diff --git a/Discovery/Web-Content/README.md b/Discovery/Web-Content/README.md index d50d6dfa..eb814c5c 100644 --- a/Discovery/Web-Content/README.md +++ b/Discovery/Web-Content/README.md @@ -104,3 +104,39 @@ References: - https://gist.github.com/harisec/519dc6b45c6b594908c37d9ac19edbc3 - https://github.com/projectdiscovery/nuclei-templates/blob/master/vulnerabilities/generic/generic-j2ee-lfi.yaml - https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LFIModule.java + + +## Frontpage.fuzz.txt +Use for: Fuzzing for common filepaths in webpages designed with **[Microsoft Frontpage](https://en.wikipedia.org/wiki/Microsoft_FrontPage)** + +Year of the first release of Microsoft Frontpage: 1997 +Year of the last release of Microsoft Frontpage: 2003 + +Date of last update: Oct 14, 2010 + + +## jrun.txt +Use for: Fuzzing for common filepaths in webpages served with **[Java Servlet Runner (Adobe JRun)](https://adobe.fandom.com/wiki/JRun)** + +Year of the first release of Java Servlet Runner (Adobe JRun): 1997 +Year of the last release of Java Servlet Runner (Adobe JRun): 2007 + +Date of last update: Oct 14, 2010 + + +## iplanet.txt +Use for: Fuzzing for common filepaths in webpages served with **[Oracle Sun iPlanet](https://www.oracle.com/middleware/technologies/webtier.html)** + +Year of the first release of Java Servlet Runner (Adobe JRun): 1994 +Year of the last release of Java Servlet Runner (Adobe JRun): 2017 + +Date of last update: Oct 14, 2010 + + +## Web-Server-Glassfish-Sun-Microsystems.txt +Use for: Fuzzing for common filepaths in webpages served with **[Glassfish - Sun Microsystems](https://glassfish.org/)** + +Year of the first release of Glassfish: [2005](https://en.wikipedia.org/wiki/GlassFish) +Glassfish is still in recieving updates as of 2024. + +Date of last update: Oct 14, 2010 \ No newline at end of file diff --git a/Fuzzing/README.md b/Fuzzing/README.md index 1070caef..3b2fee8a 100644 --- a/Fuzzing/README.md +++ b/Fuzzing/README.md @@ -18,4 +18,9 @@ Use for: Fuzzing for [XSS vulnerabilities in URIs](https://www.youtube.com/watch?v=NJulOqWjA9k) Source: [JBroFuzz](https://sourceforge.net/projects/jbrofuzz/) - https://sourceforge.net/p/jbrofuzz/code/HEAD/tree/tar/README-FUZZERS -- https://sourceforge.net/p/jbrofuzz/code/HEAD/tree/tar/fuzzers.jbrf \ No newline at end of file +- https://sourceforge.net/p/jbrofuzz/code/HEAD/tree/tar/fuzzers.jbrf + + +## fully-qualified-java-classes.txt + +Use for: Fuzzing URL parameters in **web applications** to test for **deserialisation** and **type confusion** vulnerabilities.