Commit Graph

620 Commits (0c87175275a00c505d07f4ec2e8ddf251ab98b5d)

Author SHA1 Message Date
GitHub Action ed4d1afd12 Auto Generated CVE annotations [Fri Oct 22 09:40:47 UTC 2021] 🤖 2021-10-22 09:40:47 +00:00
Prince Chaddha b39200b8e4
Update CVE-2021-33044.yaml 2021-10-21 15:47:46 +05:30
Philippe Delteil 56b0f60d5a
Update CVE-2021-41773.yaml
Fixes false positive due to IPS/ 

 'Request denied by WatchGuard Firewall.</p><p><b> Reason: </b> IPS detected for "WEB Apache HTTP Server Path traversal (CVE-2021-41773)"'
2021-10-21 00:57:23 -03:00
GitHub Action f05e7364ca Auto Generated CVE annotations [Wed Oct 20 22:40:20 UTC 2021] 🤖 2021-10-20 22:40:20 +00:00
Prince Chaddha 10ebb22fb8
Merge pull request #2910 from gy741/rule-add-v65
Create CVE-2021-20031.yaml
2021-10-19 18:23:40 +05:30
Prince Chaddha 181dda73ec
Update CVE-2021-33044.yaml 2021-10-19 17:44:06 +05:30
GwanYeong Kim 02655a9f22 Create CVE-2021-33044.yaml
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-10-19 12:50:07 +09:00
sandeep 3175b12b22 Additional matcher 2021-10-19 03:19:32 +05:30
sandeep 33badb66d1 oob tags update 2021-10-19 02:10:26 +05:30
Prince Chaddha 9e37e202bd
Update CVE-2021-20031.yaml 2021-10-18 20:55:47 +05:30
Prince Chaddha 6346c6e93a
Update CVE-2021-20031.yaml 2021-10-18 20:52:36 +05:30
GwanYeong Kim c7fc202ef1 Create CVE-2021-20031.yaml
A Host Header Injection vulnerability may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages. An issue was discovered in Sonicwall NAS, SonicWall Analyzer version 8.5.0 (may be affected on other versions too). The values of the 'Host' headers are implicitly set as trusted while this should be forbidden, leading to potential host header injection attack and also the affected hosts can be used for domain fronting. This means affected hosts can be used by attackers to hide behind during various other attack

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-10-18 08:24:29 +09:00
GitHub Action dc22f77a50 Auto Generated CVE annotations [Sun Oct 17 02:21:14 UTC 2021] 🤖 2021-10-17 02:21:14 +00:00
GitHub Action 1833c3de19 Auto Generated CVE annotations [Thu Oct 14 20:34:25 UTC 2021] 🤖 2021-10-14 20:34:25 +00:00
sandeep 1ef07b6ad9 Added CVE-2021-40438 2021-10-15 01:29:52 +05:30
sandeep 46fafc5a16 Merge branch 'master' of https://github.com/nrathaus/nuclei-templates into pr/2893 2021-10-14 20:11:47 +05:30
sandeep ac9cbb54b0 tags update 2021-10-14 20:10:59 +05:30
GitHub Action b025811dd2 Auto Generated CVE annotations [Thu Oct 14 14:40:51 UTC 2021] 🤖 2021-10-14 14:40:51 +00:00
sandeep 58ebf6b043 Merge branch 'master' of https://github.com/nrathaus/nuclei-templates into pr/2893 2021-10-14 20:09:00 +05:30
sandeep aad97c084c misc update 2021-10-14 20:08:44 +05:30
GitHub Action e8a32dbbf7 Auto Generated CVE annotations [Thu Oct 14 14:37:07 UTC 2021] 🤖 2021-10-14 14:37:07 +00:00
sandeep f9f4e3327e moving files around 2021-10-14 20:05:25 +05:30
Prince Chaddha 83dd71fe27
Merge pull request #2890 from pdelteil/patch-71
Update CVE-2021-41773.yaml
2021-10-14 16:25:15 +05:30
GitHub Action e1adf856e4 Auto Generated CVE annotations [Thu Oct 14 10:52:45 UTC 2021] 🤖 2021-10-14 10:52:45 +00:00
Philippe Delteil 742677870a
Update CVE-2021-41773.yaml
shodan query added
2021-10-14 03:52:10 -03:00
Prince Chaddha 1e4fae76a3
Update CVE-2021-40978.yaml 2021-10-14 09:23:48 +05:30
PikPikcU b22eb1ba01
Create CVE-2021-40978.yaml 2021-10-14 08:37:46 +07:00
GitHub Action 708adea285 Auto Generated CVE annotations [Wed Oct 13 08:57:56 UTC 2021] 🤖 2021-10-13 08:57:56 +00:00
sandeep 665e3f15e5 dynamic match 2021-10-10 18:27:15 +05:30
sandeep 9b1c57506b Updating CVE-2021-41773 / CVE-2021-42013 to include RCE check 2021-10-10 06:00:43 +05:30
GitHub Action 462a599f56 Auto Generated CVE annotations [Fri Oct 8 13:57:22 UTC 2021] 🤖 2021-10-08 13:57:22 +00:00
Sandeep Singh b58e2973ca
Merge pull request #2855 from geeknik/patch-34
Create CVE-2021-39327.yaml
2021-10-08 19:25:53 +05:30
sandeep 0e51fefd4b misc update 2021-10-08 19:23:59 +05:30
GitHub Action 87c57ed4ac Auto Generated CVE annotations [Fri Oct 8 13:40:21 UTC 2021] 🤖 2021-10-08 13:40:21 +00:00
Geeknik Labs 9e913ddb8e
Update CVE-2021-39327.yaml 2021-10-08 08:36:01 -05:00
Geeknik Labs cc38e20d14
Create CVE-2021-39327.yaml 2021-10-08 08:31:41 -05:00
sandeep b2fec03884 misc update 2021-10-08 02:42:44 +05:30
Naveen Sunkavally dce764380c yaml typo 2021-10-07 15:36:29 -04:00
Naveen Sunkavally 9384dd235e template for CVE-2021-42013.yaml 2021-10-07 14:17:29 -04:00
SaN ThosH a04df98f6f
Update CVE-2021-41878.yaml 2021-10-07 08:26:09 +05:30
Prince Chaddha 590e7d128b
Update CVE-2021-41878.yaml 2021-10-06 23:57:24 +05:30
Prince Chaddha f0c69c4d83
Update CVE-2021-41878.yaml 2021-10-06 23:56:54 +05:30
Prince Chaddha b204eedff5
Update CVE-2021-41467.yaml 2021-10-06 23:55:26 +05:30
SaN ThosH 7f9bb46eb8
Create CVE-2021-41878.yaml 2021-10-06 13:52:02 +05:30
SaN ThosH b38a29fcce
Create CVE-2021-41467.yaml 2021-10-06 12:41:01 +05:30
Prince Chaddha 796ccd1d9d
Update CVE-2021-41773.yaml 2021-10-05 20:36:02 +05:30
sandeep 311f1b006c more sources 2021-10-05 20:33:10 +05:30
sandeep 876a83371f misc update 2021-10-05 20:32:16 +05:30
Muhammad Daffa 47720d5da6
Create CVE-2021-41773.yaml 2021-10-05 21:49:36 +07:00
Prince Chaddha 223d49db9c
Merge pull request #2786 from geeknik/patch-29
Create CVE-2021-41826.yaml
2021-10-05 09:34:43 +05:30