sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
J4vaovo
|
92d7192ed3
|
Update CVE-2022-1595.yaml
|
2023-06-01 13:01:39 +08:00 |
Ritik Chaddha
|
e7ce7295b5
|
Update CVE-2022-1595.yaml
|
2023-05-31 13:13:33 +05:30 |
J4vaovo
|
5b9ab2065a
|
Update CVE-2022-1595.yaml
|
2023-05-31 11:14:06 +08:00 |
Dhiyaneshwaran
|
67859eff2c
|
Create CVE-2022-2733.yaml
|
2023-05-22 15:49:45 +05:30 |
pussycat0x
|
726d826284
|
Merge pull request #7212 from Zeyad-Azima/patch-1
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI p…
|
2023-05-20 23:42:33 +05:30 |
Dhiyaneshwaran
|
ce1a476baf
|
trailspace fix
|
2023-05-18 21:05:15 +05:30 |
Dhiyaneshwaran
|
4939442773
|
re-wrote-template
|
2023-05-18 20:59:40 +05:30 |
GitHub Action
|
1c5197c6f7
|
Auto Generated CVE annotations [Thu May 11 13:27:36 UTC 2023] 🤖
|
2023-05-11 13:27:36 +00:00 |
Zer0verflow
|
7b035ab1eb
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:54:49 +08:00 |
Zer0verflow
|
749f2b5aa3
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:50:07 +08:00 |
Zer0verflow
|
80d33d7741
|
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI privilege escalation
|
2023-05-11 10:57:33 +08:00 |
Dhiyaneshwaran
|
0dcedab251
|
Merge pull request #7203 from david-bla/add-sophos-mobile-xxe_cve-2022-3980
add template for sophos mobile xxe ssrf (cve-2022-3980)
|
2023-05-11 07:36:04 +05:30 |
Dhiyaneshwaran
|
333b861ffc
|
shodan query update
|
2023-05-11 07:31:07 +05:30 |
pussycat0x
|
1cbcce382d
|
Merge pull request #7196 from projectdiscovery/CVE-2022-24716
CVE 2022 24716
|
2023-05-11 00:42:58 +05:30 |
Dhiyaneshwaran
|
2f84af20e0
|
Update CVE-2022-24716.yaml
|
2023-05-11 00:30:35 +05:30 |
Ritik Chaddha
|
2696334222
|
updated matcher
|
2023-05-10 17:42:58 +05:30 |
sandeep
|
aa90fc9036
|
added additional matcher to make it strict
|
2023-05-09 22:50:55 +05:30 |
Ritik Chaddha
|
b79431ad43
|
updated path and matchers
|
2023-05-09 21:45:10 +05:30 |
Ritik Chaddha
|
68b0734657
|
removed matcher condition
|
2023-05-09 19:36:13 +05:30 |
Dhiyaneshwaran
|
70a4c7180c
|
description added
|
2023-05-08 22:56:05 +05:30 |
Dhiyaneshwaran
|
badb9b7945
|
Create CVE-2022-24716.yaml
|
2023-05-08 22:54:19 +05:30 |
Prince Chaddha
|
124b2230cf
|
templates added
|
2023-05-06 17:42:20 +05:30 |
Dhiyaneshwaran
|
511a601dd6
|
Merge pull request #7175 from Co5mos/CVE-2022-40879
Updated CVE-2022-40879 Template
|
2023-05-05 22:52:41 +05:30 |
Dhiyaneshwaran
|
c585da0abe
|
Merge pull request #7176 from Co5mos/CVE-2022-0678
Updated CVE-2022-0678 Template
|
2023-05-05 22:52:23 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
Co5mos
|
c76b0a862a
|
Updated CVE-2022-0678 Template
|
2023-05-04 20:37:18 +08:00 |
Co5mos
|
4565b0a6fe
|
Updated CVE-2022-40879 Template
|
2023-05-04 20:34:45 +08:00 |
sandeep
|
2175d81329
|
removed duplicate key
|
2023-05-02 18:29:30 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
MostInterestingBotInTheWorld
|
a34153eb9c
|
Dashboard Content Enhancements (#7149)
Dashboard Content Enhancements
|
2023-04-28 09:11:35 -04:00 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |