Prince Chaddha
f661c687a8
Update CVE-2021-25085.yaml
2022-06-16 11:06:14 +05:30
Prince Chaddha
4dfcf0230d
Merge pull request #4597 from 0xmaximus/master
...
Create CVE-2021-25085.yaml
2022-06-16 10:57:16 +05:30
Prince Chaddha
393824b99a
Update CVE-2021-25085.yaml
2022-06-16 10:55:21 +05:30
Prince Chaddha
d952450a6f
metadata-update
2022-06-16 10:05:56 +05:30
Prince Chaddha
493ea898ea
Merge branch 'Update-metadata-query' of https://github.com/ritikchaddha/nuclei-templates into ritikchaddha-Update-metadata-query
2022-06-16 10:03:41 +05:30
Prince Chaddha
3223778b4b
Update CVE-2021-44451.yaml
2022-06-16 09:53:42 +05:30
imMAXIMUS
fb05855890
Create CVE-2021-25085.yaml
2022-06-15 22:48:49 +04:30
GitHub Action
e1c69ca2f8
Auto Generated CVE annotations [Wed Jun 15 07:50:14 UTC 2022] 🤖
2022-06-15 07:50:14 +00:00
GitHub Action
94e0fa472e
Auto Generated CVE annotations [Tue Jun 14 12:22:20 UTC 2022] 🤖
2022-06-14 12:22:20 +00:00
Sandeep Singh
38ddeafc2c
Added CVE-2021-24891 ( #4586 )
2022-06-14 17:41:47 +05:30
MostInterestingBotInTheWorld
b883737198
Dashboard Content Enhancements ( #4567 )
...
Dashboard Content Enhancements
2022-06-09 16:35:21 -04:00
GitHub Action
87c28425d7
Auto Generated CVE annotations [Thu Jun 9 08:28:18 UTC 2022] 🤖
2022-06-09 08:28:18 +00:00
Prince Chaddha
d89eefb655
Create CVE-2021-37589.yaml
2022-06-09 13:15:44 +05:30
GitHub Action
ebb876e944
Auto Generated CVE annotations [Wed Jun 8 12:17:33 UTC 2022] 🤖
2022-06-08 12:17:33 +00:00
Prince Chaddha
cfe88028e3
Merge pull request #4550 from For3stCo1d/CVE-2021-40149
...
Create CVE-2021-40149.yaml
2022-06-08 17:36:18 +05:30
Alexandre ZANNI
d8440ff2d0
GLPI Telemetry Disclosure: add CVE info ( #4555 )
...
* GLPI Telemetry Disclosure: add CVE info
* template file update
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-08 13:40:34 +05:30
Prince Chaddha
040090ce87
Merge pull request #4551 from For3stCo1d/CVE-2021-40150
...
Create CVE-2021-40150.yaml
2022-06-07 15:49:39 +05:30
Prince Chaddha
065e9e1387
Update CVE-2021-40150.yaml
2022-06-07 15:38:34 +05:30
Prince Chaddha
e5a657c6bc
Update CVE-2021-40149.yaml
2022-06-07 15:32:51 +05:30
林寒
9f4604dd90
Create CVE-2021-40150.yaml
2022-06-07 12:57:22 +08:00
林寒
ac287c0a56
Create CVE-2021-40149.yaml
2022-06-07 12:54:50 +08:00
sullo
50fbea791c
buffalo-config-injection.yaml is a duplicate of CVE-2021-20091.yaml ( #4547 )
...
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml
* Delete vulnerabilities/other/buffalo-config-injection.yaml
2022-06-06 20:32:33 +05:30
sandeep
606344bfad
template id + file update
2022-06-06 16:23:02 +05:30
Prince Chaddha
7ada510859
Fixed possible FPs in open redirect templates ( #4544 )
...
* Fixed possible FPs in open redirect templates
We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.
* updated example domain
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
GitHub Action
0ac1280729
Auto Generated CVE annotations [Fri Jun 3 19:26:20 UTC 2022] 🤖
2022-06-03 19:26:20 +00:00
MostInterestingBotInTheWorld
5da580f9c2
Dashboard Content Enhancements ( #4519 )
...
Dashboard Content Enhancements
2022-06-03 15:12:31 -04:00
GitHub Action
6f5aa8f61a
Auto Generated CVE annotations [Thu Jun 2 10:38:50 UTC 2022] 🤖
2022-06-02 10:38:50 +00:00
vrenzolaverace
51fdf6f40d
Add CVE-2021-24245 ( #4343 )
...
* Add CVE-2022-0208
* misc updates
* Add CVE-2021-37416
* Added metadata + additional page specific matcher
* additional metadata
* Add CVE-2021-24245
* Add CVE-2021-20137
* Add CVE-2021-20137
* matchers update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-02 15:55:19 +05:30
Yuzhe-Zhang-0
9d8806582d
added cisa tags to appropriate templates ( #4523 )
2022-06-02 03:01:44 +05:30
GitHub Action
f35f1faddf
Auto Generated CVE annotations [Wed Jun 1 14:05:28 UTC 2022] 🤖
2022-06-01 14:05:28 +00:00
Prince Chaddha
77ef2ebd49
Update CVE-2021-27519.yaml
2022-06-01 19:08:57 +05:30
Prince Chaddha
6be0d90a50
Update CVE-2021-27519.yaml
2022-06-01 19:03:12 +05:30
Mohsen khashei
b436cdc9e9
trim
2022-06-01 15:16:23 +04:30
Mohsen khashei
7270d7eff1
update-tags
2022-06-01 15:08:02 +04:30
Mohsen khashei
0d627a8b91
update CVE-2021-27519.yaml
2022-06-01 15:00:27 +04:30
Mohsen khashei
605967c2cb
Create CVE-2021-27519.yaml
2022-05-31 13:46:01 +04:30
GitHub Action
2a3fe8086f
Auto Generated CVE annotations [Fri May 27 05:36:58 UTC 2022] 🤖
2022-05-27 05:36:58 +00:00
Prince Chaddha
5519a879ac
Update CVE-2021-46422.yaml
2022-05-27 10:52:24 +05:30
xiaostrong
02f04376b7
Fixed CVE-2021-41349 Template
2022-05-26 11:05:36 +08:00
GitHub Action
226c78a313
Auto Generated CVE annotations [Mon May 23 10:54:57 UTC 2022] 🤖
2022-05-23 10:54:57 +00:00
Prince Chaddha
c5b8da568f
Merge pull request #4362 from ritikchaddha/patch-49
...
Update CVE-2021-3223.yaml
2022-05-23 16:15:15 +05:30
Prince Chaddha
1955f01b6a
Update CVE-2021-21745.yaml
2022-05-23 15:56:16 +05:30
GwanYeong Kim
2222ca9605
Create CVE-2021-21745.yaml
...
ZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould use this vulnerability to perform illegal authorization operations by sending a request to the user to click.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-21 14:59:00 +09:00
GitHub Action
cb9991092a
Auto Generated CVE annotations [Thu May 19 19:35:49 UTC 2022] 🤖
2022-05-19 19:35:49 +00:00
Prince Chaddha
be5b6338bf
Merge pull request #4446 from gy741/rule-add-v111
...
Create CVE-2021-45428.yaml
2022-05-20 00:54:46 +05:30
Prince Chaddha
8cc82f868e
Update CVE-2021-45428.yaml
2022-05-20 00:44:47 +05:30
GitHub Action
4f819d9656
Auto Generated CVE annotations [Thu May 19 19:05:56 UTC 2022] 🤖
2022-05-19 19:05:56 +00:00
Prince Chaddha
e2af35b5ac
Update CVE-2021-46422.yaml
2022-05-20 00:05:27 +05:30
Prince Chaddha
c29a8699bf
Update CVE-2021-46422.yaml
2022-05-19 23:51:49 +05:30
GwanYeong Kim
7e811151b5
Create CVE-2021-45428.yaml
...
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-19 08:38:13 +09:00