Commit Graph

763 Commits (0a9264369c7fa7a929faa746fe6ecfe8e2c09fed)

Author SHA1 Message Date
Dhiyaneshwaran aec030bdaa
Merge pull request #8308 from luisfelipe146/main
Create CVE-2023-2224.yaml
2023-10-05 17:29:16 +05:30
Ritik Chaddha 7a7a867b7b
Update CVE-2023-2224.yaml 2023-10-05 11:35:30 +05:30
ctflearner 6f37e9b554
Create CVE-2023-38501.YAML 2023-10-04 06:56:45 +05:30
Dhiyaneshwaran 751ddc980a
Create CVE-2023-33405.yaml 2023-10-03 18:33:29 +05:30
Ritik Chaddha ac6bb1823c
Merge pull request #8272 from projectdiscovery/CVE-2023-22432
Create CVE-2023-22432.yaml
2023-10-03 13:40:06 +05:30
Ritik Chaddha 568b53ef70
Merge pull request #8295 from gy741/rule-add-v146
Create CVE-2023-30625.yaml
2023-10-03 13:33:19 +05:30
Ritik Chaddha 22c0b5891d
updated matcher & req 2023-10-03 13:32:34 +05:30
Ritik Chaddha 43fc4f3795
added status matcher 2023-10-03 13:18:23 +05:30
GitHub Action 172150f538 TemplateMan Update [Tue Oct 3 06:50:17 UTC 2023] 🤖 2023-10-03 06:50:18 +00:00
pussycat0x e13ab6cfdd
Merge pull request #8301 from gy741/rule-add-v148
Create CVE-2023-33831.yaml
2023-10-03 12:18:01 +05:30
pussycat0x 1e956367e0
Update CVE-2023-33831.yaml 2023-10-03 12:13:22 +05:30
Luis Felipe 63dcb68b75
Create CVE-2023-2224.yaml 2023-10-02 08:57:09 -03:00
gy741 fef8a38e22
Create CVE-2023-43261 (#8300)
* Auto WordPress Plugins Update [Sun Oct  1 04:12:23 UTC 2023] 🤖

* Create CVE-2023-43261.yaml

A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>

* Revert "Auto WordPress Plugins Update [Sun Oct  1 04:12:23 UTC 2023] 🤖"

This reverts commit ceb38c80b0.

* added metadata

---------

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Dhiyaneshwaran <leedhiyanesh@gmail.com>
2023-10-02 13:51:12 +05:30
Dhiyaneshwaran ffa4a84ba9
added metadata and updated matcher 2023-10-02 00:47:23 +05:30
GwanYeong Kim 06674c9bca Create CVE-2023-33831.yaml
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2023-10-02 01:19:18 +09:00
Prince Chaddha 48b3253a7e added additional matcher 2023-10-01 13:59:50 +05:30
GwanYeong Kim 208ff38843 Create CVE-2023-30013.yaml
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2023-09-30 13:15:00 +09:00
sandeep ff450a65ba strict matcher 2023-09-29 19:04:39 +05:30
sandeep fd69046097 Added CVE-2023-29357 (Microsoft SharePoint - Authentication Bypass) 2023-09-29 18:51:23 +05:30
Ritik Chaddha e616bb0ec7
protocol update 2023-09-27 23:35:44 +05:30
Ritik Chaddha bc957cd1a4
Update CVE-2023-42793.yaml 2023-09-27 23:35:06 +05:30
sandeep f0ba24afa1 JetBrains TeamCity - Remote Code Execution (CVE-2023-42793) 2023-09-27 23:25:18 +05:30
Dhiyaneshwaran dc6b9c1e73
metadata update 2023-09-27 14:39:20 +05:30
Dhiyaneshwaran 334c3be057
Create CVE-2023-22432.yaml 2023-09-27 14:38:24 +05:30
Ritik Chaddha 1f7ceddbff
Update CVE-2023-40068.yaml 2023-09-26 23:39:38 +05:30
pussycat0x e47239d4df
Merge pull request #8267 from projectdiscovery/CVE-2023-5074
Create CVE-2023-5074.yaml (Authentication Bypass in D-Link D-View 8 🔥 )
2023-09-26 21:24:12 +05:30
pussycat0x 17669c7fd8
lint -fix 2023-09-26 21:21:03 +05:30
pussycat0x 5f4f590e7f
Update CVE-2023-5074.yaml 2023-09-26 21:16:55 +05:30
pussycat0x 3b789d908b
Update CVE-2023-5074.yaml 2023-09-26 21:13:29 +05:30
GitHub Action eec309f75f TemplateMan Update [Tue Sep 26 15:42:15 UTC 2023] 🤖 2023-09-26 15:42:16 +00:00
pussycat0x 85868d5802
Merge pull request #8216 from zn9988/main
Create CVE-2023-2479.yaml
2023-09-26 21:09:57 +05:30
Dhiyaneshwaran e48aa75f0f
fix-trail-spacing 2023-09-26 20:09:49 +05:30
Dhiyaneshwaran 52c9d36132
Create CVE-2023-5074.yaml 2023-09-26 20:05:39 +05:30
pussycat0x 634eb6f24f
Merge pull request #8225 from projectdiscovery/CVE-2023-36845
Create CVE-2023-36845.yaml (Juniper J-Web - Remote Code Execution 🔥 )
2023-09-26 18:57:53 +05:30
Dhiyaneshwaran 6d40f1256d
fix trail space 2023-09-26 12:42:57 +05:30
Dhiyaneshwaran ae67cf87ba
minor update 2023-09-26 12:33:31 +05:30
GwanYeong Kim 463f722ad7 Create CVE-2023-30625.yaml
rudder-server is part of RudderStack, an open source Customer Data Platform (CDP). Versions of rudder-server prior to 1.3.0-rc.1 are vulnerable to SQL injection. This issue may lead to Remote Code Execution (RCE) due to the `rudder` role in PostgresSQL having superuser permissions by default. Version 1.3.0-rc.1 contains patches for this issue.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2023-09-24 18:15:00 +09:00
pentesttools-com d549599606
fix: typo in cve-2023-23492 template name (#8250) 2023-09-23 15:12:58 +05:30
pentesttools-com 8c3ccf581b
fix: typo in template CVE-2023-24735 name 2023-09-21 11:10:50 +03:00
Ritik Chaddha 47f97458af
Create CVE-2023-42442.yaml 2023-09-20 16:14:04 +05:30
pussycat0x 3115469524
Merge pull request #8224 from projectdiscovery/CVE-2023-4568
Create CVE-2023-4568.yaml (PaperCut NG Unauthenticated XMLRPC Functionality 🔥 )
2023-09-19 13:50:04 +05:30
Dhiyaneshwaran 4dc094fffa
Create CVE-2023-36845.yaml 2023-09-19 07:24:05 +05:30
Ritik Chaddha 835179f9be
Merge pull request #8203 from projectdiscovery/CVE-2023-2766
Create CVE-2023-2766.yaml
2023-09-18 23:51:03 +05:30
Ritik Chaddha 6335a4e3a0
matcher and info update 2023-09-18 23:47:32 +05:30
Dhiyaneshwaran 681a1b3263
Create CVE-2023-4568.yaml 2023-09-18 23:06:47 +05:30
Ritik Chaddha 601100cd0f
Merge pull request #8215 from projectdiscovery/princechaddha-patch-2
Create CVE-2023-41892.yaml
2023-09-18 15:20:42 +05:30
Dhiyaneshwaran 823e1b1f49
Merge pull request #8113 from harsh2403/patch-18
Create CVE-2023-37629.yaml
2023-09-18 15:18:37 +05:30
Prince Chaddha 716c8ddfce
updated matcher 2023-09-18 15:17:31 +05:30
Prince Chaddha b6550ca831
updated matcher 2023-09-18 14:31:39 +05:30
pussycat0x 0e4f7b0565
Update CVE-2023-2813.yaml 2023-09-17 13:41:16 +05:30
pussycat0x 1baa17c029 Fix FP -CVE-2023-2813 2023-09-17 13:37:19 +05:30
pussycat0x 4ace2254fa
Merge pull request #8218 from projectdiscovery/CVE-2023-2813
Create CVE-2023-2813.yaml (48 Wordpress Themes Affected 🔥 )
2023-09-16 23:21:00 +05:30
Ritik Chaddha 0f037e9860
request update 2023-09-15 22:39:22 +05:30
GitHub Action 86659ff1f4 TemplateMan Update [Fri Sep 15 17:04:28 UTC 2023] 🤖 2023-09-15 17:04:28 +00:00
Ritik Chaddha 8f3dfab992
Merge pull request #8178 from meme-lord/phpinfo_template
Added template for CVE-2023-39677 MyPrestaModules PHPInfo
2023-09-15 22:32:31 +05:30
Ritik Chaddha 03eb0dedc8
Merge pull request #8204 from projectdiscovery/CVE-2023-22463
Create CVE-2023-22463.yaml (KubePi JwtSigKey - Login Bypass 🔥 )
2023-09-15 22:31:29 +05:30
Ritik Chaddha 89683e2c2b
info update 2023-09-15 22:24:13 +05:30
Ritik Chaddha af6f3e0897
Merge pull request #8210 from projectdiscovery/CVE-2023-4714
Create CVE-2023-4714.yaml
2023-09-15 22:16:15 +05:30
Ritik Chaddha 428b82492d
matcher & info update 2023-09-15 22:16:06 +05:30
Ritik Chaddha 753e4e5af7
matcher update 2023-09-15 22:12:25 +05:30
Ritik Chaddha b665b1b0e8
info update 2023-09-15 22:11:27 +05:30
Dhiyaneshwaran f122fc3ec9
Create CVE-2023-2813.yaml 2023-09-15 18:19:17 +05:30
Dhiyaneshwaran 1353a5c204
added metadata 2023-09-15 15:54:32 +05:30
Prince Chaddha d405588ec1
Create CVE-2023-41892.yaml 2023-09-15 12:44:48 +05:30
zn9988 a711c0cc04
Create CVE-2023-2479.yaml 2023-09-15 15:11:13 +08:00
Ritik Chaddha 67bf15b8cb
Update CVE-2023-25573.yaml 2023-09-14 23:02:41 +05:30
Dhiyaneshwaran 3d99f465a6
Update CVE-2023-4714.yaml 2023-09-14 20:41:26 +05:30
Dhiyaneshwaran a35edf9795
Create CVE-2023-4714.yaml 2023-09-14 20:38:32 +05:30
Dhiyaneshwaran 9e2b1fa698
Update CVE-2023-25573.yaml 2023-09-14 20:34:56 +05:30
Dhiyaneshwaran 646084dced
Create CVE-2023-25573.yaml 2023-09-14 20:29:27 +05:30
Dhiyaneshwaran db0ac300f5
Create CVE-2023-22463.yaml 2023-09-13 18:30:12 +05:30
Dhiyaneshwaran 82d46bb11d
Create CVE-2023-2766.yaml 2023-09-13 18:07:55 +05:30
Ritik Chaddha ec427cc415
matcher updated 2023-09-13 14:22:51 +05:30
E1A 8fe5780891 Changed template like the script 2023-09-13 09:24:47 +02:00
pussycat0x b4b8015c73
Merge pull request #8173 from meme-lord/main
Added template for CVE-2023-39676 FieldPopupNewsletter XSS
2023-09-12 17:27:58 +05:30
pussycat0x f9fe314b2c name - update 2023-09-12 17:15:08 +05:30
GitHub Action 78e1d30ab4 TemplateMan Update [Tue Sep 12 10:04:40 UTC 2023] 🤖 2023-09-12 10:04:40 +00:00
Dhiyaneshwaran 38048e3023
Merge pull request #8120 from projectdiscovery/CVE-2023-30943
Create CVE-2023-30943.yaml
2023-09-12 15:32:40 +05:30
Ritik Chaddha 74eff31e1d
info update 2023-09-12 12:50:58 +05:30
Ritik Chaddha 8508734893
added classification 2023-09-12 12:49:44 +05:30
Ritik Chaddha 5a9459d0fd
updated template 2023-09-12 12:44:40 +05:30
Ritik Chaddha 151d5e4dcf
regex updated 2023-09-11 20:44:40 +05:30
Prince Chaddha f9cf8a303a
Merge pull request #8169 from projectdiscovery/remediations
Updating remediation for CVEs
2023-09-11 20:03:59 +05:30
pussycat0x 921a06f483
Merge pull request #8187 from muthumohanprasath/muthumohanprasath-patch-1
Create CVE-2023-39598.yaml
2023-09-11 15:41:20 +05:30
Dhiyaneshwaran e6912e6342
corrected description 2023-09-11 13:09:49 +05:30
Dhiyaneshwaran d888ca0d4b
Update CVE-2023-39677.yaml 2023-09-11 12:27:02 +05:30
Dhiyaneshwaran 5da357447f
Update CVE-2023-39676.yaml 2023-09-11 12:14:30 +05:30
Prince Chaddha cf900022f5
Merge branch 'main' into remediations 2023-09-11 12:02:51 +05:30
Dhiyaneshwaran b71a7bb05c
Merge pull request #8188 from muthumohanprasath/muthumohanprasath-patch-2
Create CVE-2023-39600.yaml
2023-09-10 22:28:58 +05:30
Ritik Chaddha 8bb91fcd4f
Rename CVE-2023-38433.yaml to CVE-2023-38433.yaml 2023-09-10 20:06:14 +05:30
Ritik Chaddha 4471d442e0
matcher update 2023-09-10 20:04:42 +05:30
Ritik Chaddha 3ea7388fa2
Rename CVE-2023-39598.yaml to CVE-2023-39598.yaml 2023-09-10 20:03:49 +05:30
Ritik Chaddha 8196867c7a
Update and rename CVE-2023-39600.yaml to CVE-2023-39600.yaml 2023-09-10 20:02:16 +05:30
meme-lord c36a419cac added myprestamodules phpinfo template 2023-09-08 12:30:28 +01:00
meme-lord dad997b818 added template for CVE-2023-39676 FieldPopupNewsletter XSS 2023-09-07 10:43:17 +01:00
Prince Chaddha e418b30d19 Merge branch 'remediations' of https://github.com/projectdiscovery/nuclei-templates into remediations 2023-09-06 18:53:19 +05:30
Prince Chaddha 3f650354e1 updated other CVEs 2023-09-06 18:52:34 +05:30
Prince Chaddha 74f0907215
Rename CVE-2023-36346 2.yaml to CVE-2023-36346.yaml 2023-09-06 18:50:10 +05:30
Prince Chaddha d6f27be44f Merge branch 'remediations' of https://github.com/projectdiscovery/nuclei-templates into remediations 2023-09-06 17:52:49 +05:30
Prince Chaddha 09c59282c4
fixed lint error 2023-09-06 17:52:30 +05:30
Prince Chaddha a09a0c8d7a Updated 2021 CVEs 2023-09-06 17:39:01 +05:30
Ritik Chaddha d103f3140c
reference & matcher update 2023-09-06 17:37:50 +05:30
Prince Chaddha 449651f076 updated 2022 CVEs 2023-09-06 17:29:08 +05:30
Ritik Chaddha 469b7f7049
matchers update 2023-09-06 17:17:28 +05:30
Prince Chaddha 137cf38b8b updated remediation in 2023 CVEs 2023-09-06 17:13:37 +05:30
Ritik Chaddha 8939245dee
Create CVE-2023-39361.yaml 2023-09-06 17:09:51 +05:30
Dhiyaneshwaran 9e32a2fcbf
Merge pull request #8160 from projectdiscovery/CVE-2023-4634
Create CVE-2023-4634.yaml
2023-09-05 19:06:20 +05:30
Ritik Chaddha 09275ac997
lint fix 2023-09-05 19:03:32 +05:30
Ritik Chaddha fc0dcf0ea7
update metadata & ref 2023-09-05 19:02:19 +05:30
Ritik Chaddha 7534ad59ac
Create CVE-2023-4634.yaml 2023-09-05 19:00:09 +05:30
Ritik Chaddha b8b9e7b92b
Create CVE-2023-2648.yaml 2023-09-05 18:02:23 +05:30
Sandeep Singh 2a37a061a8
Merge branch 'main' into epss-percentile 2023-09-01 14:29:43 +05:30
GitHub Action 047ecaa915 TemplateMan Update [Thu Aug 31 15:54:09 UTC 2023] 🤖 2023-08-31 15:54:09 +00:00
Dhiyaneshwaran d1c6782c2f
Merge pull request #7731 from projectdiscovery/CVE-2023-34192
Create CVE-2023-34192.yaml (Zimbra XSS)
2023-08-31 21:22:12 +05:30
sandeep d428cc0c9c Added EPSS Percentile 2023-08-31 17:16:18 +05:30
Ritik Chaddha 83bb3b4766
Create CVE-2023-30943.yaml 2023-08-31 10:04:29 +05:30
Dhiyaneshwaran 12c478a2c8
minor update 2023-08-31 01:31:43 +05:30
sandeep 50ebcba392 Merge branch 'main' of https://github.com/E1A/nuclei-templates into pr/8118 2023-08-31 01:18:54 +05:30
sandeep 7d93712fd3 misc update 2023-08-31 01:18:01 +05:30
E1A 5931319b1d
Update CVE-2023-40068.yaml 2023-08-30 21:47:39 +02:00
E1A bc8f7ce187
Create CVE-2023-40068.yaml 2023-08-30 21:35:56 +02:00
E1A b6be56c5b4
Delete http/cves/2023/CVE-2023-40068.yaml 2023-08-30 21:14:26 +02:00
E1A 055aae5df4
Merge branch 'projectdiscovery:main' into main 2023-08-30 21:11:03 +02:00
pussycat0x a397e12906
CVE-2023-26469 2023-08-30 23:01:52 +05:30
Harsh Yadav 3518319d95
Update CVE-2023-37629.yaml
Updated Author
2023-08-30 09:49:07 +05:30
Dhiyaneshwaran 23989d540e
fix-trail-space 2023-08-30 08:24:05 +05:30
Harsh Yadav 8c2227c4be
Create CVE-2023-37629.yaml 2023-08-29 23:17:46 +05:30
Ritik Chaddha 7106abd7b8
Merge branch 'main' into CVE-2023-34192 2023-08-29 16:43:02 +05:30
Ritik Chaddha 8feb47bead
Update CVE-2023-34192.yaml 2023-08-29 16:42:34 +05:30
pussycat0x 25ce5141f7
Update CVE-2023-39141.yaml 2023-08-29 13:54:35 +05:30
Dhiyaneshwaran 1ace193c51
Merge pull request #8087 from projectdiscovery/princechaddha-patch-3
Create CVE-2023-36844.yaml
2023-08-29 02:08:25 +05:30
Dhiyaneshwaran 7fd2a80c8c
Merge pull request #8099 from projectdiscovery/CVE-2023-34124
Create CVE-2023-34124.yaml
2023-08-29 02:07:51 +05:30
Ritik Chaddha f6e4c58708
template update 2023-08-29 00:25:45 +05:30
Ritik Chaddha 55c3839469
metadata update 2023-08-29 00:17:26 +05:30
Ritik Chaddha f1f1e457b1
updated severity 2023-08-29 00:09:15 +05:30
GitHub Action e627b0f699 TemplateMan Update [Mon Aug 28 18:37:37 UTC 2023] 🤖 2023-08-28 18:37:38 +00:00
Ritik Chaddha c9d059782a
Merge branch 'main' into princechaddha-patch-3 2023-08-29 00:02:03 +05:30
Ritik Chaddha bd1744502e
updated template 2023-08-29 00:01:48 +05:30
Dhiyaneshwaran 6e81e536a3
Update CVE-2023-34124.yaml 2023-08-28 22:35:22 +05:30
Ritik Chaddha 5f397028f7
Update CVE-2023-32563.yaml 2023-08-28 22:31:52 +05:30
Dhiyaneshwaran 5cbc0e4415
randstr 2023-08-28 22:30:28 +05:30
Dhiyaneshwaran df7a8852ad
regex fix 2023-08-28 22:14:26 +05:30
Dhiyaneshwaran df3313134f
yaml lint 2023-08-28 22:13:33 +05:30
Dhiyaneshwaran f04b826f4a
fix spaceing 2023-08-28 22:07:59 +05:30
Dhiyaneshwaran 5b68b4c71e
variable update 2023-08-28 21:20:44 +05:30
Dhiyaneshwaran 9427dc14df
fix trail space 2023-08-28 19:02:13 +05:30
Dhiyaneshwaran a1a8e6568b
Create CVE-2023-34124.yaml 2023-08-28 18:56:29 +05:30
Ritik Chaddha 46cb580f95
Merge branch 'main' into princechaddha-patch-5 2023-08-28 18:20:28 +05:30
Ritik Chaddha 96eacea06e
updated payload 2023-08-28 12:21:54 +05:30
GitHub Action 4501c3294d TemplateMan Update [Sat Aug 26 10:15:16 UTC 2023] 🤖 2023-08-26 10:15:16 +00:00
Prince Chaddha 5a6c1f88e3
Merge pull request #8026 from projectdiscovery/princechaddha-patch-2
Cisco VPN Routers - Unauthenticated Arbitrary File Upload and Stored XSS
2023-08-26 15:43:00 +05:30
sandeep fde3d043f0 appended html comment to match 2023-08-26 15:36:24 +05:30
Prince Chaddha 238807bde8
Create CVE-2023-32563.yaml 2023-08-26 13:23:49 +05:30
Prince Chaddha 8a86cbb523
Create CVE-2023-36844.yaml 2023-08-26 13:06:41 +05:30
GitHub Action 70d14b6858 TemplateMan Update [Fri Aug 25 14:08:39 UTC 2023] 🤖 2023-08-25 14:08:40 +00:00
Prince Chaddha f075cb4a00
Updated condition 2023-08-25 19:30:49 +05:30
mastercho 60418c566f Fix trailing space 2023-08-25 16:25:02 +03:00
mastercho 6b0b47a2d6 Fixed matchers and removed statuscode check as not always is 200 2023-08-25 16:17:54 +03:00
Prince Chaddha d5c2557fbc
fixed trailing spaces 2023-08-25 18:04:57 +05:30
Prince Chaddha 55dc24a4c5
Merge branch 'main' into prestashopsqli 2023-08-25 17:59:19 +05:30
Prince Chaddha c5e48e9cc8 updated matchers 2023-08-25 17:53:28 +05:30
Prince Chaddha 003c12a15e
updated matchers 2023-08-25 17:07:43 +05:30
Ritik Chaddha 17f6abec90
Merge pull request #8070 from projectdiscovery/CVE-2023-39026
Create CVE-2023-39026.yaml
2023-08-24 23:19:35 +05:30
Ritik Chaddha bcf747cc69
update matchers|info 2023-08-24 23:15:24 +05:30
Dhiyaneshwaran 777a520c8e
Create CVE-2023-38035.yaml (#8075)
* Create CVE-2023-38035.yaml

* syntax fix

* working template

* misc updates

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-08-24 23:10:37 +05:30
GitHub Action ce7d7f288c TemplateMan Update [Thu Aug 24 06:15:35 UTC 2023] 🤖 2023-08-24 06:15:36 +00:00
pussycat0x c63f2ee0ce
Merge pull request #8060 from projectdiscovery/CVE-2023-39141
Create CVE-2023-39141.yaml WebUI-Aria2 - Path traversal
2023-08-24 11:43:42 +05:30
pussycat0x eeb0288c31
dsl -update 2023-08-24 11:37:23 +05:30
Dhiyaneshwaran ec2d108430
Create CVE-2023-39026.yaml 2023-08-24 11:10:31 +05:30
Dhiyaneshwaran 73068f1b31
fix fp 2023-08-24 09:23:50 +05:30
Ritik Chaddha 7e53eed7dc
updated protocol 2023-08-23 22:47:11 +05:30
Ritik Chaddha 61f960a3bf
Update CVE-2023-3936.yaml 2023-08-23 22:39:04 +05:30
Dhiyaneshwaran 6372949eee
remove hardcoded 2023-08-23 22:38:12 +05:30
Ritik Chaddha 8ef36715e3
updated matcher/req/path&info 2023-08-23 22:36:12 +05:30
Dhiyaneshwaran 091f576f6b
added matchers-condition 2023-08-23 12:32:23 +05:30
Dhiyaneshwaran af7eca0d3e
Create CVE-2023-39141.yaml 2023-08-23 12:30:27 +05:30
E1A 4b8d227a3d
Update CVE-2023-40068.yaml 2023-08-22 11:52:15 +02:00
E1A 88728564b2
Update CVE-2023-40068.yaml 2023-08-22 11:49:23 +02:00
E1A 089e3242c1
Add files via upload 2023-08-22 10:57:57 +02:00
Dhiyaneshwaran fdec38604c
remove kev 2023-08-21 19:13:44 +05:30
Dhiyaneshwaran cf698f7907
Update CVE-2023-35082.yaml 2023-08-21 19:13:19 +05:30
Dhiyaneshwaran ce775b4722
Update CVE-2023-39143.yaml 2023-08-21 19:12:47 +05:30
Prince Chaddha b45bd30dde
Create CVE-2023-20073.yaml 2023-08-21 08:31:17 +05:30
mastercho 020f397cad Fixed naming of apmarketplace, fixed old CVE from medium to lowand added another sqli prestashop 2023-08-19 02:19:47 +03:00
mastercho cb8cbac9df Revert "Added/Fixed/Updated XXX Template"
This reverts commit dd08abe04e.

wrong commit message
2023-08-19 02:15:25 +03:00
mastercho dd08abe04e Added/Fixed/Updated XXX Template 2023-08-19 02:14:45 +03:00
pentesttools-com 38eafd33a2
Modified reference format from string to list to match the remaining cve modules (#8006) 2023-08-18 17:48:01 +05:30
Dhiyaneshwaran f8931e8381 nvd description updated 2023-08-18 13:30:45 +05:30
pentesttools-com daba6e2efb
Merge branch 'projectdiscovery:main' into add-missing-descriptions-cves 2023-08-18 10:47:36 +03:00
pentesttools-com 3edf136ea4
Added description fields for CVE-2021-44139 CVE-2023-38205 CVE-2023-34960 2023-08-18 10:46:53 +03:00
Dhiyaneshwaran 56780f8f72
spacing 2023-08-18 10:33:49 +05:30
Dhiyaneshwaran 0a51273b76 fix template 2023-08-17 18:36:07 +05:30
Dhiyaneshwaran 2dea3f4a44 remove version detection templates 2023-08-17 12:30:13 +05:30
momika233 d3affcfbfa
Add files via upload 2023-08-16 00:37:28 +08:00
Dhiyaneshwaran f6c1088240
Lexmark Command Injection ZDI-CAN-19470 Pwn2Own Toronto 2022 🔥 (#7910)
* Create CVE-2023-26067.yaml

* cmd exec check + better matchers

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-08-12 23:15:00 +05:30
Dhiyaneshwaran cbffe81504 re-wrote template 2023-08-09 02:32:42 +05:30
Ritik Chaddha 29669603b3
Merge pull request #7845 from projectdiscovery/CVE-2023-22480
Create CVE-2023-22480.yaml (KubeOperator Foreground kubeconfig Download) 🔥
2023-08-07 23:13:23 +05:30
Ritik Chaddha c281a1dc55
updated info 2023-08-07 22:53:08 +05:30
Dhiyaneshwaran ff474e87f5
fix headers -> header 2023-08-07 21:27:41 +05:30
pussycat0x 6dd47c914d
Merge pull request #7847 from projectdiscovery/CVE-2023-22478
Create CVE-2023-22478.yaml (KubePi <= v1.6.4 LoginLogsSearch)
2023-08-07 19:35:43 +05:30
Dhiyaneshwaran 1e8df323d2
Merge pull request #7846 from numanturle/CVE-2023-39120
Create CVE-2023-39120.yaml
2023-08-07 16:07:53 +05:30
Dhiyaneshwaran b58932e9c4
updated matcher and added metadata 2023-08-07 13:49:40 +05:30
Dhiyaneshwaran 3793c853fd
Create CVE-2023-39143.yaml (PaperCut Path Traversal Detection) KEV 🔥 (#7857)
* Create CVE-2023-39143.yaml

* added kev reference

* Fix FP and Match only against PaperCut

* updated to use dsl matchers

* classification update

* updated name

* misc update

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
2023-08-06 22:51:19 +05:30
numan 6ae1c5e514
Update CVE-2023-39120.yaml
fix typo
2023-08-05 13:38:40 +03:00
Dhiyaneshwaran fda5981960
Create CVE-2023-22478.yaml 2023-08-05 14:33:01 +05:30
numan eee628ac8a
Create CVE-2023-39120.yaml 2023-08-05 11:48:31 +03:00
Dhiyaneshwaran 4d1578d6e7
Create CVE-2023-22480.yaml 2023-08-05 14:16:12 +05:30
Dhiyaneshwaran eba1d1ce83
Create CVE-2023-35082.yaml 2023-08-03 21:50:05 +05:30
Ritik Chaddha 133f18eca9
Merge pull request #7789 from projectdiscovery/CVE-2023-1698
Create CVE-2023-1698.yaml
2023-08-02 13:50:28 +05:30
Ritik Chaddha 580c51dbc2
updated matcher 2023-08-02 13:47:13 +05:30
pussycat0x 85ce257f9f
Merge pull request #7787 from projectdiscovery/CVE-2023-32117
Create CVE-2023-32117.yaml
2023-08-02 12:02:14 +05:30
pussycat0x 873bd7c3cc
Update CVE-2023-32117.yaml 2023-08-02 11:14:25 +05:30
pussycat0x 4d4d008de0
lint - fix 2023-08-02 11:08:15 +05:30
pussycat0x ffd867ba2f
Update CVE-2023-32117.yaml 2023-08-02 11:05:02 +05:30
Dhiyaneshwaran f82cf5b7ca fix matcher for sqli template 2023-08-02 09:23:57 +05:30
Dhiyaneshwaran 5c66e70568
remove name 2023-08-01 15:04:14 +05:30
GitHub Action 69bed45657 TemplateMan Update [Tue Aug 1 07:02:52 UTC 2023] 🤖 2023-08-01 07:02:52 +00:00
Ritik Chaddha ddd0a02fbf
updated quote and space 2023-08-01 11:28:24 +05:30
Ritik Chaddha 69fb2db5c1
Create CVE-2023-37580.yaml (Zimbra XSS) 2023-08-01 10:56:17 +05:30
Dhiyaneshwaran c615ced4f8
fix-template 2023-08-01 09:53:40 +05:30
Ritik Chaddha 042ef1eba2
updated matcher 2023-07-31 18:56:35 +05:30
Ritik Chaddha 5b57ab4e93
Metadata update CVE-2023-35078.yaml 2023-07-31 18:52:18 +05:30
Dhiyaneshwaran ca576f0407
Create CVE-2023-1698.yaml 2023-07-30 22:11:33 +05:30
Dhiyaneshwaran e7dd8eaee5
Create CVE-2023-32117.yaml 2023-07-30 20:42:56 +05:30
GitHub Action 2a0775df9b TemplateMan Update [Fri Jul 28 21:41:00 UTC 2023] 🤖 2023-07-28 21:41:01 +00:00
Sandeep Singh 455c23dc36
Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass (CVE-2023-35078) (#7785)
* Added CVE-2023-35078 - Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass

Co-Authored-By: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>

* added reference

---------

Co-authored-by: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
2023-07-29 03:08:50 +05:30
GitHub Action 6f4ca8977e TemplateMan Update [Fri Jul 28 21:08:22 UTC 2023] 🤖 2023-07-28 21:08:23 +00:00
Dhiyaneshwaran 2f2626a6b3
Create CVE-2023-35885.yaml (#7771)
* Create CVE-2023-35885.yaml

* using echo string instead of webshell

---------

Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-07-29 02:36:02 +05:30
Sandeep Singh 92659332c3
Added CVE-2023-38646 (Metabase PreAuth RCE) (#7777)
* Added detection template for CVE-2023-38646

* payload update
2023-07-29 01:19:14 +05:30
GitHub Action 56316fa724 TemplateMan Update [Thu Jul 27 18:52:41 UTC 2023] 🤖 2023-07-27 18:52:42 +00:00
Ritik Chaddha 7c1cc02bb8
Merge pull request #7768 from HuTa0kj/dev/cve_2023_3836
Create CVE-2023-3836.yaml
2023-07-28 00:20:41 +05:30
Ritik Chaddha c1ada9f68d
updated info 2023-07-28 00:17:36 +05:30
pussycat0x a83b43697b
Merge pull request #7764 from projectdiscovery/use-headers_2
Update CVE-2023-2178.yaml
2023-07-27 14:48:19 +05:30
Dhiyaneshwaran fe443b2d6d
CasaOS Authentication Bypass (CVE-2023-37265, CVE-2023-37266) (#7766)
* Create CVE-2023-37265.yaml

* Create CVE-2023-37266.yaml
2023-07-27 14:41:18 +05:30
Dhiyaneshwaran 877af18592
metadata 2023-07-26 14:55:27 +05:30
HuTa0 333233c53d
Fix Blank line 2023-07-26 17:10:21 +08:00
TFDDZ 5e9480eb49 Create CVE-2023-3836.yaml 2023-07-26 17:01:22 +08:00
Dhiyaneshwaran 9aa5690bd5
Merge pull request #7742 from ctflearner/CVE-2023-23161
Create CVE-2023-23161.yaml
2023-07-26 13:09:04 +05:30
Ritik Chaddha f5ff8753de
updated matcher & info 2023-07-26 11:25:48 +05:30
Dhiyaneshwaran 6807ab9492
Update CVE-2023-2178.yaml 2023-07-25 17:57:42 +05:30
GitHub Action 9633a4f8d7 TemplateMan Update [Tue Jul 25 06:56:17 UTC 2023] 🤖 2023-07-25 06:56:17 +00:00
Ritik Chaddha cd4831d909
Update CVE-2023-2178.yaml 2023-07-25 11:29:28 +05:30
Ritik Chaddha 2ccb307cbd
Create CVE-2023-2178.yaml 2023-07-25 11:28:16 +05:30
Dhiyaneshwaran d201fcada6
metadata update 2023-07-22 21:34:47 +05:30
sandeep e4cd8422ef lint fix 2023-07-22 13:32:10 +05:30
ctflearner d11708fead
Create CVE-2023-23161.yaml 2023-07-22 11:37:25 +05:30
sandeep 09d3e3facc lint fix 2023-07-21 20:47:31 +05:30
Parth Malhotra 02b36239f5
Update CVE-2023-37462.yaml 2023-07-21 20:03:11 +05:30
Parth Malhotra ae14c1dc03
Create CVE-2023-37462.yaml 2023-07-21 20:01:16 +05:30
Ritik Chaddha 49981b5a86
Merge pull request #7727 from projectdiscovery/CVE-2023-38205
Create CVE-2023-38205.yaml
2023-07-21 17:27:23 +05:30