gy741/rule-add-v50
Create longjing-technology-bems-api-lfi.yaml
2021-08-03 19:56:57 +05:30
Prince Chaddha 28d568b88c
Update and rename longjing-technology-bems-api-lfi.yaml to bems-api-lfi.yaml 2021-08-03 19:55:25 +05:30
Prince Chaddha 23bc448b1b
Merge pull request #2199 from pikpikcu/patch-208
Add OpenSIS POC
2021-08-03 19:53:32 +05:30
Prince Chaddha a4ad3b2d43
Update opensis-detect.yaml 2021-08-03 19:26:06 +05:30
Prince Chaddha b927288f30
Update CVE-2020-6637.yaml 2021-08-03 19:25:06 +05:30
GwanYeong Kim 5fb6332bd9 Create longjing-technology-bems-api-lfi.yaml
The application suffers from an unauthenticated arbitrary file download vulnerability. Input passed through the fileName parameter through downloads endpoint is not properly verified before being used to download files. This can be exploited to disclose the contents of arbitrary and sensitive files through directory traversal attacks.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-03 21:52:14 +09:00
Muhammad Daffa 63cda4e1ef
Update CVE-2021-24235.yaml 2021-08-03 14:58:19 +07:00