Sandeep Singh
Sandeep Singh
@pikpikcu do we have any reference for this misconfiguration? not sure if this is a default login or something else? ``` M>nfttbhf/mjol/epd/gpmefs/pqfo'N>.8384143124345859279'U>36947294:7258 ```
@jaimin4949 I was looking at this and blog as well - https://jaimin07.medium.com/cve-2021-3110-75a24943ca5e, any suggestion to setup vulnerable version of `Prestashop` to confirm this?
Thank you @cognn, we can work on this template to include the vulnerable SQLI request instead of a passive check.
https://github.com/projectdiscovery/httpx/pull/1230#issuecomment-1938868119
@xm1k3 we can include skipped host information as part of `-elog` option. ```json { "host": "http://asdsadsadagoogle.coms", "error": "no address found for host", "skipped": true } ```
@Techbrunch if you are interested to learn about hosts that are skipped or errored out, you can always use `-elog` option to write the errored host to file and looks...
@Techbrunch fixed with https://github.com/projectdiscovery/nuclei/pull/3123
@Techbrunch follow up issue to disable this feature - https://github.com/projectdiscovery/nuclei/issues/3138
Docs - https://docs.projectdiscovery.io/templates/protocols/javascript/modules/net#net-open-protocol-address-netconn
Closing as per the above comment.