Commit Graph

4518 Commits (212fceeb4ca656b1f318d9ca641e73c3da627172)

Author SHA1 Message Date
sullo 68e0bd88f4 Remove unnecessary + 2022-05-10 17:19:58 -04:00
sullo 77ecccb629 Merge branch 'patch-1' of https://github.com/Ph33rr/nuclei-templates into patch-1 2022-05-10 17:12:55 -04:00
sullo 0ba6ee3411 Rewrote matchers due to vulnerable use-case I which had a slightly different matcher. Minor formatting and style changes. 2022-05-10 17:07:09 -04:00
Prince Chaddha 543e758177
Update CVE-2022-1388.yaml 2022-05-11 02:01:29 +05:30
Prince Chaddha 869d89ec88
Create CVE-2019-16932.yaml 2022-05-11 01:47:40 +05:30
Prince Chaddha 5bca0c7498 Revert "Create CVE-2019-16932.yaml"
This reverts commit e9ade82de7.
2022-05-11 01:46:15 +05:30
Prince Chaddha e9ade82de7
Create CVE-2019-16932.yaml 2022-05-11 01:45:58 +05:30
Ritik Chaddha 51126d9d0a Update CVE-2010-2861.yaml 2022-05-10 15:06:42 +05:30
Ritik Chaddha 077450ce65 Revert "Auto Generated New Template Addition List [Tue May 10 08:48:58 UTC 2022] 🤖"
This reverts commit 2d450b0064.
2022-05-10 15:04:51 +05:30
Ritik Chaddha 3c63ca9b42 Update CVE-2018-15961.yaml 2022-05-10 14:51:30 +05:30
Ritik Chaddha 2d450b0064 Auto Generated New Template Addition List [Tue May 10 08:48:58 UTC 2022] 🤖 2022-05-10 14:50:28 +05:30
Prince Chaddha cda8849beb Revert "Create CVE-2022-28290.yaml"
This reverts commit 28788419f4.
2022-05-10 14:18:33 +05:30
Prince Chaddha 28788419f4
Create CVE-2022-28290.yaml 2022-05-10 14:17:58 +05:30
Prince Chaddha 6c863e82e3 updated metadata 2022-05-10 13:18:12 +05:30
MostInterestingBotInTheWorld d05c7052e9
Restoring Empty Lines (#4340)
* Enhancement: cves/2021/CVE-2021-34473.yaml by mp

* Enhancement: cves/2021/CVE-2021-34621.yaml by mp

* Enhancement: cves/2021/CVE-2021-35336.yaml by mp

* Enhancement: cves/2021/CVE-2021-35464.yaml by mp

* Enhancement: cves/2021/CVE-2021-35587.yaml by mp

* Enhancement: cves/2021/CVE-2021-3577.yaml by mp

* Enhancement: cves/2021/CVE-2021-36260.yaml by mp

* Enhancement: cves/2021/CVE-2021-36380.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-39226.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-37580.yaml by mp

* Enhancement: cves/2021/CVE-2021-37538.yaml by mp

* Enhancement: cves/2021/CVE-2021-34473.yaml by mp

* Enhancement: cves/2021/CVE-2021-35336.yaml by mp

* Enhancement: cves/2021/CVE-2021-3577.yaml by mp

* Enhancement: cves/2021/CVE-2021-36260.yaml by mp

* Enhancement: cves/2021/CVE-2021-36380.yaml by mp

* Enhancement: cves/2021/CVE-2021-37538.yaml by mp

* Enhancement: cves/2021/CVE-2021-37580.yaml by mp

* Spacing and spelling

* remove blank lines introduced by dashboard

* Enhancement: cves/2019/CVE-2019-1821.yaml by mp

* Enhancement: cves/2019/CVE-2019-18394.yaml by mp

* Enhancement: cves/2019/CVE-2019-18818.yaml by mp

* Enhancement: cves/2019/CVE-2019-19781.yaml by mp

* Enhancement: cves/2019/CVE-2019-2725.yaml by mp

* Enhancement: cves/2019/CVE-2019-3396.yaml by mp

* Enhancement: cves/2019/CVE-2019-3929.yaml by mp

* Enhancement: cves/2019/CVE-2019-5127.yaml by mp

* Enhancement: cves/2019/CVE-2019-7238.yaml by mp

* Enhancement: cves/2019/CVE-2019-7256.yaml by mp

* Enhancement: cves/2019/CVE-2019-7609.yaml by mp

* Enhancement: cves/2019/CVE-2019-8982.yaml by mp

* Enhancement: cves/2019/CVE-2019-9618.yaml by mp

* Enhancement: cves/2019/CVE-2019-9670.yaml by mp

* Enhancement: cves/2019/CVE-2019-1821.yaml by mp

* Enhancement: cves/2019/CVE-2019-18394.yaml by mp

* Enhancement: cves/2019/CVE-2019-19781.yaml by mp

* Enhancement: cves/2019/CVE-2019-2725.yaml by mp

* Enhancement: cves/2019/CVE-2019-2725.yaml by mp

* Enhancement: cves/2019/CVE-2019-5127.yaml by mp

* Enhancement: cves/2019/CVE-2019-9618.yaml by mp

* Enhancement: cves/2019/CVE-2019-9670.yaml by mp

* Enhancement: cves/2005/CVE-2005-2428.yaml by mp

* Enhancement: cves/2019/CVE-2019-2579.yaml by mp

* Enhancement: cves/2019/CVE-2019-2578.yaml by mp

* Enhancement: cves/2019/CVE-2019-6112.yaml by mp

* Enhancement: cves/2019/CVE-2019-9733.yaml by mp

* Enhancement: cves/2020/CVE-2020-11034.yaml by mp

* Enhancement: cves/2020/CVE-2020-11529.yaml by mp

* Enhancement: cves/2020/CVE-2020-11546.yaml by mp

* Enhancement: cves/2020/CVE-2020-12116.yaml by mp

* Enhancement: cves/2020/CVE-2020-12447.yaml by mp

* Enhancement: cves/2020/CVE-2020-17453.yaml by mp

* Enhancement: cves/2020/CVE-2020-19360.yaml by mp

* Enhancement: cves/2020/CVE-2020-2140.yaml by mp

* Enhancement: cves/2020/CVE-2020-23575.yaml by mp

* Enhancement: cves/2020/CVE-2020-24223.yaml by mp

* Enhancement: cves/2019/CVE-2019-2578.yaml by mp

* Enhancement: cves/2019/CVE-2019-2579.yaml by mp

* Enhancement: cves/2019/CVE-2019-2578.yaml by mp

* Enhancement: cves/2019/CVE-2019-6112.yaml by mp

* Enhancement: cves/2019/CVE-2019-9733.yaml by mp

* Enhancement: cves/2020/CVE-2020-11034.yaml by mp

* Enhancement: cves/2020/CVE-2020-11529.yaml by mp

* Enhancement: cves/2020/CVE-2020-12116.yaml by mp

* Enhancement: cves/2020/CVE-2020-12447.yaml by mp

* Enhancement: cves/2020/CVE-2020-2140.yaml by mp

* Enhancement: cves/2020/CVE-2020-14092.yaml by mp

* Enhancement: cves/2021/CVE-2021-20090.yaml by mp

* standardizing enhanced by tag

* standardizing enhanced by tag

* Fix spacing. Add classification->cve

* Enhancement: cves/2021/CVE-2021-20158.yaml by mp

* Enhancement: cves/2021/CVE-2021-20167.yaml by mp

* Typo

* Enhancement: cves/2021/CVE-2021-20837.yaml by mp

* Enhancement: cves/2021/CVE-2021-21307.yaml by mp

* Enhancement: cves/2021/CVE-2021-21479.yaml by mp

* Enhancement: cves/2021/CVE-2021-21881.yaml by mp

* Enhancement: cves/2021/CVE-2021-21972.yaml by mp

* Enhancement: cves/2021/CVE-2021-21978.yaml by mp

* Enhancement: cves/2021/CVE-2021-22005.yaml by mp

* Enhancement: cves/2021/CVE-2021-22205.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2021/CVE-2021-24285.yaml by mp

* Enhancement: cves/2021/CVE-2021-24472.yaml by mp

* Enhancement: cves/2021/CVE-2021-20090.yaml by mp

* Enhancement: cves/2021/CVE-2021-20167.yaml by mp

* Enhancement: cves/2021/CVE-2021-21307.yaml by mp

* Enhancement: cves/2021/CVE-2021-21978.yaml by mp

* Enhancement: cves/2021/CVE-2021-21985.yaml by mp

* Enhancement: cves/2021/CVE-2021-21972.yaml by mp

* Enhancement: cves/2021/CVE-2021-22205.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2021/CVE-2021-24285.yaml by mp

* Restore empty lines

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Remove unnecessary file

* Restore content after bad dashboard edit

* Enhancement: undefined by cs

* Spacing issues

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Delete null file created by dashboard

* Remove improper Enhanced tag

* Spacing issues

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Remove test dashboard commits

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Not really enhanced

* Add classification->cve-id

* Restore content from dashboard mess up

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Restore newlines

Co-authored-by: sullo <sullo@cirt.net>
2022-05-10 12:35:15 +05:30
Prince Chaddha e7f065c993
Merge pull request #4312 from For3stCo1d/CVE-2022-1040
Create CVE-2022-1040.yaml
2022-05-09 22:55:41 +05:30
Prince Chaddha b46d5b7440
Update CVE-2022-1040.yaml 2022-05-09 22:53:52 +05:30
Prince Chaddha 6f44ff5f6a
Update CVE-2022-1040.yaml 2022-05-09 22:51:50 +05:30
Prince Chaddha 570b879d51
Merge pull request #4329 from edoardottt/master
Add CVE-2022-29548
2022-05-09 22:36:59 +05:30
Prince Chaddha a9183f3601
Update CVE-2022-29548.yaml 2022-05-09 22:31:59 +05:30
Abdulrahman Abdullah 152f1d33be
Update CVE-2022-1388.yaml 2022-05-09 19:46:33 +03:00
MostInterestingBotInTheWorld 73e289527d
Dashboard Content Enhancements (#4339)
* Spacing issues
2022-05-09 12:16:12 -04:00
MostInterestingBotInTheWorld 9ff9285916
Dashboard Content Enhancements (#4338)
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
Abdulrahman Abdullah ac9f793b13
Update CVE-2022-1388.yaml 2022-05-09 16:57:14 +03:00
林寒 2a74f9ffda
Update CVE-2022-1040.yaml 2022-05-09 21:54:47 +08:00
edoardottt 681f1ddaf0 Add CVE-2022-29548 2022-05-09 12:25:53 +02:00
vrenzolaverace f0a431bcc8
Add CVE-2021-37416 (#4235)
* Add CVE-2022-0208

* misc updates

* Add CVE-2021-37416

* Added metadata + additional page specific matcher

* additional metadata

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-09 15:21:53 +05:30
sandeep 95f4bef801 meta data update 2022-05-09 15:13:18 +05:30
sandeep 6a005b7cbc misc update 2022-05-09 15:07:01 +05:30
GitHub Action 940202d772 Auto Generated CVE annotations [Mon May 9 08:58:57 UTC 2022] 🤖 2022-05-09 08:58:57 +00:00
Prince Chaddha 5b83312cb5
Update CVE-2022-1388.yaml 2022-05-09 14:10:31 +05:30
Prince Chaddha 2209df5576
Update CVE-2022-1388.yaml 2022-05-09 14:06:32 +05:30
Dwi Siswanto 955e67ca1f misc: Remove unnecessary request header 2022-05-09 15:15:36 +07:00
Dwi Siswanto f572c898c5 Add CVE-2022-1388 2022-05-09 14:53:05 +07:00
Prince Chaddha 2d26db2ff1
Merge pull request #4326 from Akokonunes/patch-144
Create CVE-2017-11512.yaml
2022-05-09 12:49:02 +05:30
GitHub Action 5b160fe498 Auto Generated CVE annotations [Mon May 9 07:17:20 UTC 2022] 🤖 2022-05-09 07:17:20 +00:00
Prince Chaddha 489fcfe855
Update and rename CVE-2017-11512.yaml to cves/2017/CVE-2017-11512.yaml 2022-05-09 12:46:35 +05:30
Prince Chaddha 4798c1a14c
Update CVE-2019-12962.yaml 2022-05-09 12:41:38 +05:30
Mohsen khashei a7a30a3ddc Create CVE-2019-12962.yaml 2022-05-08 19:22:43 +04:30
Mohsen khashei deb3d6c265 Create CVE-2019-12962.yaml 2022-05-08 19:15:08 +04:30
GitHub Action c998313910 Auto Generated CVE annotations [Sun May 8 06:43:58 UTC 2022] 🤖 2022-05-08 06:43:58 +00:00
Sandeep Singh 958b15663c
Strict matchers / f/p fix (#4320)
* more strict matcher + matcher fix

* misc updates
2022-05-08 12:13:38 +05:30
Prince Chaddha 1b64f62894
Merge pull request #4293 from ritikchaddha/patch-41
Create CVE-2018-11231.yaml
2022-05-08 00:40:42 +05:30
Prince Chaddha fffea79792
Update CVE-2018-11231.yaml 2022-05-07 16:39:37 +05:30
Prince Chaddha 16d96304bd
Merge pull request #4300 from Akokonunes/patch-143
Create CVE-2022-26233.yaml
2022-05-07 16:14:55 +05:30
Prince Chaddha e83081d0dc
Update and rename CVE-2022-26233.yaml to cves/2022/CVE-2022-26233.yaml 2022-05-07 15:48:02 +05:30
pussycat0x a8f5c98f2c
FortiGate config-audit (#4275)
* Add files via upload

* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖

* moving templates into jolokia directory

* duplicate of jolokia-unauthenticated-lfi

* merged similar templates into one with updated matchers

* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖

* Delete .new-additions

* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖

* conflict update

* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖

* Add files via upload

* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖

* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖

* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml

* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖

* mise update

* Create config-audit

* Delete config-audit

* Add files via upload

* matcher fixes / ext update / typos update

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-07 12:19:43 +05:30
sandeep e4760f13bf Removed duplicate CVE template 2022-05-07 11:01:47 +05:30
sandeep c3ca28246b misc updates 2022-05-07 10:57:44 +05:30
Prince Chaddha 3af4c93a9b
Update CVE-2022-1040.yaml 2022-05-06 21:55:41 +05:30
Prince Chaddha 4f75a44ef2
Update CVE-2022-1040.yaml 2022-05-06 21:47:16 +05:30
林寒 d6ba7f57ba
Create CVE-2022-1040.yaml 2022-05-06 22:57:40 +08:00
sandeep 1fdb124853 fixed line break between header and body 2022-05-06 15:55:50 +05:30
GitHub Action 50f3acc6d3 Auto Generated CVE annotations [Fri May 6 09:57:16 UTC 2022] 🤖 2022-05-06 09:57:16 +00:00
PikPikcU cd3f64e0f5
Create CVE-2022-1504 (#4308)
* Create CVE-2022-1504.yaml

* Added CVE-2022-1439

* removed additional template

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-06 15:26:54 +05:30
Dhiyaneshwaran 276060c66b
Create CVE-2022-0540.yaml (#4309)
* Create CVE-2022-0288.yaml

* misc updates

* Create CVE-2022-0540.yaml

* Update CVE-2022-0540.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-06 15:19:17 +05:30
sandeep 54501558c2 template fix 2022-05-06 00:02:41 +05:30
GitHub Action 6ed54d662e Auto Generated CVE annotations [Thu May 5 17:04:21 UTC 2022] 🤖 2022-05-05 17:04:21 +00:00
Sandeep Singh d63e8dffe6
Added CVE-2022-0201 (#4306) 2022-05-05 22:32:43 +05:30
GitHub Action 26b16a5421 Auto Generated CVE annotations [Thu May 5 16:55:46 UTC 2022] 🤖 2022-05-05 16:55:46 +00:00
Sandeep Singh 412a5f5ecd
Added CVE-2022-0165 (#4305) 2022-05-05 22:25:21 +05:30
h1ei1 fd787859f5
Add CVE-2022-26352 (#4302)
* Create CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* misc updates

* Add CVE-2022-26352

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* updated with harmless minimal poc

Co-authored-by: xiaoheihei1107 <62200676+xiaoheihei1107@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-05 22:10:02 +05:30
Alex Rydzak e89c072410
Added template for CVE-2022-26564 (#4301) 2022-05-05 20:55:46 +05:30
GitHub Action fbc2ba38ee Auto Generated CVE annotations [Thu May 5 12:13:55 UTC 2022] 🤖 2022-05-05 12:13:55 +00:00
Dhiyaneshwaran 6b4724f5b1
Ad Inserter < 2.7.10 - Reflected Cross-Site Scripting (#4291)
* Create CVE-2022-0288.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-05 17:43:31 +05:30
Ritik Chaddha f92df92886
Create CVE-2018-11231.yaml 2022-05-04 01:38:00 +05:30
MostInterestingBotInTheWorld 03b7a5f0fe
Dashboard Content Enhancements (#4289)
Dashboard content enhancements.
2022-05-02 17:50:47 -04:00
GitHub Action 58de44b9d4 Auto Generated CVE annotations [Mon May 2 19:44:49 UTC 2022] 🤖 2022-05-02 19:44:49 +00:00
Prince Chaddha e279027adc
Update CVE-2021-39312.yaml 2022-05-03 01:05:45 +05:30
Dhiyaneshwaran 101f0e4607
Update CVE-2021-39312.yaml 2022-05-01 16:10:55 +05:30
Dhiyaneshwaran 7ee380cb9e
Create CVE-2021-39312.yaml 2022-05-01 16:08:22 +05:30
GitHub Action cc3e2ba7fa Auto Generated CVE annotations [Sat Apr 30 20:57:29 UTC 2022] 🤖 2022-04-30 20:57:29 +00:00
Prince Chaddha b6c8d874d1
Update CVE-2021-25118.yaml 2022-05-01 02:20:08 +05:30
Prince Chaddha 0154892ec8
Create CVE-2021-25118.yaml 2022-05-01 02:10:38 +05:30
GitHub Action 9d9c66412d Auto Generated CVE annotations [Sat Apr 30 20:29:38 UTC 2022] 🤖 2022-04-30 20:29:38 +00:00
Prince Chaddha 6f7fd36d38
Merge pull request #4273 from gy741/rule-add-v107
Create viaware-rce.yaml
2022-05-01 01:59:20 +05:30
GitHub Action 2c1f0cce4b Auto Generated CVE annotations [Sat Apr 30 20:27:48 UTC 2022] 🤖 2022-04-30 20:27:48 +00:00
Prince Chaddha 29d40af49f
Update and rename vulnerabilities/other/viaware-rce.yaml to cves/2021/CVE-2021-36356.yaml 2022-05-01 01:57:39 +05:30
Prince Chaddha 98f2956561
Update and rename CVE-2017-12138.yaml to cves/2017/CVE-2017-12138.yaml 2022-05-01 01:12:44 +05:30
Prince Chaddha a11f95b8bf
Create CVE-2021-25111.yaml 2022-04-30 01:49:48 +05:30
Prince Chaddha 68fde96014
Merge pull request #4269 from projectdiscovery/CVE-2022-0591
Create CVE-2022-0591.yaml
2022-04-30 01:31:46 +05:30
MostInterestingBotInTheWorld 44520223c1
Dashboard Content Enhancements (#4268)
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
Prince Chaddha 1cfdbb7c0d
Create CVE-2022-0591.yaml 2022-04-30 01:23:32 +05:30
Muhammad Daffa a424cf57ae
Update CVE-2021-39350.yaml 2022-04-29 22:09:54 +07:00
Prince Chaddha bfa0105bf3
Update CVE-2021-20158.yaml 2022-04-29 16:03:18 +05:30
Dwi Siswanto 631f56bae7
fix(linter): De-dupe meta (#4264) 2022-04-29 14:40:18 +05:30
pussycat0x ccc7835baf
Sucuri Website Firewall - Not Configured Default page (#4254)
* Add files via upload

* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖

* moving templates into jolokia directory

* duplicate of jolokia-unauthenticated-lfi

* merged similar templates into one with updated matchers

* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖

* Delete .new-additions

* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖

* conflict update

* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖

* Add files via upload

* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖

* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖

* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml

* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖

* mise update

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-29 12:14:52 +05:30
GitHub Action 6841d03aef Auto Generated CVE annotations [Fri Apr 29 06:40:08 UTC 2022] 🤖 2022-04-29 06:40:08 +00:00
Sandeep Singh 2db05da4f6
Added CVE-2022-0422 (#4261) 2022-04-29 12:09:46 +05:30
sullo c3d4dfd6ae
Tenda Template Enhancementleanup (#4257)
* Replace § markers with {{ }} pairs

* Clean up new Tenda admin panel template

* Update tenda-11n-wireless-router-login.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
sandeep 2d7cef7abd misc update 2022-04-28 18:52:35 +05:30
GitHub Action 6d0cccbd60 Auto Generated CVE annotations [Thu Apr 28 13:21:26 UTC 2022] 🤖 2022-04-28 13:21:26 +00:00
Dwi Siswanto 9929a2f524
Add CVE-2022-0543 (#4255) 2022-04-28 18:51:04 +05:30
xiaoheihei1107 75cb4e3297
Add CVE-2021-22054.yaml (#4251)
* Create CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-28 13:18:32 +05:30
Prince Chaddha aaf32a716a
Merge pull request #4249 from For3stCo1d/CVE-2021-46417.yaml
Create CVE-2021-46417.yaml
2022-04-28 01:38:59 +05:30
Prince Chaddha 208f676590
Update CVE-2021-46417.yaml 2022-04-28 01:36:11 +05:30
林寒 006c2e71e0
update CWE-ID 2022-04-27 23:45:58 +08:00
林寒 1525af197c
Create CVE-2021-46417.yaml 2022-04-27 23:43:24 +08:00
GitHub Action 0d3bdec6c2 Auto Generated CVE annotations [Tue Apr 26 21:55:38 UTC 2022] 🤖 2022-04-26 21:55:38 +00:00
Sandeep Singh de09d067c3
Added CVE-2015-3224 (Ruby on Rails Web Console - Remote Code Execution) (#4248) 2022-04-27 03:25:12 +05:30
Prince Chaddha bc831be504
Merge pull request #4241 from p-l-/fix-cve-2020-16952
Fix CVE-2020-16952 template
2022-04-26 03:48:21 +04:00
Prince Chaddha ffbeb784f4
Update CVE-2020-16952.yaml 2022-04-26 03:43:33 +04:00
Pierre Lalet e20ac0da50 Fix CVE-2020-16952 template
The headers are normalized by nuclei, and
MicrosoftSharePointTeamServices will never match.
2022-04-25 21:42:29 +02:00
Sandeep Singh 21145c1220
Added CVE-2022-1119 (#4240) 2022-04-25 21:44:36 +05:30
MostInterestingBotInTheWorld aa888bca8d
Dashboard Content Enhancements (#4238)
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Prince Chaddha c889433655
Update CVE-2019-20224.yaml 2022-04-25 03:28:12 +04:00
Prince Chaddha d76b1a0032
Merge pull request #4231 from edoardottt/master
Add CVE-2018-5715
2022-04-25 03:16:52 +04:00
Prince Chaddha 2a7f7c72b0
Merge pull request #4228 from Akokonunes/patch-141
Create CVE-2010-4239.yaml
2022-04-25 03:16:30 +04:00
Prince Chaddha 778c778707
Update CVE-2010-4239.yaml 2022-04-25 03:14:38 +04:00
Prince Chaddha 1a80d332da
Update CVE-2018-5715.yaml 2022-04-25 03:13:37 +04:00
Prince Chaddha b3c4935a68
Update and rename CVE-2010-4239.yaml to cves/2010/CVE-2010-4239.yaml 2022-04-24 18:52:35 +04:00
edoardottt 4f5ffa60ee Add CVE-2018-5715 2022-04-24 15:41:02 +02:00
edoardottt 3225c1cb94 Add CVE-2018-5715 2022-04-24 15:40:22 +02:00
edoardottt 9645f4fbc6 Add CVE-2018-5715 2022-04-24 15:39:12 +02:00
vrenzolaverace 1ca45751d1
Add CVE-2022-0208 (#4187)
* Add CVE-2022-0208

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 16:07:48 +05:30
Adam Crosser fd3a7c8fc5
Zoho Desktop Central Authentication Bypass Vulnerability (CVE-2021-44515) (#4142)
* Added Template for CVE-2021-44515

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:42:25 +05:30
GitHub Action cedf4dee89 Auto Generated CVE annotations [Sun Apr 24 10:05:04 UTC 2022] 🤖 2022-04-24 10:05:04 +00:00
Sandeep Singh 2989fb2b4b
Added CVE-2022-0140 (#4230) 2022-04-24 15:34:42 +05:30
Prince Chaddha 0a27decfe6
Create CVE-2022-0595.yaml (#4213)
* Create CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* misc updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-24 15:23:15 +05:30
Adam Crosser 031720fc5f
Created Template for CVE-2021-44077 (#4129)
* Created Template for CVE-2021-44077

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:15:34 +05:30
sandeep 922d1d9aec more strict matchers 2022-04-23 00:30:59 +05:30
sandeep 9e505d4609 added missing tags 2022-04-22 22:13:51 +05:30
forgedhallpass 4f7e02e8a4 Added CVE id in Classification for CVE-2022-29464.yaml 2022-04-22 19:31:52 +03:00
forgedhallpass f7ca5b134d CVE info update for CVE-2022-1054.yaml 2022-04-22 19:29:43 +03:00
forgedhallpass 5451673368 Moved and renamed templates containing a CVE under their correct location 2022-04-22 19:25:23 +03:00
forgedhallpass 9f8650b0b8 Classification CVE id fix in CVE-2021-40542.yaml 2022-04-22 19:21:28 +03:00
forgedhallpass 99f8b1e4ae Description and classification CVE id fix in CVE-2022-1020.yaml 2022-04-22 19:21:09 +03:00
GitHub Action 9e3dcb86e6 Auto Generated CVE annotations [Fri Apr 22 14:30:15 UTC 2022] 🤖 2022-04-22 14:30:15 +00:00
Prince Chaddha 47a579f177
Merge pull request #4160 from ritikchaddha/patch-31
Create CVE-2019-16996.yaml
2022-04-22 18:13:31 +04:00
Prince Chaddha bc7436b471
Update CVE-2019-16996.yaml 2022-04-22 18:10:31 +04:00
Prince Chaddha 5b6aec6474
Merge pull request #4211 from projectdiscovery/CVE-2022-1054
Create CVE-2022-1054.yaml
2022-04-22 17:30:44 +04:00
Prince Chaddha cc0a6213ca
Update CVE-2022-1054.yaml 2022-04-22 17:27:48 +04:00
Prince Chaddha af2937b7b7
Merge pull request #4210 from projectdiscovery/CVE-2022-1020
Create CVE-2022-1020.yaml
2022-04-22 17:22:43 +04:00
Prince Chaddha b685ac8072
Update CVE-2022-1020.yaml 2022-04-22 17:20:27 +04:00
Sandeep Singh 2487e9877f
Merge pull request #4219 from projectdiscovery/template_info_fixup
Info section refactor
2022-04-22 18:01:12 +05:30
forgedhallpass e349c4ed72 YamlLint warning fix
* added new lines at the end of the template
2022-04-22 13:41:48 +03:00
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
Prince Chaddha 6942229274
Create CVE-2022-27849.yaml 2022-04-22 13:11:27 +04:00
MostInterestingBotInTheWorld 31312b1c19
Dashboard Content Enhancements (#4191)
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action 8c19fffb6a Auto Generated CVE annotations [Thu Apr 21 09:35:20 UTC 2022] 🤖 2022-04-21 09:35:20 +00:00
sandeep caa4e827f1 added additional references 2022-04-21 12:41:01 +05:30
luci c02d919071
Adding CVE-2022-29464 (#4209)
* Adding CVE-2022-29464

* Fixin spaces I guess

* misc updates

* path update

* Update CVE-2022-29464.yaml

* added working exploit poc

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-21 12:32:42 +05:30
Prince Chaddha b0f264c0b8
Create CVE-2022-1054.yaml 2022-04-21 02:51:08 +04:00
Prince Chaddha 36bc825ad8
Create CVE-2022-1020.yaml 2022-04-21 02:47:29 +04:00
sandeep 338d4622bf parts update to use response instead of all 2022-04-20 20:08:07 +05:30
GitHub Action 775b18dfb2 Auto Generated CVE annotations [Tue Apr 19 21:56:21 UTC 2022] 🤖 2022-04-19 21:56:21 +00:00
Prince Chaddha f1a525907e
Update CVE-2020-7980.yaml 2022-04-20 01:50:19 +04:00
Ritik Chaddha f532a0ead3
Update CVE-2020-7980.yaml 2022-04-20 02:46:41 +05:30
Ritik Chaddha fd6b099f41
Create CVE-2020-7980.yaml 2022-04-20 02:40:53 +05:30
MostInterestingBotInTheWorld 3e2e842d0e
Dashboard Content Ehnancements (#4183)
* Spacing and other template cleanups
* duplicate yaml tags

Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Dominique RIGHETTO a3ad749c91
Add a template for Incapptic Connect (#4100)
* Add tpl for Incapptic

* Fix linter error

* misc update

* Auto Generated CVE annotations [Mon Apr 18 13:10:32 UTC 2022] 🤖

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
2022-04-18 18:40:41 +05:30
Prince Chaddha 927a2f68e2
Update CVE-2021-31805.yaml 2022-04-18 15:12:27 +04:00
Prince Chaddha 5467e632dc
Create CVE-2021-31805.yaml 2022-04-18 15:08:19 +04:00
Prince Chaddha 6f30f445ad
Update and rename CVE-2018-14931.yaml to cves/2018/CVE-2018-14931.yaml 2022-04-18 13:34:00 +04:00
Muhammad Daffa 2c2312ab8c
Update CVE-2014-8682.yaml (#4173) 2022-04-17 12:00:44 +05:30
Muhammad Daffa a220bb8029
Update CVE-2016-10940.yaml (#4174) 2022-04-17 11:59:35 +05:30
Prince Chaddha 5170996712
Merge pull request #4164 from Akokonunes/patch-139
Create CVE-2022-23347
2022-04-16 17:33:12 +04:00
Prince Chaddha 5a3d0c9227
Update CVE-2022-23347.yaml 2022-04-16 17:29:35 +04:00
Prince Chaddha 9b76b0840c
Update and rename CVE-2022-23347.yaml to cves/2022/CVE-2022-23347.yaml 2022-04-16 17:27:38 +04:00
GitHub Action 4e6338a4a0 Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖 2022-04-16 13:18:49 +00:00
Ritik Chaddha 277fe4d514
Create CVE-2019-20224.yaml 2022-04-16 13:46:17 +05:30
Ritik Chaddha 27c2b78ede
Create CVE-2019-16996.yaml 2022-04-16 12:52:19 +05:30
MostInterestingBotInTheWorld 5730781afa
Dashboard Content Enhancements (#4157)
* Enhancement: exposures/files/joomla-file-listing.yaml by cs

* Enhancement: cves/2019/CVE-2019-5418.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2021/CVE-2021-20091.yaml by mp

* Enhancement: cves/2021/CVE-2021-20092.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: cves/2017/CVE-2017-9833.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: misconfiguration/symfony-debugmode.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: cves/2021/CVE-2021-31682.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Relocating to CVE folder

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-2628.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2019/CVE-2019-2588.yaml by mp

* Enhancement: cves/2021/CVE-2021-31755.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments

* Tag typo

Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha 00046e6ce3
Update CVE-2022-0271.yaml 2022-04-15 18:43:56 +04:00
Prince Chaddha ba3f842314
Update CVE-2021-24987.yaml 2022-04-15 18:40:28 +04:00
Prince Chaddha ce757d0581
Create CVE-2021-24987.yaml 2022-04-15 17:50:49 +04:00
Prince Chaddha 16d6e9d8eb
Create CVE-2022-0271.yaml 2022-04-15 17:50:14 +04:00
Prince Chaddha 428da484c4
Merge pull request #4136 from edoardottt/master
Add CVE-2017-5631
2022-04-15 16:26:58 +04:00
Prince Chaddha 755936a47a
Update CVE-2017-5631.yaml 2022-04-15 16:16:56 +04:00
GitHub Action 86a4ed6178 Auto Generated CVE annotations [Fri Apr 15 12:09:42 UTC 2022] 🤖 2022-04-15 12:09:42 +00:00
Prince Chaddha 9e82c6f530
Merge pull request #4148 from ritikchaddha/patch-29
Create CVE-2019-17418.yaml
2022-04-15 16:09:20 +04:00
Prince Chaddha 2ed1628058
Update CVE-2019-17418.yaml 2022-04-15 15:07:39 +04:00
Prince Chaddha 956fe8a482
Update CVE-2019-17418.yaml 2022-04-15 14:46:55 +04:00
Prince Chaddha 1837051002
Update CVE-2019-16997.yaml 2022-04-15 14:46:24 +04:00
Prince Chaddha 96669b9322
Merge pull request #4149 from ritikchaddha/patch-30
Create CVE-2019-16997.yaml
2022-04-15 14:39:51 +04:00
Prince Chaddha b48d9aa526
Update CVE-2019-16997.yaml 2022-04-15 14:38:30 +04:00
Sandeep Singh d495cca9b3
Added CVE-2019-17444 (Jfrog Artifactory default password) (#4151)
* Added CVE-2019-17444 (Jfrog Artifactory default password)

* misc update
2022-04-15 13:37:49 +05:30
Ritik Chaddha 190594db9d
Update CVE-2019-17418.yaml 2022-04-15 11:37:38 +05:30
Ritik Chaddha d70a0bda29
Create CVE-2019-16997.yaml 2022-04-15 11:33:55 +05:30
Ritik Chaddha eda4835ccc
Create CVE-2019-17418.yaml 2022-04-15 11:25:48 +05:30
Prince Chaddha 3b0149d066
Merge pull request #4130 from Akokonunes/patch-138
Create CVE-2022-25216.yaml
2022-04-14 13:36:03 +04:00
Prince Chaddha da1d31c0ab
Update CVE-2022-25216.yaml 2022-04-14 13:22:19 +04:00
Prince Chaddha 62bf35c347
Update CVE-2022-25216.yaml 2022-04-14 13:00:24 +04:00
Prince Chaddha 84d91e7c0e
Update CVE-2017-12583.yaml 2022-04-14 12:44:00 +04:00
Prince Chaddha be2632e99e
Update CVE-2017-12583.yaml 2022-04-14 12:42:58 +04:00
Prince Chaddha 02ce5e2f23
Update CVE-2017-12583.yaml 2022-04-14 12:42:11 +04:00
Prince Chaddha 2d28f3685e
Update CVE-2017-12583.yaml 2022-04-14 12:33:28 +04:00
Prince Chaddha 56aaa33a7b
Update and rename CVE-2022-25216.yaml to cves/2022/CVE-2022-25216.yaml 2022-04-14 12:33:01 +04:00
edoardottt 1d0e2b1b45 Add CVE-2017-5631 2022-04-13 12:41:03 +02:00
Muhammad Daffa f8240809bd
Update CVE-2021-24340.yaml (#4134) 2022-04-13 14:21:49 +05:30
GitHub Action a9cad3f0ad Auto Generated CVE annotations [Wed Apr 13 07:34:27 UTC 2022] 🤖 2022-04-13 07:34:27 +00:00
Dhiyaneshwaran d6b7cc95dc
Neo4j Browser , Refected XSS in doku.php (#4132)
* Create spring-core-rce.yaml

* Update spring-core-rce.yaml

* Update spring-core-rce.yaml

* Create exposed-neo4j-browser.yaml

* Create CVE-2017-12583.yaml

* removed duplicate template

* minor matchers update

* misc template updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-13 13:04:06 +05:30
Prince Chaddha 0359adc0d0
Update CVE-2020-28351.yaml 2022-04-12 23:29:20 +05:30
Prince Chaddha 3cdf2ae29f
Merge pull request #4099 from Akokonunes/patch-137
Create CVE-2018-10956.yaml
2022-04-12 19:37:02 +05:30
Prince Chaddha 2dc2f6ba3f
Update and rename CVE-2018-10956.yaml to cves/2018/CVE-2018-10956.yaml 2022-04-12 19:35:26 +05:30
GitHub Action f26f5f050c Auto Generated CVE annotations [Mon Apr 11 20:08:33 UTC 2022] 🤖 2022-04-11 20:08:33 +00:00
Prince Chaddha be4a05a855
Merge pull request #4103 from ritikchaddha/patch-24
Create CVE-2018-7662.yaml
2022-04-12 01:24:09 +05:30
Prince Chaddha 784ef6f25e
Update CVE-2018-7662.yaml 2022-04-12 01:22:14 +05:30
Sandeep Singh 0a4a7b31f7
Added VMware Workspace ONE Access - Freemarker SSTI (#4113)
Co-Authored-By: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>

Co-authored-by: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>
2022-04-11 22:17:00 +05:30
MostInterestingBotInTheWorld 45174dee16
Dashboard Content Enhancements (#4111)
Dashboard Content Enhancements
2022-04-11 10:42:35 -04:00
sandeep 4b395a60d1 template location fix 2022-04-11 18:43:12 +05:30
Muhammad Daffa eb2fc8dfbd
Update CVE-2022-0437.yaml (#4104) 2022-04-11 16:18:44 +05:30
Muhammad Daffa 3b4158529f
Update CVE-2020-35489.yaml (#4105) 2022-04-11 16:18:13 +05:30
Prince Chaddha e8f971c70b
Update CVE-2018-7662.yaml 2022-04-11 16:03:57 +05:30
Alexandre ZANNI f27f032188
CVE-2022-0482: add a reference (#4107) 2022-04-11 14:08:32 +05:30
Ritik Chaddha 3d173d5925
Create CVE-2018-7662.yaml 2022-04-11 12:14:02 +05:30
Sandeep Singh 5eb47292e4
Added Reprise License Manager Templates (#4097)
Co-Authored-By: Akincibor <99909324+Akincibor@users.noreply.github.com>

Co-authored-by: Akincibor <99909324+Akincibor@users.noreply.github.com>
2022-04-10 12:41:31 +05:30
Prince Chaddha 11c139e44b
Merge pull request #4082 from Akokonunes/patch-136
Create CVE-2015-3897.yaml
2022-04-10 00:33:33 +05:30
Prince Chaddha 7e6f810d1e
Update and rename CVE-2015-3897.yaml to cves/2015/CVE-2015-3897.yaml 2022-04-10 00:31:56 +05:30
GitHub Action e4fed28fc2 Auto Generated CVE annotations [Sat Apr 9 15:50:05 UTC 2022] 🤖 2022-04-09 15:50:05 +00:00
Sandeep Singh 4236dfe3b7
Added CVE-2022-0482 (#4095) 2022-04-09 21:19:47 +05:30
Sandeep Singh 2503c42816
payload + matchers update (#4094) 2022-04-09 20:22:22 +05:30
MostInterestingBotInTheWorld a24ef794b7
Dashboard Content Enhancements (#4031)
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
sullo becdd7810b
Cleanup Joomla! Jvehicles template (#3983)
* Cleanup Joomla! Jvehicles template since it was labeled as SQLi but had a test for LFI
Create new template for the Jvehicles LFI

* Fix id

* path update

* Delete CVE-2010-1873.yaml

temporarily removing as it doesn't contain the exact matchers.

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-06 17:21:08 +05:30
GitHub Action 83dae0cac1 Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖 2022-04-06 04:33:20 +00:00
Prince Chaddha a0e7094664
Update CVE-2021-24746.yaml 2022-04-06 09:55:48 +05:30
Prince Chaddha 68f4159393
Create CVE-2021-24746.yaml 2022-04-06 09:36:53 +05:30
Prince Chaddha 21a73f490c Update CVE-2021-24746.yaml 2022-04-06 09:35:04 +05:30
GitHub Action 9045a7bd9c Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖 2022-04-06 04:01:51 +00:00
Prince Chaddha 90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha d834c6aef3
Merge pull request #4052 from Akokonunes/patch-135
Create CVE-2017-1000029.yaml
2022-04-05 23:29:09 +05:30
Prince Chaddha f0af9a04b6
Update CVE-2021-24746.yaml 2022-04-05 23:28:52 +05:30
Prince Chaddha 0f8598a14c
Update and rename CVE-2017-1000029.yaml to cves/2017/CVE-2017-1000029.yaml 2022-04-05 22:54:06 +05:30
sandeep 7d195c9984 Added POST method support to CVE-2022-22965 detection 2022-04-05 22:38:34 +05:30
GitHub Action 15575ec82e Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖 2022-04-05 13:17:39 +00:00
Ritik Chaddha 34a2dca9e6
Update CVE-2019-11248.yaml (#4056)
* Update CVE-2019-11248.yaml

* misc fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-05 18:47:15 +05:30
Prince Chaddha 18cfd2f11b
Merge pull request #4039 from gy741/rule-add-v104
Create CVE-2018-10562.yaml
2022-04-05 12:40:58 +05:30
Prince Chaddha 66a27e4da0
Update CVE-2018-10562.yaml 2022-04-05 12:18:20 +05:30
Prince Chaddha 02a1d0ce06
Update CVE-2018-10562.yaml 2022-04-05 12:13:12 +05:30
Prince Chaddha 77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha 3586ec841c
Update CVE-2021-26598.yaml 2022-04-05 00:13:18 +05:30
Prince Chaddha c9e108c7db
Update CVE-2021-26598.yaml 2022-04-04 23:57:11 +05:30
Sandeep Singh d633c2db45
Updated intrusive detection with HTTP OOB interaction (#4028) 2022-04-04 19:58:38 +05:30
Prince Chaddha 1890296f31
Merge pull request #4046 from Akokonunes/patch-134
Create CVE-2020-27191.yaml
2022-04-04 18:13:11 +05:30
Prince Chaddha 963742768a
Update and rename CVE-2020-27191.yaml to cves/2020/CVE-2020-27191.yaml 2022-04-04 18:08:30 +05:30
Rodrigo Schio 4d690358ae
fix match and extractors regexes (#4040) 2022-04-04 18:08:25 +05:30
GwanYeong Kim 1e374c7482 Create CVE-2021-26598.yaml
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
GwanYeong Kim 21a3ce4f12 Create CVE-2018-10562.yaml
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-02 23:56:35 +09:00
Prince Chaddha c1a7f2398c
Create CVE-2021-24746.yaml 2022-04-02 16:15:26 +05:30
Prince Chaddha a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
GitHub Action 9a769040d7 Auto Generated CVE annotations [Sat Apr 2 10:37:27 UTC 2022] 🤖 2022-04-02 10:37:27 +00:00
Prince Chaddha ef88c6b170
Merge pull request #4007 from pikpikcu/patch-328
Create CVE-2022-23881
2022-04-02 15:58:08 +05:30
Prince Chaddha 58cb6dfdcf
Update CVE-2022-23881.yaml 2022-04-02 15:55:31 +05:30
Prince Chaddha 14d40fdb50
Update CVE-2021-44103.yaml 2022-04-02 14:47:22 +05:30
Prince Chaddha d3c4313f64
Update CVE-2021-44103.yaml 2022-04-02 14:39:25 +05:30
GitHub Action 5e128f2c52 Auto Generated CVE annotations [Sat Apr 2 07:59:47 UTC 2022] 🤖 2022-04-02 07:59:47 +00:00
Prince Chaddha 1e011d6442
Merge pull request #4023 from Akokonunes/patch-133
Create CVE-2021-28377.yaml
2022-04-02 13:29:30 +05:30
Prince Chaddha 930ed5e321
Update and rename CVE-2021-28377.yaml to cves/2017/CVE-2021-28377.yaml 2022-04-02 13:23:16 +05:30
rschio da4c4dde5d remove trailing spaces 2022-04-01 12:53:54 -04:00
Sandeep Singh dd0cdb1385
Added CVE-2022-22965 - Spring Framework RCE via Data Binding on JDK 9+ (Spring4Shell) (#4024) 2022-04-01 17:13:45 +05:30
Sandeep Singh a6a4d78065
Added CVE-2021-46387 (#4022) 2022-04-01 15:13:57 +05:30
MostInterestingBotInTheWorld 6ddfbac2b4
Dashboard Content Enhancement (#4020)
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

* Syntax  restore some characters

* Spacing

* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp

* Enhancement: cves/2019/CVE-2019-10068.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-11580.yaml by mp

* Enhancement: cves/2019/CVE-2019-11581.yaml by mp

* Enhancement: cves/2019/CVE-2019-12314.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Link wrapping issue

* Enhancement: cves/2019/CVE-2019-13462.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16759.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cves/2019/CVE-2019-16278.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-12725.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs

* Enhancement: cves/2021/CVE-2021-33807.yaml by mp

* Enhancement: cves/2010/CVE-2010-0943.yaml by mp

* Enhancement: cves/2008/CVE-2008-6172.yaml by mp

* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: network/cisco-smi-exposure.yaml by mp

* Enhancement: cves/2021/CVE-2021-37704.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2019/CVE-2019-16313.yaml by mp

* Enhancement: cves/2021/CVE-2021-3017.yaml by mp

* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2021/CVE-2021-37573.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2018/CVE-2018-11709.yaml by mp

* Enhancement: cves/2014/CVE-2014-2321.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Manual enhancement

* Manual enhancement push due to dashboard failure

* Testing of dashboard accidentally commited to dashboard branch

* Spacing
Put some CVEs in the classification

* Add missing cve-id fields to templates in cve/

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
rschio 32d9039f6b add CVE-2021-44103
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
2022-04-01 03:39:18 -04:00
xvnpw 001c10644f
Update CVE-2022-24990.yaml (#4016)
* Update CVE-2022-24990.yaml

Removed https://nvd.nist.gov/vuln/detail/CVE-2022-23990. CVE-2022-23990 is not related to this template.

* Update CVE-2022-24990.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 02:09:11 +05:30
GitHub Action 074936d227 Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖 2022-03-31 19:40:33 +00:00
Adam Crosser 235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) (#4019)
* Updated CVE-2022-22963

* Added CVE-2021-21311 Template

* Added Shodan Query

* Updated Title

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30
Adam Crosser 2686307a64
Updated CVE-2022-22963 (#4011) 2022-03-31 00:39:28 +05:30
sandeep 754ba8574e Added stop-at-first-match 2022-03-30 15:19:04 +05:30
sandeep b06d02b2fe template id update 2022-03-30 15:16:52 +05:30
Geekby bec0912a2a
Create CVE-2022-26148.yaml (#4008)
* Create CVE-2022-26148.yaml

Add CVE-2022-26188

* updated matchers + extractors

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-30 13:49:34 +05:30
PikPikcU ae32c73ffa
Create CVE-2022-23881.yaml 2022-03-29 19:41:01 -04:00
MostInterestingBotInTheWorld 13bfc8ff57
Dashboard Content Enhancements (#3998)
* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
sandeep 9012b2396a misc update to CVE-2020-10148 2022-03-29 16:00:27 +05:30
Prince Chaddha b6dd43c0c9
Merge pull request #3984 from Akokonunes/patch-132
Create CVE-2021-46381.yaml
2022-03-29 12:14:05 +05:30
Prince Chaddha 708921b3e5
Update and rename CVE-2021-46381.yaml to cves/2021/CVE-2021-46381.yaml 2022-03-29 12:09:40 +05:30
gilfoyle97 91db326b54
Fix CVE-2020-17456 (false positive) (#3997)
* Fix CVE-2020-17456 (false positive)

* additional matchers

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-28 16:35:16 +05:30
Sandeep Singh 5f28041069
Added Spring Boot Log4j Remote Code Injection (#3993)
* Added Spring Boot Log4j Remote Code Injection

* minor improvements to CVE-2021-44228

* URI based payload update to catch injection point
2022-03-28 01:46:50 +05:30
sandeep 7b83c9990a minor updates to template names 2022-03-27 22:13:08 +05:30
GitHub Action c8380b3bf8 Auto Generated CVE annotations [Sun Mar 27 14:25:50 UTC 2022] 🤖 2022-03-27 14:25:50 +00:00
Dhiyaneshwaran 014a8c9192
4 New Wordpress Authenticated Templates (#3990)
* Create xss-childlist-selector.yaml

* Update xss-childlist-selector.yaml

* Rename xss-childlist-selector.yaml to aem-xss-childlist-selector.yaml

* adding metadata

* Create CVE-2021-25112.yaml

* Create CVE-2022-0189.yaml

* Create CVE-2021-25055.yaml

* Create CVE-2022-0148.yaml

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-27 19:55:03 +05:30
Sandeep Singh eeff6b26b8
more strict matchers (#3987) 2022-03-26 16:45:50 +05:30
GitHub Action ac87976a84 Auto Generated CVE annotations [Sat Mar 26 09:11:31 UTC 2022] 🤖 2022-03-26 09:11:31 +00:00
Muhammad Daffa d3a765df85
Update CVE-2017-1000028.yaml (#3968)
* Update CVE-2017-1000028.yaml

* Update CVE-2017-1000028.yaml
2022-03-26 14:40:47 +05:30
MostInterestingBotInTheWorld 814d07fb7d
Dashboard Content Enhancements (#3961)
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp

* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp

* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp

* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp

* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp

* Enhancement: dns/azure-takeover-detection.yaml by mp

* Enhancement: dns/cname-fingerprint.yaml by mp

* Enhancement: dns/cname-service-detection.yaml by mp

* Enhancement: dns/detect-dangling-cname.yaml by mp

* Enhancement: dns/dns-waf-detect.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: dns/dnssec-detection.yaml by mp

* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
GitHub Action 83ecf7060b Auto Generated CVE annotations [Wed Mar 23 10:44:27 UTC 2022] 🤖 2022-03-23 10:44:27 +00:00
Sandeep Singh 8c12450b09
Added CVE-2021-42063 (#3956) 2022-03-23 16:13:38 +05:30
Prince Chaddha ca54dd0026
Merge pull request #3946 from bartutku/CVE-2021-41691
CVE-2021-41691
2022-03-23 13:17:18 +05:30
sandeep ec99241f0e Updated "/etc/passwd" regex to avoid possible false positive results. 2022-03-22 13:31:31 +05:30
Sandeep Singh 21c2c0cd2c
lint update 2022-03-22 13:04:29 +05:30
Prince Chaddha bc30daa9fb
Update CVE-2021-41691.yaml 2022-03-22 12:38:45 +05:30
Prince Chaddha 75845a7b6e
Merge pull request #3951 from z3dc0ps/master
changed 'burpcollaborator.net' to "{{interactsh-url}}"
2022-03-22 11:35:52 +05:30
Prince Chaddha 063d6ad7eb
Update CVE-2020-5412.yaml 2022-03-22 11:32:56 +05:30
Prince Chaddha 4e75bb7162
Update CVE-2019-9978.yaml 2022-03-22 11:32:49 +05:30
Prince Chaddha 2d8bc7577a
Update CVE-2020-5412.yaml 2022-03-22 11:25:29 +05:30
Prince Chaddha 3517bab6cc
Update CVE-2019-9978.yaml 2022-03-22 11:24:50 +05:30
MostInterestingBotInTheWorld 9663595dd1
Dashboard Text Enhancements (#3948)
Dashboard content enhancements
2022-03-21 23:48:47 -04:00
z3dc0ps 1e96305cf2
Update CVE-2017-9805.yaml 2022-03-22 01:47:31 +05:30
z3dc0ps 8f37ae4a2f
Update CVE-2021-21315.yaml 2022-03-22 01:46:15 +05:30
z3dc0ps d2afc026eb
Update CVE-2020-5412.yaml 2022-03-22 01:45:11 +05:30
z3dc0ps c87ed3f66f
Update CVE-2019-9978.yaml 2022-03-22 00:40:24 +05:30
bartutku 9fb6c93947 CVE-2021-41691 2022-03-21 16:49:56 +03:00
bartutku df61805ee8 CVE-2021-41691 2022-03-21 16:46:15 +03:00
GitHub Action 412ff87c82 Auto Generated CVE annotations [Mon Mar 21 12:21:54 UTC 2022] 🤖 2022-03-21 12:21:54 +00:00
PikPikcU adbf3eca22
Create CVE-2022-0437 (#3673)
* Create CVE-2022-0437.yaml

* request + matcher update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:51:11 +05:30
Markus 9e43f3cc18
[false-positive] WordPress Contact Form 7 Plugin - Unrestricted File Upload (#3825)
* Update CVE-2020-35489.yaml

Fix for the false positives mentioned in #3816

* Update CVE-2020-35489.yaml

Fix for the false positives mentioned in #3816

* misc update

* version comparison with new helper function

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:48:01 +05:30
GitHub Action 3f3ba47aaa Auto Generated CVE annotations [Mon Mar 21 12:12:32 UTC 2022] 🤖 2022-03-21 12:12:32 +00:00
Prince Chaddha d42c946e20
Merge pull request #3907 from gy741/rule-add-v101
Create CVE-2020-17456.yaml
2022-03-21 17:41:48 +05:30
Prince Chaddha f4fdbbf415
Update and rename CVE-2020-27467.yaml to cves/2020/CVE-2020-27467.yaml 2022-03-21 16:56:48 +05:30
GitHub Action 6b562eb6f7 Auto Generated CVE annotations [Sun Mar 20 07:45:32 UTC 2022] 🤖 2022-03-20 07:45:32 +00:00
darkc0d37 36ff44ab40
Ivanti EPM CSA Code Injection(CVE-2021-44529) (#3937)
* Added CVE-2021-44529

* Added CVE-2021-44529

* Added CVE-2021-44529

* metadata updates

* contributors update

Co-authored-by: Tirtha Mandal <darkc0d3@Tirthas-MacBook-Pro.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-20 13:14:37 +05:30