-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
7 changed files
with
178 additions
and
2,625 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,33 +1,14 @@ | ||
# Object files | ||
*.o | ||
*.ko | ||
*.obj | ||
*.elf | ||
# for Rust | ||
# Generated by Cargo will have compiled files and executables | ||
debug/ | ||
target/ | ||
|
||
# Precompiled Headers | ||
*.gch | ||
*.pch | ||
# Remove Cargo.lock from gitignore if creating an executable, leave it for libraries | ||
# More information here https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html | ||
Cargo.lock | ||
|
||
# Libraries | ||
*.lib | ||
*.a | ||
*.la | ||
*.lo | ||
# These are backup files generated by rustfmt | ||
**/*.rs.bk | ||
|
||
# Shared objects (inc. Windows DLLs) | ||
*.dll | ||
*.so | ||
*.so.* | ||
*.dylib | ||
|
||
# Executables | ||
*.exe | ||
*.out | ||
*.app | ||
*.i*86 | ||
*.x86_64 | ||
*.hex | ||
|
||
# Debug files | ||
*.dSYM/ | ||
*.su | ||
# MSVC Windows builds of rustc generate these, which store debugging information | ||
*.pdb |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
[package] | ||
name = "svf" | ||
version = "0.1.0" | ||
edition = "2021" | ||
|
||
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html | ||
|
||
[target.'cfg(target_os = "linux")'.dependencies] | ||
openssl = { version = "0.10", features = ["vendored"] } | ||
|
||
[dependencies] | ||
reqwest = { version = "0.11", features = ["json", "socks"] } | ||
tokio = { version = "1", features = ["full"] } | ||
serde = { version = "1.0", features = ["derive"] } | ||
serde_json = "1.0" | ||
clap = { version = "4.1.6", features = ["derive"] } |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,49 +1,11 @@ | ||
# This is a search tool for search Vulnerability | ||
|
||
before you make it with gcc, you must confirm you have installed the `libcurl` | ||
|
||
if not, try this: | ||
|
||
``` | ||
sudo apt-get install libcurl4-openssl-dev | ||
``` | ||
|
||
## You can make it as | ||
|
||
``` | ||
gcc *.c -o svf -lm -l curl | ||
``` | ||
|
||
## And run it like this | ||
|
||
``` | ||
./svf discuz | ||
``` | ||
|
||
and the result it like below: | ||
Download it from the release page or compile it yourself. | ||
|
||
```bash | ||
./svf --name sqlmap` | ||
NOW LIST THE ALL RESULT (2.006s) (Length: 2): | ||
| INDEX | CVE | DATE | NAME | | ||
| 0 | 34933 | 2020-02-11 | SQLmap - Command Injection | | ||
| 1 | 24827 | 2016-09-20 | VinDrive SQL Injecti0n Vulnerability - Manually AND sqlmap | | ||
``` | ||
Get the API data retrieved | ||
NOW LIST THE ALL RESULT: | ||
NUML NUMC | DATE | DETAIL | ||
>[1] 6792 | 2010-01-29 | Discuz! 6.0.0 cross site scripting | ||
>[2] 7570 | 2009-09-17 | Discuz! Plugin Crazy Star <= 2.0 (fmid) SQL Injection Vulnerability | ||
>[3] 7619 | 2009-09-15 | Discuz! JiangHu plugin versions 1.1 and below remote SQL injection | ||
>[4] 7779 | 2009-08-25 | Discuz 6.0 (2fly_gift.php) Sql Injection Vulnerability | ||
>[5] 7878 | 2009-08-19 | Discuz! Remote Reset User Password Exploit | ||
>[6] 7879 | 2009-08-19 | Discuz! 6.x/7.x Remote Code Execution Exploit | ||
>[7] 10534 | 2008-08-07 | Comsenz Discuz! 6.0.1 Sql injection | ||
>[8] 6792 | 2010-01-29 | Discuz! 6.0.0 cross site scripting | ||
>[9] 7570 | 2009-09-17 | Discuz! Plugin Crazy Star <= 2.0 (fmid) SQL Injection Vulnerability | ||
>[10] 7619 | 2009-09-15 | Discuz! JiangHu plugin versions 1.1 and below remote SQL injection | ||
>[11] 7779 | 2009-08-25 | Discuz 6.0 (2fly_gift.php) Sql Injection Vulnerability | ||
>[12] 7878 | 2009-08-19 | Discuz! Remote Reset User Password Exploit | ||
>[13] 7879 | 2009-08-19 | Discuz! 6.x/7.x Remote Code Execution Exploit | ||
>[14] 10534 | 2008-08-07 | Comsenz Discuz! 6.0.1 Sql injection | ||
END | ||
``` | ||
|
||
## NOTE: | ||
- The `NUML` is mean the serial number in local machine | ||
- The `NUMC` is mean the serial number of CVE |
Oops, something went wrong.