Skip to content

Commit

Permalink
fix someMapMutex.Unlock() vendor/github.com/projectdiscovery/nuclei/v…
Browse files Browse the repository at this point in the history
…2/pkg/protocols/http/request.go 2022-10-05
  • Loading branch information
hktalent committed Oct 5, 2022
1 parent bdd33d1 commit 44a3376
Show file tree
Hide file tree
Showing 21 changed files with 110 additions and 127 deletions.
4 changes: 2 additions & 2 deletions .gitmodules
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[submodule "nuclei-templates"]
path = nuclei-templates
url = [email protected]:hktalent/nuclei-templates.git
szUrl = [email protected]:hktalent/nuclei-templates.git
[submodule "config/nuclei-templates"]
path = config/nuclei-templates
url = http://github.com/hktalent/nuclei-templates
szUrl = http://github.com/hktalent/nuclei-templates
2 changes: 1 addition & 1 deletion HomebrewFormula/scan4all.rb
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
class Rage < Formula
desc "Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)..."
homepage "https://scan4all.51pwn.com"
url "https://github.com/hktalent/scan4all/releases/download/2.8.1/scan4all_2.8.1_macOS_amd64.zip"
szUrl "https://github.com/hktalent/scan4all/releases/download/2.8.1/scan4all_2.8.1_macOS_amd64.zip"
sha256 "2af8d9f67bae7c03ef20d064b2f23e7bef4c95f0cf7e1da33cbd42fcceabeb39"
version "2.8.1"

Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
[![Tweet](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
[![Tweet](https://img.shields.io/twitter/szUrl/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
<p align="center">
<a href="/README_CN.md">README_中文</a> •
<a href="/static/Installation.md">Compile/Install/Run</a> •
Expand Down Expand Up @@ -149,7 +149,7 @@ where 92.168.0.111 is the target to query
<a href=https://github.com/hktalent/scan4all/discussions>Using Help</a>
```bash
go build
# Precise scan url list UrlPrecise=true
# Precise scan szUrl list UrlPrecise=true
UrlPrecise=true ./scan4all -l xx.txt
# Disable adaptation to nmap and use naabu port to scan its internally defined http-related Ports
priorityNmap=false ./scan4all -tp http -list allOut.txt -v
Expand Down
2 changes: 1 addition & 1 deletion README_CN.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
[![Tweet](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
[![Tweet](https://img.shields.io/twitter/szUrl/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social&label=Follow)](https://github.com/hktalent/)
<p align="center">
<a href="/README.md">README_EN</a> •
<a href="/static/Installation.md">编译/安装/运行</a> •
Expand Down
28 changes: 14 additions & 14 deletions brute/dicts/filedic.txt
Original file line number Diff line number Diff line change
Expand Up @@ -2134,7 +2134,7 @@ $metadata
/api/payment?id=
/api/prod/services
/api/proxy
/api/proxy?url=
/api/proxy?szUrl=
/api/saved_objects/_find?type=index-pattern&per_page=100
/api/search
/api/sessions
Expand Down Expand Up @@ -7658,7 +7658,7 @@ api/payment?id=
api/product/toprank
api/profile
api/proxy
api/proxy?url=
api/proxy?szUrl=
api/put
api/quiet
api/reload
Expand Down Expand Up @@ -15448,9 +15448,9 @@ gotdotnet
gotemp.php
gotest.sh
goto
gotoURL.asp?url=google.com&id=43569
gotoURL.asp?szUrl=google.com&id=43569
goto_step.sh
gotourl.asp?url=google.com&id=43569
gotourl.asp?szUrl=google.com&id=43569
gpg.sh
gphotos
gpl.txt
Expand Down Expand Up @@ -22706,10 +22706,10 @@ plugins/editors/fckeditor
plugins/fckeditor
plugins/filemanager/filemanager/js
plugins/servlet/gadgets/makeRequest
plugins/servlet/gadgets/makeRequest?url=https://google.com
plugins/servlet/gadgets/makeRequest?szUrl=https://google.com
plugins/servlet/gadgets/makerequest
plugins/servlet/gadgets/makerequest?url=https
plugins/servlet/gadgets/makerequest?url=https://google.com
plugins/servlet/gadgets/makerequest?szUrl=https
plugins/servlet/gadgets/makerequest?szUrl=https://google.com
plugins/servlet/oauth/users/icon
plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload.swf
plugins/sfSWFUploadPlugin/web/sfSWFUploadPlugin/swf/swfupload_f9.swf
Expand Down Expand Up @@ -27943,9 +27943,9 @@ ur-admin/
urban
uresk
uri
url
url.jsp
url.php
szUrl
szUrl.jsp
szUrl.php
url_1.sql
url_2.sql
urlList.
Expand Down Expand Up @@ -29929,7 +29929,7 @@ wp-content/plugins/elementor-pro/assets/css/frontend.min.css
wp-content/plugins/google-sitemap-generator/sitemap-core.php
wp-content/plugins/hello.php
wp-content/plugins/jekyll-exporter/vendor/phpunit/phpunit/src/util/php/eval-stdin.php
wp-content/plugins/jrss-widget/proxy.php?url=
wp-content/plugins/jrss-widget/proxy.php?szUrl=
wp-content/plugins/master-slider/public/assets/css/masterslider.main.css?ver=2.9.8
wp-content/plugins/master-slider/public/assets/js/jquery.easing.min.js?ver=2.9.8
wp-content/plugins/master-slider/public/assets/js/masterslider.min.js?ver=2.9.8
Expand Down Expand Up @@ -30040,9 +30040,9 @@ wp-includes/rss-functions.php
wp-includes/wlwmanifest.xml
wp-json
wp-json/
wp-json/oembed/1.0/embed?url=http:/172.105.71.142
wp-json/oembed/1.0/embed?url=http:/lovi.studio
wp-json/oembed/1.0/embed?url=http:/onestopsla.com
wp-json/oembed/1.0/embed?szUrl=http:/172.105.71.142
wp-json/oembed/1.0/embed?szUrl=http:/lovi.studio
wp-json/oembed/1.0/embed?szUrl=http:/onestopsla.com
wp-json/wp/v2/users
wp-json/wp/v2/users/
wp-license.php
Expand Down
2 changes: 1 addition & 1 deletion config/config.json
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@
"naabu": {"TopPorts": "1000","ScanAllIPS": true,"Threads": 50,"EnableProgressBar": false},
"priorityNmap": true,
"noScan": false,
"enableMultNuclei": true,
"enableMultNuclei": false,
"enableNuclei": true,
"nuclei": {
"Severities": [5,4,3],
Expand Down
2 changes: 1 addition & 1 deletion config/databases/db_dictionary
Original file line number Diff line number Diff line change
Expand Up @@ -1683,7 +1683,7 @@ upfiles
upload
uploader
uploads
url
szUrl
urls
us
usa
Expand Down
6 changes: 3 additions & 3 deletions config/databases/db_server_msgs
Original file line number Diff line number Diff line change
Expand Up @@ -118,15 +118,15 @@
"800098","jakarta-tomcat-4.0.1","0","Server will reveal path"
"800099","JavaWebServer","0","Probably Sun Microsystem's servlet interface. May have default code which is exploitable. Try admin/admin for id/password."
"800100","JetAdmin","0","HP Printer"
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent url is requested, i.e. [victim site]/[javascript].jsp"
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent szUrl is requested, i.e. [victim site]/[javascript].jsp"
"800102","Jigsaw\/([0-1].*|2\.([0-1].*|2\.0))","0","Jigsaw 2.1.0 or below may be vulnerable to XSS if a nonexistent host name is requested, i.e. nosuchhost.domain.com/<script>..."
"800103","Jigsaw\/2\.2\.1","0","Jigsaw 2.1.1 on Windows may be tricked into revealing the system path by requesting /aux two times."
"800104","JRun\/([0-3]\..*|4\.0)","0","JRun 4.0 and below on IIS is vulnerable to remote buffer overflow with a filename over 4096. http://www.macromedia.com/v1/handlers/index.cfm?ID=23500 and http://www.eeye.com/html/Research/Advisories/index.html"
"800105","JRun\/3\.1","0","JRun 3.1 on Windows NT/2000 is vulnerable to remote buffer overflow in the Host header field that can allow attackers to exploit the system."
"800106","KazaaClient","0","Kazaa may allow sensitive information to be retrieved, http://www.securiteam.com/securitynews/5UP0L2K55W.html"
"800107","LabVIEW\/(5\.[1-9]|6\.[0-1])","0","LabVIEW 5.1.1 to 6.1 is vulnerable to a remote DoS by sending a malformed GET request. This DoS was not attempted."
"800108","Lasso\/3\.6\.5","0","This version of Blueworld WebData engine is vulnerable to DoS by sending a 1600 character long GET request."
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the url."
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the szUrl."
"800110","LocalWeb2000\/([0-1]\.*|2\.(0\.*|1\.0))","0","LocalWeb2000 2.1.0 and below allow protected files to be retrieved by prepending the request with /./"
"800111","Lotus-Domino\/([0-3].*|4\.([0-1].*|2\.([0-1].*|3)))","0","This version of Lotus-Domino server has had multiple vulnerabilities. See the bugtraq archives for details."
"800112","Lotus-Domino\/4\.[5-6]","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
Expand Down Expand Up @@ -157,7 +157,7 @@
"800137","myCIO","0","The McAfee myCIO server provides antivirus updates to clients. This server has had multiple vulnerabilities in the past."
"800138","Mylo/0\.([0-1]|2\.[0-1])","0","mod_mylo may be vulnerable to a remote buffer overflow. Upgrade to the latest version. BID-8287."
"800139","MyServer 0\.([0-3]\..*|4\.[0-2])","0","MyServer versions lower than 0.5 contain multiple remote vulnerabilities."
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a url of approximately 1000 characters."
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a szUrl of approximately 1000 characters."
"800141","ncsa","0","lower than v1.3 have multiple issues"
"800142","neowebscript","0","Apache plugin to allow TCL use"
"800143","netcloak","0","http://www.maxum.com plugin for webstar"
Expand Down
Loading

0 comments on commit 44a3376

Please sign in to comment.