Command injection vulnerability was identified in NPM package rising version 1.0.2
Resources:
- Project's NPM Package: https://www.npmjs.com/package/rising
- Project's NPM JS registery: https://registry.npmjs.org/rising
domain | |
123rf.com | |
1stdibs.com | |
2u.com | |
ba.com | |
babylist.com | |
bananatag.com | |
baylor.edu | |
bbcgoodfood.com | |
bcm.edu |
Command injection vulnerability was identified in NPM package rising version 1.0.2
Resources:
a | |
a-- | |
A- | |
a0 | |
a0-tzmigration-ruby | |
a1 | |
a11n | |
A_123 | |
a1330ks_bmi | |
a13g |
[ | |
"express", | |
"afnan" | |
] |
#!/bin/bash | |
filename=$1 | |
output_str="(" | |
while read -r line; do | |
output_str+="ip.src eq $line) or (" | |
done < "$filename" | |
output_str=${output_str% or (*} |
import requests | |
import sys | |
import json | |
import concurrent.futures | |
output_file = open("emails_res.txt", "w") | |
def Emails(package): | |
req = requests.get("https://api.npms.io/v2/package/{}".format(package)) |
` | |
~/ | |
~ | |
×™× | |
___ | |
__ | |
_ |
.aaa | |
.aarp | |
.abarth | |
.abb | |
.abbott | |
.abbvie | |
.abc | |
.able | |
.abogado | |
.abudhabi |
# Coded by Geekink | |
#!/usr/bin/env python3 | |
import urllib.request | |
import sqlite3 | |
import os.path | |
import re | |
import math |
<?php | |
/* Plugin Name: Damn Vulnerable WordPress Plugin | |
* Description: Intentionally vulnerable plugin for plugin author education | |
* Version: 0.1 | |
* Plugin URI: http://make.wordpress.org/plugins/2013/04/09/intentionally-vulnerable-plugin/ | |
* Author: Jon Cave | |
* Author URI: http://joncave.co.uk | |
* License: GPLv2+ | |
* | |
* DO NOT RUN THIS PLUGIN ON AN INTERNET ACCESSIBLE SITE |