Directory listing for /Sn1per/templates/active/
Apache_Solr_Scanner.sh
Apache_Tomcat_Scanner.sh
ApPHP_MicroBlog_Remote_Code_Execution_Vulnerability.sh
AvantFAX_LOGIN_Detected.sh
AWS_S3_Public_Bucket_Listing.sh
Cisco_VPN_Login_Scanner.sh
Cisco_VPN_Scanner.sh
Citrix-Access-Gateway_Detected.sh
Citrix_VPN_Scanner.sh
Citrix_VPN_Scanner_2.sh
Clear-text_Communications_HTTP.sh
Clickjacking.sh
Common_Status_File_Scanner_1.sh
Common_Status_File_Scanner_2.sh
Common_Status_File_Scanner_3.sh
Confluence_Scanner.sh
Contact_Form_7_Wordpress_Plugin_Found_1.sh
Contact_Form_7_Wordpress_Plugin_Found_2.sh
cPanel_Login_Found.sh
cPanel_Login_Found_2.sh
CVE-2018-13379_-_Fortigate_Pulse_Connect_Secure_Directory_Traversal.sh
CVE-2019-11510_-_Pulse_Connect_Secure_SSL_VPN_Arbitrary_File_Read.sh
CVE-2019-11580_-_Atlassian_Crowd_Data_Center_Unauthenticated_RCE.sh
CVE-2019-11581_-_Jira_Template_Injection.sh
CVE-2019-1653_-_Cisco_RV320_RV326_Configuration_Disclosure.sh
CVE-2019-16662_-_rConfig_3.9.2_Remote_Code_Execution.sh
CVE-2019-16759_-_vBulletin_5.x_0-Day_Pre-Auth_Remote_Command_Execution.sh
CVE-2019-16759_-_vBulletin_5.x_0-Day_Pre-Auth_Remote_Command_Execution_Bypass.sh
CVE-2019-17558_-_Apache_Solr_RCE.sh
CVE-2019-19719_Tableau_Server_DOM_XSS.py
CVE-2019-19781_-_Citrix_ADC_Directory_Traversal.sh
CVE-2019-19908_-_phpMyChat-Plus_XSS.sh
CVE-2019-5418_-_Rail_File_Content_Disclosure.sh
CVE-2019-6340_-_Drupal8_REST_RCE_SA-CORE-2019-003.disabled
CVE-2019-7192_-_QNAP_Pre-Auth_Root_RCE.sh
CVE-2019-8442_-_Jira_Webroot_Directory_Traversal_1.sh
CVE-2019-8442_-_Jira_Webroot_Directory_Traversal_2.sh
CVE-2019-8451_Jira_SSRF_1.sh
CVE-2019-8451_Jira_SSRF_2.sh
CVE-2019-8451_Jira_SSRF_3.sh
CVE-2019-8451_Jira_SSRF_4.sh
CVE-2019-8903_-_Totaljs_Unathenticated_Directory_Traversal.sh
CVE-2019-8982_-_Wavemaker_Studio_6.6_LFI_SSRF.sh
CVE-2020-0618_-_Remote_Code_Execution_SQL_Server_Reporting_Services.sh
CVE-2020-10204_-_Sonatype_Nexus_Repository_RCE.sh
CVE-2020-1147_-_Remote_Code_Execution_in_Microsoft_SharePoint_Server.sh
CVE-2020-11530_-_Wordpress_Chop_Slider_3_Plugin_SQL_Injection.sh
CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal.sh
CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal_2.sh
CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal_3.sh
CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal_4.sh
CVE-2020-12271_-_Sophos_XG_Firewall_Pre-Auth_SQL_Injection.sh
CVE-2020-12720_-_vBulletin_Unauthenticaed_SQLi_1.sh
CVE-2020-12720_-_vBulletin_Unauthenticaed_SQLi_2.sh
CVE-2020-12720_-_vBulletin_Unauthenticaed_SQLi_3.sh
CVE-2020-13167_-_Netsweeper_WebAdmin_Python_Code_Injection_1.sh
CVE-2020-13167_-_Netsweeper_WebAdmin_Python_Code_Injection_2.sh
CVE-2020-14181_-_User_Enumeration_Via_Insecure_Jira_Endpoint.sh
CVE-2020-14815_-_Oracle_Business_Intelligence_Enterprise_DOM_XSS.sh
CVE-2020-15129_-_Open_Redirect_In_Traefik.sh
CVE-2020-15920_-_Mida_eFramework_Unauthenticated_RCE.sh
CVE-2020-17519_-_Apache_Flink_Path_Traversal.sh
CVE-2020-2034_-_PAN-OS_GlobalProtect_OS_Command_Injection.sh
CVE-2020-2096_-_Jenkins_Gitlab_Hook_XSS.sh
CVE-2020-2096_Jenkins_Gitlab_XSS_1.sh
CVE-2020-2096_Jenkins_Gitlab_XSS_2.sh
CVE-2020-2096_Jenkins_Gitlab_XSS_3.sh
CVE-2020-2096_Jenkins_Gitlab_XSS_4.sh
CVE-2020-2140_-_Jenkin_AuditTrailPlugin_XSS.sh
CVE-2020-24223_-_Mara_CMS_7.5_Reflective_XSS.sh
CVE-2020-25213_-_WP_File_Manager_File_Upload.sh
CVE-2020-2551_-_Unauthenticated_Oracle_WebLogic_Server_Remote_Code_Execution.sh
CVE-2020-2555_-_WebLogic_Server_Deserialization_RCE.sh
CVE-2020-3187_-_Citrix_Unauthenticated_File_Deletion.sh
CVE-2020-3452_-_Cisco_ASA-FTD_Arbitrary_File_Reading_Vulnerability.sh
CVE-2020-5284_-_Next_JS_Limited_Path_Traversal.sh
CVE-2020-5405_-_Spring_Directory_Traversal_1.sh
CVE-2020-5405_-_Spring_Directory_Traversal_2.sh
CVE-2020-5405_-_Spring_Directory_Traversal_3.sh
CVE-2020-5412_-_Full-read_SSRF_in_Spring_Cloud_Netflix.sh
CVE-2020-5902_-_F5_BIG-IP_Remote_Code_Execution_1.sh
CVE-2020-5902_-_F5_BIG-IP_Remote_Code_Execution_2.sh
CVE-2020-5902_-_F5_BIG-IP_XSS.sh
CVE-2020-6287_-_Create_an_Administrative_User_in_SAP_NetWeaver_AS_JAVA.sh
CVE-2020-7048_-_WP_Database_Reset_3.15_Unauthenticated_Database_Reset.sh
CVE-2020-7209_-_LinuxKI_Toolset_6.01_Remote_Command_Execution.sh
CVE-2020-7246_-_qdPM_Authenticated_Remote_Code_Execution.sh
CVE-2020-7473_Citrix_ShareFile_StorageZones.disabled
CVE-2020-8115_-_Revive_Adserver_XSS.py
CVE-2020-8115_-_Revive_Adserver_XSS.sh
CVE-2020-8163_-_Rails_5.0.1_Remote_Code_Execution.sh
CVE-2020-8191_-_Citrix_ADC_NetScaler_Gateway_Reflected_XSS.sh
CVE-2020-8193_-_Citrix_Unauthenticated_LFI.sh
CVE-2020-8194_-_Citrix_ADC_NetScaler_Gateway_Reflected_Code_Injection.sh
CVE-2020-8209_-_Citrix_XenMobile_Server_Path_Traversal.sh
CVE-2020-8209_-_XenMobile-Citrix_Endpoint_Management_Config_Password_Disclosure.sh
CVE-2020-8209_-_XenMobile-Citrix_Endpoint_Management_Path_Traversal.sh
CVE-2020-8512_-_IceWarp_WebMail_XSS.sh
CVE-2020-8772_-_IfiniteWP_Client_1.9.4.5_Authentication_Bypass_1.sh
CVE-2020-8982_-_Citrix_ShareFile_StorageZones_Unauthenticated_Arbitrary_File_Read.sh
CVE-2020-9047_-_exacqVision_Web_Service_Remote_Code_Execution.sh
CVE-2020-9054_-_ZyXEL_NAS_Remote_Code_Execution.sh
CVE-2020-9484_-_Apache_Tomcat_RCE_by_deserialization.sh
CVE-2020-9757_-_SEOmatic_3.3.0_Server-Side_Template_Injection.sh
Directory_Listing_Enabled.sh
Drupal_Install_Found.sh
Drupal_Scanner_1.sh
Drupal_Scanner_2.sh
Drupal_Scanner_3.sh
Drupal_User_Login.sh
Drupal_Version_Disclosure.sh
F5_BIG-IP_Scanner.sh
F5_BIG-IP_Scanner_2.sh
Fortigate_Pulse_Connect_Secure_Scanner.sh
Fortinet_FortiGate_SSL_VPN_Panel_Detected.sh
Fortinet_FortiGate_SSL_VPN_Panel_Detected_1.sh
Fortinet_FortiGate_SSL_VPN_Panel_Detected_2.sh
Fortinet_FortiGate_SSL_VPN_Panel_Detected_3.sh
Frontpage_Service_Password_Disclosure.sh
Git_Config_Detected.sh
Jaspersoft_Detected.sh
Jenkins_Scanner.sh
Jetty_Version_Disclosure.sh
Jira_Scanner_1.sh
Jira_Scanner_2.sh
Jira_Scanner_3.sh
JK_Status_Manager.sh
Jolokia_Version_Disclosure.sh
Joomla_Scanner_1.sh
Joomla_Scanner_2.sh
Joomla_Version_Disclosure.sh
Laraval_Environment_File_Found.sh
Magento_2.3.0_SQL_Injection.sh
Mailman_Version_Disclosure.sh
MobileIron_Login_1.sh
MobileIron_Login_2.sh
MobileIron_Login_3.sh
MS_SQL_Reporting_Server_Scanner_1.sh
MS_SQL_Reporting_Server_Scanner_2.sh
Palo_Alto_GlobalProtect_PAN-OS_Portal_Scanner.sh
PHP_Composer_Disclosure.sh
PHP_Info.sh
phpMyAdmin_Scanner_1.sh
PulseSecure_VPN_Detected.sh
RabbitMQ_Management_Default_Credentials.sh
RabbitMQ_Management_Interface_Detected.sh
Robots.txt_Detected.sh
SAP_NetWeaver_AS_JAVA_LM_Configuration_Wizard_Detection.sh
Sitemap.xml_Detected.sh
SolarWinds_Orion_Default_Credentials_1.sh
SolarWinds_Orion_Default_Credentials_2.sh
SolarWinds_Orion_Panel.sh
SQLiteManager_Scanner_1.sh
TeamQuest_Login_Found.sh
Telerik_File_Upload_Web_UI.sh
Tiki_Wiki_CMS_Groupware_Scanner.sh
Unauthenticated_Jenkins_Dashboard_Detected.sh
VMware_vCenter_Unauthenticated_Arbitrary_File_Read.sh
Weak_Authentication_Scanner.sh
Web_Config_Detected.sh
Weblogic_Application_Server_Detected.sh
WebLogic_Scanner.sh
Wordpres_Scanner_1.sh
Wordpres_Scanner_2.sh
Wordpres_Scanner_3.sh
Wordpress_WP-File-Manager_Version_Detected.sh
XSS.py