Commit Graph

1202 Commits (23e8afaa22f5708a5621d6cbe0b74a6ac21722dc)

Author SHA1 Message Date
Prince Chaddha f661c687a8
Update CVE-2021-25085.yaml 2022-06-16 11:06:14 +05:30
Prince Chaddha 4dfcf0230d
Merge pull request #4597 from 0xmaximus/master
Create CVE-2021-25085.yaml
2022-06-16 10:57:16 +05:30
Prince Chaddha 393824b99a
Update CVE-2021-25085.yaml 2022-06-16 10:55:21 +05:30
Prince Chaddha d952450a6f metadata-update 2022-06-16 10:05:56 +05:30
Prince Chaddha 493ea898ea Merge branch 'Update-metadata-query' of https://github.com/ritikchaddha/nuclei-templates into ritikchaddha-Update-metadata-query 2022-06-16 10:03:41 +05:30
Prince Chaddha 3223778b4b
Update CVE-2021-44451.yaml 2022-06-16 09:53:42 +05:30
imMAXIMUS fb05855890
Create CVE-2021-25085.yaml 2022-06-15 22:48:49 +04:30
GitHub Action e1c69ca2f8 Auto Generated CVE annotations [Wed Jun 15 07:50:14 UTC 2022] 🤖 2022-06-15 07:50:14 +00:00
GitHub Action 94e0fa472e Auto Generated CVE annotations [Tue Jun 14 12:22:20 UTC 2022] 🤖 2022-06-14 12:22:20 +00:00
Sandeep Singh 38ddeafc2c
Added CVE-2021-24891 (#4586) 2022-06-14 17:41:47 +05:30
MostInterestingBotInTheWorld b883737198
Dashboard Content Enhancements (#4567)
Dashboard Content Enhancements
2022-06-09 16:35:21 -04:00
GitHub Action 87c28425d7 Auto Generated CVE annotations [Thu Jun 9 08:28:18 UTC 2022] 🤖 2022-06-09 08:28:18 +00:00
Prince Chaddha d89eefb655
Create CVE-2021-37589.yaml 2022-06-09 13:15:44 +05:30
GitHub Action ebb876e944 Auto Generated CVE annotations [Wed Jun 8 12:17:33 UTC 2022] 🤖 2022-06-08 12:17:33 +00:00
Prince Chaddha cfe88028e3
Merge pull request #4550 from For3stCo1d/CVE-2021-40149
Create CVE-2021-40149.yaml
2022-06-08 17:36:18 +05:30
Alexandre ZANNI d8440ff2d0
GLPI Telemetry Disclosure: add CVE info (#4555)
* GLPI Telemetry Disclosure: add CVE info

* template file update

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-08 13:40:34 +05:30
Prince Chaddha 040090ce87
Merge pull request #4551 from For3stCo1d/CVE-2021-40150
Create CVE-2021-40150.yaml
2022-06-07 15:49:39 +05:30
Prince Chaddha 065e9e1387
Update CVE-2021-40150.yaml 2022-06-07 15:38:34 +05:30
Prince Chaddha e5a657c6bc
Update CVE-2021-40149.yaml 2022-06-07 15:32:51 +05:30
林寒 9f4604dd90
Create CVE-2021-40150.yaml 2022-06-07 12:57:22 +08:00
林寒 ac287c0a56
Create CVE-2021-40149.yaml 2022-06-07 12:54:50 +08:00
sullo 50fbea791c
buffalo-config-injection.yaml is a duplicate of CVE-2021-20091.yaml (#4547)
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml

* Delete vulnerabilities/other/buffalo-config-injection.yaml
2022-06-06 20:32:33 +05:30
sandeep 606344bfad template id + file update 2022-06-06 16:23:02 +05:30
Prince Chaddha 7ada510859
Fixed possible FPs in open redirect templates (#4544)
* Fixed possible FPs in open redirect templates

We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.

* updated example domain

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
GitHub Action 0ac1280729 Auto Generated CVE annotations [Fri Jun 3 19:26:20 UTC 2022] 🤖 2022-06-03 19:26:20 +00:00
MostInterestingBotInTheWorld 5da580f9c2
Dashboard Content Enhancements (#4519)
Dashboard Content Enhancements
2022-06-03 15:12:31 -04:00
GitHub Action 6f5aa8f61a Auto Generated CVE annotations [Thu Jun 2 10:38:50 UTC 2022] 🤖 2022-06-02 10:38:50 +00:00
vrenzolaverace 51fdf6f40d
Add CVE-2021-24245 (#4343)
* Add CVE-2022-0208

* misc updates

* Add CVE-2021-37416

* Added metadata + additional page specific matcher

* additional metadata

* Add CVE-2021-24245

* Add CVE-2021-20137

* Add CVE-2021-20137

* matchers update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-02 15:55:19 +05:30
Yuzhe-Zhang-0 9d8806582d
added cisa tags to appropriate templates (#4523) 2022-06-02 03:01:44 +05:30
GitHub Action f35f1faddf Auto Generated CVE annotations [Wed Jun 1 14:05:28 UTC 2022] 🤖 2022-06-01 14:05:28 +00:00
Prince Chaddha 77ef2ebd49
Update CVE-2021-27519.yaml 2022-06-01 19:08:57 +05:30
Prince Chaddha 6be0d90a50
Update CVE-2021-27519.yaml 2022-06-01 19:03:12 +05:30
Mohsen khashei b436cdc9e9 trim 2022-06-01 15:16:23 +04:30
Mohsen khashei 7270d7eff1 update-tags 2022-06-01 15:08:02 +04:30
Mohsen khashei 0d627a8b91 update CVE-2021-27519.yaml 2022-06-01 15:00:27 +04:30
Mohsen khashei 605967c2cb Create CVE-2021-27519.yaml 2022-05-31 13:46:01 +04:30
GitHub Action 2a3fe8086f Auto Generated CVE annotations [Fri May 27 05:36:58 UTC 2022] 🤖 2022-05-27 05:36:58 +00:00
Prince Chaddha 5519a879ac
Update CVE-2021-46422.yaml 2022-05-27 10:52:24 +05:30
xiaostrong 02f04376b7 Fixed CVE-2021-41349 Template 2022-05-26 11:05:36 +08:00
GitHub Action 226c78a313 Auto Generated CVE annotations [Mon May 23 10:54:57 UTC 2022] 🤖 2022-05-23 10:54:57 +00:00
Prince Chaddha c5b8da568f
Merge pull request #4362 from ritikchaddha/patch-49
Update CVE-2021-3223.yaml
2022-05-23 16:15:15 +05:30
Prince Chaddha 1955f01b6a
Update CVE-2021-21745.yaml 2022-05-23 15:56:16 +05:30
GwanYeong Kim 2222ca9605 Create CVE-2021-21745.yaml
ZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould     use this vulnerability to perform illegal authorization operations by sending a request to the user to click.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-21 14:59:00 +09:00
GitHub Action cb9991092a Auto Generated CVE annotations [Thu May 19 19:35:49 UTC 2022] 🤖 2022-05-19 19:35:49 +00:00
Prince Chaddha be5b6338bf
Merge pull request #4446 from gy741/rule-add-v111
Create CVE-2021-45428.yaml
2022-05-20 00:54:46 +05:30
Prince Chaddha 8cc82f868e
Update CVE-2021-45428.yaml 2022-05-20 00:44:47 +05:30
GitHub Action 4f819d9656 Auto Generated CVE annotations [Thu May 19 19:05:56 UTC 2022] 🤖 2022-05-19 19:05:56 +00:00
Prince Chaddha e2af35b5ac
Update CVE-2021-46422.yaml 2022-05-20 00:05:27 +05:30
Prince Chaddha c29a8699bf
Update CVE-2021-46422.yaml 2022-05-19 23:51:49 +05:30
GwanYeong Kim 7e811151b5 Create CVE-2021-45428.yaml
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-19 08:38:13 +09:00