Sandeep Singh
0b8fe245cd
Added strict matchers ( #4589 )
2022-06-15 05:03:00 +05:30
Prince Chaddha
580a152b19
Merge pull request #4540 from ritikchaddha/patch-74
...
Create CVE-2020-22208.yaml
2022-06-10 20:02:50 +05:30
Prince Chaddha
0a067faf7e
Merge pull request #4539 from ritikchaddha/patch-73
...
Create CVE-2020-22209.yaml
2022-06-10 19:12:18 +05:30
Prince Chaddha
9bd944cc15
Update CVE-2020-22208.yaml
2022-06-10 19:12:01 +05:30
Prince Chaddha
b9cddc461a
Update CVE-2020-22209.yaml
2022-06-10 19:08:43 +05:30
Prince Chaddha
7d73301a95
Merge pull request #4537 from ritikchaddha/patch-71
...
Create CVE-2020-22211.yaml
2022-06-10 19:07:01 +05:30
Prince Chaddha
ba7416227b
Merge pull request #4538 from ritikchaddha/patch-72
...
Create CVE-2020-22210.yaml
2022-06-10 19:05:04 +05:30
Prince Chaddha
2116e26725
Update CVE-2020-22211.yaml
2022-06-10 19:04:19 +05:30
MostInterestingBotInTheWorld
b883737198
Dashboard Content Enhancements ( #4567 )
...
Dashboard Content Enhancements
2022-06-09 16:35:21 -04:00
Prince Chaddha
db806be93d
Update CVE-2020-22211.yaml
2022-06-09 17:10:43 +05:30
Prince Chaddha
5b40d7f07b
Update CVE-2020-22211.yaml
2022-06-09 17:08:54 +05:30
Prince Chaddha
ef9ee3e505
Update CVE-2020-22211.yaml
2022-06-09 17:08:02 +05:30
Prince Chaddha
a0aa01b898
Update CVE-2020-22211.yaml
2022-06-09 10:33:02 +05:30
Aaron Chen
5aa779a068
Fix templates: change alert(xss) to alert(/xss/) ( #4564 )
2022-06-09 10:11:03 +05:30
Prince Chaddha
7ada510859
Fixed possible FPs in open redirect templates ( #4544 )
...
* Fixed possible FPs in open redirect templates
We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.
* updated example domain
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
Ritik Chaddha
404f532df6
Update CVE-2020-22211.yaml
2022-06-05 17:16:08 +05:30
Prince Chaddha
1a54b625b8
Update CVE-2020-22208.yaml
2022-06-05 17:15:29 +05:30
Ritik Chaddha
6be001ec61
Update CVE-2020-22210.yaml
2022-06-05 17:15:00 +05:30
Ritik Chaddha
f44f6a0719
Update CVE-2020-22209.yaml
2022-06-05 17:14:16 +05:30
Prince Chaddha
dd3c883933
Update CVE-2020-22210.yaml
2022-06-05 16:32:35 +05:30
Ritik Chaddha
f79c2d50f2
Create CVE-2020-22208.yaml
2022-06-05 16:10:44 +05:30
Ritik Chaddha
5127e1b920
Create CVE-2020-22209.yaml
2022-06-05 16:10:34 +05:30
Ritik Chaddha
0912b651bd
Create CVE-2020-22210.yaml
2022-06-05 16:10:20 +05:30
Ritik Chaddha
161155c001
Create CVE-2020-22211.yaml
2022-06-05 16:09:55 +05:30
Ritik Chaddha
914aa45704
Update and rename cves/2020/CVE-2020-22210.yaml to vulnerabilities/other/74cms-sqli.yaml
2022-06-05 15:04:44 +05:30
GitHub Action
2b8d79ede7
Auto Generated CVE annotations [Sat Jun 4 11:45:09 UTC 2022] 🤖
2022-06-04 11:45:09 +00:00
Prince Chaddha
63a781fcba
Update CVE-2020-29597.yaml
2022-06-04 16:47:47 +05:30
Prince Chaddha
acfc3a2a49
Create CVE-2020-29597.yaml
2022-06-04 16:45:28 +05:30
Yuzhe-Zhang-0
9d8806582d
added cisa tags to appropriate templates ( #4523 )
2022-06-02 03:01:44 +05:30
Sandeep Singh
1d5d9504fc
Added Weblogic UDDIexplorer and other template updates ( #4488 )
...
* Added Weblogic UDDIexplorer and other template updates
* misc updates
2022-05-27 00:05:42 +05:30
MostInterestingBotInTheWorld
5eb6b79331
Dashboard Content Enhancements ( #4426 )
...
Dashboard Content Enhancements
2022-05-18 16:58:07 -04:00
GitHub Action
d0832c679e
Auto Generated CVE annotations [Tue May 17 20:46:49 UTC 2022] 🤖
2022-05-17 20:46:49 +00:00
Sandeep Singh
b59ff42aaf
additional reference to cves templates ( #4395 )
...
* additional reference to cves templates
* Update CVE-2006-1681.yaml
* Update CVE-2009-3318.yaml
* Update CVE-2009-4223.yaml
* Update CVE-2010-0942.yaml
* Update CVE-2010-0944.yaml
* Update CVE-2010-0972.yaml
* Update CVE-2010-1304.yaml
* Update CVE-2010-1308.yaml
* Update CVE-2010-1313.yaml
* Update CVE-2010-1461.yaml
* Update CVE-2010-1470.yaml
* Update CVE-2010-1471.yaml
* Update CVE-2010-1472.yaml
* Update CVE-2010-1474.yaml
* removed duplicate references
* misc fix
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
MostInterestingBotInTheWorld
83cc50ce3e
Dashboard Content Enhancements ( #4411 )
...
* standardizing enhanced by tag
* Fix spacing. Add classification->cve
* Enhancement: cves/2021/CVE-2021-20158.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Typo
* Enhancement: cves/2021/CVE-2021-20837.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21479.yaml by mp
* Enhancement: cves/2021/CVE-2021-21881.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-22005.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Enhancement: cves/2021/CVE-2021-24472.yaml by mp
* Enhancement: cves/2021/CVE-2021-20090.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-21985.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Restore empty lines
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Remove unnecessary file
* Restore content after bad dashboard edit
* Enhancement: undefined by cs
* Spacing issues
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Delete null file created by dashboard
* Remove improper Enhanced tag
* Spacing issues
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Remove test dashboard commits
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Not really enhanced
* Add classification->cve-id
* Restore content from dashboard mess up
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Restore newlines
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2015/CVE-2015-3224.yaml by mp
* Enhancement: cves/2015/CVE-2015-7450.yaml by mp
* Enhancement: cves/2016/CVE-2016-10134.yaml by mp
* Enhancement: cves/2016/CVE-2016-1555.yaml by mp
* Enhancement: cves/2016/CVE-2016-2004.yaml by mp
* Enhancement: cves/2016/CVE-2016-5649.yaml by mp
* Enhancement: cves/2016/CVE-2016-7552.yaml by mp
* Enhancement: cves/2017/CVE-2017-1000486.yaml by mp
* Enhancement: cves/2017/CVE-2017-11444.yaml by mp
* Spacing issues
* Added better reference
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-12611.yaml by mp
* Enhancement: cves/2017/CVE-2017-12635.yaml by mp
* Enhancement: cves/2017/CVE-2017-14135.yaml by mp
* Enhancement: cves/2017/CVE-2017-3881.yaml by mp
* Enhancement: cves/2017/CVE-2017-7269.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Enhancement: cves/2017/CVE-2017-9791.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Spacing and other minor issues
* Update CVE-2015-1427.yaml
* Update CVE-2017-12149.yaml
* Update CVE-2017-12542.yaml
* Update CVE-2017-12635.yaml
* Update CVE-2017-14135.yaml
* Update CVE-2017-3881.yaml
* Update CVE-2017-7269.yaml
* Update CVE-2017-8917.yaml
* Update CVE-2017-9791.yaml
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-32204.yaml by mp
* Enhancement: cnvd/2020/CNVD-2020-68596.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-09650.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-26422.yaml by mp
* Enhancement: cnvd/2022/CNVD-2022-03672.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-0127.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000226.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-1273.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-14064.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Cleanup and spacing
* Remove blank cve-id lines
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17246.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Enhancement: cves/2018/CVE-2018-18925.yaml by mp
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-2894.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7602.yaml by mp
* Enhancement: cves/2018/CVE-2018-9161.yaml by mp
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Many title clean-ups for more standardization.
Some vendor name clean-up
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Spacing issues
* Remove 2 blank newlines
* Enhancement: vulnerabilities/other/tamronos-rce.yaml by cs
* Enhancement: cves/2018/CVE-2018-9845.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-16920.yaml by mp
* Enhancement: cves/2019/CVE-2019-17270.yaml by mp
* Enhancement: cves/2019/CVE-2019-17382.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2019/CVE-2019-17506.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11710.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-12800.yaml by mp
* Enhancement: cves/2020/CVE-2020-13117.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-13942.yaml by mp
* Spacing, syntax error
* Spacing, correct this time.
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2020/CVE-2020-29227.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Enhancement: cves/2021/CVE-2021-24762.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Extra newlines and one sp;acing issue
* Update CVE-2018-9995.yaml
* Update CVE-2019-0230.yaml
* Update CVE-2019-16920.yaml
* Update CVE-2019-17270.yaml
* Update CVE-2019-17382.yaml
* Update CVE-2019-17444.yaml
* Update CVE-2019-17506.yaml
* Update CVE-2020-10148.yaml
* Update CVE-2020-11710.yaml
* Update CVE-2020-11854.yaml
* Update CVE-2020-12800.yaml
* Update CVE-2020-13167.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2020-13942.yaml
* Update CVE-2020-15920.yaml
* Update CVE-2020-29227.yaml
* Update CVE-2021-24499.yaml
* Update CVE-2021-24762.yaml
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-17 14:41:26 +05:30
Prince Chaddha
22f054cf0c
Update CVE-2020-13117.yaml
2022-05-15 16:47:36 +05:30
MostInterestingBotInTheWorld
581b7a627b
Dashboard Content Enhancements ( #4381 )
...
Dashboard Content Enhancements
2022-05-13 16:26:43 -04:00
Ritik Chaddha
27a039a70c
Update metadata query ( #4350 )
...
* Update adobe-component-login.yaml
* Update cold-fusion-cfcache-map.yaml
* Update unpatched-coldfusion.yaml
* Update coldfusion-debug-xss.yaml
* Update CVE-2020-11978.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2021-38540.yaml
* Update CVE-2021-44451.yaml
* Update CVE-2022-24288.yaml
* Update airflow-debug.yaml
* Update airflow-detect.yaml
* Update CVE-2010-0219.yaml
* Update apache-axis-detect.yaml
* Update CVE-2020-11991.yaml
* Update apache-cocoon-detect.yaml
* Update CVE-2021-21402.yaml
* Update jellyfin-detect.yaml
* Update CVE-2021-21402.yaml
* Update CVE-2021-21402.yaml
* Update ecology-arbitrary-file-upload.yaml
* Update ecology-v8-sqli.yaml
* Update ecology-syncuserinfo-sqli.yaml
* Update ecology-filedownload-directory-traversal.yaml
* Update CNVD-2021-15822.yaml
* Update dedecms-carbuyaction-fileinclude.yaml
* Update dedecms-openredirect.yaml
* Update tamronos-rce.yaml
* Update natshell-path-traversal.yaml
2022-05-12 19:48:36 +05:30
Prince Chaddha
cbf0e34259
Update CVE-2020-36510.yaml
2022-05-12 17:00:02 +05:30
Prince Chaddha
d550e17fe0
Update CVE-2020-36510.yaml
2022-05-12 16:58:57 +05:30
GitHub Action
462a6d2f9c
Auto Generated CVE annotations [Wed May 11 13:16:45 UTC 2022] 🤖
2022-05-11 13:16:45 +00:00
Veshraj Ghimire
eb2f235971
Merge branch 'projectdiscovery:master' into master
2022-05-11 19:01:00 +05:45
Prince Chaddha
062dd6a567
Update and rename vulnerabilities/wordpress/15Zine-xss.yaml to cves/2020/CVE-2020-36510.yaml
2022-05-11 18:20:11 +05:30
Ritik Chaddha
5ca86de12e
Update CVE-2020-11991.yaml
2022-05-10 19:05:35 +05:30
Ritik Chaddha
37b6dcdd9d
Update CVE-2020-13927.yaml
2022-05-10 18:15:06 +05:30
Ritik Chaddha
23d058285e
Update CVE-2020-11978.yaml
2022-05-10 18:15:02 +05:30
MostInterestingBotInTheWorld
73e289527d
Dashboard Content Enhancements ( #4339 )
...
* Spacing issues
2022-05-09 12:16:12 -04:00
MostInterestingBotInTheWorld
9ff9285916
Dashboard Content Enhancements ( #4338 )
...
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
Sandeep Singh
958b15663c
Strict matchers / f/p fix ( #4320 )
...
* more strict matcher + matcher fix
* misc updates
2022-05-08 12:13:38 +05:30
MostInterestingBotInTheWorld
44520223c1
Dashboard Content Enhancements ( #4268 )
...
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
sullo
c3d4dfd6ae
Tenda Template Enhancementleanup ( #4257 )
...
* Replace § markers with {{ }} pairs
* Clean up new Tenda admin panel template
* Update tenda-11n-wireless-router-login.yaml
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
Prince Chaddha
bc831be504
Merge pull request #4241 from p-l-/fix-cve-2020-16952
...
Fix CVE-2020-16952 template
2022-04-26 03:48:21 +04:00
Prince Chaddha
ffbeb784f4
Update CVE-2020-16952.yaml
2022-04-26 03:43:33 +04:00
Pierre Lalet
e20ac0da50
Fix CVE-2020-16952 template
...
The headers are normalized by nuclei, and
MicrosoftSharePointTeamServices will never match.
2022-04-25 21:42:29 +02:00
MostInterestingBotInTheWorld
aa888bca8d
Dashboard Content Enhancements ( #4238 )
...
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
sandeep
922d1d9aec
more strict matchers
2022-04-23 00:30:59 +05:30
sandeep
9e505d4609
added missing tags
2022-04-22 22:13:51 +05:30
forgedhallpass
5451673368
Moved and renamed templates containing a CVE under their correct location
2022-04-22 19:25:23 +03:00
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld
31312b1c19
Dashboard Content Enhancements ( #4191 )
...
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action
775b18dfb2
Auto Generated CVE annotations [Tue Apr 19 21:56:21 UTC 2022] 🤖
2022-04-19 21:56:21 +00:00
Prince Chaddha
f1a525907e
Update CVE-2020-7980.yaml
2022-04-20 01:50:19 +04:00
Ritik Chaddha
f532a0ead3
Update CVE-2020-7980.yaml
2022-04-20 02:46:41 +05:30
Ritik Chaddha
fd6b099f41
Create CVE-2020-7980.yaml
2022-04-20 02:40:53 +05:30
MostInterestingBotInTheWorld
5730781afa
Dashboard Content Enhancements ( #4157 )
...
* Enhancement: exposures/files/joomla-file-listing.yaml by cs
* Enhancement: cves/2019/CVE-2019-5418.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2021/CVE-2021-20091.yaml by mp
* Enhancement: cves/2021/CVE-2021-20092.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: cves/2017/CVE-2017-9833.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: misconfiguration/symfony-debugmode.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: cves/2021/CVE-2021-31682.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Relocating to CVE folder
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-2628.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2019/CVE-2019-2588.yaml by mp
* Enhancement: cves/2021/CVE-2021-31755.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments
* Tag typo
Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha
0359adc0d0
Update CVE-2020-28351.yaml
2022-04-12 23:29:20 +05:30
MostInterestingBotInTheWorld
45174dee16
Dashboard Content Enhancements ( #4111 )
...
Dashboard Content Enhancements
2022-04-11 10:42:35 -04:00
Muhammad Daffa
3b4158529f
Update CVE-2020-35489.yaml ( #4105 )
2022-04-11 16:18:13 +05:30
Sandeep Singh
2503c42816
payload + matchers update ( #4094 )
2022-04-09 20:22:22 +05:30
MostInterestingBotInTheWorld
a24ef794b7
Dashboard Content Enhancements ( #4031 )
...
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
Prince Chaddha
963742768a
Update and rename CVE-2020-27191.yaml to cves/2020/CVE-2020-27191.yaml
2022-04-04 18:08:30 +05:30
MostInterestingBotInTheWorld
6ddfbac2b4
Dashboard Content Enhancement ( #4020 )
...
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
* Syntax restore some characters
* Spacing
* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp
* Enhancement: cves/2019/CVE-2019-10068.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-11580.yaml by mp
* Enhancement: cves/2019/CVE-2019-11581.yaml by mp
* Enhancement: cves/2019/CVE-2019-12314.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Link wrapping issue
* Enhancement: cves/2019/CVE-2019-13462.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16759.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cves/2019/CVE-2019-16278.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-12725.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs
* Enhancement: cves/2021/CVE-2021-33807.yaml by mp
* Enhancement: cves/2010/CVE-2010-0943.yaml by mp
* Enhancement: cves/2008/CVE-2008-6172.yaml by mp
* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: network/cisco-smi-exposure.yaml by mp
* Enhancement: cves/2021/CVE-2021-37704.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2019/CVE-2019-16313.yaml by mp
* Enhancement: cves/2021/CVE-2021-3017.yaml by mp
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2021/CVE-2021-37573.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2018/CVE-2018-11709.yaml by mp
* Enhancement: cves/2014/CVE-2014-2321.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Manual enhancement
* Manual enhancement push due to dashboard failure
* Testing of dashboard accidentally commited to dashboard branch
* Spacing
Put some CVEs in the classification
* Add missing cve-id fields to templates in cve/
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
sandeep
754ba8574e
Added stop-at-first-match
2022-03-30 15:19:04 +05:30
MostInterestingBotInTheWorld
13bfc8ff57
Dashboard Content Enhancements ( #3998 )
...
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
sandeep
9012b2396a
misc update to CVE-2020-10148
2022-03-29 16:00:27 +05:30
gilfoyle97
91db326b54
Fix CVE-2020-17456 (false positive) ( #3997 )
...
* Fix CVE-2020-17456 (false positive)
* additional matchers
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-28 16:35:16 +05:30
MostInterestingBotInTheWorld
814d07fb7d
Dashboard Content Enhancements ( #3961 )
...
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp
* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp
* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp
* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp
* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp
* Enhancement: dns/azure-takeover-detection.yaml by mp
* Enhancement: dns/cname-fingerprint.yaml by mp
* Enhancement: dns/cname-service-detection.yaml by mp
* Enhancement: dns/detect-dangling-cname.yaml by mp
* Enhancement: dns/dns-waf-detect.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: dns/dnssec-detection.yaml by mp
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
sandeep
ec99241f0e
Updated "/etc/passwd" regex to avoid possible false positive results.
2022-03-22 13:31:31 +05:30
Prince Chaddha
063d6ad7eb
Update CVE-2020-5412.yaml
2022-03-22 11:32:56 +05:30
Prince Chaddha
2d8bc7577a
Update CVE-2020-5412.yaml
2022-03-22 11:25:29 +05:30
z3dc0ps
d2afc026eb
Update CVE-2020-5412.yaml
2022-03-22 01:45:11 +05:30
Markus
9e43f3cc18
[false-positive] WordPress Contact Form 7 Plugin - Unrestricted File Upload ( #3825 )
...
* Update CVE-2020-35489.yaml
Fix for the false positives mentioned in #3816
* Update CVE-2020-35489.yaml
Fix for the false positives mentioned in #3816
* misc update
* version comparison with new helper function
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:48:01 +05:30
GitHub Action
3f3ba47aaa
Auto Generated CVE annotations [Mon Mar 21 12:12:32 UTC 2022] 🤖
2022-03-21 12:12:32 +00:00
Prince Chaddha
d42c946e20
Merge pull request #3907 from gy741/rule-add-v101
...
Create CVE-2020-17456.yaml
2022-03-21 17:41:48 +05:30
Prince Chaddha
f4fdbbf415
Update and rename CVE-2020-27467.yaml to cves/2020/CVE-2020-27467.yaml
2022-03-21 16:56:48 +05:30
MostInterestingBotInTheWorld
056323ec5a
Dashboard Text Enhancements ( #3927 )
...
Dashboard text enhancements
2022-03-17 13:01:45 -04:00
Prince Chaddha
4c1b01bfc3
Update CVE-2020-17456.yaml
2022-03-15 16:36:08 +05:30
GwanYeong Kim
ec174819c4
Create CVE-2020-17456.yaml
...
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-15 19:13:50 +09:00
Prince Chaddha
d016e3102f
Update CVE-2020-13158.yaml
2022-03-11 14:24:04 +05:30
Prince Chaddha
d3221ba5d6
Update and rename CVE-2020-13158.yaml to cves/2020/CVE-2020-13158.yaml
2022-03-11 14:21:56 +05:30
sandeep
67e20bc87f
puppet templates
2022-03-09 00:17:22 +05:30
Prince Chaddha
e14b913101
Update CVE-2020-15050.yaml
2022-03-08 11:12:39 +05:30
GwanYeong Kim
ba14674e22
Create CVE-2020-15050.yaml
...
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-07 19:19:01 +09:00
sandeep
3a6c69df71
template name updates
2022-03-04 22:12:30 +05:30
sandeep
af09a6ce4b
Added CVE-2020-2103
...
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
2022-03-04 21:50:03 +05:30
Prince Chaddha
b0e13cb19d
Merge pull request #3791 from pussycat0x/master
...
New Template Added
2022-03-03 16:44:20 +05:30
sandeep
6d32b81b2a
GitLab metadata update
2022-03-02 13:05:29 +05:30
sandeep
1b76c3e7e8
updated tags and id
2022-03-01 19:10:54 +05:30
sullo
93e9c04f38
Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard
2022-02-28 17:31:38 -05:00
Prince Chaddha
cc3505d3b6
added deleted templates
2022-03-01 02:15:19 +05:30
MostInterestingBotInTheWorld
3208a72e63
Enhancement: cves/2020/CVE-2020-13937.yaml by cs
2022-02-28 13:45:46 -05:00
pussycat0x
9aa861f09a
Delete CVE-2020-28976.yaml
2022-02-28 22:31:03 +05:30
sullo
73c4e88830
Rename vulnerabilities/wordpress/easy-wp-smtp-listing.yaml to CVE-2020-35234.yaml
2022-02-28 11:25:50 -05:00
GitHub Action
5b154f6b93
Auto Generated CVE annotations [Sun Feb 27 15:44:38 UTC 2022] 🤖
2022-02-27 15:44:38 +00:00
pussycat0x
afcc610cd8
Add files via upload
2022-02-27 21:12:39 +05:30
MostInterestingBotInTheWorld
b631f45e1c
Dashboard Text Enhancements ( #3778 )
...
Dashboard text enhancements
2022-02-25 17:07:55 -05:00
MostInterestingBotInTheWorld
9b82c296e1
Dashboard Enhancements ( #3722 )
...
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Enhancement: cves/2010/CVE-2010-1957.yaml by mp
* Enhancement: cves/2010/CVE-2010-1977.yaml by mp
* Enhancement: cves/2010/CVE-2010-1979.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-1983.yaml by mp
* Enhancement: cves/2010/CVE-2010-2033.yaml by mp
* Enhancement: cves/2010/CVE-2010-2034.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2036.yaml by mp
* Enhancement: cves/2010/CVE-2010-2037.yaml by mp
* Enhancement: cves/2010/CVE-2010-2045.yaml by mp
* Enhancement: cves/2010/CVE-2010-2050.yaml by mp
* Enhancement: cves/2010/CVE-2010-2122.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2128.yaml by mp
* Enhancement: cves/2010/CVE-2010-2259.yaml by mp
* Enhancement: cves/2010/CVE-2010-2307.yaml by mp
* Enhancement: cves/2010/CVE-2010-2507.yaml by mp
* Enhancement: cves/2010/CVE-2010-2680.yaml by mp
* Enhancement: cves/2010/CVE-2010-2682.yaml by mp
* Enhancement: cves/2010/CVE-2010-2857.yaml by mp
* Enhancement: cves/2010/CVE-2010-2861.yaml by mp
* Enhancement: cves/2010/CVE-2010-2918.yaml by mp
* Enhancement: cves/2010/CVE-2010-2920.yaml by mp
* Enhancement: cves/2010/CVE-2010-3203.yaml by mp
* Enhancement: cves/2010/CVE-2010-3426.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4231.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4719.yaml by mp
* Enhancement: cves/2010/CVE-2010-4769.yaml by mp
* Enhancement: cves/2010/CVE-2010-4977.yaml by mp
* Enhancement: cves/2010/CVE-2010-5028.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2010/CVE-2010-5286.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-1669.yaml by mp
* Enhancement: cves/2011/CVE-2011-2744.yaml by mp
* Enhancement: cves/2000/CVE-2000-0114.yaml by mp
* Enhancement: cves/2011/CVE-2011-3315.yaml by mp
* Enhancement: cves/2011/CVE-2011-4336.yaml by mp
* Enhancement: cves/2011/CVE-2011-4618.yaml by mp
* Enhancement: cves/2011/CVE-2011-4624.yaml by mp
* Enhancement: cves/2011/CVE-2011-4804.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2012/CVE-2012-1823.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-1226.yaml by mp
* Enhancement: cves/2012/CVE-2012-0996.yaml by mp
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-27358.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2012/CVE-2012-1835.yaml by mp
* Enhancement: cves/2012/CVE-2012-0901.yaml by mp
* Enhancement: cves/2011/CVE-2011-5265.yaml by mp
* Enhancement: cves/2011/CVE-2011-5181.yaml by mp
* Enhancement: cves/2011/CVE-2011-5179.yaml by mp
* Enhancement: cves/2011/CVE-2011-5107.yaml by mp
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2012/CVE-2012-0991.yaml by mp
* Enhancement: cves/2012/CVE-2012-0981.yaml by mp
* Enhancement: cves/2012/CVE-2012-0896.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
Co-authored-by: sullo <sullo@cirt.net>
2022-02-21 13:33:16 -05:00
sandeep
159e94d0c2
added content type check
2022-02-18 02:15:13 +05:30
Sandeep Singh
07e31135ae
Added Consul Templates ( #3720 )
...
* added request condition to avoid false positive detection
* misc updates
2022-02-17 23:55:37 +05:30
Prince Chaddha
627ef6412e
Update mongodb-unauth.yaml ( #3712 )
...
* Update mongodb-unauth.yaml
* Update CVE-2020-11110.yaml
* Update CVE-2020-11110.yaml
2022-02-16 18:03:09 +05:30
sullo
4cf3791eb3
Merge pull request #3686 from MostInterestingBotInTheWorld/dashboard
...
Dashboard Updates: Multiple content enhancements
2022-02-08 17:07:01 -05:00
Prince Chaddha
8664885b45
Update CVE-2020-35749.yaml
2022-02-09 00:13:40 +05:30
Prince Chaddha
8c14733e0b
Update and rename CVE-2020-13121.yaml to cves/2020/CVE-2020-13121.yaml
2022-02-08 23:35:08 +05:30
MostInterestingBotInTheWorld
2ab1c4cacc
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-08 11:36:43 -05:00
cckuailong
f29d2b20df
add some wp plugins cves
2022-02-08 09:07:19 +08:00
Prince Chaddha
389089d63c
Merge pull request #3668 from Akokonunes/patch-113
...
Create CVE-2020-12447.yaml
2022-02-08 00:37:11 +05:30
Prince Chaddha
4e00ba83f3
Update and rename CVE-2020-12447.yaml to cves/2020/CVE-2020-12447.yaml
2022-02-08 00:35:52 +05:30
sullo
ee235ad8e6
Extraneous comment
2022-02-07 09:01:46 -05:00
MostInterestingBotInTheWorld
4f497cbd17
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:02:22 -05:00
MostInterestingBotInTheWorld
e124b4333b
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:01:13 -05:00
MostInterestingBotInTheWorld
d7ac754156
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 15:55:59 -05:00
MostInterestingBotInTheWorld
a3d83420ac
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 14:29:39 -05:00
Prince Chaddha
42bc941827
Update and rename CVE-2020-36365.yaml to cves/2020/CVE-2020-36365.yaml
2022-02-03 02:39:33 +05:30
Prince Chaddha
dca4cdc12f
Update CVE-2020-35489.yaml
2022-02-01 01:28:32 +05:30
Prince Chaddha
fdddc48c2f
Update CVE-2020-18268.yaml
2022-02-01 00:42:58 +05:30
Prince Chaddha
992687329c
Update CVE-2020-18268.yaml
2022-02-01 00:41:58 +05:30
Prince Chaddha
fd777fd0b6
Update and rename CVE-2020-18268.yaml to cves/2020/CVE-2020-18268.yaml
2022-01-27 14:18:01 +05:30
Sullo
9a8482172d
Remove:
...
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
- spaces after : in some files
2022-01-25 14:38:53 -05:00
Leovalcante
bac26e1669
Create check for cve-2020-24391 mongo-express RCE ( #3566 )
...
* Create check for cve-2020-24391 mongo-express RCE
* random file to write + matcher updates + extractor
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-20 14:55:01 +05:30
sandeep
f6e3df8b33
CVE-2020-13483 Update
2022-01-19 13:44:01 +05:30
Roberto Nunes
f8013457b6
Create CVE-2020-23575.yaml ( #3547 )
...
* Create CVE-2020-23575.yaml
* Update and rename CVE-2020-23575.yaml to cves/2020/CVE-2020-23575.yaml
* minor update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 13:12:16 +05:30
GitHub Action
8244d08f57
Auto Generated CVE annotations [Sun Jan 16 16:40:51 UTC 2022] 🤖
2022-01-16 16:40:51 +00:00
Sandeep Singh
f6377b09ec
Added Apache APISIX's Admin API Default Access Token (RCE) ( #3544 )
2022-01-16 22:08:55 +05:30
gy741
e5958c1364
Update tags ( #3538 )
2022-01-16 02:08:21 +05:30
Prince Chaddha
aa8fd16018
Merge pull request #3515 from Akokonunes/patch-104
...
Create CVE-2020-11529.yaml
2022-01-11 14:37:32 +05:30
Prince Chaddha
7f26b9e895
Update and rename CVE-2020-11529.yaml to cves/2020/CVE-2020-11529.yaml
2022-01-11 14:35:53 +05:30
Prince Chaddha
6ea0a7f492
Update CVE-2020-7136.yaml
2022-01-11 13:43:30 +05:30
GwanYeong Kim
351dc3e460
Create CVE-2020-7136.yaml
...
A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:39:41 +09:00
Muhammad Daffa
068d576d22
Update CVE-2020-8641.yaml ( #3505 )
2022-01-08 20:23:53 +05:30
Roberto Nunes
691688fb66
Create CVE-2020-23015.yaml ( #3502 )
...
* Create CVE-2020-23015.yaml
* moving template to cves directory
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 16:52:50 +05:30
sandeep
6b30e12e86
lint fixes
2022-01-07 13:04:40 +05:30
Sandeep Singh
844c3b4a02
Network template updates & fixes ( #3497 )
...
* Fixed template syntax
* network template update and fixes
2022-01-07 12:58:37 +05:30
PikPikcU
c3360c9d23
Create CVE-2020-13258.yaml
2022-01-06 21:49:47 -05:00
Pathtaga
e281e5bf88
Updated all templates tags with technologies ( #3478 )
...
* Updated tags for template sonicwall-email-security-detect.yaml
* Updated tags for template detect-sentry.yaml
* Updated tags for template kong-detect.yaml
* Updated tags for template openam-detect.yaml
* Updated tags for template shiro-detect.yaml
* Updated tags for template iplanet-web-server.yaml
* Updated tags for template graylog-api-browser.yaml
* Updated tags for template prtg-detect.yaml
* Updated tags for template node-red-detect.yaml
* Updated tags for template abyss-web-server.yaml
* Updated tags for template geo-webserver.yaml
* Updated tags for template autobahn-python-detect.yaml
* Updated tags for template default-lighttpd-page.yaml
* Updated tags for template microsoft-iis-8.yaml
* Updated tags for template lucee-detect.yaml
* Updated tags for template php-proxy-detect.yaml
* Updated tags for template jenkins-detect.yaml
* Updated tags for template cockpit-detect.yaml
* Updated tags for template csrfguard-detect.yaml
* Updated tags for template dwr-index-detect.yaml
* Updated tags for template netsweeper-webadmin-detect.yaml
* Updated tags for template weblogic-detect.yaml
* Updated tags for template s3-detect.yaml
* Updated tags for template tileserver-gl.yaml
* Updated tags for template springboot-actuator.yaml
* Updated tags for template terraform-detect.yaml
* Updated tags for template redmine-cli-detect.yaml
* Updated tags for template mrtg-detect.yaml
* Updated tags for template tableau-server-detect.yaml
* Updated tags for template magmi-detect.yaml
* Updated tags for template oidc-detect.yaml
* Updated tags for template tor-socks-proxy.yaml
* Updated tags for template synology-web-station.yaml
* Updated tags for template herokuapp-detect.yaml
* Updated tags for template gunicorn-detect.yaml
* Updated tags for template sql-server-reporting.yaml
* Updated tags for template google-bucket-service.yaml
* Updated tags for template kubernetes-mirantis.yaml
* Updated tags for template kubernetes-enterprise-manager.yaml
* Updated tags for template oracle-iplanet-web-server.yaml
* Updated tags for template dell-idrac7-detect.yaml
* Updated tags for template dell-idrac6-detect.yaml
* Updated tags for template dell-idrac9-detect.yaml
* Updated tags for template dell-idrac8-detect.yaml
* Updated tags for template apache-guacamole.yaml
* Updated tags for template aws-cloudfront-service.yaml
* Updated tags for template aws-bucket-service.yaml
* Updated tags for template nginx-linux-page.yaml
* Updated tags for template telerik-fileupload-detect.yaml
* Updated tags for template telerik-dialoghandler-detect.yaml
* Updated tags for template htaccess-config.yaml
* Updated tags for template microsoft-azure-error.yaml
* Updated tags for template detect-options-method.yaml
* Updated tags for template unpatched-coldfusion.yaml
* Updated tags for template moodle-changelog.yaml
* Updated tags for template detect-dns-over-https.yaml
* Updated tags for template CVE-2019-19134.yaml
* Updated tags for template CVE-2019-3929.yaml
* Updated tags for template CVE-2019-19908.yaml
* Updated tags for template CVE-2019-10475.yaml
* Updated tags for template CVE-2019-17382.yaml
* Updated tags for template CVE-2019-16332.yaml
* Updated tags for template CVE-2019-14974.yaml
* Updated tags for template CVE-2019-19368.yaml
* Updated tags for template CVE-2019-12725.yaml
* Updated tags for template CVE-2019-15501.yaml
* Updated tags for template CVE-2019-9733.yaml
* Updated tags for template CVE-2019-14322.yaml
* Updated tags for template CVE-2019-9955.yaml
* Updated tags for template CVE-2019-0230.yaml
* Updated tags for template CVE-2019-10232.yaml
* Updated tags for template CVE-2019-17506.yaml
* Updated tags for template CVE-2019-8449.yaml
* Updated tags for template CVE-2019-12593.yaml
* Updated tags for template CVE-2019-10092.yaml
* Updated tags for template CVE-2019-1821.yaml
* Updated tags for template CVE-2019-3401.yaml
* Updated tags for template CVE-2019-16662.yaml
* Updated tags for template CVE-2019-5418.yaml
* Updated tags for template CVE-2016-4975.yaml
* Updated tags for template CVE-2016-1000137.yaml
* Updated tags for template CVE-2016-7552.yaml
* Updated tags for template CVE-2016-10956.yaml
* Updated tags for template CVE-2016-1000146.yaml
* Updated tags for template CVE-2013-2251.yaml
* Updated tags for template CVE-2013-1965.yaml
* Updated tags for template CVE-2014-2323.yaml
* Updated tags for template CVE-2014-5111.yaml
* Updated tags for template CVE-2014-2962.yaml
* Updated tags for template CVE-2014-4561.yaml
* Updated tags for template CVE-2014-4558.yaml
* Updated tags for template CVE-2014-3120.yaml
* Updated tags for template CVE-2007-5728.yaml
* Updated tags for template CVE-2009-4679.yaml
* Updated tags for template CVE-2009-1558.yaml
* Updated tags for template CVE-2009-4202.yaml
* Updated tags for template CVE-2009-0932.yaml
* Updated tags for template CVE-2015-2068.yaml
* Updated tags for template CVE-2015-8813.yaml
* Updated tags for template CVE-2015-7450.yaml
* Updated tags for template CVE-2015-2067.yaml
* Updated tags for template CVE-2015-3306.yaml
* Updated tags for template CVE-2015-3337.yaml
* Updated tags for template CVE-2015-1427.yaml
* Updated tags for template CVE-2015-1503.yaml
* Updated tags for template CVE-2015-1880.yaml
* Updated tags for template CVE-2018-3810.yaml
* Updated tags for template CVE-2018-18069.yaml
* Updated tags for template CVE-2018-17246.yaml
* Updated tags for template CVE-2018-10141.yaml
* Updated tags for template CVE-2018-16341.yaml
* Updated tags for template CVE-2018-18777.yaml
* Updated tags for template CVE-2018-15138.yaml
* Updated tags for template CVE-2018-11784.yaml
* Updated tags for template CVE-2018-16299.yaml
* Updated tags for template CVE-2018-7251.yaml
* Updated tags for template CVE-2018-1273.yaml
* Updated tags for template CVE-2018-1271.yaml
* Updated tags for template CVE-2018-11759.yaml
* Updated tags for template CVE-2018-3167.yaml
* Updated tags for template CVE-2018-7490.yaml
* Updated tags for template CVE-2018-2628.yaml
* Updated tags for template CVE-2018-13380.yaml
* Updated tags for template CVE-2018-2893.yaml
* Updated tags for template CVE-2018-5316.yaml
* Updated tags for template CVE-2018-20985.yaml
* Updated tags for template CVE-2018-10818.yaml
* Updated tags for template CVE-2018-1000861.yaml
* Updated tags for template CVE-2018-0296.yaml
* Updated tags for template CVE-2018-19458.yaml
* Updated tags for template CVE-2018-3760.yaml
* Updated tags for template CVE-2018-12998.yaml
* Updated tags for template CVE-2018-9118.yaml
* Updated tags for template CVE-2018-1000130.yaml
* Updated tags for template CVE-2008-6668.yaml
* Updated tags for template CVE-2017-7269.yaml
* Updated tags for template CVE-2017-1000170.yaml
* Updated tags for template CVE-2017-16877.yaml
* Updated tags for template CVE-2017-1000486.yaml
* Updated tags for template CVE-2017-9822.yaml
* Updated tags for template CVE-2017-0929.yaml
* Updated tags for template CVE-2017-7921.yaml
* Updated tags for template CVE-2017-14535.yaml
* Updated tags for template CVE-2017-5521.yaml
* Updated tags for template CVE-2017-12637.yaml
* Updated tags for template CVE-2017-12635.yaml
* Updated tags for template CVE-2017-11610.yaml
* Updated tags for template CVE-2021-20114.yaml
* Updated tags for template CVE-2021-40856.yaml
* Updated tags for template CVE-2021-21972.yaml
* Updated tags for template CVE-2021-31602.yaml
* Updated tags for template CVE-2021-41773.yaml
* Updated tags for template CVE-2021-37704.yaml
* Updated tags for template CVE-2021-45046.yaml
* Updated tags for template CVE-2021-26084.yaml
* Updated tags for template CVE-2021-27931.yaml
* Updated tags for template CVE-2021-24291.yaml
* Updated tags for template CVE-2021-41648.yaml
* Updated tags for template CVE-2021-37216.yaml
* Updated tags for template CVE-2021-22005.yaml
* Updated tags for template CVE-2021-37573.yaml
* Updated tags for template CVE-2021-31755.yaml
* Updated tags for template CVE-2021-43287.yaml
* Updated tags for template CVE-2021-24274.yaml
* Updated tags for template CVE-2021-33564.yaml
* Updated tags for template CVE-2021-22145.yaml
* Updated tags for template CVE-2021-24237.yaml
* Updated tags for template CVE-2021-44848.yaml
* Updated tags for template CVE-2021-25646.yaml
* Updated tags for template CVE-2021-21816.yaml
* Updated tags for template CVE-2021-41649.yaml
* Updated tags for template CVE-2021-41291.yaml
* Updated tags for template CVE-2021-41293.yaml
* Updated tags for template CVE-2021-21801.yaml
* Updated tags for template CVE-2021-29156.yaml
* Updated tags for template CVE-2021-34370.yaml
* Updated tags for template CVE-2021-27132.yaml
* Updated tags for template CVE-2021-28151.yaml
* Updated tags for template CVE-2021-26812.yaml
* Updated tags for template CVE-2021-21985.yaml
* Updated tags for template CVE-2021-43778.yaml
* Updated tags for template CVE-2021-25281.yaml
* Updated tags for template CVE-2021-40539.yaml
* Updated tags for template CVE-2021-36749.yaml
* Updated tags for template CVE-2021-21234.yaml
* Updated tags for template CVE-2021-33221.yaml
* Updated tags for template CVE-2021-42013.yaml
* Updated tags for template CVE-2021-33807.yaml
* Updated tags for template CVE-2021-44228.yaml
* Updated tags for template CVE-2012-0896.yaml
* Updated tags for template CVE-2012-0991.yaml
* Updated tags for template CVE-2012-0392.yaml
* Updated tags for template CVE-2012-4940.yaml
* Updated tags for template CVE-2012-1226.yaml
* Updated tags for template CVE-2012-4878.yaml
* Updated tags for template CVE-2010-1304.yaml
* Updated tags for template CVE-2010-1217.yaml
* Updated tags for template CVE-2010-0759.yaml
* Updated tags for template CVE-2010-2307.yaml
* Updated tags for template CVE-2010-4231.yaml
* Updated tags for template CVE-2010-2861.yaml
* Updated tags for template CVE-2010-4282.yaml
* Updated tags for template CVE-2010-1302.yaml
* Updated tags for template CVE-2010-1461.yaml
* Updated tags for template CVE-2020-4463.yaml
* Updated tags for template CVE-2020-1943.yaml
* Updated tags for template CVE-2020-36289.yaml
* Updated tags for template CVE-2020-17518.yaml
* Updated tags for template CVE-2020-12800.yaml
* Updated tags for template CVE-2020-10770.yaml
* Updated tags for template CVE-2020-17506.yaml
* Updated tags for template CVE-2020-11547.yaml
* Updated tags for template CVE-2020-11034.yaml
* Updated tags for template CVE-2020-24589.yaml
* Updated tags for template CVE-2020-9054.yaml
* Updated tags for template CVE-2020-28976.yaml
* Updated tags for template CVE-2020-16952.yaml
* Updated tags for template CVE-2020-24312.yaml
* Updated tags for template CVE-2020-8512.yaml
* Updated tags for template CVE-2020-14179.yaml
* Updated tags for template CVE-2020-6308.yaml
* Updated tags for template CVE-2020-35846.yaml
* Updated tags for template CVE-2020-7318.yaml
* Updated tags for template CVE-2020-2140.yaml
* Updated tags for template CVE-2020-5410.yaml
* Updated tags for template CVE-2020-5777.yaml
* Updated tags for template CVE-2020-13700.yaml
* Updated tags for template CVE-2020-5775.yaml
* Updated tags for template CVE-2020-13167.yaml
* Updated tags for template CVE-2020-35848.yaml
* Updated tags for template CVE-2020-9484.yaml
* Updated tags for template CVE-2020-15505.yaml
* Updated tags for template CVE-2020-9047.yaml
* Updated tags for template CVE-2020-17519.yaml
* Updated tags for template CVE-2020-17505.yaml
* Updated tags for template CVE-2020-9376.yaml
* Updated tags for template CVE-2020-8497.yaml
* Updated tags for template CVE-2020-14092.yaml
* Updated tags for template CVE-2020-10148.yaml
* Updated tags for template CVE-2020-35847.yaml
* Updated tags for template CVE-2020-12116.yaml
* Updated tags for template CVE-2020-11930.yaml
* Updated tags for template CVE-2020-24186.yaml
* Updated tags for template CVE-2020-9496.yaml
* Updated tags for template CVE-2020-35489.yaml
* Updated tags for template CVE-2020-26413.yaml
* Updated tags for template CVE-2020-2096.yaml
* misc updates
* misc update
* more updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 01:04:16 +05:30
Sandeep Singh
de9c4d605c
Apache Tomcat Template improvements ( #3446 )
...
* Improved Tomcat matchers / extractors / paths
* removed duplicate detections / matchers
* removed duplicate template
* Added missing tomcat tags
2021-12-29 19:10:59 +05:30
sandeep
85956018f8
Added metadata
2021-12-28 18:16:23 +05:30
Sandeep Singh
5d7d4409a0
Added CVE-2020-11546 ( #3436 )
...
Co-Authored-By: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
Co-authored-by: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
2021-12-28 18:13:04 +05:30
Prince Chaddha
c92010033b
Update CVE-2020-8497.yaml
2021-12-06 10:39:43 +05:30
GwanYeong Kim
b76c1d20f3
Create CVE-2020-8497.yaml
...
In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-06 08:36:14 +09:00
GitHub Action
2f6733c202
Auto Generated CVE annotations [Mon Nov 29 14:34:36 UTC 2021] 🤖
2021-11-29 14:34:36 +00:00
Sandeep Singh
38839cfbbc
Added Commvault CommCell Directory Traversal (CVE-2020-25780) ( #3182 )
2021-11-29 20:02:59 +05:30
GitHub Action
bcb798df8b
Auto Generated CVE annotations [Sun Nov 28 20:49:07 UTC 2021] 🤖
2021-11-28 20:49:07 +00:00
sandeep
b7cb6a63cb
moving template into cves
2021-11-29 02:17:27 +05:30
sandeep
682db62431
Fixed CVE-2020-14882 payload + matcher
2021-11-29 01:15:05 +05:30
Prince Chaddha
168db8a984
Update CVE-2020-2096.yaml
2021-11-24 11:58:52 +04:00
yuan
641ffd4e93
update CVE-2020-2096
2021-11-23 19:01:24 +08:00
GitHub Action
65ec414ae7
Auto Generated CVE annotations [Tue Nov 23 04:08:40 UTC 2021] 🤖
2021-11-23 04:08:40 +00:00
Prince Chaddha
1c569d76cb
Update CVE-2020-20982.yaml
2021-11-23 07:57:11 +04:00
PikPikcU
8463cfd824
Create CVE-2020-20982.yaml
2021-11-22 22:56:22 +07:00
Prince Chaddha
26a9bbc797
Update and rename CVE-2020-19360.yaml to cves/2020/CVE-2020-19360.yaml
2021-11-13 23:34:22 +05:30
GitHub Action
56c9fb7a7b
Auto Generated CVE annotations [Sat Nov 6 17:09:47 UTC 2021] 🤖
2021-11-06 17:09:47 +00:00
sandeep
dbbb08e40c
misc updates
2021-11-06 22:36:37 +05:30
Prince Chaddha
0e27f24138
Update CVE-2020-26413.yaml
2021-11-06 20:18:27 +05:30
Prince Chaddha
5aeb4de8c8
Create CVE-2020-26413.yaml
2021-11-06 18:22:50 +05:30
Chill3d
e6d40037c5
Typo on rocketchat tag
2021-10-27 10:30:43 +02:00
Sandeep Singh
b8aaf28eb6
Merge pull request #2901 from lethargynavigator/master
...
CVE-2020-24589 template
2021-10-21 22:27:25 +05:30
sandeep
e7768bb348
misc update
2021-10-21 22:25:42 +05:30
lethargynavigator
15a8208fc6
full poc
2021-10-21 11:02:55 -04:00
Sandeep Singh
a21cec6362
Merge pull request #2844 from projectdiscovery/more-fixes
...
Changes to adopt v2.5.3 engine
2021-10-21 07:21:20 +05:30
sandeep
33badb66d1
oob tags update
2021-10-19 02:10:26 +05:30
Prince Chaddha
fc81dd3b24
Update CVE-2020-10770.yaml
2021-10-18 21:03:29 +05:30
GitHub Action
e8218febf5
Auto Generated CVE annotations [Sun Oct 17 16:03:20 UTC 2021] 🤖
2021-10-17 16:03:20 +00:00
Dhiyaneshwaran
a9eca98f7f
Update CVE-2020-10770.yaml
2021-10-17 21:31:55 +05:30
Dhiyaneshwaran
9c8d006dbe
Create CVE-2020-10770.yaml
2021-10-17 21:29:45 +05:30
lethargynavigator
2871cc6b02
CVE-2020-24589 template
2021-10-15 20:37:03 -04:00
Sandeep Singh
9273a765c0
Merge branch 'master' into more-fixes
2021-10-13 13:48:52 +05:30
GitHub Action
5cf090ddec
Auto Generated CVE annotations [Sun Oct 10 22:40:30 UTC 2021] 🤖
2021-10-10 22:40:30 +00:00
sandeep
d76884c109
moving files around
2021-10-11 04:07:10 +05:30
sandeep
5072932509
more updates
2021-10-10 06:43:30 +05:30
sandeep
53fc9bcb3f
misc fixes
2021-10-07 05:23:20 +05:30
sandeep
937ff9f7ee
misc update
2021-10-05 22:00:59 +05:30
Sandeep Singh
ada6fcef43
Update CVE-2020-2036.yaml
2021-10-02 17:56:42 +05:30
Philippe Delteil
8185a0e9c0
Update CVE-2020-2036.yaml
2021-10-02 03:24:29 -03:00
sullo
c0003f8731
Update CVE-2020-29453.yaml
2021-09-30 14:27:12 -04:00
sullo
784d9560be
Fix CVSS score
...
incorrectly changed cvss score
2021-09-30 14:26:37 -04:00
Sullo
3878138bfe
* Added Host headers where needed (validated via disclosures/posts)
...
* Added CVE simple-employee-rce.yaml
2021-09-30 12:52:05 -04:00
sullo
6b5d52084d
Update cvss/severity for CVE-2020-29453
2021-09-29 10:35:52 -04:00
sandeep
ff1537d7da
fixing tags typos
2021-09-21 15:43:08 +05:30
sandeep
7b23f4ebd4
outdated template cleanups
2021-09-21 14:34:20 +05:30
Sandeep Singh
0f03f5ff55
Merge pull request #2692 from projectdiscovery/metadata-attribute-update
2021-09-18 18:19:07 +05:30
GitHub Action
a866f1e777
Auto Generated CVE annotations [Fri Sep 17 11:08:30 UTC 2021] 🤖
2021-09-17 11:08:30 +00:00
Prince Chaddha
7fc3c211d8
Merge pull request #2667 from pikpikcu/patch-268
...
Added Jeesns POC
2021-09-17 16:37:25 +05:30
Prince Chaddha
9357ac4153
Update CVE-2020-19282.yaml
2021-09-17 16:33:45 +05:30
Prince Chaddha
51672dd85d
Update CVE-2020-19295.yaml
2021-09-17 16:32:41 +05:30
Prince Chaddha
ae221b7892
Update CVE-2020-19283.yaml
2021-09-17 16:32:27 +05:30
Prince Chaddha
92014aa363
Update CVE-2020-19295.yaml
2021-09-17 16:31:20 +05:30
sandeep
676b51d20c
Metadata attribute update
2021-09-16 21:24:33 +05:30
GitHub Action
7542ad2c07
Auto Generated CVE annotations [Thu Sep 16 13:05:34 UTC 2021] 🤖
2021-09-16 13:05:34 +00:00
forgedhallpass
d0f5daca61
#276 Replace space character with dash in template ID.
2021-09-16 16:04:04 +03:00
GitHub Action
f19daba616
Auto Generated CVE annotations [Wed Sep 15 12:04:47 UTC 2021] 🤖
2021-09-15 12:04:47 +00:00
Prince Chaddha
f5c71d54e2
Merge pull request #2677 from pikpikcu/patch-278
...
Create CVE-2020-28351.yaml
2021-09-15 17:33:36 +05:30
Prince Chaddha
6539892061
Update CVE-2020-28351.yaml
2021-09-15 17:24:42 +05:30
GitHub Action
18534fa692
Auto Generated CVE annotations [Wed Sep 15 11:53:20 UTC 2021] 🤖
2021-09-15 11:53:20 +00:00
Prince Chaddha
68cdcd3034
Update CVE-2020-24912.yaml
2021-09-15 17:20:24 +05:30
Prince Chaddha
bc1d567455
Update CVE-2020-24912.yaml
2021-09-15 16:50:33 +05:30
Prince Chaddha
86a369132e
Update CVE-2020-24912.yaml
2021-09-15 16:49:18 +05:30
PikPikcU
80072c8e97
Create CVE-2020-28351.yaml
2021-09-15 13:13:50 +07:00
PikPikcU
bb8e0616e9
Create CVE-2020-24912.yaml
2021-09-15 13:00:51 +07:00
PikPikcU
1d63ebfe45
Update CVE-2020-19295.yaml
2021-09-15 11:30:58 +07:00
PikPikcU
c5416951e5
Update CVE-2020-19283.yaml
2021-09-15 11:30:38 +07:00
PikPikcU
4a10930690
Update CVE-2020-19282.yaml
2021-09-15 11:30:18 +07:00
PikPikcU
6985e77e20
Update CVE-2020-19295.yaml
2021-09-15 10:45:24 +07:00
PikPikcU
5fb54fd82e
Update CVE-2020-19283.yaml
2021-09-15 10:45:04 +07:00
PikPikcU
42cf71e956
Create CVE-2020-19295.yaml
2021-09-15 10:41:12 +07:00
PikPikcU
6e09439dec
Create CVE-2020-19283.yaml
2021-09-15 10:37:44 +07:00
PikPikcU
4340807fb6
Create CVE-2020-19282.yaml
2021-09-15 09:56:03 +07:00
sandeep
29a944ea73
payload update
2021-09-12 20:22:03 +05:30
sandeep
e6d97e26c5
additional matcher
2021-09-12 18:31:46 +05:30
Ice3man543
e9f728c321
Added cve annotations + severity adjustments
2021-09-10 16:56:40 +05:30
sandeep
bd24dc198e
Coverage for all templates using tags
2021-09-09 19:08:13 +05:30
Prince Chaddha
90eba9d883
Update CVE-2020-7961.yaml
2021-09-09 11:46:54 +05:30
Prince Chaddha
43b45a7b63
Update CVE-2020-12720.yaml
2021-09-09 11:42:52 +05:30
sandeep
609705f676
removed extra headers not required for template
2021-09-08 17:47:19 +05:30
sullo
ef1f7c5e92
Updates across many templates for clarity, spelling, and grammar.
2021-09-05 17:13:45 -04:00
Sandeep Singh
f6c72769ce
temporary moving to another branch
2021-09-03 22:29:55 +05:30
sandeep
90f8caf302
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into pr/2481
2021-09-03 14:55:30 +05:30
sandeep
c41a498505
added tags
2021-09-03 12:52:27 +05:30
Prince Chaddha
58a886ad6e
Update CVE-2020-28976.yaml
2021-09-03 09:24:21 +05:30
Borna Nematzadeh
6e7c3ab0a2
Update CVE-2020-28976.yaml
2021-09-02 12:26:10 -07:00
LogicalHunter
f0197ae9ac
Added CVE-2020-28976.yaml Template
2021-09-02 12:13:21 -07:00
Prince Chaddha
3b32de60be
Update CVE-2020-11547.yaml
2021-09-02 18:25:16 +05:30
betul.kiral
5c94814e00
Adding CVE-2020-11547
2021-09-02 14:43:37 +03:00
sandeep
c81725e991
Removed duplicate template
2021-09-01 12:36:20 +05:30
Noam Rathaus
51eb639de8
Updated
2021-08-30 12:49:23 +03:00
Noam Rathaus
86f3c08ba6
Vendor writes it as "NETGEAR"
2021-08-29 09:39:06 +03:00
Noam Rathaus
67fa97aed1
Add vendor KB
2021-08-29 09:36:59 +03:00
socketz
c766a8454d
Fixed yaml linting errors
2021-08-25 14:09:42 +02:00
socketz
f290b9f60d
Deleted duplicate and in wrong directory
2021-08-25 07:55:46 +02:00
sandeep
d705fbd84b
Update CVE-2020-11420.yaml
2021-08-25 00:33:54 +05:30
sandeep
3c95101f5a
Update CVE-2020-11420.yaml
2021-08-25 00:31:27 +05:30
sandeep
65d9d8acb2
lint fix
2021-08-24 23:13:00 +05:30
forgedhallpass
110f9c9ddd
Merge remote-tracking branch 'origin' into dynamic_attributes
2021-08-24 20:38:11 +03:00
socketz
7d6a6c137a
Added CVE-2020-11420
2021-08-24 14:43:45 +02:00
sandeep
85f8cf2c41
Update CVE-2020-12800.yaml
2021-08-24 05:00:04 +05:30
sandeep
fba4461932
Added CVE-2020-12800
2021-08-24 04:57:51 +05:30
forgedhallpass
296edfc37b
Merge remote-tracking branch 'origin' into dynamic_attributes
2021-08-23 14:40:33 +03:00
Sandeep Singh
04b401a8ef
Merge pull request #2456 from projectdiscovery/payloads-update
...
Payloads positional update to keep the request format uniform
2021-08-23 15:26:35 +05:30
sandeep
451e938d46
misc changes
2021-08-23 14:54:04 +05:30
Dwi Siswanto
be3d5c9d08
Add CVE-2020-29453
2021-08-23 11:30:16 +07:00
sandeep
2aa54304ee
Payloads positional update to keep the request format uniform
2021-08-22 23:39:33 +05:30
forgedhallpass
dc4cc62629
Merge remote-tracking branch 'origin/master' into dynamic_attributes
2021-08-20 15:35:17 +03:00
sandeep
3f803deb28
more updates
2021-08-20 02:14:42 +05:30
forgedhallpass
77103bc629
Satisfying the linter (all errors and warnings)
...
* whitespace modifications only
2021-08-19 17:44:46 +03:00
forgedhallpass
2a320412bf
Misc (minor)
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 17:25:01 +03:00
forgedhallpass
97d4f8705b
Fixed mistakes/typos
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:55 +03:00
forgedhallpass
f55d6b75e1
Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:12 +03:00
forgedhallpass
7b29be739e
Merge branch 'master' into dynamic_attributes
2021-08-19 16:23:26 +03:00
forgedhallpass
ffaff64565
Changes fixes/around dynamic attributes ("additional-fields")
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:17:27 +03:00
forgedhallpass
0b432b341b
Added comments with URLs under the "references" field
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:15:35 +03:00
Prince Chaddha
3a8b5df438
Update CVE-2020-25223.yaml
2021-08-19 16:35:50 +05:30
GwanYeong Kim
673fe80660
Create CVE-2020-25223.yaml
...
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-19 18:37:59 +09:00
forgedhallpass
cdf9451158
Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
forgedhallpass
4c920b2552
Rename "references" to "reference" to match the expected template info structure
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:29:20 +03:00
sandeep
63431349aa
minor update
2021-08-10 20:13:14 +05:30
Geeknik Labs
d6bd06a878
Update CVE-2020-24312.yaml
...
Fixes a false positive.
2021-08-09 20:43:58 -05:00
Prince Chaddha
bc236580ee
Merge pull request #1856 from Akokonunes/patch-15
...
Create CVE-2019-9618.yaml
2021-08-07 19:55:08 +05:30
Prince Chaddha
3395eff8a0
Merge pull request #2316 from gy741/rule-add-v49
...
Create CVE-2020-7796.yaml
2021-08-03 19:57:45 +05:30
Prince Chaddha
23bc448b1b
Merge pull request #2199 from pikpikcu/patch-208
...
Add OpenSIS POC
2021-08-03 19:53:32 +05:30
Prince Chaddha
b927288f30
Update CVE-2020-6637.yaml
2021-08-03 19:25:06 +05:30
Prince Chaddha
107c3594bf
Update CVE-2020-6637.yaml
2021-08-03 13:24:31 +05:30
sandeep
3c03e28e55
Update CVE-2020-7796.yaml
2021-08-03 12:50:22 +05:30
sandeep
d8007437ae
Update CVE-2020-7796.yaml
2021-08-03 12:50:10 +05:30
Prince Chaddha
b02ea3266b
Update CVE-2020-7796.yaml
2021-08-03 12:47:55 +05:30
Prince Chaddha
9620f4616e
Update CVE-2020-7796.yaml
2021-08-03 12:42:56 +05:30
GwanYeong Kim
9c16967fa5
Create CVE-2020-7796.yaml
...
Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-03 09:31:23 +09:00
GwanYeong Kim
8627aadce0
Create CVE-2020-27361.yaml
...
An issue exists within Akkadian Provisioning Manager 4.50.02 which allows attackers to view sensitive information within the /pme subdirectories.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-03 01:17:48 +09:00
Prince Chaddha
a3cba3b1e1
Merge pull request #2280 from daffainfo/patch-120
...
Create CVE-2020-35598.yaml
2021-08-02 17:14:38 +05:30
sandeep
a24977aab9
Update CVE-2020-6637.yaml
2021-08-02 01:42:01 +05:30
Noam Rathaus
734dde35cc
Fix FP - https://github.com/projectdiscovery/nuclei-templates/issues/2217
2021-08-01 08:52:30 +03:00
Muhammad Daffa
b826d82268
Create CVE-2020-35598.yaml
2021-08-01 06:40:11 +07:00
Toufik Airane
1cce455f1c
Update CVE-2020-13927.yaml
...
Following the discussion https://github.com/projectdiscovery/nuclei-templates/discussions/1477 .
According to NIST, It's a critical issue.
https://nvd.nist.gov/vuln/detail/CVE-2020-13927
2021-07-30 16:40:41 +02:00
Muhammad Daffa
da3ba72db3
Create CVE-2020-11455.yaml
2021-07-29 05:43:07 +07:00
Sandeep Singh
32e18be51a
Merge pull request #2215 from TheConciergeDev/patch-4
...
Renamed yaml file
2021-07-27 17:27:23 +05:30
Prince Chaddha
fdfd4232a5
Merge pull request #2225 from pikpikcu/patch-231
...
Create CVE-2020-26153.yaml
2021-07-27 17:22:04 +05:30
Prince Chaddha
cdb91d44f3
Update CVE-2020-26153.yaml
2021-07-27 17:20:54 +05:30
Prince Chaddha
4a5d374227
Merge pull request #2212 from pikpikcu/patch-220
...
Add Jeedom XSS
2021-07-27 17:18:07 +05:30
Prince Chaddha
142eb2fe3b
Update CVE-2020-9036.yaml
2021-07-27 17:12:32 +05:30
Prince Chaddha
c4e75a7eb5
Merge pull request #2203 from pikpikcu/patch-211
...
Add CVE-2020-27735
2021-07-27 17:08:21 +05:30
PikPikcU
d561a8711d
Create CVE-2020-26153.yaml
2021-07-27 18:19:44 +07:00
Prince Chaddha
d9f20b63e4
Update CVE-2020-27735.yaml
2021-07-27 16:32:50 +05:30
Prince Chaddha
6e7aba2fb9
Update CVE-2020-27735.yaml
2021-07-27 13:55:45 +05:30
Prince Chaddha
4a13112125
Update CVE-2020-27735.yaml
2021-07-27 13:33:41 +05:30
TheConciergeDev
62df9585f9
Renamed yaml file
...
Added missing "-" in filename
2021-07-27 09:28:54 +02:00
PikPikcU
6f91b5d052
Create CVE-2020-9036.yaml
2021-07-27 13:45:01 +07:00
Prince Chaddha
76a39c9ef5
Update CVE 2020-6171.yaml
2021-07-27 11:58:42 +05:30
PikPikcU
751626e435
Update CVE 2020-6171.yaml
2021-07-27 12:24:17 +07:00
PikPikcU
ddc251861f
Create CVE 2020-6171.yaml
2021-07-27 12:21:52 +07:00
Prince Chaddha
caf6bb61c3
Update CVE-2020-27735.yaml
2021-07-27 10:41:08 +05:30
Prince Chaddha
b2f1863fd7
Update CVE-2020-35774.yaml
2021-07-27 10:40:55 +05:30
Prince Chaddha
b75c2dde67
Update CVE-2020-35774.yaml
2021-07-27 10:38:46 +05:30
PikPikcU
326c8265ef
Create CVE-2020-35774.yaml
2021-07-27 10:31:48 +07:00
PikPikcU
f619caf26a
Create CVE-2020-27735.yaml
2021-07-27 10:23:23 +07:00
PikPikcU
96c03d93cc
Update CVE-2020-6637.yaml
2021-07-27 07:38:49 +07:00
PikPikcU
b1dfb89f88
Create CVE-2020-6637.yaml
2021-07-27 07:36:48 +07:00
sandeep
9c66387f0f
More CVEs Template
2021-07-26 22:48:45 +05:30
Sandeep Singh
79c077ddf7
Merge pull request #1874 from Vladimir-Ivanov-Git/CVE-2020-6207
...
CVE-2020-6207 SAP SolMan RCE
2021-07-26 18:26:55 +05:30
Sandeep Singh
8130cd2c3b
Update CVE-2020-6207.yaml
2021-07-26 18:26:19 +05:30
Prince Chaddha
4ee46bf076
Merge pull request #2112 from daffainfo/patch-91
...
Create CVE-2020-35580.yaml
2021-07-26 14:06:50 +05:30
Prince Chaddha
84161bc33e
Update CVE-2020-8813.yaml
2021-07-26 13:27:19 +05:30
GwanYeong Kim
620ff3f367
Create CVE-2020-8813.yaml
...
This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-26 11:32:23 +09:00
Muhammad Daffa
fed682443e
Update CVE-2020-35580.yaml
2021-07-26 06:55:48 +07:00
GwanYeong Kim
b9fadff659
Create CVE-2020-5307.yaml
...
PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-25 11:50:53 +09:00
sandeep
6ccc5f8792
matcher update to handle edge cases
2021-07-25 03:05:55 +05:30
Prince Chaddha
f32521ad9d
Merge pull request #2113 from daffainfo/patch-92
...
Create CVE-2020-29227.yaml
2021-07-24 12:22:54 +05:30
Prince Chaddha
af4081d0ec
Update CVE-2020-29227.yaml
2021-07-24 12:17:56 +05:30
Prince Chaddha
956eb6691f
Update CVE-2020-29227.yaml
2021-07-24 12:16:30 +05:30
Prince Chaddha
f40aca136b
Update CVE-2020-29227.yaml
2021-07-24 12:15:24 +05:30
Prince Chaddha
31f62d59ce
Update CVE-2020-13117.yaml
2021-07-24 11:39:47 +05:30
Prince Chaddha
f60a9ed891
Update CVE-2020-13117.yaml
2021-07-23 15:06:51 +05:30
GwanYeong Kim
7298a0b35d
Create CVE-2020-13117.yaml
...
Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-23 11:14:31 +09:00
Muhammad Daffa
65bddf3e33
Create CVE-2020-29227.yaml
2021-07-20 20:08:18 +07:00
Muhammad Daffa
f7d4a642f1
Create CVE-2020-35580.yaml
2021-07-20 20:02:49 +07:00
Sandeep Singh
ac39bd3284
Merge pull request #2100 from daffainfo/master
...
Renamed CVE-2020-8771.yaml
2021-07-20 11:38:35 +05:30
Sandeep Singh
14beefec28
Update CVE-2020-8771.yaml
2021-07-20 11:35:57 +05:30
sandeep
19fe96bc45
minor improvements and file name update
2021-07-20 11:33:16 +05:30
Muhammad Daffa
d27fb4c3b0
Renamed CVE-2020-8771.yaml
2021-07-20 12:49:16 +07:00
Sandeep Singh
6eee57115c
Merge pull request #2083 from projectdiscovery/fixing-xss-matchers
...
fixing-xss-matchers
2021-07-20 00:28:01 +05:30
sandeep
414883f719
Update CVE-2020-12054.yaml
2021-07-19 23:55:15 +05:30
sandeep
7d9dbc4aad
Update CVE-2020-28188.yaml
2021-07-19 16:41:12 +05:30
GwanYeong Kim
edabf1e7ca
Create CVE-2020-28188.yaml
...
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-19 15:13:57 +09:00
Prince Chaddha
75c5a8c68e
Update CVE-2020-17362.yaml
2021-07-19 11:35:47 +05:30
Prince Chaddha
c22839b3fd
Update CVE-2020-12054.yaml
2021-07-19 11:35:24 +05:30
sandeep
965e6fcc00
minor update
2021-07-18 23:24:55 +05:30
GwanYeong Kim
fb22fd40c5
Create CVE-2020-27866.yaml
...
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 10:03:38 +09:00
sandeep
048cdff225
Additional matcher
2021-07-17 02:07:26 +05:30
Prince Chaddha
33a0ede229
Merge pull request #2009 from gy741/rule-add-v24
...
Create CVE-2020-26919, CVE-2020-25506, OptiLink ONT1GEW GPON RCE, CVE-2021-31755
2021-07-16 18:04:52 +05:30
Prince Chaddha
4da4ebf224
Merge pull request #2020 from gy741/rule-add-v25
...
Create CVE-2020-35713.yaml
2021-07-16 17:31:26 +05:30
Prince Chaddha
f4f05394e1
Update CVE-2020-35713.yaml
2021-07-16 17:30:35 +05:30
Regala
6aef970258
Update CVE-2020-17362.yaml
...
Added "nova-lite" matcher; massively reduce false positives.
2021-07-16 12:19:30 +01:00
sandeep
94ae6ea0bf
Added tag
2021-07-15 23:47:05 +05:30
sandeep
97dfd43f1e
Added tag and removed unsafe
2021-07-15 23:46:08 +05:30
Prince Chaddha
b7d2ac2843
Merge pull request #2023 from daffainfo/patch-61
...
Create CVE-2020-12054.yaml
2021-07-15 17:27:05 +05:30
Prince Chaddha
89112a18d6
Update CVE-2020-12054.yaml
2021-07-15 17:25:22 +05:30
Prince Chaddha
93293c986a
Update CVE-2020-17362.yaml
2021-07-15 17:22:49 +05:30
Muhammad Daffa
cb364b16c5
Update CVE-2020-12054.yaml
2021-07-15 18:30:38 +07:00
Muhammad Daffa
dc2cf528bd
Create CVE-2020-12054.yaml
2021-07-15 18:27:45 +07:00
Muhammad Daffa
6d3e02ddc1
Create CVE-2020-17362.yaml
2021-07-15 18:14:59 +07:00
GwanYeong Kim
f8f9f539ea
Create CVE-2020-35713.yaml
...
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 18:10:11 +09:00
GwanYeong Kim
a3699d912a
Create CVE-2020-25506.yaml
...
The exploit targets a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 14:28:14 +09:00
GwanYeong Kim
67ae44be04
Create CVE-2020-26919.yaml
...
it was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 10:54:56 +09:00
Sandeep Singh
89e1a8da93
Merge pull request #1962 from dwisiswant0/hotfix/CVE-2020-24148
2021-07-13 05:01:01 +05:30