Commit Graph

8 Commits (0ed827a3fd5a1c0584a7793235be2dd264c9e838)

Author SHA1 Message Date
sullo 88c150d2e0
Remove blank cve-id fields from templates. (#4516)
* Remove blank cve-id fields from templates.
Add cve-id to CVE-2022-0776.yaml

* Fix classification spelling
2022-05-31 20:04:35 +05:30
Prince Chaddha cd9188a2d9
Update mirai-unknown-rce.yaml 2022-05-31 14:23:16 +05:30
MostInterestingBotInTheWorld b004ffeb68 Enhancement: vulnerabilities/other/mirai-unknown-rce.yaml by mp 2022-05-30 10:04:12 -04:00
sandeep 33badb66d1 oob tags update 2021-10-19 02:10:26 +05:30
Sullo 3878138bfe * Added Host headers where needed (validated via disclosures/posts)
* Added CVE simple-employee-rce.yaml
2021-09-30 12:52:05 -04:00
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
forgedhallpass cdf9451158 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
GwanYeong Kim 19fa522fec Create mirai-unknown-rce.yaml
The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 22:44:29 +09:00