Prince Chaddha
|
213b63e42a
|
updated oast matchers
|
2023-10-08 13:24:05 +05:30 |
Prince Chaddha
|
d28c19efa6
|
Update CVE-2020-8813.yaml
|
2023-10-08 12:48:55 +05:30 |
Prince Chaddha
|
1cd804ad8c
|
Added Impact
|
2023-09-27 21:21:13 +05:30 |
Prince Chaddha
|
cf900022f5
|
Merge branch 'main' into remediations
|
2023-09-11 12:02:51 +05:30 |
Ritik Chaddha
|
2b0d68f7e7
|
matcher update
|
2023-09-10 20:01:33 +05:30 |
Prince Chaddha
|
7d9d59ab58
|
updated 2020 CVEs
|
2023-09-06 17:52:36 +05:30 |
pussycat0x
|
a6dd2314a9
|
Merge pull request #7802 from j4vaovo/patch-4
fix CVE-2020-2036 false-positive
|
2023-09-05 17:39:44 +05:30 |
Sandeep Singh
|
2a37a061a8
|
Merge branch 'main' into epss-percentile
|
2023-09-01 14:29:43 +05:30 |
Dhiyaneshwaran
|
a2db8b7ec5
|
payload updation
|
2023-09-01 08:34:21 +05:30 |
Dhiyaneshwaran
|
6d5a53306e
|
Merge pull request #8127 from projectdiscovery/CVE-2020-10220
Create CVE-2020-10220.yaml & update rconfig-file-upload.yaml
|
2023-09-01 08:32:08 +05:30 |
Dhiyaneshwaran
|
0d9daed8d8
|
matchers-condition: and added
|
2023-09-01 08:25:12 +05:30 |
GitHub Action
|
af9148890b
|
TemplateMan Update [Fri Sep 1 02:54:41 UTC 2023] 🤖
|
2023-09-01 02:54:42 +00:00 |
Ritik Chaddha
|
d425d8da65
|
Create CVE-2020-10220.yaml
|
2023-09-01 00:53:15 +05:30 |
Tarunkant Gupta
|
3b74f3747d
|
Adding one more path in CVE-2020-13379.yaml
|
2023-08-31 23:08:16 +05:30 |
sandeep
|
d428cc0c9c
|
Added EPSS Percentile
|
2023-08-31 17:16:18 +05:30 |
Dhiyaneshwaran
|
60a0fe67f5
|
cvss added
|
2023-08-25 13:57:04 +05:30 |
Ritik Chaddha
|
f4faa84ffb
|
Create CVE-2020-11798.yaml
|
2023-08-25 11:38:13 +05:30 |
Prince Chaddha
|
91339e0177
|
Fixed FP - CVE-2020-28185
|
2023-08-21 21:43:48 +05:30 |
pentesttools-com
|
38eafd33a2
|
Modified reference format from string to list to match the remaining cve modules (#8006)
|
2023-08-18 17:48:01 +05:30 |
Walter Sagehorn
|
6687a699f1
|
Fixes incorrect tag in CVE-2020-28185
TerraMaster TOS < 4.2.06 - User Enumeration
|
2023-08-11 11:54:13 -05:00 |
GitHub Action
|
9a1cc98726
|
TemplateMan Update [Wed Aug 9 07:49:29 UTC 2023] 🤖
|
2023-08-09 07:49:30 +00:00 |
Dhiyaneshwaran
|
d836e594ad
|
fix template
|
2023-08-09 13:08:58 +05:30 |
pussycat0x
|
ec72aec7f6
|
TerraMaster TOS - User Enumeration
|
2023-08-08 15:05:46 +05:30 |
Dhiyaneshwaran
|
7c2776114f
|
reference fix
83bf20510f (diff-4ac5b144d339b0b2e) […]de2f270e0b84a65a120712 ctrl+ f search for CVE-2020-10199
|
2023-08-07 15:37:30 +05:30 |
J4vaovo
|
ef89c8637f
|
Update CVE-2020-2036.yaml
|
2023-08-01 08:03:49 +08:00 |
J4vaovo
|
bfc27c95d8
|
Update CVE-2020-2036.yaml
|
2023-08-01 07:56:42 +08:00 |
Ritik Chaddha
|
5fe0dfef0f
|
Update CVE-2020-9344.yaml
|
2023-07-26 11:56:52 +05:30 |
Ritik Chaddha
|
f0fa5c00f9
|
Update CVE-2020-19295.yaml
|
2023-07-25 18:13:43 +05:30 |
Ritik Chaddha
|
e9ac583f2c
|
Update CVE-2020-11930.yaml
|
2023-07-25 16:51:15 +05:30 |
Ritik Chaddha
|
0eb647310e
|
Merge pull request #7728 from projectdiscovery/remove-nuclei-keyword
Replaced Hardcoded Nuclei Keyword
|
2023-07-21 17:13:56 +05:30 |
sandeep
|
dd0c565377
|
misc update
|
2023-07-20 14:52:46 +05:30 |
Dhiyaneshwaran
|
f8d7275527
|
Replaced Hardcoded Nuclei Keyword
|
2023-07-20 13:13:09 +05:30 |
Dhiyaneshwaran
|
2504eb8ea9
|
Merge pull request #7718 from projectdiscovery/princechaddha-patch-3
Fixed FP - CVE-2020-13167
|
2023-07-18 14:35:06 +05:30 |
Prince Chaddha
|
249ad821ec
|
Fixed FP - CVE-2020-13167
|
2023-07-18 14:05:45 +05:30 |
Dhiyaneshwaran
|
b485eaaf50
|
Merge branch 'main' into Thirukrishnan-patch-1
|
2023-07-18 13:21:56 +05:30 |
Dhiyaneshwaran
|
6eb7489dd4
|
added metadata
|
2023-07-18 13:05:20 +05:30 |
Dhiyaneshwaran
|
1d54849488
|
adding matcher - 1st request
|
2023-07-18 11:25:12 +05:30 |
pussycat0x
|
62fea9f47a
|
Update CVE-2020-17463.yaml
|
2023-07-16 21:01:00 +05:30 |
pussycat0x
|
f8d7f3a427
|
Update CVE-2020-17463.yaml
|
2023-07-16 15:35:17 +05:30 |
pussycat0x
|
ac05fd9232
|
minor -changes
|
2023-07-16 15:26:13 +05:30 |
Thirukrishnan
|
e2f3a058d7
|
Update CVE-2020-17463.yaml
|
2023-07-16 13:15:08 +05:30 |
Thirukrishnan
|
28b8b179a0
|
Create CVE-2020-17463.yaml
Template for CVE-2020-17463 under defcon31 label
|
2023-07-16 13:05:32 +05:30 |
sandeep
|
83bf20510f
|
more updates
|
2023-07-15 21:59:17 +05:30 |
sandeep
|
b5a88ad386
|
tags update
|
2023-07-12 17:26:50 +05:30 |
sandeep
|
dd83af0228
|
CVE Enrichment 🎉
|
2023-07-12 01:19:27 +05:30 |
Prince Chaddha
|
b316cc936f
|
Merge pull request #7618 from projectdiscovery/remove-comments
removed enhanced by comments
|
2023-07-07 17:00:46 +05:30 |
Prince Chaddha
|
0a681ec0bb
|
removed empty lines
|
2023-07-07 16:56:27 +05:30 |
GitHub Action
|
cb26083079
|
TemplateMan Update [Fri Jul 7 11:17:58 UTC 2023] 🤖
|
2023-07-07 11:17:59 +00:00 |
pussycat0x
|
cb6eaf95a2
|
Merge pull request #7637 from projectdiscovery/cve-templates4
CVEs added
|
2023-07-07 16:46:09 +05:30 |
pussycat0x
|
0ccffd229a
|
Merge branch 'main' into remove-comments
|
2023-07-07 16:38:46 +05:30 |
Dhiyaneshwaran
|
6c7678fcec
|
Merge branch 'cve-templates4' of https://github.com/projectdiscovery/nuclei-templates into cve-templates4
|
2023-07-07 16:21:19 +05:30 |
Dhiyaneshwaran
|
c77309373b
|
fix payload and directory
|
2023-07-07 16:21:07 +05:30 |
pussycat0x
|
993541f0aa
|
tag - update
|
2023-07-07 16:18:49 +05:30 |
Prince Chaddha
|
7d7e4f43ac
|
updated stored tags
|
2023-07-07 15:34:00 +05:30 |
Prince Chaddha
|
7b99d90f26
|
updated tags
|
2023-07-07 15:32:52 +05:30 |
Prince Chaddha
|
332e19282e
|
templates added
|
2023-07-07 15:08:49 +05:30 |
Ritik Chaddha
|
743cbaa246
|
Update CVE-2020-24186.yaml
|
2023-07-07 10:15:45 +05:30 |
Prince Chaddha
|
75ed275328
|
removed enhanced by comments
|
2023-07-05 13:37:58 +05:30 |
Prince Chaddha
|
ba7ec9a05f
|
updates
|
2023-07-05 13:20:14 +05:30 |
GitHub Action
|
41277637c0
|
TemplateMan Update [Wed Jun 21 21:03:53 UTC 2023] 🤖
|
2023-06-21 21:03:54 +00:00 |
sandeep
|
c90fa30096
|
removed deprecated header syntax with latest one
|
2023-06-20 02:40:30 +05:30 |
Ritik Chaddha
|
ba09c8e961
|
Merge pull request #7457 from j4vaovo/patch-67
Update CVE-2020-28871.yaml
|
2023-06-16 10:30:47 +05:30 |
Ritik Chaddha
|
bab7fa74c2
|
Update CVE-2020-28871.yaml
|
2023-06-16 10:17:21 +05:30 |
Dhiyaneshwaran
|
09d2757291
|
Merge pull request #7185 from ViCrack/xstream-curl
Fixed CVE-2013-7285 / Updated CVE-2020-26217 / Updated CVE-2021-21345 / Updated CVE-2021-39144
|
2023-06-16 10:05:17 +05:30 |
J4vaovo
|
1898e69137
|
Update CVE-2020-28871.yaml
|
2023-06-15 19:44:34 +08:00 |
Prince Chaddha
|
f9fd870fbb
|
misc changes
|
2023-06-12 18:54:55 +05:30 |
J4vaovo
|
124a982be8
|
Update CVE-2020-14750.yaml (#7370)
|
2023-06-09 16:26:52 +05:30 |
pussycat0x
|
771aab655a
|
Merge pull request #7299 from kazet/fixing-fp-http/cves/2020/CVE-2020-35847.yaml
Fixing false-positive in cves/2020/CVE-2020-35847.yaml
|
2023-06-09 00:30:20 +05:30 |
Ritik Chaddha
|
2b8f5b3c7e
|
updated the req and matcher
|
2023-06-08 23:15:41 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
Dhiyaneshwaran
|
351fa87812
|
Merge pull request #7214 from projectdiscovery/princechaddha-patch-4
Added CVE-2020-1956
|
2023-05-31 11:04:30 +05:30 |
Dhiyaneshwaran
|
14f099fc68
|
minor update
|
2023-05-31 11:02:07 +05:30 |
pussycat0x
|
8e0c99bf5f
|
matcher -update
|
2023-05-31 07:23:36 +05:30 |
Krzysztof Zając
|
24c236b05e
|
Fixing false-positive in cves/2020/CVE-2020-35847.yaml
|
2023-05-26 09:04:17 +02:00 |
pussycat0x
|
f9763244e1
|
Merge pull request #7124 from mastercho/dev
Fix CVE-2020-35847 false positive
|
2023-05-26 12:20:52 +05:30 |
Ritik Chaddha
|
85c2642e84
|
Merge branch 'main' into patch-3
|
2023-05-25 23:50:28 +05:30 |
Ritik Chaddha
|
e448122e34
|
updated matchers,path,info
|
2023-05-25 23:48:57 +05:30 |
Ritik Chaddha
|
8ea82a7e75
|
updated matchers and metadata
|
2023-05-25 18:25:27 +05:30 |
Prince Chaddha
|
b95c43b7ce
|
updated reference
|
2023-05-11 17:47:48 +05:30 |
Prince Chaddha
|
4bf57ffdd2
|
Merge branch 'main' into dev
|
2023-05-11 15:25:17 +05:30 |
Prince Chaddha
|
c317a06dd4
|
fixing conflict
|
2023-05-11 15:24:10 +05:30 |
Prince Chaddha
|
0d8aa48c87
|
Create CVE-2020-1956.yaml
|
2023-05-11 14:33:44 +05:30 |
Sandeep Singh
|
6addff3ac6
|
misc syntax fixes (#7201)
|
2023-05-09 18:13:13 +05:30 |
Dhiyaneshwaran
|
5875abf833
|
Merge pull request #7182 from ViCrack/CVE-2020-14883
Updated CVE-2020-14883
|
2023-05-08 11:03:41 +05:30 |
Arm!tage
|
9dbcf5b78a
|
change to default password
|
2023-05-08 00:19:29 +08:00 |
ViCrack
|
5b88116b2e
|
fix xstream
|
2023-05-07 00:36:32 +08:00 |
Ritik Chaddha
|
1732a81929
|
added shodan
|
2023-05-06 12:38:20 +05:30 |
Ritik Chaddha
|
cb6ebb417b
|
updated variable and matcher
|
2023-05-06 12:29:32 +05:30 |
ViCrack
|
df22dcc281
|
add support for Windows
|
2023-05-06 14:21:07 +08:00 |
pussycat0x
|
983915d4bc
|
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml
|
2023-05-05 19:02:53 +05:30 |
Dhiyaneshwaran
|
6ea44267d5
|
Merge branch 'main' into main
|
2023-05-05 18:35:06 +05:30 |
mlec
|
8c792b2911
|
fix(false-positive): Add removed part after rebased 🩹
Refs:
- https://github.com/projectdiscovery/nuclei-templates/issues/5934
- https://github.com/projectdiscovery/nuclei-templates/pull/5939
|
2023-05-05 08:17:35 +02:00 |
pussycat0x
|
a7b52d98a9
|
Merge branch 'main' into main
|
2023-05-05 10:38:42 +05:30 |
pussycat0x
|
9e7fa915d9
|
protocol update
|
2023-05-05 10:35:38 +05:30 |
pussycat0x
|
8458967376
|
Rename cves/2020/CVE-2020-5847.yaml to http/cves/2020/CVE-2020-5847.yaml
|
2023-05-05 10:33:34 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
Dhiyaneshwaran
|
658575fb02
|
Merge pull request #5520 from edoardottt/CVE-2020-27481
Add CVE-2020-27481
|
2023-04-27 23:10:11 +05:30 |
Dhiyaneshwaran
|
38514e4bd1
|
Update and rename cves/2020/CVE-2020-27481.yaml to http/cves/2020/CVE-2020-27481.yaml
|
2023-04-27 23:06:26 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |