Skip to content

Commit 7577b33

Browse files
committed
up PoCs 2022-09-09
1 parent 5e405f6 commit 7577b33

File tree

278 files changed

+3560
-3149
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

278 files changed

+3560
-3149
lines changed

.gitmodules

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
[submodule "nuclei-templates"]
22
path = nuclei-templates
3-
url = [email protected]:hktalent/nuclei-templates.git
3+
szUrl = [email protected]:hktalent/nuclei-templates.git

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
[![Tweet](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
1+
[![Tweet](https://img.shields.io/twitter/szUrl/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
22
<p align="center">
33
<a href="/README_CN.md">README_中文</a> •
44
<a href="/static/Installation.md">Compile/Install/Run</a> •
@@ -149,7 +149,7 @@ where 92.168.0.111 is the target to query
149149
<a href=https://github.com/hktalent/scan4all/discussions>Using Help</a>
150150
```bash
151151
go build
152-
# Precise scan url list UrlPrecise=true
152+
# Precise scan szUrl list UrlPrecise=true
153153
UrlPrecise=true ./scan4all -l xx.txt
154154
# Disable adaptation to nmap and use naabu port to scan its internally defined http-related ports
155155
priorityNmap=false ./scan4all -tp http -list allOut.txt -v

README_CN.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
[![Tweet](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
1+
[![Tweet](https://img.shields.io/twitter/szUrl/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
22
<p align="center">
33
<a href="/README.md">README_EN</a> •
44
<a href="/static/Installation.md">编译/安装/运行</a> •

brute/dicts/filedic.txt

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1696,7 +1696,7 @@
16961696
/api/payment?id=
16971697
/api/prod/services
16981698
/api/proxy
1699-
/api/proxy?url=
1699+
/api/proxy?szUrl=
17001700
/api/saved_objects/_find?type=index-pattern&per_page=100
17011701
/api/search
17021702
/api/sessions
@@ -7517,7 +7517,7 @@ go
75177517
go.%EXT%
75187518
google
75197519
google-services.json
7520-
gotoURL.asp?url=google.com&id=43569
7520+
gotoURL.asp?szUrl=google.com&id=43569
75217521
grabbed.html
75227522
gradle-app.setting
75237523
gradle/
@@ -9644,7 +9644,7 @@ plugins/
96449644
plugins/editors/fckeditor
96459645
plugins/fckeditor
96469646
plugins/servlet/gadgets/makeRequest
9647-
plugins/servlet/gadgets/makeRequest?url=https://google.com
9647+
plugins/servlet/gadgets/makeRequest?szUrl=https://google.com
96489648
plugins/servlet/oauth/users/icon
96499649
plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload.swf
96509650
plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload_f9.swf
@@ -11135,8 +11135,8 @@ ur-admin
1113511135
ur-admin.php
1113611136
ur-admin/
1113711137
uri
11138-
url
11139-
url.jsp
11138+
szUrl
11139+
szUrl.jsp
1114011140
us
1114111141
usage
1114211142
usage/
@@ -11566,7 +11566,7 @@ wp-content/plugins/count-per-day/js/yc/d00.php
1156611566
wp-content/plugins/disqus-comment-system/disqus.php
1156711567
wp-content/plugins/google-sitemap-generator/sitemap-core.php
1156811568
wp-content/plugins/hello.php
11569-
wp-content/plugins/jrss-widget/proxy.php?url=
11569+
wp-content/plugins/jrss-widget/proxy.php?szUrl=
1157011570
wp-content/plugins/super-forms/
1157111571
wp-content/plugins/wp-publication-archive/includes/openfile.php?file=
1157211572
wp-content/plugins/wpengine-snapshot/snapshots/

config/databases/db_dictionary

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1683,7 +1683,7 @@ upfiles
16831683
upload
16841684
uploader
16851685
uploads
1686-
url
1686+
szUrl
16871687
urls
16881688
us
16891689
usa

config/databases/db_server_msgs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -118,15 +118,15 @@
118118
"800098","jakarta-tomcat-4.0.1","0","Server will reveal path"
119119
"800099","JavaWebServer","0","Probably Sun Microsystem's servlet interface. May have default code which is exploitable. Try admin/admin for id/password."
120120
"800100","JetAdmin","0","HP Printer"
121-
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent url is requested, i.e. [victim site]/[javascript].jsp"
121+
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent szUrl is requested, i.e. [victim site]/[javascript].jsp"
122122
"800102","Jigsaw\/([0-1].*|2\.([0-1].*|2\.0))","0","Jigsaw 2.1.0 or below may be vulnerable to XSS if a nonexistent host name is requested, i.e. nosuchhost.domain.com/<script>..."
123123
"800103","Jigsaw\/2\.2\.1","0","Jigsaw 2.1.1 on Windows may be tricked into revealing the system path by requesting /aux two times."
124124
"800104","JRun\/([0-3]\..*|4\.0)","0","JRun 4.0 and below on IIS is vulnerable to remote buffer overflow with a filename over 4096. http://www.macromedia.com/v1/handlers/index.cfm?ID=23500 and http://www.eeye.com/html/Research/Advisories/index.html"
125125
"800105","JRun\/3\.1","0","JRun 3.1 on Windows NT/2000 is vulnerable to remote buffer overflow in the Host header field that can allow attackers to exploit the system."
126126
"800106","KazaaClient","0","Kazaa may allow sensitive information to be retrieved, http://www.securiteam.com/securitynews/5UP0L2K55W.html"
127127
"800107","LabVIEW\/(5\.[1-9]|6\.[0-1])","0","LabVIEW 5.1.1 to 6.1 is vulnerable to a remote DoS by sending a malformed GET request. This DoS was not attempted."
128128
"800108","Lasso\/3\.6\.5","0","This version of Blueworld WebData engine is vulnerable to DoS by sending a 1600 character long GET request."
129-
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the url."
129+
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the szUrl."
130130
"800110","LocalWeb2000\/([0-1]\.*|2\.(0\.*|1\.0))","0","LocalWeb2000 2.1.0 and below allow protected files to be retrieved by prepending the request with /./"
131131
"800111","Lotus-Domino\/([0-3].*|4\.([0-1].*|2\.([0-1].*|3)))","0","This version of Lotus-Domino server has had multiple vulnerabilities. See the bugtraq archives for details."
132132
"800112","Lotus-Domino\/4\.[5-6]","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
@@ -157,7 +157,7 @@
157157
"800137","myCIO","0","The McAfee myCIO server provides antivirus updates to clients. This server has had multiple vulnerabilities in the past."
158158
"800138","Mylo/0\.([0-1]|2\.[0-1])","0","mod_mylo may be vulnerable to a remote buffer overflow. Upgrade to the latest version. BID-8287."
159159
"800139","MyServer 0\.([0-3]\..*|4\.[0-2])","0","MyServer versions lower than 0.5 contain multiple remote vulnerabilities."
160-
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a url of approximately 1000 characters."
160+
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a szUrl of approximately 1000 characters."
161161
"800141","ncsa","0","lower than v1.3 have multiple issues"
162162
"800142","neowebscript","0","Apache plugin to allow TCL use"
163163
"800143","netcloak","0","http://www.maxum.com plugin for webstar"

0 commit comments

Comments
 (0)