Dhiyaneshwaran
|
df7a8852ad
|
regex fix
|
2023-08-28 22:14:26 +05:30 |
Dhiyaneshwaran
|
df3313134f
|
yaml lint
|
2023-08-28 22:13:33 +05:30 |
Dhiyaneshwaran
|
f04b826f4a
|
fix spaceing
|
2023-08-28 22:07:59 +05:30 |
Dhiyaneshwaran
|
5b68b4c71e
|
variable update
|
2023-08-28 21:20:44 +05:30 |
Dhiyaneshwaran
|
9427dc14df
|
fix trail space
|
2023-08-28 19:02:13 +05:30 |
Dhiyaneshwaran
|
a1a8e6568b
|
Create CVE-2023-34124.yaml
|
2023-08-28 18:56:29 +05:30 |
Ritik Chaddha
|
46cb580f95
|
Merge branch 'main' into princechaddha-patch-5
|
2023-08-28 18:20:28 +05:30 |
Ritik Chaddha
|
96eacea06e
|
updated payload
|
2023-08-28 12:21:54 +05:30 |
GitHub Action
|
4501c3294d
|
TemplateMan Update [Sat Aug 26 10:15:16 UTC 2023] 🤖
|
2023-08-26 10:15:16 +00:00 |
Prince Chaddha
|
5a6c1f88e3
|
Merge pull request #8026 from projectdiscovery/princechaddha-patch-2
Cisco VPN Routers - Unauthenticated Arbitrary File Upload and Stored XSS
|
2023-08-26 15:43:00 +05:30 |
sandeep
|
fde3d043f0
|
appended html comment to match
|
2023-08-26 15:36:24 +05:30 |
Prince Chaddha
|
238807bde8
|
Create CVE-2023-32563.yaml
|
2023-08-26 13:23:49 +05:30 |
Prince Chaddha
|
8a86cbb523
|
Create CVE-2023-36844.yaml
|
2023-08-26 13:06:41 +05:30 |
GitHub Action
|
70d14b6858
|
TemplateMan Update [Fri Aug 25 14:08:39 UTC 2023] 🤖
|
2023-08-25 14:08:40 +00:00 |
Prince Chaddha
|
f075cb4a00
|
Updated condition
|
2023-08-25 19:30:49 +05:30 |
mastercho
|
60418c566f
|
Fix trailing space
|
2023-08-25 16:25:02 +03:00 |
mastercho
|
6b0b47a2d6
|
Fixed matchers and removed statuscode check as not always is 200
|
2023-08-25 16:17:54 +03:00 |
Prince Chaddha
|
d5c2557fbc
|
fixed trailing spaces
|
2023-08-25 18:04:57 +05:30 |
Prince Chaddha
|
55dc24a4c5
|
Merge branch 'main' into prestashopsqli
|
2023-08-25 17:59:19 +05:30 |
Prince Chaddha
|
c5e48e9cc8
|
updated matchers
|
2023-08-25 17:53:28 +05:30 |
Prince Chaddha
|
003c12a15e
|
updated matchers
|
2023-08-25 17:07:43 +05:30 |
Ritik Chaddha
|
17f6abec90
|
Merge pull request #8070 from projectdiscovery/CVE-2023-39026
Create CVE-2023-39026.yaml
|
2023-08-24 23:19:35 +05:30 |
Ritik Chaddha
|
bcf747cc69
|
update matchers|info
|
2023-08-24 23:15:24 +05:30 |
Dhiyaneshwaran
|
777a520c8e
|
Create CVE-2023-38035.yaml (#8075)
* Create CVE-2023-38035.yaml
* syntax fix
* working template
* misc updates
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-08-24 23:10:37 +05:30 |
GitHub Action
|
ce7d7f288c
|
TemplateMan Update [Thu Aug 24 06:15:35 UTC 2023] 🤖
|
2023-08-24 06:15:36 +00:00 |
pussycat0x
|
c63f2ee0ce
|
Merge pull request #8060 from projectdiscovery/CVE-2023-39141
Create CVE-2023-39141.yaml WebUI-Aria2 - Path traversal
|
2023-08-24 11:43:42 +05:30 |
pussycat0x
|
eeb0288c31
|
dsl -update
|
2023-08-24 11:37:23 +05:30 |
Dhiyaneshwaran
|
ec2d108430
|
Create CVE-2023-39026.yaml
|
2023-08-24 11:10:31 +05:30 |
Dhiyaneshwaran
|
73068f1b31
|
fix fp
|
2023-08-24 09:23:50 +05:30 |
Ritik Chaddha
|
7e53eed7dc
|
updated protocol
|
2023-08-23 22:47:11 +05:30 |
Ritik Chaddha
|
61f960a3bf
|
Update CVE-2023-3936.yaml
|
2023-08-23 22:39:04 +05:30 |
Dhiyaneshwaran
|
6372949eee
|
remove hardcoded
|
2023-08-23 22:38:12 +05:30 |
Ritik Chaddha
|
8ef36715e3
|
updated matcher/req/path&info
|
2023-08-23 22:36:12 +05:30 |
Dhiyaneshwaran
|
091f576f6b
|
added matchers-condition
|
2023-08-23 12:32:23 +05:30 |
Dhiyaneshwaran
|
af7eca0d3e
|
Create CVE-2023-39141.yaml
|
2023-08-23 12:30:27 +05:30 |
Dhiyaneshwaran
|
fdec38604c
|
remove kev
|
2023-08-21 19:13:44 +05:30 |
Dhiyaneshwaran
|
cf698f7907
|
Update CVE-2023-35082.yaml
|
2023-08-21 19:13:19 +05:30 |
Dhiyaneshwaran
|
ce775b4722
|
Update CVE-2023-39143.yaml
|
2023-08-21 19:12:47 +05:30 |
Prince Chaddha
|
b45bd30dde
|
Create CVE-2023-20073.yaml
|
2023-08-21 08:31:17 +05:30 |
mastercho
|
020f397cad
|
Fixed naming of apmarketplace, fixed old CVE from medium to lowand added another sqli prestashop
|
2023-08-19 02:19:47 +03:00 |
mastercho
|
cb8cbac9df
|
Revert "Added/Fixed/Updated XXX Template"
This reverts commit dd08abe04e .
wrong commit message
|
2023-08-19 02:15:25 +03:00 |
mastercho
|
dd08abe04e
|
Added/Fixed/Updated XXX Template
|
2023-08-19 02:14:45 +03:00 |
pentesttools-com
|
38eafd33a2
|
Modified reference format from string to list to match the remaining cve modules (#8006)
|
2023-08-18 17:48:01 +05:30 |
Dhiyaneshwaran
|
f8931e8381
|
nvd description updated
|
2023-08-18 13:30:45 +05:30 |
pentesttools-com
|
daba6e2efb
|
Merge branch 'projectdiscovery:main' into add-missing-descriptions-cves
|
2023-08-18 10:47:36 +03:00 |
pentesttools-com
|
3edf136ea4
|
Added description fields for CVE-2021-44139 CVE-2023-38205 CVE-2023-34960
|
2023-08-18 10:46:53 +03:00 |
Dhiyaneshwaran
|
56780f8f72
|
spacing
|
2023-08-18 10:33:49 +05:30 |
Dhiyaneshwaran
|
0a51273b76
|
fix template
|
2023-08-17 18:36:07 +05:30 |
Dhiyaneshwaran
|
2dea3f4a44
|
remove version detection templates
|
2023-08-17 12:30:13 +05:30 |
momika233
|
d3affcfbfa
|
Add files via upload
|
2023-08-16 00:37:28 +08:00 |
Dhiyaneshwaran
|
f6c1088240
|
Lexmark Command Injection ZDI-CAN-19470 Pwn2Own Toronto 2022 🔥 (#7910)
* Create CVE-2023-26067.yaml
* cmd exec check + better matchers
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-08-12 23:15:00 +05:30 |
Dhiyaneshwaran
|
cbffe81504
|
re-wrote template
|
2023-08-09 02:32:42 +05:30 |
Ritik Chaddha
|
29669603b3
|
Merge pull request #7845 from projectdiscovery/CVE-2023-22480
Create CVE-2023-22480.yaml (KubeOperator Foreground kubeconfig Download) 🔥
|
2023-08-07 23:13:23 +05:30 |
Ritik Chaddha
|
c281a1dc55
|
updated info
|
2023-08-07 22:53:08 +05:30 |
Dhiyaneshwaran
|
ff474e87f5
|
fix headers -> header
|
2023-08-07 21:27:41 +05:30 |
pussycat0x
|
6dd47c914d
|
Merge pull request #7847 from projectdiscovery/CVE-2023-22478
Create CVE-2023-22478.yaml (KubePi <= v1.6.4 LoginLogsSearch)
|
2023-08-07 19:35:43 +05:30 |
Dhiyaneshwaran
|
1e8df323d2
|
Merge pull request #7846 from numanturle/CVE-2023-39120
Create CVE-2023-39120.yaml
|
2023-08-07 16:07:53 +05:30 |
Dhiyaneshwaran
|
b58932e9c4
|
updated matcher and added metadata
|
2023-08-07 13:49:40 +05:30 |
Dhiyaneshwaran
|
3793c853fd
|
Create CVE-2023-39143.yaml (PaperCut Path Traversal Detection) KEV 🔥 (#7857)
* Create CVE-2023-39143.yaml
* added kev reference
* Fix FP and Match only against PaperCut
* updated to use dsl matchers
* classification update
* updated name
* misc update
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
|
2023-08-06 22:51:19 +05:30 |
numan
|
6ae1c5e514
|
Update CVE-2023-39120.yaml
fix typo
|
2023-08-05 13:38:40 +03:00 |
Dhiyaneshwaran
|
fda5981960
|
Create CVE-2023-22478.yaml
|
2023-08-05 14:33:01 +05:30 |
numan
|
eee628ac8a
|
Create CVE-2023-39120.yaml
|
2023-08-05 11:48:31 +03:00 |
Dhiyaneshwaran
|
4d1578d6e7
|
Create CVE-2023-22480.yaml
|
2023-08-05 14:16:12 +05:30 |
Dhiyaneshwaran
|
eba1d1ce83
|
Create CVE-2023-35082.yaml
|
2023-08-03 21:50:05 +05:30 |
Ritik Chaddha
|
133f18eca9
|
Merge pull request #7789 from projectdiscovery/CVE-2023-1698
Create CVE-2023-1698.yaml
|
2023-08-02 13:50:28 +05:30 |
Ritik Chaddha
|
580c51dbc2
|
updated matcher
|
2023-08-02 13:47:13 +05:30 |
pussycat0x
|
85ce257f9f
|
Merge pull request #7787 from projectdiscovery/CVE-2023-32117
Create CVE-2023-32117.yaml
|
2023-08-02 12:02:14 +05:30 |
pussycat0x
|
873bd7c3cc
|
Update CVE-2023-32117.yaml
|
2023-08-02 11:14:25 +05:30 |
pussycat0x
|
4d4d008de0
|
lint - fix
|
2023-08-02 11:08:15 +05:30 |
pussycat0x
|
ffd867ba2f
|
Update CVE-2023-32117.yaml
|
2023-08-02 11:05:02 +05:30 |
Dhiyaneshwaran
|
f82cf5b7ca
|
fix matcher for sqli template
|
2023-08-02 09:23:57 +05:30 |
Dhiyaneshwaran
|
5c66e70568
|
remove name
|
2023-08-01 15:04:14 +05:30 |
GitHub Action
|
69bed45657
|
TemplateMan Update [Tue Aug 1 07:02:52 UTC 2023] 🤖
|
2023-08-01 07:02:52 +00:00 |
Ritik Chaddha
|
ddd0a02fbf
|
updated quote and space
|
2023-08-01 11:28:24 +05:30 |
Ritik Chaddha
|
69fb2db5c1
|
Create CVE-2023-37580.yaml (Zimbra XSS)
|
2023-08-01 10:56:17 +05:30 |
Dhiyaneshwaran
|
c615ced4f8
|
fix-template
|
2023-08-01 09:53:40 +05:30 |
Ritik Chaddha
|
042ef1eba2
|
updated matcher
|
2023-07-31 18:56:35 +05:30 |
Ritik Chaddha
|
5b57ab4e93
|
Metadata update CVE-2023-35078.yaml
|
2023-07-31 18:52:18 +05:30 |
Dhiyaneshwaran
|
ca576f0407
|
Create CVE-2023-1698.yaml
|
2023-07-30 22:11:33 +05:30 |
Dhiyaneshwaran
|
e7dd8eaee5
|
Create CVE-2023-32117.yaml
|
2023-07-30 20:42:56 +05:30 |
GitHub Action
|
2a0775df9b
|
TemplateMan Update [Fri Jul 28 21:41:00 UTC 2023] 🤖
|
2023-07-28 21:41:01 +00:00 |
Sandeep Singh
|
455c23dc36
|
Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass (CVE-2023-35078) (#7785)
* Added CVE-2023-35078 - Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass
Co-Authored-By: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
* added reference
---------
Co-authored-by: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
|
2023-07-29 03:08:50 +05:30 |
GitHub Action
|
6f4ca8977e
|
TemplateMan Update [Fri Jul 28 21:08:22 UTC 2023] 🤖
|
2023-07-28 21:08:23 +00:00 |
Dhiyaneshwaran
|
2f2626a6b3
|
Create CVE-2023-35885.yaml (#7771)
* Create CVE-2023-35885.yaml
* using echo string instead of webshell
---------
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-29 02:36:02 +05:30 |
Sandeep Singh
|
92659332c3
|
Added CVE-2023-38646 (Metabase PreAuth RCE) (#7777)
* Added detection template for CVE-2023-38646
* payload update
|
2023-07-29 01:19:14 +05:30 |
GitHub Action
|
56316fa724
|
TemplateMan Update [Thu Jul 27 18:52:41 UTC 2023] 🤖
|
2023-07-27 18:52:42 +00:00 |
Ritik Chaddha
|
7c1cc02bb8
|
Merge pull request #7768 from HuTa0kj/dev/cve_2023_3836
Create CVE-2023-3836.yaml
|
2023-07-28 00:20:41 +05:30 |
Ritik Chaddha
|
c1ada9f68d
|
updated info
|
2023-07-28 00:17:36 +05:30 |
pussycat0x
|
a83b43697b
|
Merge pull request #7764 from projectdiscovery/use-headers_2
Update CVE-2023-2178.yaml
|
2023-07-27 14:48:19 +05:30 |
Dhiyaneshwaran
|
fe443b2d6d
|
CasaOS Authentication Bypass (CVE-2023-37265, CVE-2023-37266) (#7766)
* Create CVE-2023-37265.yaml
* Create CVE-2023-37266.yaml
|
2023-07-27 14:41:18 +05:30 |
Dhiyaneshwaran
|
877af18592
|
metadata
|
2023-07-26 14:55:27 +05:30 |
HuTa0
|
333233c53d
|
Fix Blank line
|
2023-07-26 17:10:21 +08:00 |
TFDDZ
|
5e9480eb49
|
Create CVE-2023-3836.yaml
|
2023-07-26 17:01:22 +08:00 |
Dhiyaneshwaran
|
9aa5690bd5
|
Merge pull request #7742 from ctflearner/CVE-2023-23161
Create CVE-2023-23161.yaml
|
2023-07-26 13:09:04 +05:30 |
Ritik Chaddha
|
f5ff8753de
|
updated matcher & info
|
2023-07-26 11:25:48 +05:30 |
Dhiyaneshwaran
|
6807ab9492
|
Update CVE-2023-2178.yaml
|
2023-07-25 17:57:42 +05:30 |
GitHub Action
|
9633a4f8d7
|
TemplateMan Update [Tue Jul 25 06:56:17 UTC 2023] 🤖
|
2023-07-25 06:56:17 +00:00 |
Ritik Chaddha
|
cd4831d909
|
Update CVE-2023-2178.yaml
|
2023-07-25 11:29:28 +05:30 |
Ritik Chaddha
|
2ccb307cbd
|
Create CVE-2023-2178.yaml
|
2023-07-25 11:28:16 +05:30 |
Dhiyaneshwaran
|
d201fcada6
|
metadata update
|
2023-07-22 21:34:47 +05:30 |
sandeep
|
e4cd8422ef
|
lint fix
|
2023-07-22 13:32:10 +05:30 |
ctflearner
|
d11708fead
|
Create CVE-2023-23161.yaml
|
2023-07-22 11:37:25 +05:30 |
sandeep
|
09d3e3facc
|
lint fix
|
2023-07-21 20:47:31 +05:30 |
Parth Malhotra
|
02b36239f5
|
Update CVE-2023-37462.yaml
|
2023-07-21 20:03:11 +05:30 |
Parth Malhotra
|
ae14c1dc03
|
Create CVE-2023-37462.yaml
|
2023-07-21 20:01:16 +05:30 |
Ritik Chaddha
|
49981b5a86
|
Merge pull request #7727 from projectdiscovery/CVE-2023-38205
Create CVE-2023-38205.yaml
|
2023-07-21 17:27:23 +05:30 |
Ritik Chaddha
|
14b1ec2fd9
|
updated metadata
|
2023-07-21 17:21:37 +05:30 |
Dhiyaneshwaran
|
b8383cbac0
|
Create CVE-2023-3765.yaml
|
2023-07-21 01:35:45 +05:30 |
Ritik Chaddha
|
e3ffead64f
|
Create CVE-2023-34192.yaml (Zimbra XSS)
|
2023-07-20 23:57:03 +05:30 |
Dhiyaneshwaran
|
0033cf148a
|
Create CVE-2023-38205.yaml
|
2023-07-20 02:55:31 +05:30 |
sandeep
|
190eeeec51
|
updated templates with outdated syntax
|
2023-07-18 14:50:20 +05:30 |
Dhiyaneshwaran
|
7535168054
|
Merge branch 'main' into patch-16
|
2023-07-18 13:24:10 +05:30 |
Dhiyaneshwaran
|
ab1a450b80
|
Merge pull request #7712 from projectdiscovery/CVE-2023-23491
Create CVE-2023-23491.yaml
|
2023-07-18 13:21:37 +05:30 |
Dhiyaneshwaran
|
35de9a4ee8
|
Merge pull request #7713 from projectdiscovery/CVE-2023-0448
Create CVE-2023-0448.yaml
|
2023-07-18 13:19:42 +05:30 |
Dhiyaneshwaran
|
2791b323e6
|
Merge pull request #7707 from harsh2403/patch-17
Create CVE-2023-28665.yaml
|
2023-07-18 13:10:55 +05:30 |
GitHub Action
|
0d4a5d9a66
|
TemplateMan Update [Tue Jul 18 06:03:59 UTC 2023] 🤖
|
2023-07-18 06:04:01 +00:00 |
GitHub Action
|
c877dacbfc
|
TemplateMan Update [Tue Jul 18 06:02:36 UTC 2023] 🤖
|
2023-07-18 06:02:36 +00:00 |
Prince Chaddha
|
3e4f912f0e
|
Merge pull request #7602 from bob-the-builder-v/main
Modified http/cves/2023/CVE-2023-32243.yaml for better detection
|
2023-07-18 11:31:50 +05:30 |
pussycat0x
|
0216f4ecc5
|
Merge pull request #7700 from projectdiscovery/CVE-2023-3345
Create CVE-2023-3345.yaml
|
2023-07-18 11:30:50 +05:30 |
Prince Chaddha
|
e7b1b5d82f
|
Update CVE-2023-32243.yaml
|
2023-07-18 11:26:19 +05:30 |
Dhiyaneshwaran
|
640215564a
|
Merge branch 'main' into main
|
2023-07-18 11:21:17 +05:30 |
Dhiyaneshwaran
|
054b260f0b
|
lower case tags and remediation
|
2023-07-18 11:19:43 +05:30 |
Ritik Chaddha
|
bf2a342699
|
url encode payload
|
2023-07-17 23:51:46 +05:30 |
Ritik Chaddha
|
088dc6b284
|
Create CVE-2023-0448.yaml
|
2023-07-17 23:48:03 +05:30 |
Ritik Chaddha
|
979684b27c
|
Create CVE-2023-23491.yaml
|
2023-07-17 23:36:18 +05:30 |
Ritik Chaddha
|
d71733a489
|
updated req,matchers,info
|
2023-07-17 23:01:00 +05:30 |
Harsh Yadav
|
d9d543bb0d
|
Create CVE-2023-28665.yaml
|
2023-07-16 23:36:40 +05:30 |
Ritik Chaddha
|
ea472731da
|
updated payload,matcher,info
|
2023-07-16 22:58:45 +05:30 |
Prince Chaddha
|
b04a740cfa
|
Merge pull request #7670 from projectdiscovery/cve_enrichment
CVE Enrichment 🎉
|
2023-07-16 17:16:51 +05:30 |
Dhiyaneshwaran
|
6426507ae8
|
Create CVE-2023-3460.yaml (#7704)
* Create CVE-2023-3460.yaml
* misc update
* Update CVE-2023-3460.yaml
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-16 15:20:13 +05:30 |
Harsh Yadav
|
d14aaa69c0
|
Create CVE-2023-1546.yaml
|
2023-07-15 23:36:25 +05:30 |
pussycat0x
|
1de9011299
|
Update CVE-2023-3345.yaml
|
2023-07-15 22:03:45 +05:30 |
sandeep
|
83bf20510f
|
more updates
|
2023-07-15 21:59:17 +05:30 |
Dhiyaneshwaran
|
703518f755
|
Create CVE-2023-3345.yaml
|
2023-07-15 18:02:13 +05:30 |
mastercho
|
66e5c0af5b
|
Fixed Spaces
|
2023-07-13 20:04:28 +03:00 |
mastercho
|
2c6aa8b152
|
Added Prestashop SQLi
|
2023-07-13 19:54:13 +03:00 |
Dhiyaneshwaran
|
a082d33481
|
typo
|
2023-07-13 13:39:02 +05:30 |
Dhiyaneshwaran
|
c77ec55fbb
|
added possible user enum endpoints
|
2023-07-13 13:37:51 +05:30 |
Ritik Chaddha
|
e47db87042
|
Update CVE-2023-37270.yaml
|
2023-07-13 13:27:33 +05:30 |
Ritik Chaddha
|
92675d0756
|
Update CVE-2023-37270.yaml
|
2023-07-13 13:24:44 +05:30 |
pussycat0x
|
b5789d2c1a
|
Merge pull request #7673 from projectdiscovery/CVE-2023-37270
Create CVE-2023-37270.yaml
|
2023-07-13 13:15:41 +05:30 |
pussycat0x
|
414b21ffb2
|
dsl matchers - update
|
2023-07-13 13:12:01 +05:30 |
pussycat0x
|
2b03e2782d
|
Update CVE-2023-37270.yaml
|
2023-07-13 13:01:44 +05:30 |
Ritik Chaddha
|
b4b1c6ded0
|
Update CVE-2023-37270.yaml
|
2023-07-13 12:57:00 +05:30 |
pussycat0x
|
32ff78d0bc
|
minor -changes
|
2023-07-13 12:48:08 +05:30 |
Sandeep Singh
|
f6cd430e59
|
Added CVE-2023-29300 (Adobe ColdFusion - Pre-Auth Remote Code Execution) (#7682)
|
2023-07-13 03:59:28 +05:30 |
Prince Chaddha
|
a20611fe5d
|
Create CVE-2023-29298.yaml (#7677)
* Create CVE-2023-29298.yaml
* fixed lint error
* matcher + misc updates
* strict matcher
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-13 03:38:33 +05:30 |
Sandeep Singh
|
fd675eaba3
|
Merge branch 'main' into cve_enrichment
|
2023-07-12 21:27:27 +05:30 |
pussycat0x
|
1c1614b207
|
Merge pull request #7665 from projectdiscovery/CVE-2023-2796
Create CVE-2023-2796.yaml
|
2023-07-12 11:46:24 +05:30 |
Ritik Chaddha
|
18279f40b1
|
tag updated
|
2023-07-12 10:22:14 +05:30 |
Ritik Chaddha
|
1856bf9a8e
|
Create CVE-2023-37270.yaml
|
2023-07-12 10:21:18 +05:30 |
Dhiyaneshwaran
|
8f7c078997
|
CVE-2023-24489 🔥 Citrix ShareFile StorageZones Controller - RCE (#7664)
* Create CVE-2023-24489
* Add files via upload
* fuzz tag updation
* Rename CVE-2023-24489 to CVE-2023-24489.yaml
* Update http/cves/2023/CVE-2023-24489.yaml
Co-authored-by: Dwi Siswanto <me@dw1.io>
* changes as per review
* misc update
* variable update
* more strict matcher
---------
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: Dwi Siswanto <me@dw1.io>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-12 01:53:18 +05:30 |
sandeep
|
dd83af0228
|
CVE Enrichment 🎉
|
2023-07-12 01:19:27 +05:30 |
Ritik Chaddha
|
2bc852f3d1
|
Update CVE-2023-2796.yaml
|
2023-07-11 23:32:39 +05:30 |
Dhiyaneshwaran
|
918e0b0891
|
Create CVE-2023-2796.yaml
|
2023-07-11 18:02:11 +05:30 |
E1A
|
93bf747773
|
Update CVE-2023-27524.yaml
|
2023-07-10 17:21:35 +02:00 |
Ritik Chaddha
|
167d0e267d
|
Merge pull request #7649 from edoardottt/main
Add CVE-2023-3479
|
2023-07-10 20:44:47 +05:30 |
Ritik Chaddha
|
f942b15400
|
updated matcher
|
2023-07-10 20:41:27 +05:30 |
Dhiyaneshwaran
|
685850abae
|
fix-matcher
|
2023-07-10 20:34:42 +05:30 |
GitHub Action
|
04800ddd75
|
TemplateMan Update [Mon Jul 10 12:43:00 UTC 2023] 🤖
|
2023-07-10 12:43:01 +00:00 |
Dhiyaneshwaran
|
b15ab9f3ae
|
Merge pull request #7539 from harsh2403/patch-7
Create CVE-2023-33440.yaml
|
2023-07-10 18:11:05 +05:30 |
Dhiyaneshwaran
|
942bb169ca
|
fix
|
2023-07-10 18:07:31 +05:30 |
GitHub Action
|
674cbf611f
|
TemplateMan Update [Mon Jul 10 12:35:12 UTC 2023] 🤖
|
2023-07-10 12:35:13 +00:00 |
Dhiyaneshwaran
|
da29099005
|
Merge pull request #7570 from harsh2403/patch-12
Create CVE-2023-33338.yaml
|
2023-07-10 18:03:25 +05:30 |
Ritik Chaddha
|
7a21bb6f23
|
matcher and req updated
|
2023-07-10 17:55:32 +05:30 |
Ritik Chaddha
|
33fdee9c77
|
matchers and req update
|
2023-07-10 17:40:18 +05:30 |
Dhiyaneshwaran
|
4ca99ac8f0
|
Merge pull request #7576 from projectdiscovery/CVE-2023-2982
Create CVE-2023-2982.yaml
|
2023-07-10 13:38:57 +05:30 |
GitHub Action
|
0dd1d1c36e
|
TemplateMan Update [Sun Jul 9 09:50:07 UTC 2023] 🤖
|
2023-07-09 09:50:08 +00:00 |
Sandeep Singh
|
616e1ec5b0
|
Added CVE-2023-36934 (MOVEit Transfer - SQL Injection) (#7650)
|
2023-07-09 15:17:35 +05:30 |
edoardottt
|
6dc7cbafe6
|
add CVE-2023-3479
|
2023-07-09 11:02:02 +02:00 |
Prince Chaddha
|
79203dca0e
|
Update CVE-2023-36346.yaml
|
2023-07-08 12:13:35 +05:30 |
Prince Chaddha
|
cd1b7781db
|
Update CVE-2023-36346.yaml
|
2023-07-08 11:53:21 +05:30 |
GitHub Action
|
646ffaf0b8
|
TemplateMan Update [Fri Jul 7 11:37:24 UTC 2023] 🤖
|
2023-07-07 11:37:25 +00:00 |
Prince Chaddha
|
f00f0b0488
|
Merge pull request #7552 from harsh2403/patch-10
Create CVE-2023-33439.yaml
|
2023-07-07 17:05:10 +05:30 |
Prince Chaddha
|
b316cc936f
|
Merge pull request #7618 from projectdiscovery/remove-comments
removed enhanced by comments
|
2023-07-07 17:00:46 +05:30 |
Prince Chaddha
|
0a681ec0bb
|
removed empty lines
|
2023-07-07 16:56:27 +05:30 |
GitHub Action
|
cb26083079
|
TemplateMan Update [Fri Jul 7 11:17:58 UTC 2023] 🤖
|
2023-07-07 11:17:59 +00:00 |
pussycat0x
|
cb6eaf95a2
|
Merge pull request #7637 from projectdiscovery/cve-templates4
CVEs added
|
2023-07-07 16:46:09 +05:30 |
pussycat0x
|
0ccffd229a
|
Merge branch 'main' into remove-comments
|
2023-07-07 16:38:46 +05:30 |
Dhiyaneshwaran
|
c77309373b
|
fix payload and directory
|
2023-07-07 16:21:07 +05:30 |
Prince Chaddha
|
7d7e4f43ac
|
updated stored tags
|
2023-07-07 15:34:00 +05:30 |
Ritik Chaddha
|
d389ef4754
|
Update CVE-2023-33439.yaml
|
2023-07-07 15:30:05 +05:30 |
Prince Chaddha
|
332e19282e
|
templates added
|
2023-07-07 15:08:49 +05:30 |
pussycat0x
|
a8503c567d
|
Merge pull request #7616 from projectdiscovery/CVE-2023-2822
Create CVE-2023-2822.yaml
|
2023-07-07 15:04:52 +05:30 |
pussycat0x
|
0a0525fa67
|
Update CVE-2023-0297.yaml
|
2023-07-07 10:38:10 +05:30 |
Dhiyaneshwaran
|
03b1f956c8
|
trail space fix
|
2023-07-06 16:04:40 +05:30 |
Dhiyaneshwaran
|
def35f6b48
|
re-wrote template
|
2023-07-06 16:00:31 +05:30 |
Prince Chaddha
|
75ed275328
|
removed enhanced by comments
|
2023-07-05 13:37:58 +05:30 |
Dhiyaneshwaran
|
2a2c309d6c
|
Create CVE-2023-2822.yaml
|
2023-07-05 12:21:44 +05:30 |
alert('0-0')
|
276497b314
|
CVE-2023-0297.yaml
|
2023-07-04 18:28:32 +05:30 |
alert('0-0')
|
ac84955ae6
|
CVE-2023-0297.yaml
|
2023-07-04 18:21:35 +05:30 |
Ritik Chaddha
|
ff1fcc7735
|
Update CVE-2023-28432.yaml
|
2023-07-04 15:11:55 +05:30 |
Prince Chaddha
|
8f529c8ca7
|
Update CVE-2023-28432.yaml
|
2023-07-04 14:46:26 +05:30 |
GitHub Action
|
61343fba51
|
TemplateMan Update [Tue Jul 4 09:06:45 UTC 2023] 🤖
|
2023-07-04 09:06:46 +00:00 |
Prince Chaddha
|
6ac87ba526
|
Update CVE-2023-24488.yaml
|
2023-07-04 14:24:43 +05:30 |
Dhiyaneshwaran
|
a3702ab23c
|
fix lint
|
2023-07-04 11:00:39 +05:30 |
Dhiyaneshwaran
|
29984cf2de
|
Update CVE-2023-24488.yaml
|
2023-07-04 09:59:56 +05:30 |
Dhiyaneshwaran
|
ac390d4f9a
|
Create CVE-2023-28121.yaml (#7605)
* Create CVE-2023-28121.yaml
* misc updates
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-03 23:45:00 +05:30 |
Vikas
|
30df6e6ad7
|
Modified http/cves/2023/CVE-2023-32243.yaml for better detection
|
2023-07-03 15:09:42 +05:30 |
GitHub Action
|
f25faffb88
|
TemplateMan Update [Sat Jul 1 13:40:54 UTC 2023] 🤖
|
2023-07-01 13:40:55 +00:00 |