This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: SQLInjection_ERROR | |
info: | |
name: SQLINJECTION Detection | |
author: 0x240x23elu & OFJAAAH | |
severity: High | |
requests: | |
- method: GET |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: nginx-Detect | |
info: | |
name: Detect nginx | |
author: 0x240x23elu | |
severity: info | |
requests: | |
- method: GET | |
path: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: LFI-RCE | |
info: | |
name: LFI Detection | |
author: 0x240x23elu & payloadallthings | |
severity: High | |
requests: | |
- method: GET |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cve-2019-8449 | |
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. | |
https://jira.atlassian.com/browse/JRASERVER-69796 | |
https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true | |
===================================================================================================================================== |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/admin/admin.js | |
/admin/appinfo.jsp | |
/admin/cache_stats.jsp | |
/admin/catalogcache.jsp | |
/admin/ccms/customizing.jsp | |
/admin/ccms/result.jsp | |
/admin/ccms/sendFailure.jsp | |
/ecall/jsp/customer/login/login.jsp | |
/ecall/jsp/customer/upload/upload.jsp | |
/user/admin/index.jsp |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
info: | |
name: CVE-2020-0646 | |
author: 0x240x23elu | |
severity: High | |
requests: | |
- raw: | |
- | | |
POST /EN/_vti_bin/WebPartPages.asmx HTTP/1.1 | |
Host: {{Hostname}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: CVE-2020-17519 | |
info: | |
name: Apache Flink Arbitrary file reading with JobManager | |
author: 0x240x23elu & 0rich1 of Ant Security FG Lab | |
severity: High | |
requests: | |
- method: GET | |
path: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
AKIA5ZBU5BQ4AEFA4I5W | |
token = yugsagdsagjdsabskad | |
password = adhjaajdbdfsdfsfs | |
PASSOWORD = sajdbjadhbasjdabdjk28792812 | |
token=gvvvh1234ghhffjhjghjgfh | |
passoword=bnvcsahdbsdjs3e2w2 | |
token:8wqdgxsjxbcsajcbjcs | |
password = "adhjaajdbdfsdfsfs" | |
PASSOWORD = "sajdbjadhbasjdabdjk28792812" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Lmage_url=https | |
Open=https | |
callback=https | |
cgi-bin/redirect.cgihttps | |
cgi-bin/redirect.cgi?https | |
checkout=https | |
checkout_url=https | |
continue=https | |
data=https | |
dest=https |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: wordpress-LFI | |
info: | |
name: wordpress-LFI | |
author: 0x240x23elu | |
severity: High | |
requests: | |
- method: GET | |
path: |
OlderNewer