Commit Graph

4481 Commits (2eca42b094a774930872988c4e2e3624000e8d37)

Author SHA1 Message Date
GitHub Action 6841d03aef Auto Generated CVE annotations [Fri Apr 29 06:40:08 UTC 2022] 🤖 2022-04-29 06:40:08 +00:00
Sandeep Singh 2db05da4f6
Added CVE-2022-0422 (#4261) 2022-04-29 12:09:46 +05:30
sullo c3d4dfd6ae
Tenda Template Enhancementleanup (#4257)
* Replace § markers with {{ }} pairs

* Clean up new Tenda admin panel template

* Update tenda-11n-wireless-router-login.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
sandeep 2d7cef7abd misc update 2022-04-28 18:52:35 +05:30
GitHub Action 6d0cccbd60 Auto Generated CVE annotations [Thu Apr 28 13:21:26 UTC 2022] 🤖 2022-04-28 13:21:26 +00:00
Dwi Siswanto 9929a2f524
Add CVE-2022-0543 (#4255) 2022-04-28 18:51:04 +05:30
xiaoheihei1107 75cb4e3297
Add CVE-2021-22054.yaml (#4251)
* Create CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-28 13:18:32 +05:30
Prince Chaddha aaf32a716a
Merge pull request #4249 from For3stCo1d/CVE-2021-46417.yaml
Create CVE-2021-46417.yaml
2022-04-28 01:38:59 +05:30
Prince Chaddha 208f676590
Update CVE-2021-46417.yaml 2022-04-28 01:36:11 +05:30
林寒 006c2e71e0
update CWE-ID 2022-04-27 23:45:58 +08:00
林寒 1525af197c
Create CVE-2021-46417.yaml 2022-04-27 23:43:24 +08:00
GitHub Action 0d3bdec6c2 Auto Generated CVE annotations [Tue Apr 26 21:55:38 UTC 2022] 🤖 2022-04-26 21:55:38 +00:00
Sandeep Singh de09d067c3
Added CVE-2015-3224 (Ruby on Rails Web Console - Remote Code Execution) (#4248) 2022-04-27 03:25:12 +05:30
Prince Chaddha bc831be504
Merge pull request #4241 from p-l-/fix-cve-2020-16952
Fix CVE-2020-16952 template
2022-04-26 03:48:21 +04:00
Prince Chaddha ffbeb784f4
Update CVE-2020-16952.yaml 2022-04-26 03:43:33 +04:00
Pierre Lalet e20ac0da50 Fix CVE-2020-16952 template
The headers are normalized by nuclei, and
MicrosoftSharePointTeamServices will never match.
2022-04-25 21:42:29 +02:00
Sandeep Singh 21145c1220
Added CVE-2022-1119 (#4240) 2022-04-25 21:44:36 +05:30
MostInterestingBotInTheWorld aa888bca8d
Dashboard Content Enhancements (#4238)
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Prince Chaddha c889433655
Update CVE-2019-20224.yaml 2022-04-25 03:28:12 +04:00
Prince Chaddha d76b1a0032
Merge pull request #4231 from edoardottt/master
Add CVE-2018-5715
2022-04-25 03:16:52 +04:00
Prince Chaddha 2a7f7c72b0
Merge pull request #4228 from Akokonunes/patch-141
Create CVE-2010-4239.yaml
2022-04-25 03:16:30 +04:00
Prince Chaddha 778c778707
Update CVE-2010-4239.yaml 2022-04-25 03:14:38 +04:00
Prince Chaddha 1a80d332da
Update CVE-2018-5715.yaml 2022-04-25 03:13:37 +04:00
Prince Chaddha b3c4935a68
Update and rename CVE-2010-4239.yaml to cves/2010/CVE-2010-4239.yaml 2022-04-24 18:52:35 +04:00
edoardottt 4f5ffa60ee Add CVE-2018-5715 2022-04-24 15:41:02 +02:00
edoardottt 3225c1cb94 Add CVE-2018-5715 2022-04-24 15:40:22 +02:00
edoardottt 9645f4fbc6 Add CVE-2018-5715 2022-04-24 15:39:12 +02:00
vrenzolaverace 1ca45751d1
Add CVE-2022-0208 (#4187)
* Add CVE-2022-0208

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 16:07:48 +05:30
Adam Crosser fd3a7c8fc5
Zoho Desktop Central Authentication Bypass Vulnerability (CVE-2021-44515) (#4142)
* Added Template for CVE-2021-44515

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:42:25 +05:30
GitHub Action cedf4dee89 Auto Generated CVE annotations [Sun Apr 24 10:05:04 UTC 2022] 🤖 2022-04-24 10:05:04 +00:00
Sandeep Singh 2989fb2b4b
Added CVE-2022-0140 (#4230) 2022-04-24 15:34:42 +05:30
Prince Chaddha 0a27decfe6
Create CVE-2022-0595.yaml (#4213)
* Create CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* misc updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-24 15:23:15 +05:30
Adam Crosser 031720fc5f
Created Template for CVE-2021-44077 (#4129)
* Created Template for CVE-2021-44077

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:15:34 +05:30
sandeep 922d1d9aec more strict matchers 2022-04-23 00:30:59 +05:30
sandeep 9e505d4609 added missing tags 2022-04-22 22:13:51 +05:30
forgedhallpass 4f7e02e8a4 Added CVE id in Classification for CVE-2022-29464.yaml 2022-04-22 19:31:52 +03:00
forgedhallpass f7ca5b134d CVE info update for CVE-2022-1054.yaml 2022-04-22 19:29:43 +03:00
forgedhallpass 5451673368 Moved and renamed templates containing a CVE under their correct location 2022-04-22 19:25:23 +03:00
forgedhallpass 9f8650b0b8 Classification CVE id fix in CVE-2021-40542.yaml 2022-04-22 19:21:28 +03:00
forgedhallpass 99f8b1e4ae Description and classification CVE id fix in CVE-2022-1020.yaml 2022-04-22 19:21:09 +03:00
GitHub Action 9e3dcb86e6 Auto Generated CVE annotations [Fri Apr 22 14:30:15 UTC 2022] 🤖 2022-04-22 14:30:15 +00:00
Prince Chaddha 47a579f177
Merge pull request #4160 from ritikchaddha/patch-31
Create CVE-2019-16996.yaml
2022-04-22 18:13:31 +04:00
Prince Chaddha bc7436b471
Update CVE-2019-16996.yaml 2022-04-22 18:10:31 +04:00
Prince Chaddha 5b6aec6474
Merge pull request #4211 from projectdiscovery/CVE-2022-1054
Create CVE-2022-1054.yaml
2022-04-22 17:30:44 +04:00
Prince Chaddha cc0a6213ca
Update CVE-2022-1054.yaml 2022-04-22 17:27:48 +04:00
Prince Chaddha af2937b7b7
Merge pull request #4210 from projectdiscovery/CVE-2022-1020
Create CVE-2022-1020.yaml
2022-04-22 17:22:43 +04:00
Prince Chaddha b685ac8072
Update CVE-2022-1020.yaml 2022-04-22 17:20:27 +04:00
Sandeep Singh 2487e9877f
Merge pull request #4219 from projectdiscovery/template_info_fixup
Info section refactor
2022-04-22 18:01:12 +05:30
forgedhallpass e349c4ed72 YamlLint warning fix
* added new lines at the end of the template
2022-04-22 13:41:48 +03:00
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
Prince Chaddha 6942229274
Create CVE-2022-27849.yaml 2022-04-22 13:11:27 +04:00
MostInterestingBotInTheWorld 31312b1c19
Dashboard Content Enhancements (#4191)
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action 8c19fffb6a Auto Generated CVE annotations [Thu Apr 21 09:35:20 UTC 2022] 🤖 2022-04-21 09:35:20 +00:00
sandeep caa4e827f1 added additional references 2022-04-21 12:41:01 +05:30
luci c02d919071
Adding CVE-2022-29464 (#4209)
* Adding CVE-2022-29464

* Fixin spaces I guess

* misc updates

* path update

* Update CVE-2022-29464.yaml

* added working exploit poc

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-21 12:32:42 +05:30
Prince Chaddha b0f264c0b8
Create CVE-2022-1054.yaml 2022-04-21 02:51:08 +04:00
Prince Chaddha 36bc825ad8
Create CVE-2022-1020.yaml 2022-04-21 02:47:29 +04:00
sandeep 338d4622bf parts update to use response instead of all 2022-04-20 20:08:07 +05:30
GitHub Action 775b18dfb2 Auto Generated CVE annotations [Tue Apr 19 21:56:21 UTC 2022] 🤖 2022-04-19 21:56:21 +00:00
Prince Chaddha f1a525907e
Update CVE-2020-7980.yaml 2022-04-20 01:50:19 +04:00
Ritik Chaddha f532a0ead3
Update CVE-2020-7980.yaml 2022-04-20 02:46:41 +05:30
Ritik Chaddha fd6b099f41
Create CVE-2020-7980.yaml 2022-04-20 02:40:53 +05:30
MostInterestingBotInTheWorld 3e2e842d0e
Dashboard Content Ehnancements (#4183)
* Spacing and other template cleanups
* duplicate yaml tags

Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Dominique RIGHETTO a3ad749c91
Add a template for Incapptic Connect (#4100)
* Add tpl for Incapptic

* Fix linter error

* misc update

* Auto Generated CVE annotations [Mon Apr 18 13:10:32 UTC 2022] 🤖

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
2022-04-18 18:40:41 +05:30
Prince Chaddha 927a2f68e2
Update CVE-2021-31805.yaml 2022-04-18 15:12:27 +04:00
Prince Chaddha 5467e632dc
Create CVE-2021-31805.yaml 2022-04-18 15:08:19 +04:00
Prince Chaddha 6f30f445ad
Update and rename CVE-2018-14931.yaml to cves/2018/CVE-2018-14931.yaml 2022-04-18 13:34:00 +04:00
Muhammad Daffa 2c2312ab8c
Update CVE-2014-8682.yaml (#4173) 2022-04-17 12:00:44 +05:30
Muhammad Daffa a220bb8029
Update CVE-2016-10940.yaml (#4174) 2022-04-17 11:59:35 +05:30
Prince Chaddha 5170996712
Merge pull request #4164 from Akokonunes/patch-139
Create CVE-2022-23347
2022-04-16 17:33:12 +04:00
Prince Chaddha 5a3d0c9227
Update CVE-2022-23347.yaml 2022-04-16 17:29:35 +04:00
Prince Chaddha 9b76b0840c
Update and rename CVE-2022-23347.yaml to cves/2022/CVE-2022-23347.yaml 2022-04-16 17:27:38 +04:00
GitHub Action 4e6338a4a0 Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖 2022-04-16 13:18:49 +00:00
Ritik Chaddha 277fe4d514
Create CVE-2019-20224.yaml 2022-04-16 13:46:17 +05:30
Ritik Chaddha 27c2b78ede
Create CVE-2019-16996.yaml 2022-04-16 12:52:19 +05:30
MostInterestingBotInTheWorld 5730781afa
Dashboard Content Enhancements (#4157)
* Enhancement: exposures/files/joomla-file-listing.yaml by cs

* Enhancement: cves/2019/CVE-2019-5418.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2021/CVE-2021-20091.yaml by mp

* Enhancement: cves/2021/CVE-2021-20092.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: cves/2017/CVE-2017-9833.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: misconfiguration/symfony-debugmode.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: cves/2021/CVE-2021-31682.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Relocating to CVE folder

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-2628.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2019/CVE-2019-2588.yaml by mp

* Enhancement: cves/2021/CVE-2021-31755.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments

* Tag typo

Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha 00046e6ce3
Update CVE-2022-0271.yaml 2022-04-15 18:43:56 +04:00
Prince Chaddha ba3f842314
Update CVE-2021-24987.yaml 2022-04-15 18:40:28 +04:00
Prince Chaddha ce757d0581
Create CVE-2021-24987.yaml 2022-04-15 17:50:49 +04:00
Prince Chaddha 16d6e9d8eb
Create CVE-2022-0271.yaml 2022-04-15 17:50:14 +04:00
Prince Chaddha 428da484c4
Merge pull request #4136 from edoardottt/master
Add CVE-2017-5631
2022-04-15 16:26:58 +04:00
Prince Chaddha 755936a47a
Update CVE-2017-5631.yaml 2022-04-15 16:16:56 +04:00
GitHub Action 86a4ed6178 Auto Generated CVE annotations [Fri Apr 15 12:09:42 UTC 2022] 🤖 2022-04-15 12:09:42 +00:00
Prince Chaddha 9e82c6f530
Merge pull request #4148 from ritikchaddha/patch-29
Create CVE-2019-17418.yaml
2022-04-15 16:09:20 +04:00
Prince Chaddha 2ed1628058
Update CVE-2019-17418.yaml 2022-04-15 15:07:39 +04:00
Prince Chaddha 956fe8a482
Update CVE-2019-17418.yaml 2022-04-15 14:46:55 +04:00
Prince Chaddha 1837051002
Update CVE-2019-16997.yaml 2022-04-15 14:46:24 +04:00
Prince Chaddha 96669b9322
Merge pull request #4149 from ritikchaddha/patch-30
Create CVE-2019-16997.yaml
2022-04-15 14:39:51 +04:00
Prince Chaddha b48d9aa526
Update CVE-2019-16997.yaml 2022-04-15 14:38:30 +04:00
Sandeep Singh d495cca9b3
Added CVE-2019-17444 (Jfrog Artifactory default password) (#4151)
* Added CVE-2019-17444 (Jfrog Artifactory default password)

* misc update
2022-04-15 13:37:49 +05:30
Ritik Chaddha 190594db9d
Update CVE-2019-17418.yaml 2022-04-15 11:37:38 +05:30
Ritik Chaddha d70a0bda29
Create CVE-2019-16997.yaml 2022-04-15 11:33:55 +05:30
Ritik Chaddha eda4835ccc
Create CVE-2019-17418.yaml 2022-04-15 11:25:48 +05:30
Prince Chaddha 3b0149d066
Merge pull request #4130 from Akokonunes/patch-138
Create CVE-2022-25216.yaml
2022-04-14 13:36:03 +04:00
Prince Chaddha da1d31c0ab
Update CVE-2022-25216.yaml 2022-04-14 13:22:19 +04:00
Prince Chaddha 62bf35c347
Update CVE-2022-25216.yaml 2022-04-14 13:00:24 +04:00
Prince Chaddha 84d91e7c0e
Update CVE-2017-12583.yaml 2022-04-14 12:44:00 +04:00
Prince Chaddha be2632e99e
Update CVE-2017-12583.yaml 2022-04-14 12:42:58 +04:00
Prince Chaddha 02ce5e2f23
Update CVE-2017-12583.yaml 2022-04-14 12:42:11 +04:00
Prince Chaddha 2d28f3685e
Update CVE-2017-12583.yaml 2022-04-14 12:33:28 +04:00
Prince Chaddha 56aaa33a7b
Update and rename CVE-2022-25216.yaml to cves/2022/CVE-2022-25216.yaml 2022-04-14 12:33:01 +04:00
edoardottt 1d0e2b1b45 Add CVE-2017-5631 2022-04-13 12:41:03 +02:00
Muhammad Daffa f8240809bd
Update CVE-2021-24340.yaml (#4134) 2022-04-13 14:21:49 +05:30
GitHub Action a9cad3f0ad Auto Generated CVE annotations [Wed Apr 13 07:34:27 UTC 2022] 🤖 2022-04-13 07:34:27 +00:00
Dhiyaneshwaran d6b7cc95dc
Neo4j Browser , Refected XSS in doku.php (#4132)
* Create spring-core-rce.yaml

* Update spring-core-rce.yaml

* Update spring-core-rce.yaml

* Create exposed-neo4j-browser.yaml

* Create CVE-2017-12583.yaml

* removed duplicate template

* minor matchers update

* misc template updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-13 13:04:06 +05:30
Prince Chaddha 0359adc0d0
Update CVE-2020-28351.yaml 2022-04-12 23:29:20 +05:30
Prince Chaddha 3cdf2ae29f
Merge pull request #4099 from Akokonunes/patch-137
Create CVE-2018-10956.yaml
2022-04-12 19:37:02 +05:30
Prince Chaddha 2dc2f6ba3f
Update and rename CVE-2018-10956.yaml to cves/2018/CVE-2018-10956.yaml 2022-04-12 19:35:26 +05:30
GitHub Action f26f5f050c Auto Generated CVE annotations [Mon Apr 11 20:08:33 UTC 2022] 🤖 2022-04-11 20:08:33 +00:00
Prince Chaddha be4a05a855
Merge pull request #4103 from ritikchaddha/patch-24
Create CVE-2018-7662.yaml
2022-04-12 01:24:09 +05:30
Prince Chaddha 784ef6f25e
Update CVE-2018-7662.yaml 2022-04-12 01:22:14 +05:30
Sandeep Singh 0a4a7b31f7
Added VMware Workspace ONE Access - Freemarker SSTI (#4113)
Co-Authored-By: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>

Co-authored-by: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>
2022-04-11 22:17:00 +05:30
MostInterestingBotInTheWorld 45174dee16
Dashboard Content Enhancements (#4111)
Dashboard Content Enhancements
2022-04-11 10:42:35 -04:00
sandeep 4b395a60d1 template location fix 2022-04-11 18:43:12 +05:30
Muhammad Daffa eb2fc8dfbd
Update CVE-2022-0437.yaml (#4104) 2022-04-11 16:18:44 +05:30
Muhammad Daffa 3b4158529f
Update CVE-2020-35489.yaml (#4105) 2022-04-11 16:18:13 +05:30
Prince Chaddha e8f971c70b
Update CVE-2018-7662.yaml 2022-04-11 16:03:57 +05:30
Alexandre ZANNI f27f032188
CVE-2022-0482: add a reference (#4107) 2022-04-11 14:08:32 +05:30
Ritik Chaddha 3d173d5925
Create CVE-2018-7662.yaml 2022-04-11 12:14:02 +05:30
Sandeep Singh 5eb47292e4
Added Reprise License Manager Templates (#4097)
Co-Authored-By: Akincibor <99909324+Akincibor@users.noreply.github.com>

Co-authored-by: Akincibor <99909324+Akincibor@users.noreply.github.com>
2022-04-10 12:41:31 +05:30
Prince Chaddha 11c139e44b
Merge pull request #4082 from Akokonunes/patch-136
Create CVE-2015-3897.yaml
2022-04-10 00:33:33 +05:30
Prince Chaddha 7e6f810d1e
Update and rename CVE-2015-3897.yaml to cves/2015/CVE-2015-3897.yaml 2022-04-10 00:31:56 +05:30
GitHub Action e4fed28fc2 Auto Generated CVE annotations [Sat Apr 9 15:50:05 UTC 2022] 🤖 2022-04-09 15:50:05 +00:00
Sandeep Singh 4236dfe3b7
Added CVE-2022-0482 (#4095) 2022-04-09 21:19:47 +05:30
Sandeep Singh 2503c42816
payload + matchers update (#4094) 2022-04-09 20:22:22 +05:30
MostInterestingBotInTheWorld a24ef794b7
Dashboard Content Enhancements (#4031)
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
sullo becdd7810b
Cleanup Joomla! Jvehicles template (#3983)
* Cleanup Joomla! Jvehicles template since it was labeled as SQLi but had a test for LFI
Create new template for the Jvehicles LFI

* Fix id

* path update

* Delete CVE-2010-1873.yaml

temporarily removing as it doesn't contain the exact matchers.

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-06 17:21:08 +05:30
GitHub Action 83dae0cac1 Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖 2022-04-06 04:33:20 +00:00
Prince Chaddha a0e7094664
Update CVE-2021-24746.yaml 2022-04-06 09:55:48 +05:30
Prince Chaddha 68f4159393
Create CVE-2021-24746.yaml 2022-04-06 09:36:53 +05:30
Prince Chaddha 21a73f490c Update CVE-2021-24746.yaml 2022-04-06 09:35:04 +05:30
GitHub Action 9045a7bd9c Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖 2022-04-06 04:01:51 +00:00
Prince Chaddha 90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha d834c6aef3
Merge pull request #4052 from Akokonunes/patch-135
Create CVE-2017-1000029.yaml
2022-04-05 23:29:09 +05:30
Prince Chaddha f0af9a04b6
Update CVE-2021-24746.yaml 2022-04-05 23:28:52 +05:30
Prince Chaddha 0f8598a14c
Update and rename CVE-2017-1000029.yaml to cves/2017/CVE-2017-1000029.yaml 2022-04-05 22:54:06 +05:30
sandeep 7d195c9984 Added POST method support to CVE-2022-22965 detection 2022-04-05 22:38:34 +05:30
GitHub Action 15575ec82e Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖 2022-04-05 13:17:39 +00:00
Ritik Chaddha 34a2dca9e6
Update CVE-2019-11248.yaml (#4056)
* Update CVE-2019-11248.yaml

* misc fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-05 18:47:15 +05:30
Prince Chaddha 18cfd2f11b
Merge pull request #4039 from gy741/rule-add-v104
Create CVE-2018-10562.yaml
2022-04-05 12:40:58 +05:30
Prince Chaddha 66a27e4da0
Update CVE-2018-10562.yaml 2022-04-05 12:18:20 +05:30
Prince Chaddha 02a1d0ce06
Update CVE-2018-10562.yaml 2022-04-05 12:13:12 +05:30
Prince Chaddha 77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha 3586ec841c
Update CVE-2021-26598.yaml 2022-04-05 00:13:18 +05:30
Prince Chaddha c9e108c7db
Update CVE-2021-26598.yaml 2022-04-04 23:57:11 +05:30
Sandeep Singh d633c2db45
Updated intrusive detection with HTTP OOB interaction (#4028) 2022-04-04 19:58:38 +05:30
Prince Chaddha 1890296f31
Merge pull request #4046 from Akokonunes/patch-134
Create CVE-2020-27191.yaml
2022-04-04 18:13:11 +05:30
Prince Chaddha 963742768a
Update and rename CVE-2020-27191.yaml to cves/2020/CVE-2020-27191.yaml 2022-04-04 18:08:30 +05:30
Rodrigo Schio 4d690358ae
fix match and extractors regexes (#4040) 2022-04-04 18:08:25 +05:30
GwanYeong Kim 1e374c7482 Create CVE-2021-26598.yaml
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
GwanYeong Kim 21a3ce4f12 Create CVE-2018-10562.yaml
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-02 23:56:35 +09:00
Prince Chaddha c1a7f2398c
Create CVE-2021-24746.yaml 2022-04-02 16:15:26 +05:30
Prince Chaddha a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
GitHub Action 9a769040d7 Auto Generated CVE annotations [Sat Apr 2 10:37:27 UTC 2022] 🤖 2022-04-02 10:37:27 +00:00
Prince Chaddha ef88c6b170
Merge pull request #4007 from pikpikcu/patch-328
Create CVE-2022-23881
2022-04-02 15:58:08 +05:30
Prince Chaddha 58cb6dfdcf
Update CVE-2022-23881.yaml 2022-04-02 15:55:31 +05:30
Prince Chaddha 14d40fdb50
Update CVE-2021-44103.yaml 2022-04-02 14:47:22 +05:30
Prince Chaddha d3c4313f64
Update CVE-2021-44103.yaml 2022-04-02 14:39:25 +05:30
GitHub Action 5e128f2c52 Auto Generated CVE annotations [Sat Apr 2 07:59:47 UTC 2022] 🤖 2022-04-02 07:59:47 +00:00
Prince Chaddha 1e011d6442
Merge pull request #4023 from Akokonunes/patch-133
Create CVE-2021-28377.yaml
2022-04-02 13:29:30 +05:30
Prince Chaddha 930ed5e321
Update and rename CVE-2021-28377.yaml to cves/2017/CVE-2021-28377.yaml 2022-04-02 13:23:16 +05:30
rschio da4c4dde5d remove trailing spaces 2022-04-01 12:53:54 -04:00
Sandeep Singh dd0cdb1385
Added CVE-2022-22965 - Spring Framework RCE via Data Binding on JDK 9+ (Spring4Shell) (#4024) 2022-04-01 17:13:45 +05:30
Sandeep Singh a6a4d78065
Added CVE-2021-46387 (#4022) 2022-04-01 15:13:57 +05:30
MostInterestingBotInTheWorld 6ddfbac2b4
Dashboard Content Enhancement (#4020)
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

* Syntax  restore some characters

* Spacing

* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp

* Enhancement: cves/2019/CVE-2019-10068.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-11580.yaml by mp

* Enhancement: cves/2019/CVE-2019-11581.yaml by mp

* Enhancement: cves/2019/CVE-2019-12314.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Link wrapping issue

* Enhancement: cves/2019/CVE-2019-13462.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16759.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cves/2019/CVE-2019-16278.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-12725.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs

* Enhancement: cves/2021/CVE-2021-33807.yaml by mp

* Enhancement: cves/2010/CVE-2010-0943.yaml by mp

* Enhancement: cves/2008/CVE-2008-6172.yaml by mp

* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: network/cisco-smi-exposure.yaml by mp

* Enhancement: cves/2021/CVE-2021-37704.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2019/CVE-2019-16313.yaml by mp

* Enhancement: cves/2021/CVE-2021-3017.yaml by mp

* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2021/CVE-2021-37573.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2018/CVE-2018-11709.yaml by mp

* Enhancement: cves/2014/CVE-2014-2321.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Manual enhancement

* Manual enhancement push due to dashboard failure

* Testing of dashboard accidentally commited to dashboard branch

* Spacing
Put some CVEs in the classification

* Add missing cve-id fields to templates in cve/

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
rschio 32d9039f6b add CVE-2021-44103
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
2022-04-01 03:39:18 -04:00
xvnpw 001c10644f
Update CVE-2022-24990.yaml (#4016)
* Update CVE-2022-24990.yaml

Removed https://nvd.nist.gov/vuln/detail/CVE-2022-23990. CVE-2022-23990 is not related to this template.

* Update CVE-2022-24990.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 02:09:11 +05:30
GitHub Action 074936d227 Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖 2022-03-31 19:40:33 +00:00
Adam Crosser 235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) (#4019)
* Updated CVE-2022-22963

* Added CVE-2021-21311 Template

* Added Shodan Query

* Updated Title

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30
Adam Crosser 2686307a64
Updated CVE-2022-22963 (#4011) 2022-03-31 00:39:28 +05:30
sandeep 754ba8574e Added stop-at-first-match 2022-03-30 15:19:04 +05:30
sandeep b06d02b2fe template id update 2022-03-30 15:16:52 +05:30
Geekby bec0912a2a
Create CVE-2022-26148.yaml (#4008)
* Create CVE-2022-26148.yaml

Add CVE-2022-26188

* updated matchers + extractors

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-30 13:49:34 +05:30
PikPikcU ae32c73ffa
Create CVE-2022-23881.yaml 2022-03-29 19:41:01 -04:00
MostInterestingBotInTheWorld 13bfc8ff57
Dashboard Content Enhancements (#3998)
* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
sandeep 9012b2396a misc update to CVE-2020-10148 2022-03-29 16:00:27 +05:30
Prince Chaddha b6dd43c0c9
Merge pull request #3984 from Akokonunes/patch-132
Create CVE-2021-46381.yaml
2022-03-29 12:14:05 +05:30
Prince Chaddha 708921b3e5
Update and rename CVE-2021-46381.yaml to cves/2021/CVE-2021-46381.yaml 2022-03-29 12:09:40 +05:30
gilfoyle97 91db326b54
Fix CVE-2020-17456 (false positive) (#3997)
* Fix CVE-2020-17456 (false positive)

* additional matchers

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-28 16:35:16 +05:30
Sandeep Singh 5f28041069
Added Spring Boot Log4j Remote Code Injection (#3993)
* Added Spring Boot Log4j Remote Code Injection

* minor improvements to CVE-2021-44228

* URI based payload update to catch injection point
2022-03-28 01:46:50 +05:30
sandeep 7b83c9990a minor updates to template names 2022-03-27 22:13:08 +05:30
GitHub Action c8380b3bf8 Auto Generated CVE annotations [Sun Mar 27 14:25:50 UTC 2022] 🤖 2022-03-27 14:25:50 +00:00
Dhiyaneshwaran 014a8c9192
4 New Wordpress Authenticated Templates (#3990)
* Create xss-childlist-selector.yaml

* Update xss-childlist-selector.yaml

* Rename xss-childlist-selector.yaml to aem-xss-childlist-selector.yaml

* adding metadata

* Create CVE-2021-25112.yaml

* Create CVE-2022-0189.yaml

* Create CVE-2021-25055.yaml

* Create CVE-2022-0148.yaml

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-27 19:55:03 +05:30
Sandeep Singh eeff6b26b8
more strict matchers (#3987) 2022-03-26 16:45:50 +05:30
GitHub Action ac87976a84 Auto Generated CVE annotations [Sat Mar 26 09:11:31 UTC 2022] 🤖 2022-03-26 09:11:31 +00:00
Muhammad Daffa d3a765df85
Update CVE-2017-1000028.yaml (#3968)
* Update CVE-2017-1000028.yaml

* Update CVE-2017-1000028.yaml
2022-03-26 14:40:47 +05:30
MostInterestingBotInTheWorld 814d07fb7d
Dashboard Content Enhancements (#3961)
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp

* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp

* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp

* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp

* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp

* Enhancement: dns/azure-takeover-detection.yaml by mp

* Enhancement: dns/cname-fingerprint.yaml by mp

* Enhancement: dns/cname-service-detection.yaml by mp

* Enhancement: dns/detect-dangling-cname.yaml by mp

* Enhancement: dns/dns-waf-detect.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: dns/dnssec-detection.yaml by mp

* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
GitHub Action 83ecf7060b Auto Generated CVE annotations [Wed Mar 23 10:44:27 UTC 2022] 🤖 2022-03-23 10:44:27 +00:00
Sandeep Singh 8c12450b09
Added CVE-2021-42063 (#3956) 2022-03-23 16:13:38 +05:30
Prince Chaddha ca54dd0026
Merge pull request #3946 from bartutku/CVE-2021-41691
CVE-2021-41691
2022-03-23 13:17:18 +05:30
sandeep ec99241f0e Updated "/etc/passwd" regex to avoid possible false positive results. 2022-03-22 13:31:31 +05:30
Sandeep Singh 21c2c0cd2c
lint update 2022-03-22 13:04:29 +05:30
Prince Chaddha bc30daa9fb
Update CVE-2021-41691.yaml 2022-03-22 12:38:45 +05:30
Prince Chaddha 75845a7b6e
Merge pull request #3951 from z3dc0ps/master
changed 'burpcollaborator.net' to "{{interactsh-url}}"
2022-03-22 11:35:52 +05:30
Prince Chaddha 063d6ad7eb
Update CVE-2020-5412.yaml 2022-03-22 11:32:56 +05:30
Prince Chaddha 4e75bb7162
Update CVE-2019-9978.yaml 2022-03-22 11:32:49 +05:30
Prince Chaddha 2d8bc7577a
Update CVE-2020-5412.yaml 2022-03-22 11:25:29 +05:30
Prince Chaddha 3517bab6cc
Update CVE-2019-9978.yaml 2022-03-22 11:24:50 +05:30
MostInterestingBotInTheWorld 9663595dd1
Dashboard Text Enhancements (#3948)
Dashboard content enhancements
2022-03-21 23:48:47 -04:00
z3dc0ps 1e96305cf2
Update CVE-2017-9805.yaml 2022-03-22 01:47:31 +05:30
z3dc0ps 8f37ae4a2f
Update CVE-2021-21315.yaml 2022-03-22 01:46:15 +05:30
z3dc0ps d2afc026eb
Update CVE-2020-5412.yaml 2022-03-22 01:45:11 +05:30
z3dc0ps c87ed3f66f
Update CVE-2019-9978.yaml 2022-03-22 00:40:24 +05:30
bartutku 9fb6c93947 CVE-2021-41691 2022-03-21 16:49:56 +03:00
bartutku df61805ee8 CVE-2021-41691 2022-03-21 16:46:15 +03:00
GitHub Action 412ff87c82 Auto Generated CVE annotations [Mon Mar 21 12:21:54 UTC 2022] 🤖 2022-03-21 12:21:54 +00:00
PikPikcU adbf3eca22
Create CVE-2022-0437 (#3673)
* Create CVE-2022-0437.yaml

* request + matcher update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:51:11 +05:30
Markus 9e43f3cc18
[false-positive] WordPress Contact Form 7 Plugin - Unrestricted File Upload (#3825)
* Update CVE-2020-35489.yaml

Fix for the false positives mentioned in #3816

* Update CVE-2020-35489.yaml

Fix for the false positives mentioned in #3816

* misc update

* version comparison with new helper function

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:48:01 +05:30
GitHub Action 3f3ba47aaa Auto Generated CVE annotations [Mon Mar 21 12:12:32 UTC 2022] 🤖 2022-03-21 12:12:32 +00:00
Prince Chaddha d42c946e20
Merge pull request #3907 from gy741/rule-add-v101
Create CVE-2020-17456.yaml
2022-03-21 17:41:48 +05:30
Prince Chaddha f4fdbbf415
Update and rename CVE-2020-27467.yaml to cves/2020/CVE-2020-27467.yaml 2022-03-21 16:56:48 +05:30
GitHub Action 6b562eb6f7 Auto Generated CVE annotations [Sun Mar 20 07:45:32 UTC 2022] 🤖 2022-03-20 07:45:32 +00:00
darkc0d37 36ff44ab40
Ivanti EPM CSA Code Injection(CVE-2021-44529) (#3937)
* Added CVE-2021-44529

* Added CVE-2021-44529

* Added CVE-2021-44529

* metadata updates

* contributors update

Co-authored-by: Tirtha Mandal <darkc0d3@Tirthas-MacBook-Pro.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-20 13:14:37 +05:30
Sandeep Singh ec2246ee22
added confluence metadata and minor matcher updates (#3929) 2022-03-19 16:12:08 +05:30
sandeep a97dccb54a additional matcher update 2022-03-19 16:10:43 +05:30
Dwi Siswanto 1878c50193
Add Pascom advisories (#3862)
* pascom: Add CVE-2021-45967

* pascom: Add CVE-2021-45968
2022-03-19 16:09:09 +05:30
Xeldax 10b23118aa
add airflow cve-2022-24288 (#3873)
* add airflow cve-2022-24288

* lint update

* template request + matcher + metadata update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 15:59:17 +05:30
sandeep dd2322c7f2 tags update 2022-03-19 15:15:41 +05:30
GitHub Action 145620c09c Auto Generated CVE annotations [Sat Mar 19 09:06:25 UTC 2022] 🤖 2022-03-19 09:06:25 +00:00
cckuailong 9fe955392a
add CVE-2021-41282 (#3844)
* add CVE-2021-41282

* tags update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:35:40 +05:30
sandeep a3a709045a tag update 2022-03-19 14:25:34 +05:30
cckuailong 5b787f0260
add CVE-2021-35587 (#3872)
* add CVE-2021-35587

* fix verbose space

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:24:33 +05:30
Roberto Nunes 66fadd57ad
Create CVE-2021-34805.yaml (#3919)
* Create CVE-2021-34805.yaml

* misc fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:18:46 +05:30
sandeep 218b87a384 removing duplicate template 2022-03-18 21:09:34 +05:30
Podalirius 4c66d04cf1
Added template for CVE-2022-26159 (#3923)
* Added template for CVE-2022-26159

* path + matcher update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-18 14:58:35 +05:30
Philippe Delteil be3d2d42f1
Update CVE-2018-5230.yaml (#3928)
* Update CVE-2018-5230.yaml

Solves a false positive when the requests triggers a file download 

nuclei -debug -t nuclei-templates/cves/2018/CVE-2018-5230.yaml -u https://get-jama.replicated.com

* matcher fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-18 12:55:28 +05:30
MostInterestingBotInTheWorld 056323ec5a
Dashboard Text Enhancements (#3927)
Dashboard text enhancements
2022-03-17 13:01:45 -04:00
gilfoyle97 0fa555567a
Request: Fix CVE-2021-21234 (#3920)
* Fixed CVE-2019-9670

* more strict matchers

* Fix CVE-2021-21234

* more strict matcher

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-17 14:59:53 +05:30
gilfoyle97 5a25fe8e0f
Fixed CVE-2019-9670 (#3918)
* Fixed CVE-2019-9670

* more strict matchers

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-17 13:36:15 +05:30
Prince Chaddha 4c1b01bfc3
Update CVE-2020-17456.yaml 2022-03-15 16:36:08 +05:30
GwanYeong Kim ec174819c4 Create CVE-2020-17456.yaml
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-15 19:13:50 +09:00
sandeep 0edbae8e45 limit the matcher / extractor scope to location header 2022-03-15 11:46:47 +05:30
sandeep 2bff343eda more strict matchers for CVE-2022-23779 2022-03-15 02:03:06 +05:30
Prince Chaddha 913a1ab64e
Merge pull request #3894 from Akokonunes/patch-127
Create CVE-2018-12300.yaml
2022-03-15 00:48:39 +05:30
GitHub Action 13df485fff Auto Generated CVE annotations [Mon Mar 14 19:05:47 UTC 2022] 🤖 2022-03-14 19:05:47 +00:00
Prince Chaddha b68f2afd70
Merge pull request #3898 from projectdiscovery/CVE-2018-12296
Create CVE-2018-12296.yaml
2022-03-15 00:35:07 +05:30
Sandeep Singh 5231a3e193
Update CVE-2018-12296.yaml 2022-03-14 17:46:34 +05:30
sandeep 5303173354 additional word matcher 2022-03-14 16:09:08 +05:30
Prince Chaddha e3453ee7db
Create CVE-2018-12296.yaml 2022-03-14 15:58:20 +05:30
Prince Chaddha 9f833a5878
Update and rename CVE-2018-12300.yaml to cves/2018/CVE-2018-12300.yaml 2022-03-14 15:43:20 +05:30
MostInterestingBotInTheWorld 6b7215c4b3
Dashboard Text Enhancements (#3886)
Text Enhancements
2022-03-11 10:27:47 -05:00
Prince Chaddha 911e9eb9ac
Merge pull request #3881 from Akokonunes/patch-126
Create CVE-2020-13158.yaml
2022-03-11 16:00:45 +05:30
GitHub Action bcd67b9429 Auto Generated CVE annotations [Fri Mar 11 09:46:35 UTC 2022] 🤖 2022-03-11 09:46:35 +00:00
Prince Chaddha d016e3102f
Update CVE-2020-13158.yaml 2022-03-11 14:24:04 +05:30
Prince Chaddha d3221ba5d6
Update and rename CVE-2020-13158.yaml to cves/2020/CVE-2020-13158.yaml 2022-03-11 14:21:56 +05:30
Prince Chaddha 3ad976aa51
Merge pull request #3842 from projectdiscovery/CVE-2019-12725-fix
Update CVE-2019-12725.yaml
2022-03-11 01:35:07 +05:30
GitHub Action d23bfa0462 Auto Generated CVE annotations [Thu Mar 10 10:28:37 UTC 2022] 🤖 2022-03-10 10:28:37 +00:00
Sandeep Singh a06653e53c
Merge pull request #3865 from projectdiscovery/puppet
puppet templates
2022-03-09 17:05:15 +05:30
sullo 48675b803a Fix control character issue 2022-03-08 17:38:14 -05:00
sandeep 67e20bc87f puppet templates 2022-03-09 00:17:22 +05:30
MostInterestingBotInTheWorld 7cd9e673ca Enhancement: cves/2022/CVE-2022-24124.yaml by mp 2022-03-08 12:38:46 -05:00
MostInterestingBotInTheWorld acb55f3c06 Enhancement: cves/2022/CVE-2022-23808.yaml by mp 2022-03-08 12:36:49 -05:00
MostInterestingBotInTheWorld 2d350e0a2f Enhancement: cves/2022/CVE-2022-23134.yaml by mp 2022-03-08 12:35:20 -05:00
MostInterestingBotInTheWorld 295de3ec7b Enhancement: cves/2022/CVE-2022-22536.yaml by mp 2022-03-08 12:33:02 -05:00
MostInterestingBotInTheWorld eebef82c6a Enhancement: cves/2022/CVE-2022-21371.yaml by mp 2022-03-08 12:31:20 -05:00
MostInterestingBotInTheWorld 161ba2c6a2 Enhancement: cves/2022/CVE-2022-0692.yaml by mp 2022-03-08 12:29:12 -05:00
MostInterestingBotInTheWorld 28a422d658 Enhancement: cves/2022/CVE-2022-24260.yaml by mp 2022-03-08 10:57:25 -05:00
MostInterestingBotInTheWorld 9004746e16 Enhancement: cves/2022/CVE-2022-24124.yaml by mp 2022-03-08 10:54:16 -05:00
MostInterestingBotInTheWorld 1ce8284cbe Enhancement: cves/2022/CVE-2022-24112.yaml by mp 2022-03-08 10:51:53 -05:00
MostInterestingBotInTheWorld c2fba36a7a Enhancement: cves/2022/CVE-2022-23944.yaml by mp 2022-03-08 10:41:08 -05:00
MostInterestingBotInTheWorld 303f6f71c6 Enhancement: cves/2022/CVE-2022-23134.yaml by mp 2022-03-08 10:36:27 -05:00
MostInterestingBotInTheWorld 613ff3f1eb Enhancement: cves/2022/CVE-2022-23131.yaml by mp 2022-03-08 10:28:19 -05:00
MostInterestingBotInTheWorld dd2d525989 Enhancement: cves/2022/CVE-2022-22947.yaml by mp 2022-03-08 10:15:40 -05:00
MostInterestingBotInTheWorld d0be94c185 Enhancement: cves/2022/CVE-2022-22536.yaml by mp 2022-03-08 10:09:38 -05:00
MostInterestingBotInTheWorld f15357f415 Enhancement: cves/2022/CVE-2022-0692.yaml by mp 2022-03-08 10:03:35 -05:00
MostInterestingBotInTheWorld b6e96c73a8 Enhancement: cves/2022/CVE-2022-21371.yaml by mp 2022-03-08 09:58:58 -05:00
MostInterestingBotInTheWorld c1601ceded
Merge branch 'projectdiscovery:master' into dashboard 2022-03-08 09:36:06 -05:00
GitHub Action a85cb6354e Auto Generated CVE annotations [Tue Mar 8 06:53:29 UTC 2022] 🤖 2022-03-08 06:53:29 +00:00
Prince Chaddha 44f96f3115
Update and rename boa-web-fileread.yaml to cves/2017/CVE-2017-9833.yaml 2022-03-08 11:51:07 +05:30
Prince Chaddha 20e59be53c
Merge pull request #3847 from gy741/rule-add-v100
Create CVE-2020-15050.yaml
2022-03-08 11:17:43 +05:30
Prince Chaddha e14b913101
Update CVE-2020-15050.yaml 2022-03-08 11:12:39 +05:30
sandeep f0d3116b12 added metadata 2022-03-08 07:00:33 +05:30
Sandeep Singh 6ae7f3f361
Update CVE-2022-25323.yaml 2022-03-08 06:38:46 +05:30
Dwi Siswanto 29d462125c Add CVE-2022-24990 2022-03-08 08:05:30 +07:00
MostInterestingBotInTheWorld 5a99c2c4f4 Enhancement: cves/2022/CVE-2022-25323.yaml by mp 2022-03-07 16:36:44 -05:00
MostInterestingBotInTheWorld 1af2e53732 Enhancement: cves/2010/CVE-2010-1607.yaml by mp 2022-03-07 16:30:03 -05:00
MostInterestingBotInTheWorld 73a06a5fab Enhancement: cves/2021/CVE-2021-44521.yaml by mp 2022-03-07 16:29:30 -05:00
sandeep 20774864c5 misc updates 2022-03-08 01:28:57 +05:30
edoardottt 7032b928cc Add CVE-2021-3002 2022-03-07 20:47:40 +01:00
sullo 2d0d48fdb7 Trailing space 2022-03-07 14:26:37 -05:00
sandeep 2ebcbed6a3 additional matcher 2022-03-08 00:49:41 +05:30
MostInterestingBotInTheWorld 81868f926d Enhancement: cves/2021/CVE-2021-4191.yaml by mp 2022-03-07 14:12:26 -05:00
MostInterestingBotInTheWorld aac30ad6ef Enhancement: cves/2010/CVE-2010-1602.yaml by mp 2022-03-07 14:04:05 -05:00
MostInterestingBotInTheWorld bcc094893a Enhancement: cves/2021/CVE-2021-41649.yaml by mp 2022-03-07 14:02:44 -05:00
MostInterestingBotInTheWorld 138142bdba Enhancement: cves/2021/CVE-2021-41648.yaml by mp 2022-03-07 13:45:31 -05:00
MostInterestingBotInTheWorld 7f5de64a29 Enhancement: cves/2021/CVE-2021-41467.yaml by mp 2022-03-07 13:41:37 -05:00
MostInterestingBotInTheWorld 042d3eb4a4 Enhancement: cves/2021/CVE-2021-41349.yaml by mp 2022-03-07 13:40:20 -05:00
edoardottt 74a69107bb Add CVE-2022-0381 2022-03-07 19:19:41 +01:00
MostInterestingBotInTheWorld 49623611cb Enhancement: cves/2021/CVE-2021-41381.yaml by mp 2022-03-07 10:46:28 -05:00
MostInterestingBotInTheWorld 3ed70c8627 Enhancement: cves/2021/CVE-2021-41349.yaml by mp 2022-03-07 10:43:02 -05:00
MostInterestingBotInTheWorld d58cf407d9 Enhancement: cves/2021/CVE-2021-41293.yaml by mp 2022-03-07 10:36:19 -05:00
sullo c002e6c7d5 Accidentally added a vim command 2022-03-07 09:13:57 -05:00
sullo 4266bdad25 Spacing 2022-03-07 09:08:43 -05:00
MostInterestingBotInTheWorld 21d872d42c
Merge branch 'projectdiscovery:master' into dashboard 2022-03-07 08:10:22 -05:00
GwanYeong Kim ba14674e22 Create CVE-2020-15050.yaml
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-07 19:19:01 +09:00
Prince Chaddha 5f9caa4418
Update CVE-2019-12725.yaml 2022-03-07 03:37:03 +05:30
Prince Chaddha 9587fcfcb8
Update CVE-2019-12725.yaml 2022-03-07 03:36:21 +05:30
MostInterestingBotInTheWorld 2ad1854752 Enhancement: cves/2010/CVE-2010-1601.yaml by mp 2022-03-06 12:04:57 -05:00
MostInterestingBotInTheWorld d743fb7969 Enhancement: cves/2021/CVE-2021-41291.yaml by mp 2022-03-06 12:04:24 -05:00
MostInterestingBotInTheWorld 925f08ff70 Enhancement: cves/2021/CVE-2021-41277.yaml by mp 2022-03-06 12:01:47 -05:00
MostInterestingBotInTheWorld 92aa22ebe8 Enhancement: cves/2021/CVE-2021-41266.yaml by mp 2022-03-06 11:56:57 -05:00
MostInterestingBotInTheWorld 739edecc0f Enhancement: cves/2021/CVE-2021-41174.yaml by mp 2022-03-06 11:52:34 -05:00
MostInterestingBotInTheWorld 220bc5a35a Enhancement: cves/2021/CVE-2021-40978.yaml by mp 2022-03-06 11:50:17 -05:00
MostInterestingBotInTheWorld b20659acef Enhancement: cves/2021/CVE-2021-40960.yaml by mp 2022-03-06 11:43:48 -05:00
MostInterestingBotInTheWorld 0739f98dc7 Enhancement: cves/2021/CVE-2021-40875.yaml by mp 2022-03-06 11:41:44 -05:00
MostInterestingBotInTheWorld b03d23b035 Enhancement: cves/2021/CVE-2021-40870.yaml by mp 2022-03-06 11:35:55 -05:00
MostInterestingBotInTheWorld 57ab79164b Enhancement: cves/2021/CVE-2021-40868.yaml by mp 2022-03-06 11:31:51 -05:00
MostInterestingBotInTheWorld ebaf71e728 Enhancement: cves/2010/CVE-2010-1540.yaml by mp 2022-03-06 11:27:52 -05:00
sandeep 71410871c6 more strict matchers + extractor 2022-03-06 13:47:52 +05:30
cckuailong 4023282a2d add CVE-2022-23779 2022-03-06 09:38:26 +08:00
sandeep 103826f041 strict matchers for CVE-2022-22536 2022-03-05 20:57:11 +05:30
sandeep 25c8f1bc11 cve tag update 2022-03-05 13:46:55 +05:30
sandeep faea03749e tags update + extractor 2022-03-05 13:42:33 +05:30
sandeep 3fd92dbdcd indentation update 2022-03-05 13:15:21 +05:30
zsusac d18e7535d2 Add template for CVE-2021-4191 2022-03-04 16:56:50 -05:00
Sandeep Singh 541568a74c
Merge pull request #3835 from Akokonunes/patch-124
Create CVE-2022-0692.yaml
2022-03-04 22:24:46 +05:30
sandeep a3345c34ae template location update 2022-03-04 22:17:44 +05:30
sandeep 3a6c69df71 template name updates 2022-03-04 22:12:30 +05:30
sandeep af09a6ce4b Added CVE-2020-2103
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
2022-03-04 21:50:03 +05:30
sandeep 11a0308624 Added CVE-2019-10405
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
2022-03-04 21:49:54 +05:30
Sandeep Singh 8a8913b916
Merge pull request #3831 from gy741/rule-add-v99
Create CVE-2022-24260.yaml
2022-03-04 20:48:18 +05:30
sandeep 657c4cc1f7 matcher update 2022-03-04 20:46:40 +05:30
sandeep 9f5cc1ca80 added gitlab metadata 2022-03-04 19:20:03 +05:30
Sandeep Singh bdad4ef7e3
Merge pull request #3832 from GitLab-Red-Team/gitlab-cve-2021-22214
GitLab CVE-2021-22214 fixes
2022-03-04 19:17:51 +05:30
Sandeep Singh 8c49bf4708
Merge pull request #3826 from edoardottt/master
Add CVE-2018-18264
2022-03-04 18:09:48 +05:30
sandeep b6afea5710 misc updates 2022-03-04 17:48:26 +05:30
initstring 3389b0b7aa removing irrelevant oast tag 2022-03-04 14:25:00 +11:00
initstring ce85dd4283 Fixed CVE-2021-22214 2022-03-04 13:04:56 +11:00
GwanYeong Kim 834c5a8c64 Create CVE-2022-24260.yaml
A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-04 10:18:40 +09:00
GitHub Action dbdfd6858a Auto Generated CVE annotations [Thu Mar 3 21:20:41 UTC 2022] 🤖 2022-03-03 21:20:41 +00:00
Sandeep Singh 09b90a84a4
Merge pull request #3776 from projectdiscovery/CVE-2022-22536
Added CVE-2022-22536 (SAP Memory Pipes(MPI) Desynchronization) Detection
2022-03-04 02:50:01 +05:30
sandeep 51af63b9ab misc update 2022-03-04 02:48:25 +05:30
GitHub Action ac76cf7004 Auto Generated CVE annotations [Thu Mar 3 21:15:02 UTC 2022] 🤖 2022-03-03 21:15:02 +00:00
Sandeep Singh 0f47239f2a
Merge pull request #3807 from projectdiscovery/CVE-2021-44521
Apache Cassandra Load UDF RCE
2022-03-04 02:43:42 +05:30
gilfoyle97 65683d0000
Update CVE-2018-18264.yaml 2022-03-03 18:05:35 +01:00
edoardottt 6cf8d21cc2 Add CVE-2018-18264 2022-03-03 18:02:39 +01:00
sandeep d91066b9fe moving template around 2022-03-03 20:05:05 +05:30
MostInterestingBotInTheWorld 66f1023114
Merge branch 'projectdiscovery:master' into dashboard 2022-03-03 08:52:54 -05:00
Prince Chaddha 698bfa993e
Update CVE-2022-23808.yaml 2022-03-03 17:09:21 +05:30
Prince Chaddha b0e13cb19d
Merge pull request #3791 from pussycat0x/master
New Template Added
2022-03-03 16:44:20 +05:30
Prince Chaddha 2e71889e88
Merge pull request #3799 from cckuailong/test2
add CVE-2022-24124
2022-03-03 16:16:57 +05:30
Sandeep Singh ff1642796c
Merge pull request #3815 from projectdiscovery/CVE-2022-22947
Spring Cloud Gateway Code Injection (CVE-2022-22947)
2022-03-03 02:49:01 +05:30
sandeep 496c66f6a4 minor updates 2022-03-03 02:44:27 +05:30
MostInterestingBotInTheWorld 11fe5159e1 Enhancement: cves/2015/CVE-2015-7297.yaml by mp 2022-03-02 09:57:55 -05:00
sandeep 9ba37cacfd Spring Cloud Gateway Code Injection (CVE-2022-22947) 2022-03-02 14:15:10 +05:30
sandeep 6d32b81b2a GitLab metadata update 2022-03-02 13:05:29 +05:30
MostInterestingBotInTheWorld e4fe9b88bd Enhancement: cves/2010/CVE-2010-1723.yaml by mp 2022-03-01 15:22:02 -05:00
MostInterestingBotInTheWorld ee24727cfe Enhancement: cves/2010/CVE-2010-1722.yaml by mp 2022-03-01 15:21:36 -05:00
MostInterestingBotInTheWorld 8f0fa84873 Enhancement: cves/2010/CVE-2010-1719.yaml by mp 2022-03-01 15:12:46 -05:00
MostInterestingBotInTheWorld 3373a02ac6 Enhancement: cves/2010/CVE-2010-1718.yaml by mp 2022-03-01 15:12:06 -05:00