Skip to content

Commit 44a3376

Browse files
committed
fix someMapMutex.Unlock() vendor/github.com/projectdiscovery/nuclei/v2/pkg/protocols/http/request.go 2022-10-05
1 parent bdd33d1 commit 44a3376

21 files changed

+110
-127
lines changed

.gitmodules

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[submodule "nuclei-templates"]
22
path = nuclei-templates
3-
url = [email protected]:hktalent/nuclei-templates.git
3+
szUrl = [email protected]:hktalent/nuclei-templates.git
44
[submodule "config/nuclei-templates"]
55
path = config/nuclei-templates
6-
url = http://github.com/hktalent/nuclei-templates
6+
szUrl = http://github.com/hktalent/nuclei-templates

HomebrewFormula/scan4all.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
class Rage < Formula
22
desc "Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)..."
33
homepage "https://scan4all.51pwn.com"
4-
url "https://github.com/hktalent/scan4all/releases/download/2.8.1/scan4all_2.8.1_macOS_amd64.zip"
4+
szUrl "https://github.com/hktalent/scan4all/releases/download/2.8.1/scan4all_2.8.1_macOS_amd64.zip"
55
sha256 "2af8d9f67bae7c03ef20d064b2f23e7bef4c95f0cf7e1da33cbd42fcceabeb39"
66
version "2.8.1"
77

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
[![Tweet](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
1+
[![Tweet](https://img.shields.io/twitter/szUrl/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
22
<p align="center">
33
<a href="/README_CN.md">README_中文</a> •
44
<a href="/static/Installation.md">Compile/Install/Run</a> •
@@ -149,7 +149,7 @@ where 92.168.0.111 is the target to query
149149
<a href=https://github.com/hktalent/scan4all/discussions>Using Help</a>
150150
```bash
151151
go build
152-
# Precise scan url list UrlPrecise=true
152+
# Precise scan szUrl list UrlPrecise=true
153153
UrlPrecise=true ./scan4all -l xx.txt
154154
# Disable adaptation to nmap and use naabu port to scan its internally defined http-related Ports
155155
priorityNmap=false ./scan4all -tp http -list allOut.txt -v

README_CN.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
[![Tweet](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
1+
[![Tweet](https://img.shields.io/twitter/szUrl/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
22
<p align="center">
33
<a href="/README.md">README_EN</a> •
44
<a href="/static/Installation.md">编译/安装/运行</a> •

brute/dicts/filedic.txt

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -2134,7 +2134,7 @@ $metadata
21342134
/api/payment?id=
21352135
/api/prod/services
21362136
/api/proxy
2137-
/api/proxy?url=
2137+
/api/proxy?szUrl=
21382138
/api/saved_objects/_find?type=index-pattern&per_page=100
21392139
/api/search
21402140
/api/sessions
@@ -7658,7 +7658,7 @@ api/payment?id=
76587658
api/product/toprank
76597659
api/profile
76607660
api/proxy
7661-
api/proxy?url=
7661+
api/proxy?szUrl=
76627662
api/put
76637663
api/quiet
76647664
api/reload
@@ -15448,9 +15448,9 @@ gotdotnet
1544815448
gotemp.php
1544915449
gotest.sh
1545015450
goto
15451-
gotoURL.asp?url=google.com&id=43569
15451+
gotoURL.asp?szUrl=google.com&id=43569
1545215452
goto_step.sh
15453-
gotourl.asp?url=google.com&id=43569
15453+
gotourl.asp?szUrl=google.com&id=43569
1545415454
gpg.sh
1545515455
gphotos
1545615456
gpl.txt
@@ -22706,10 +22706,10 @@ plugins/editors/fckeditor
2270622706
plugins/fckeditor
2270722707
plugins/filemanager/filemanager/js
2270822708
plugins/servlet/gadgets/makeRequest
22709-
plugins/servlet/gadgets/makeRequest?url=https://google.com
22709+
plugins/servlet/gadgets/makeRequest?szUrl=https://google.com
2271022710
plugins/servlet/gadgets/makerequest
22711-
plugins/servlet/gadgets/makerequest?url=https
22712-
plugins/servlet/gadgets/makerequest?url=https://google.com
22711+
plugins/servlet/gadgets/makerequest?szUrl=https
22712+
plugins/servlet/gadgets/makerequest?szUrl=https://google.com
2271322713
plugins/servlet/oauth/users/icon
2271422714
plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload.swf
2271522715
plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload_f9.swf
@@ -27943,9 +27943,9 @@ ur-admin/
2794327943
urban
2794427944
uresk
2794527945
uri
27946-
url
27947-
url.jsp
27948-
url.php
27946+
szUrl
27947+
szUrl.jsp
27948+
szUrl.php
2794927949
url_1.sql
2795027950
url_2.sql
2795127951
urlList.
@@ -29929,7 +29929,7 @@ wp-content/plugins/elementor-pro/assets/css/frontend.min.css
2992929929
wp-content/plugins/google-sitemap-generator/sitemap-core.php
2993029930
wp-content/plugins/hello.php
2993129931
wp-content/plugins/jekyll-exporter/vendor/phpunit/phpunit/src/util/php/eval-stdin.php
29932-
wp-content/plugins/jrss-widget/proxy.php?url=
29932+
wp-content/plugins/jrss-widget/proxy.php?szUrl=
2993329933
wp-content/plugins/master-slider/public/assets/css/masterslider.main.css?ver=2.9.8
2993429934
wp-content/plugins/master-slider/public/assets/js/jquery.easing.min.js?ver=2.9.8
2993529935
wp-content/plugins/master-slider/public/assets/js/masterslider.min.js?ver=2.9.8
@@ -30040,9 +30040,9 @@ wp-includes/rss-functions.php
3004030040
wp-includes/wlwmanifest.xml
3004130041
wp-json
3004230042
wp-json/
30043-
wp-json/oembed/1.0/embed?url=http:/172.105.71.142
30044-
wp-json/oembed/1.0/embed?url=http:/lovi.studio
30045-
wp-json/oembed/1.0/embed?url=http:/onestopsla.com
30043+
wp-json/oembed/1.0/embed?szUrl=http:/172.105.71.142
30044+
wp-json/oembed/1.0/embed?szUrl=http:/lovi.studio
30045+
wp-json/oembed/1.0/embed?szUrl=http:/onestopsla.com
3004630046
wp-json/wp/v2/users
3004730047
wp-json/wp/v2/users/
3004830048
wp-license.php

config/config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@
7373
"naabu": {"TopPorts": "1000","ScanAllIPS": true,"Threads": 50,"EnableProgressBar": false},
7474
"priorityNmap": true,
7575
"noScan": false,
76-
"enableMultNuclei": true,
76+
"enableMultNuclei": false,
7777
"enableNuclei": true,
7878
"nuclei": {
7979
"Severities": [5,4,3],

config/databases/db_dictionary

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1683,7 +1683,7 @@ upfiles
16831683
upload
16841684
uploader
16851685
uploads
1686-
url
1686+
szUrl
16871687
urls
16881688
us
16891689
usa

config/databases/db_server_msgs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -118,15 +118,15 @@
118118
"800098","jakarta-tomcat-4.0.1","0","Server will reveal path"
119119
"800099","JavaWebServer","0","Probably Sun Microsystem's servlet interface. May have default code which is exploitable. Try admin/admin for id/password."
120120
"800100","JetAdmin","0","HP Printer"
121-
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent url is requested, i.e. [victim site]/[javascript].jsp"
121+
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent szUrl is requested, i.e. [victim site]/[javascript].jsp"
122122
"800102","Jigsaw\/([0-1].*|2\.([0-1].*|2\.0))","0","Jigsaw 2.1.0 or below may be vulnerable to XSS if a nonexistent host name is requested, i.e. nosuchhost.domain.com/<script>..."
123123
"800103","Jigsaw\/2\.2\.1","0","Jigsaw 2.1.1 on Windows may be tricked into revealing the system path by requesting /aux two times."
124124
"800104","JRun\/([0-3]\..*|4\.0)","0","JRun 4.0 and below on IIS is vulnerable to remote buffer overflow with a filename over 4096. http://www.macromedia.com/v1/handlers/index.cfm?ID=23500 and http://www.eeye.com/html/Research/Advisories/index.html"
125125
"800105","JRun\/3\.1","0","JRun 3.1 on Windows NT/2000 is vulnerable to remote buffer overflow in the Host header field that can allow attackers to exploit the system."
126126
"800106","KazaaClient","0","Kazaa may allow sensitive information to be retrieved, http://www.securiteam.com/securitynews/5UP0L2K55W.html"
127127
"800107","LabVIEW\/(5\.[1-9]|6\.[0-1])","0","LabVIEW 5.1.1 to 6.1 is vulnerable to a remote DoS by sending a malformed GET request. This DoS was not attempted."
128128
"800108","Lasso\/3\.6\.5","0","This version of Blueworld WebData engine is vulnerable to DoS by sending a 1600 character long GET request."
129-
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the url."
129+
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the szUrl."
130130
"800110","LocalWeb2000\/([0-1]\.*|2\.(0\.*|1\.0))","0","LocalWeb2000 2.1.0 and below allow protected files to be retrieved by prepending the request with /./"
131131
"800111","Lotus-Domino\/([0-3].*|4\.([0-1].*|2\.([0-1].*|3)))","0","This version of Lotus-Domino server has had multiple vulnerabilities. See the bugtraq archives for details."
132132
"800112","Lotus-Domino\/4\.[5-6]","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
@@ -157,7 +157,7 @@
157157
"800137","myCIO","0","The McAfee myCIO server provides antivirus updates to clients. This server has had multiple vulnerabilities in the past."
158158
"800138","Mylo/0\.([0-1]|2\.[0-1])","0","mod_mylo may be vulnerable to a remote buffer overflow. Upgrade to the latest version. BID-8287."
159159
"800139","MyServer 0\.([0-3]\..*|4\.[0-2])","0","MyServer versions lower than 0.5 contain multiple remote vulnerabilities."
160-
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a url of approximately 1000 characters."
160+
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a szUrl of approximately 1000 characters."
161161
"800141","ncsa","0","lower than v1.3 have multiple issues"
162162
"800142","neowebscript","0","Apache plugin to allow TCL use"
163163
"800143","netcloak","0","http://www.maxum.com plugin for webstar"

0 commit comments

Comments
 (0)