Alexandre ZANNI
d8440ff2d0
GLPI Telemetry Disclosure: add CVE info ( #4555 )
...
* GLPI Telemetry Disclosure: add CVE info
* template file update
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-08 13:40:34 +05:30
Prince Chaddha
040090ce87
Merge pull request #4551 from For3stCo1d/CVE-2021-40150
...
Create CVE-2021-40150.yaml
2022-06-07 15:49:39 +05:30
Prince Chaddha
065e9e1387
Update CVE-2021-40150.yaml
2022-06-07 15:38:34 +05:30
Prince Chaddha
e5a657c6bc
Update CVE-2021-40149.yaml
2022-06-07 15:32:51 +05:30
林寒
9f4604dd90
Create CVE-2021-40150.yaml
2022-06-07 12:57:22 +08:00
林寒
ac287c0a56
Create CVE-2021-40149.yaml
2022-06-07 12:54:50 +08:00
sullo
50fbea791c
buffalo-config-injection.yaml is a duplicate of CVE-2021-20091.yaml ( #4547 )
...
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml
* Delete vulnerabilities/other/buffalo-config-injection.yaml
2022-06-06 20:32:33 +05:30
MostInterestingBotInTheWorld
8ad6525611
Merge branch 'projectdiscovery:master' into dashboard
2022-06-06 10:12:35 -04:00
sandeep
606344bfad
template id + file update
2022-06-06 16:23:02 +05:30
Prince Chaddha
7ada510859
Fixed possible FPs in open redirect templates ( #4544 )
...
* Fixed possible FPs in open redirect templates
We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.
* updated example domain
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
sullo
77982f9e3d
Joomla! spelling corrections
2022-06-03 15:54:12 -04:00
GitHub Action
0ac1280729
Auto Generated CVE annotations [Fri Jun 3 19:26:20 UTC 2022] 🤖
2022-06-03 19:26:20 +00:00
MostInterestingBotInTheWorld
5da580f9c2
Dashboard Content Enhancements ( #4519 )
...
Dashboard Content Enhancements
2022-06-03 15:12:31 -04:00
MostInterestingBotInTheWorld
97d8379c7b
Merge branch 'master' into dashboard
2022-06-03 14:59:01 -04:00
GitHub Action
6f5aa8f61a
Auto Generated CVE annotations [Thu Jun 2 10:38:50 UTC 2022] 🤖
2022-06-02 10:38:50 +00:00
vrenzolaverace
51fdf6f40d
Add CVE-2021-24245 ( #4343 )
...
* Add CVE-2022-0208
* misc updates
* Add CVE-2021-37416
* Added metadata + additional page specific matcher
* additional metadata
* Add CVE-2021-24245
* Add CVE-2021-20137
* Add CVE-2021-20137
* matchers update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-02 15:55:19 +05:30
Yuzhe-Zhang-0
9d8806582d
added cisa tags to appropriate templates ( #4523 )
2022-06-02 03:01:44 +05:30
sullo
77a205f831
Enhance CVE-2021-33044.yaml manually
...
Remove null file added during Dashboard flakiness
2022-06-01 15:47:28 -04:00
sullo
8e73b70a6c
Redid CVSS and lowered from critical to high
2022-06-01 14:28:38 -04:00
GitHub Action
f35f1faddf
Auto Generated CVE annotations [Wed Jun 1 14:05:28 UTC 2022] 🤖
2022-06-01 14:05:28 +00:00
Prince Chaddha
77ef2ebd49
Update CVE-2021-27519.yaml
2022-06-01 19:08:57 +05:30
Prince Chaddha
6be0d90a50
Update CVE-2021-27519.yaml
2022-06-01 19:03:12 +05:30
Mohsen khashei
b436cdc9e9
trim
2022-06-01 15:16:23 +04:30
Mohsen khashei
7270d7eff1
update-tags
2022-06-01 15:08:02 +04:30
Mohsen khashei
0d627a8b91
update CVE-2021-27519.yaml
2022-06-01 15:00:27 +04:30
Mohsen khashei
605967c2cb
Create CVE-2021-27519.yaml
2022-05-31 13:46:01 +04:30
GitHub Action
2a3fe8086f
Auto Generated CVE annotations [Fri May 27 05:36:58 UTC 2022] 🤖
2022-05-27 05:36:58 +00:00
Prince Chaddha
5519a879ac
Update CVE-2021-46422.yaml
2022-05-27 10:52:24 +05:30
xiaostrong
02f04376b7
Fixed CVE-2021-41349 Template
2022-05-26 11:05:36 +08:00
GitHub Action
226c78a313
Auto Generated CVE annotations [Mon May 23 10:54:57 UTC 2022] 🤖
2022-05-23 10:54:57 +00:00
Prince Chaddha
c5b8da568f
Merge pull request #4362 from ritikchaddha/patch-49
...
Update CVE-2021-3223.yaml
2022-05-23 16:15:15 +05:30
Prince Chaddha
1955f01b6a
Update CVE-2021-21745.yaml
2022-05-23 15:56:16 +05:30
GwanYeong Kim
2222ca9605
Create CVE-2021-21745.yaml
...
ZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould use this vulnerability to perform illegal authorization operations by sending a request to the user to click.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-21 14:59:00 +09:00
GitHub Action
cb9991092a
Auto Generated CVE annotations [Thu May 19 19:35:49 UTC 2022] 🤖
2022-05-19 19:35:49 +00:00
Prince Chaddha
be5b6338bf
Merge pull request #4446 from gy741/rule-add-v111
...
Create CVE-2021-45428.yaml
2022-05-20 00:54:46 +05:30
Prince Chaddha
8cc82f868e
Update CVE-2021-45428.yaml
2022-05-20 00:44:47 +05:30
GitHub Action
4f819d9656
Auto Generated CVE annotations [Thu May 19 19:05:56 UTC 2022] 🤖
2022-05-19 19:05:56 +00:00
Prince Chaddha
e2af35b5ac
Update CVE-2021-46422.yaml
2022-05-20 00:05:27 +05:30
Prince Chaddha
c29a8699bf
Update CVE-2021-46422.yaml
2022-05-19 23:51:49 +05:30
GwanYeong Kim
7e811151b5
Create CVE-2021-45428.yaml
...
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-19 08:38:13 +09:00
GitHub Action
3115bd2f3a
Auto Generated CVE annotations [Wed May 18 21:10:42 UTC 2022] 🤖
2022-05-18 21:10:42 +00:00
MostInterestingBotInTheWorld
5eb6b79331
Dashboard Content Enhancements ( #4426 )
...
Dashboard Content Enhancements
2022-05-18 16:58:07 -04:00
GitHub Action
844f04e029
Auto Generated CVE annotations [Wed May 18 17:19:05 UTC 2022] 🤖
2022-05-18 17:19:05 +00:00
Prince Chaddha
7d0507ecb3
Merge pull request #4440 from For3stCo1d/CVE-2021-40822
...
Create CVE-2021-40822.yaml
2022-05-18 22:34:53 +05:30
Prince Chaddha
e741d8ba00
Update CVE-2021-40822.yaml
2022-05-18 22:30:54 +05:30
Prince Chaddha
e9800153bb
Update CVE-2021-46422.yaml
2022-05-18 19:31:36 +05:30
林寒
2e85ec8bb8
Create CVE-2021-40822.yaml
2022-05-18 21:04:39 +08:00
GitHub Action
cf1a9724f4
Auto Generated CVE annotations [Wed May 18 08:55:27 UTC 2022] 🤖
2022-05-18 08:55:27 +00:00
Prince Chaddha
b240abad90
Merge pull request #4430 from projectdiscovery/CVE-2021-46422
...
Create CVE-2021-46422.yaml
2022-05-18 14:12:50 +05:30
Prince Chaddha
96a05ccd1e
Update CVE-2021-46422.yaml
2022-05-18 14:10:28 +05:30
GitHub Action
afa33e5431
Auto Generated CVE annotations [Wed May 18 08:14:19 UTC 2022] 🤖
2022-05-18 08:14:19 +00:00
Prince Chaddha
f263e723c2
Create CVE-2021-46422.yaml
2022-05-18 13:31:57 +05:30
Prince Chaddha
7d3456031b
Update and rename CVE-2021-46379.yaml to cves/2021/CVE-2021-46379.yaml
2022-05-18 13:29:23 +05:30
GitHub Action
d0832c679e
Auto Generated CVE annotations [Tue May 17 20:46:49 UTC 2022] 🤖
2022-05-17 20:46:49 +00:00
Sandeep Singh
6644d6aecb
Added dynamic payload instead of hardcoded one using native deserialization helpers ( #4379 )
2022-05-18 02:03:23 +05:30
Sandeep Singh
b59ff42aaf
additional reference to cves templates ( #4395 )
...
* additional reference to cves templates
* Update CVE-2006-1681.yaml
* Update CVE-2009-3318.yaml
* Update CVE-2009-4223.yaml
* Update CVE-2010-0942.yaml
* Update CVE-2010-0944.yaml
* Update CVE-2010-0972.yaml
* Update CVE-2010-1304.yaml
* Update CVE-2010-1308.yaml
* Update CVE-2010-1313.yaml
* Update CVE-2010-1461.yaml
* Update CVE-2010-1470.yaml
* Update CVE-2010-1471.yaml
* Update CVE-2010-1472.yaml
* Update CVE-2010-1474.yaml
* removed duplicate references
* misc fix
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
MostInterestingBotInTheWorld
83cc50ce3e
Dashboard Content Enhancements ( #4411 )
...
* standardizing enhanced by tag
* Fix spacing. Add classification->cve
* Enhancement: cves/2021/CVE-2021-20158.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Typo
* Enhancement: cves/2021/CVE-2021-20837.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21479.yaml by mp
* Enhancement: cves/2021/CVE-2021-21881.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-22005.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Enhancement: cves/2021/CVE-2021-24472.yaml by mp
* Enhancement: cves/2021/CVE-2021-20090.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-21985.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Restore empty lines
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Remove unnecessary file
* Restore content after bad dashboard edit
* Enhancement: undefined by cs
* Spacing issues
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Delete null file created by dashboard
* Remove improper Enhanced tag
* Spacing issues
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Remove test dashboard commits
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Not really enhanced
* Add classification->cve-id
* Restore content from dashboard mess up
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Restore newlines
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2015/CVE-2015-3224.yaml by mp
* Enhancement: cves/2015/CVE-2015-7450.yaml by mp
* Enhancement: cves/2016/CVE-2016-10134.yaml by mp
* Enhancement: cves/2016/CVE-2016-1555.yaml by mp
* Enhancement: cves/2016/CVE-2016-2004.yaml by mp
* Enhancement: cves/2016/CVE-2016-5649.yaml by mp
* Enhancement: cves/2016/CVE-2016-7552.yaml by mp
* Enhancement: cves/2017/CVE-2017-1000486.yaml by mp
* Enhancement: cves/2017/CVE-2017-11444.yaml by mp
* Spacing issues
* Added better reference
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-12611.yaml by mp
* Enhancement: cves/2017/CVE-2017-12635.yaml by mp
* Enhancement: cves/2017/CVE-2017-14135.yaml by mp
* Enhancement: cves/2017/CVE-2017-3881.yaml by mp
* Enhancement: cves/2017/CVE-2017-7269.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Enhancement: cves/2017/CVE-2017-9791.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Spacing and other minor issues
* Update CVE-2015-1427.yaml
* Update CVE-2017-12149.yaml
* Update CVE-2017-12542.yaml
* Update CVE-2017-12635.yaml
* Update CVE-2017-14135.yaml
* Update CVE-2017-3881.yaml
* Update CVE-2017-7269.yaml
* Update CVE-2017-8917.yaml
* Update CVE-2017-9791.yaml
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-32204.yaml by mp
* Enhancement: cnvd/2020/CNVD-2020-68596.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-09650.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-26422.yaml by mp
* Enhancement: cnvd/2022/CNVD-2022-03672.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-0127.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000226.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-1273.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-14064.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Cleanup and spacing
* Remove blank cve-id lines
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17246.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Enhancement: cves/2018/CVE-2018-18925.yaml by mp
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-2894.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7602.yaml by mp
* Enhancement: cves/2018/CVE-2018-9161.yaml by mp
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Many title clean-ups for more standardization.
Some vendor name clean-up
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Spacing issues
* Remove 2 blank newlines
* Enhancement: vulnerabilities/other/tamronos-rce.yaml by cs
* Enhancement: cves/2018/CVE-2018-9845.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-16920.yaml by mp
* Enhancement: cves/2019/CVE-2019-17270.yaml by mp
* Enhancement: cves/2019/CVE-2019-17382.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2019/CVE-2019-17506.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11710.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-12800.yaml by mp
* Enhancement: cves/2020/CVE-2020-13117.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-13942.yaml by mp
* Spacing, syntax error
* Spacing, correct this time.
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2020/CVE-2020-29227.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Enhancement: cves/2021/CVE-2021-24762.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Extra newlines and one sp;acing issue
* Update CVE-2018-9995.yaml
* Update CVE-2019-0230.yaml
* Update CVE-2019-16920.yaml
* Update CVE-2019-17270.yaml
* Update CVE-2019-17382.yaml
* Update CVE-2019-17444.yaml
* Update CVE-2019-17506.yaml
* Update CVE-2020-10148.yaml
* Update CVE-2020-11710.yaml
* Update CVE-2020-11854.yaml
* Update CVE-2020-12800.yaml
* Update CVE-2020-13167.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2020-13942.yaml
* Update CVE-2020-15920.yaml
* Update CVE-2020-29227.yaml
* Update CVE-2021-24499.yaml
* Update CVE-2021-24762.yaml
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-17 14:41:26 +05:30
Prince Chaddha
565b183905
false negative
...
The current template will result in false negatives for this CVE, so we need to create a headless template
2022-05-17 13:26:59 +05:30
Prince Chaddha
0deea2ce88
Merge pull request #4408 from daffainfo/patch-23
...
Update CVE-2021-27330
2022-05-17 12:34:56 +05:30
Prince Chaddha
e5ef699566
Update CVE-2021-27330.yaml
2022-05-17 12:31:28 +05:30
Prince Chaddha
2010c97355
Update CVE-2021-46424.yaml
2022-05-17 11:47:22 +05:30
GwanYeong Kim
f06f02b0c1
Create CVE-2021-46424.yaml
...
Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-17 14:35:45 +09:00
Muhammad Daffa
262d638222
Adding google dork, fix path, adding some matchers
2022-05-17 00:16:14 +07:00
sandeep
22ab0f9d53
minor matcher update
2022-05-15 04:48:52 +05:30
GitHub Action
3f66b769c1
Auto Generated CVE annotations [Sat May 14 23:03:15 UTC 2022] 🤖
2022-05-14 23:03:15 +00:00
Dhiyaneshwaran
a3ce25a5a6
Authenticated Wordpress XSS Templates ( #4398 )
...
* Create CVE-2021-25075.yaml
* Create seo-redirection-xss.yaml
2022-05-15 04:32:53 +05:30
MostInterestingBotInTheWorld
581b7a627b
Dashboard Content Enhancements ( #4381 )
...
Dashboard Content Enhancements
2022-05-13 16:26:43 -04:00
Prince Chaddha
5e38345931
Merge pull request #4386 from Akokonunes/patch-146
...
Create CVE-2021-20124.yaml
2022-05-13 18:34:48 +05:30
Prince Chaddha
0481125ecb
Update and rename CVE-2021-20124.yaml to cves/2021/CVE-2021-20124.yaml
2022-05-13 15:35:36 +05:30
Prince Chaddha
c6f34b351b
Update and rename CVE-2021-20123.yaml to cves/2021/CVE-2021-20123.yaml
2022-05-13 15:25:01 +05:30
Ritik Chaddha
27a039a70c
Update metadata query ( #4350 )
...
* Update adobe-component-login.yaml
* Update cold-fusion-cfcache-map.yaml
* Update unpatched-coldfusion.yaml
* Update coldfusion-debug-xss.yaml
* Update CVE-2020-11978.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2021-38540.yaml
* Update CVE-2021-44451.yaml
* Update CVE-2022-24288.yaml
* Update airflow-debug.yaml
* Update airflow-detect.yaml
* Update CVE-2010-0219.yaml
* Update apache-axis-detect.yaml
* Update CVE-2020-11991.yaml
* Update apache-cocoon-detect.yaml
* Update CVE-2021-21402.yaml
* Update jellyfin-detect.yaml
* Update CVE-2021-21402.yaml
* Update CVE-2021-21402.yaml
* Update ecology-arbitrary-file-upload.yaml
* Update ecology-v8-sqli.yaml
* Update ecology-syncuserinfo-sqli.yaml
* Update ecology-filedownload-directory-traversal.yaml
* Update CNVD-2021-15822.yaml
* Update dedecms-carbuyaction-fileinclude.yaml
* Update dedecms-openredirect.yaml
* Update tamronos-rce.yaml
* Update natshell-path-traversal.yaml
2022-05-12 19:48:36 +05:30
Ritik Chaddha
f9120595d2
Update CVE-2021-3223.yaml
2022-05-11 18:39:39 +05:30
Ritik Chaddha
b5cd4d5129
Update CVE-2021-21402.yaml
2022-05-11 18:33:42 +05:30
Ritik Chaddha
2068a8cacf
Update CVE-2021-3223.yaml
2022-05-11 18:32:11 +05:30
Ritik Chaddha
2774aac3de
Update CVE-2021-21402.yaml
2022-05-11 14:40:16 +05:30
Ritik Chaddha
252160437e
Update CVE-2021-21402.yaml
2022-05-11 12:07:40 +05:30
Ritik Chaddha
8e630baecd
Update CVE-2021-44451.yaml
2022-05-10 18:15:11 +05:30
Ritik Chaddha
53d1ef5348
Update CVE-2021-38540.yaml
2022-05-10 18:15:09 +05:30
MostInterestingBotInTheWorld
73e289527d
Dashboard Content Enhancements ( #4339 )
...
* Spacing issues
2022-05-09 12:16:12 -04:00
MostInterestingBotInTheWorld
9ff9285916
Dashboard Content Enhancements ( #4338 )
...
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
vrenzolaverace
f0a431bcc8
Add CVE-2021-37416 ( #4235 )
...
* Add CVE-2022-0208
* misc updates
* Add CVE-2021-37416
* Added metadata + additional page specific matcher
* additional metadata
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-09 15:21:53 +05:30
pussycat0x
a8f5c98f2c
FortiGate config-audit ( #4275 )
...
* Add files via upload
* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖
* moving templates into jolokia directory
* duplicate of jolokia-unauthenticated-lfi
* merged similar templates into one with updated matchers
* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖
* Delete .new-additions
* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖
* conflict update
* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖
* Add files via upload
* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖
* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖
* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml
* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖
* mise update
* Create config-audit
* Delete config-audit
* Add files via upload
* matcher fixes / ext update / typos update
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-07 12:19:43 +05:30
sandeep
e4760f13bf
Removed duplicate CVE template
2022-05-07 11:01:47 +05:30
sandeep
c3ca28246b
misc updates
2022-05-07 10:57:44 +05:30
sandeep
1fdb124853
fixed line break between header and body
2022-05-06 15:55:50 +05:30
sandeep
54501558c2
template fix
2022-05-06 00:02:41 +05:30
GitHub Action
fbc2ba38ee
Auto Generated CVE annotations [Thu May 5 12:13:55 UTC 2022] 🤖
2022-05-05 12:13:55 +00:00
MostInterestingBotInTheWorld
03b7a5f0fe
Dashboard Content Enhancements ( #4289 )
...
Dashboard content enhancements.
2022-05-02 17:50:47 -04:00
GitHub Action
58de44b9d4
Auto Generated CVE annotations [Mon May 2 19:44:49 UTC 2022] 🤖
2022-05-02 19:44:49 +00:00
Prince Chaddha
e279027adc
Update CVE-2021-39312.yaml
2022-05-03 01:05:45 +05:30
Dhiyaneshwaran
101f0e4607
Update CVE-2021-39312.yaml
2022-05-01 16:10:55 +05:30
Dhiyaneshwaran
7ee380cb9e
Create CVE-2021-39312.yaml
2022-05-01 16:08:22 +05:30
GitHub Action
cc3e2ba7fa
Auto Generated CVE annotations [Sat Apr 30 20:57:29 UTC 2022] 🤖
2022-04-30 20:57:29 +00:00
Prince Chaddha
b6c8d874d1
Update CVE-2021-25118.yaml
2022-05-01 02:20:08 +05:30
Prince Chaddha
0154892ec8
Create CVE-2021-25118.yaml
2022-05-01 02:10:38 +05:30
GitHub Action
9d9c66412d
Auto Generated CVE annotations [Sat Apr 30 20:29:38 UTC 2022] 🤖
2022-04-30 20:29:38 +00:00
Prince Chaddha
29d40af49f
Update and rename vulnerabilities/other/viaware-rce.yaml to cves/2021/CVE-2021-36356.yaml
2022-05-01 01:57:39 +05:30
Prince Chaddha
a11f95b8bf
Create CVE-2021-25111.yaml
2022-04-30 01:49:48 +05:30
MostInterestingBotInTheWorld
44520223c1
Dashboard Content Enhancements ( #4268 )
...
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
Muhammad Daffa
a424cf57ae
Update CVE-2021-39350.yaml
2022-04-29 22:09:54 +07:00
Prince Chaddha
bfa0105bf3
Update CVE-2021-20158.yaml
2022-04-29 16:03:18 +05:30
Dwi Siswanto
631f56bae7
fix(linter): De-dupe meta ( #4264 )
2022-04-29 14:40:18 +05:30
pussycat0x
ccc7835baf
Sucuri Website Firewall - Not Configured Default page ( #4254 )
...
* Add files via upload
* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖
* moving templates into jolokia directory
* duplicate of jolokia-unauthenticated-lfi
* merged similar templates into one with updated matchers
* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖
* Delete .new-additions
* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖
* conflict update
* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖
* Add files via upload
* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖
* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖
* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml
* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖
* mise update
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-29 12:14:52 +05:30
sullo
c3d4dfd6ae
Tenda Template Enhancementleanup ( #4257 )
...
* Replace § markers with {{ }} pairs
* Clean up new Tenda admin panel template
* Update tenda-11n-wireless-router-login.yaml
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
xiaoheihei1107
75cb4e3297
Add CVE-2021-22054.yaml ( #4251 )
...
* Create CVE-2021-22054.yaml
* Update CVE-2021-22054.yaml
* Update CVE-2021-22054.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-28 13:18:32 +05:30
Prince Chaddha
aaf32a716a
Merge pull request #4249 from For3stCo1d/CVE-2021-46417.yaml
...
Create CVE-2021-46417.yaml
2022-04-28 01:38:59 +05:30
Prince Chaddha
208f676590
Update CVE-2021-46417.yaml
2022-04-28 01:36:11 +05:30
林寒
006c2e71e0
update CWE-ID
2022-04-27 23:45:58 +08:00
林寒
1525af197c
Create CVE-2021-46417.yaml
2022-04-27 23:43:24 +08:00
MostInterestingBotInTheWorld
aa888bca8d
Dashboard Content Enhancements ( #4238 )
...
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Adam Crosser
fd3a7c8fc5
Zoho Desktop Central Authentication Bypass Vulnerability (CVE-2021-44515) ( #4142 )
...
* Added Template for CVE-2021-44515
* Update bigip-config-utility-detect.yaml
* Update bigip-config-utility-detect.yaml
* Update bigip-config-utility-detect.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:42:25 +05:30
Adam Crosser
031720fc5f
Created Template for CVE-2021-44077 ( #4129 )
...
* Created Template for CVE-2021-44077
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:15:34 +05:30
sandeep
9e505d4609
added missing tags
2022-04-22 22:13:51 +05:30
forgedhallpass
5451673368
Moved and renamed templates containing a CVE under their correct location
2022-04-22 19:25:23 +03:00
forgedhallpass
9f8650b0b8
Classification CVE id fix in CVE-2021-40542.yaml
2022-04-22 19:21:28 +03:00
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld
31312b1c19
Dashboard Content Enhancements ( #4191 )
...
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action
8c19fffb6a
Auto Generated CVE annotations [Thu Apr 21 09:35:20 UTC 2022] 🤖
2022-04-21 09:35:20 +00:00
MostInterestingBotInTheWorld
3e2e842d0e
Dashboard Content Ehnancements ( #4183 )
...
* Spacing and other template cleanups
* duplicate yaml tags
Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Prince Chaddha
927a2f68e2
Update CVE-2021-31805.yaml
2022-04-18 15:12:27 +04:00
Prince Chaddha
5467e632dc
Create CVE-2021-31805.yaml
2022-04-18 15:08:19 +04:00
GitHub Action
4e6338a4a0
Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖
2022-04-16 13:18:49 +00:00
MostInterestingBotInTheWorld
5730781afa
Dashboard Content Enhancements ( #4157 )
...
* Enhancement: exposures/files/joomla-file-listing.yaml by cs
* Enhancement: cves/2019/CVE-2019-5418.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2021/CVE-2021-20091.yaml by mp
* Enhancement: cves/2021/CVE-2021-20092.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: cves/2017/CVE-2017-9833.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: misconfiguration/symfony-debugmode.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: cves/2021/CVE-2021-31682.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Relocating to CVE folder
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-2628.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2019/CVE-2019-2588.yaml by mp
* Enhancement: cves/2021/CVE-2021-31755.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments
* Tag typo
Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha
ba3f842314
Update CVE-2021-24987.yaml
2022-04-15 18:40:28 +04:00
Prince Chaddha
ce757d0581
Create CVE-2021-24987.yaml
2022-04-15 17:50:49 +04:00
Muhammad Daffa
f8240809bd
Update CVE-2021-24340.yaml ( #4134 )
2022-04-13 14:21:49 +05:30
sandeep
4b395a60d1
template location fix
2022-04-11 18:43:12 +05:30
MostInterestingBotInTheWorld
a24ef794b7
Dashboard Content Enhancements ( #4031 )
...
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
GitHub Action
83dae0cac1
Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖
2022-04-06 04:33:20 +00:00
Prince Chaddha
a0e7094664
Update CVE-2021-24746.yaml
2022-04-06 09:55:48 +05:30
Prince Chaddha
68f4159393
Create CVE-2021-24746.yaml
2022-04-06 09:36:53 +05:30
Prince Chaddha
21a73f490c
Update CVE-2021-24746.yaml
2022-04-06 09:35:04 +05:30
GitHub Action
9045a7bd9c
Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖
2022-04-06 04:01:51 +00:00
Prince Chaddha
90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
...
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha
f0af9a04b6
Update CVE-2021-24746.yaml
2022-04-05 23:28:52 +05:30
GitHub Action
15575ec82e
Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖
2022-04-05 13:17:39 +00:00
Prince Chaddha
77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
...
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha
3586ec841c
Update CVE-2021-26598.yaml
2022-04-05 00:13:18 +05:30
Prince Chaddha
c9e108c7db
Update CVE-2021-26598.yaml
2022-04-04 23:57:11 +05:30
Rodrigo Schio
4d690358ae
fix match and extractors regexes ( #4040 )
2022-04-04 18:08:25 +05:30
GwanYeong Kim
1e374c7482
Create CVE-2021-26598.yaml
...
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
Prince Chaddha
c1a7f2398c
Create CVE-2021-24746.yaml
2022-04-02 16:15:26 +05:30
Prince Chaddha
a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
...
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
Prince Chaddha
14d40fdb50
Update CVE-2021-44103.yaml
2022-04-02 14:47:22 +05:30
Prince Chaddha
d3c4313f64
Update CVE-2021-44103.yaml
2022-04-02 14:39:25 +05:30
GitHub Action
5e128f2c52
Auto Generated CVE annotations [Sat Apr 2 07:59:47 UTC 2022] 🤖
2022-04-02 07:59:47 +00:00
rschio
da4c4dde5d
remove trailing spaces
2022-04-01 12:53:54 -04:00
Sandeep Singh
a6a4d78065
Added CVE-2021-46387 ( #4022 )
2022-04-01 15:13:57 +05:30
MostInterestingBotInTheWorld
6ddfbac2b4
Dashboard Content Enhancement ( #4020 )
...
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
* Syntax restore some characters
* Spacing
* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp
* Enhancement: cves/2019/CVE-2019-10068.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-11580.yaml by mp
* Enhancement: cves/2019/CVE-2019-11581.yaml by mp
* Enhancement: cves/2019/CVE-2019-12314.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Link wrapping issue
* Enhancement: cves/2019/CVE-2019-13462.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16759.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cves/2019/CVE-2019-16278.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-12725.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs
* Enhancement: cves/2021/CVE-2021-33807.yaml by mp
* Enhancement: cves/2010/CVE-2010-0943.yaml by mp
* Enhancement: cves/2008/CVE-2008-6172.yaml by mp
* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: network/cisco-smi-exposure.yaml by mp
* Enhancement: cves/2021/CVE-2021-37704.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2019/CVE-2019-16313.yaml by mp
* Enhancement: cves/2021/CVE-2021-3017.yaml by mp
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2021/CVE-2021-37573.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2018/CVE-2018-11709.yaml by mp
* Enhancement: cves/2014/CVE-2014-2321.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Manual enhancement
* Manual enhancement push due to dashboard failure
* Testing of dashboard accidentally commited to dashboard branch
* Spacing
Put some CVEs in the classification
* Add missing cve-id fields to templates in cve/
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
rschio
32d9039f6b
add CVE-2021-44103
...
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
2022-04-01 03:39:18 -04:00
GitHub Action
074936d227
Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖
2022-03-31 19:40:33 +00:00
Adam Crosser
235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) ( #4019 )
...
* Updated CVE-2022-22963
* Added CVE-2021-21311 Template
* Added Shodan Query
* Updated Title
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30
MostInterestingBotInTheWorld
13bfc8ff57
Dashboard Content Enhancements ( #3998 )
...
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
Prince Chaddha
b6dd43c0c9
Merge pull request #3984 from Akokonunes/patch-132
...
Create CVE-2021-46381.yaml
2022-03-29 12:14:05 +05:30
Prince Chaddha
708921b3e5
Update and rename CVE-2021-46381.yaml to cves/2021/CVE-2021-46381.yaml
2022-03-29 12:09:40 +05:30
Sandeep Singh
5f28041069
Added Spring Boot Log4j Remote Code Injection ( #3993 )
...
* Added Spring Boot Log4j Remote Code Injection
* minor improvements to CVE-2021-44228
* URI based payload update to catch injection point
2022-03-28 01:46:50 +05:30
sandeep
7b83c9990a
minor updates to template names
2022-03-27 22:13:08 +05:30
GitHub Action
c8380b3bf8
Auto Generated CVE annotations [Sun Mar 27 14:25:50 UTC 2022] 🤖
2022-03-27 14:25:50 +00:00
Dhiyaneshwaran
014a8c9192
4 New Wordpress Authenticated Templates ( #3990 )
...
* Create xss-childlist-selector.yaml
* Update xss-childlist-selector.yaml
* Rename xss-childlist-selector.yaml to aem-xss-childlist-selector.yaml
* adding metadata
* Create CVE-2021-25112.yaml
* Create CVE-2022-0189.yaml
* Create CVE-2021-25055.yaml
* Create CVE-2022-0148.yaml
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-27 19:55:03 +05:30
GitHub Action
ac87976a84
Auto Generated CVE annotations [Sat Mar 26 09:11:31 UTC 2022] 🤖
2022-03-26 09:11:31 +00:00
MostInterestingBotInTheWorld
814d07fb7d
Dashboard Content Enhancements ( #3961 )
...
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp
* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp
* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp
* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp
* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp
* Enhancement: dns/azure-takeover-detection.yaml by mp
* Enhancement: dns/cname-fingerprint.yaml by mp
* Enhancement: dns/cname-service-detection.yaml by mp
* Enhancement: dns/detect-dangling-cname.yaml by mp
* Enhancement: dns/dns-waf-detect.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: dns/dnssec-detection.yaml by mp
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
GitHub Action
83ecf7060b
Auto Generated CVE annotations [Wed Mar 23 10:44:27 UTC 2022] 🤖
2022-03-23 10:44:27 +00:00
Sandeep Singh
8c12450b09
Added CVE-2021-42063 ( #3956 )
2022-03-23 16:13:38 +05:30
Prince Chaddha
ca54dd0026
Merge pull request #3946 from bartutku/CVE-2021-41691
...
CVE-2021-41691
2022-03-23 13:17:18 +05:30
sandeep
ec99241f0e
Updated "/etc/passwd" regex to avoid possible false positive results.
2022-03-22 13:31:31 +05:30
Sandeep Singh
21c2c0cd2c
lint update
2022-03-22 13:04:29 +05:30
Prince Chaddha
bc30daa9fb
Update CVE-2021-41691.yaml
2022-03-22 12:38:45 +05:30
Prince Chaddha
75845a7b6e
Merge pull request #3951 from z3dc0ps/master
...
changed 'burpcollaborator.net' to "{{interactsh-url}}"
2022-03-22 11:35:52 +05:30
MostInterestingBotInTheWorld
9663595dd1
Dashboard Text Enhancements ( #3948 )
...
Dashboard content enhancements
2022-03-21 23:48:47 -04:00
z3dc0ps
8f37ae4a2f
Update CVE-2021-21315.yaml
2022-03-22 01:46:15 +05:30
bartutku
9fb6c93947
CVE-2021-41691
2022-03-21 16:49:56 +03:00
GitHub Action
6b562eb6f7
Auto Generated CVE annotations [Sun Mar 20 07:45:32 UTC 2022] 🤖
2022-03-20 07:45:32 +00:00
darkc0d37
36ff44ab40
Ivanti EPM CSA Code Injection(CVE-2021-44529) ( #3937 )
...
* Added CVE-2021-44529
* Added CVE-2021-44529
* Added CVE-2021-44529
* metadata updates
* contributors update
Co-authored-by: Tirtha Mandal <darkc0d3@Tirthas-MacBook-Pro.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-20 13:14:37 +05:30
Sandeep Singh
ec2246ee22
added confluence metadata and minor matcher updates ( #3929 )
2022-03-19 16:12:08 +05:30
sandeep
a97dccb54a
additional matcher update
2022-03-19 16:10:43 +05:30
Dwi Siswanto
1878c50193
Add Pascom advisories ( #3862 )
...
* pascom: Add CVE-2021-45967
* pascom: Add CVE-2021-45968
2022-03-19 16:09:09 +05:30
sandeep
dd2322c7f2
tags update
2022-03-19 15:15:41 +05:30
GitHub Action
145620c09c
Auto Generated CVE annotations [Sat Mar 19 09:06:25 UTC 2022] 🤖
2022-03-19 09:06:25 +00:00
cckuailong
9fe955392a
add CVE-2021-41282 ( #3844 )
...
* add CVE-2021-41282
* tags update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:35:40 +05:30
sandeep
a3a709045a
tag update
2022-03-19 14:25:34 +05:30
cckuailong
5b787f0260
add CVE-2021-35587 ( #3872 )
...
* add CVE-2021-35587
* fix verbose space
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:24:33 +05:30
Roberto Nunes
66fadd57ad
Create CVE-2021-34805.yaml ( #3919 )
...
* Create CVE-2021-34805.yaml
* misc fixes
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:18:46 +05:30
MostInterestingBotInTheWorld
056323ec5a
Dashboard Text Enhancements ( #3927 )
...
Dashboard text enhancements
2022-03-17 13:01:45 -04:00
gilfoyle97
0fa555567a
Request: Fix CVE-2021-21234 ( #3920 )
...
* Fixed CVE-2019-9670
* more strict matchers
* Fix CVE-2021-21234
* more strict matcher
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-17 14:59:53 +05:30
sandeep
5303173354
additional word matcher
2022-03-14 16:09:08 +05:30
GitHub Action
bcd67b9429
Auto Generated CVE annotations [Fri Mar 11 09:46:35 UTC 2022] 🤖
2022-03-11 09:46:35 +00:00
MostInterestingBotInTheWorld
c1601ceded
Merge branch 'projectdiscovery:master' into dashboard
2022-03-08 09:36:06 -05:00
MostInterestingBotInTheWorld
73a06a5fab
Enhancement: cves/2021/CVE-2021-44521.yaml by mp
2022-03-07 16:29:30 -05:00
sandeep
20774864c5
misc updates
2022-03-08 01:28:57 +05:30
edoardottt
7032b928cc
Add CVE-2021-3002
2022-03-07 20:47:40 +01:00
sullo
2d0d48fdb7
Trailing space
2022-03-07 14:26:37 -05:00
MostInterestingBotInTheWorld
81868f926d
Enhancement: cves/2021/CVE-2021-4191.yaml by mp
2022-03-07 14:12:26 -05:00
MostInterestingBotInTheWorld
bcc094893a
Enhancement: cves/2021/CVE-2021-41649.yaml by mp
2022-03-07 14:02:44 -05:00
MostInterestingBotInTheWorld
138142bdba
Enhancement: cves/2021/CVE-2021-41648.yaml by mp
2022-03-07 13:45:31 -05:00
MostInterestingBotInTheWorld
7f5de64a29
Enhancement: cves/2021/CVE-2021-41467.yaml by mp
2022-03-07 13:41:37 -05:00
MostInterestingBotInTheWorld
042d3eb4a4
Enhancement: cves/2021/CVE-2021-41349.yaml by mp
2022-03-07 13:40:20 -05:00
MostInterestingBotInTheWorld
49623611cb
Enhancement: cves/2021/CVE-2021-41381.yaml by mp
2022-03-07 10:46:28 -05:00
MostInterestingBotInTheWorld
3ed70c8627
Enhancement: cves/2021/CVE-2021-41349.yaml by mp
2022-03-07 10:43:02 -05:00
MostInterestingBotInTheWorld
d58cf407d9
Enhancement: cves/2021/CVE-2021-41293.yaml by mp
2022-03-07 10:36:19 -05:00
sullo
c002e6c7d5
Accidentally added a vim command
2022-03-07 09:13:57 -05:00
sullo
4266bdad25
Spacing
2022-03-07 09:08:43 -05:00
MostInterestingBotInTheWorld
21d872d42c
Merge branch 'projectdiscovery:master' into dashboard
2022-03-07 08:10:22 -05:00
MostInterestingBotInTheWorld
d743fb7969
Enhancement: cves/2021/CVE-2021-41291.yaml by mp
2022-03-06 12:04:24 -05:00
MostInterestingBotInTheWorld
925f08ff70
Enhancement: cves/2021/CVE-2021-41277.yaml by mp
2022-03-06 12:01:47 -05:00
MostInterestingBotInTheWorld
92aa22ebe8
Enhancement: cves/2021/CVE-2021-41266.yaml by mp
2022-03-06 11:56:57 -05:00
MostInterestingBotInTheWorld
739edecc0f
Enhancement: cves/2021/CVE-2021-41174.yaml by mp
2022-03-06 11:52:34 -05:00
MostInterestingBotInTheWorld
220bc5a35a
Enhancement: cves/2021/CVE-2021-40978.yaml by mp
2022-03-06 11:50:17 -05:00
MostInterestingBotInTheWorld
b20659acef
Enhancement: cves/2021/CVE-2021-40960.yaml by mp
2022-03-06 11:43:48 -05:00
MostInterestingBotInTheWorld
0739f98dc7
Enhancement: cves/2021/CVE-2021-40875.yaml by mp
2022-03-06 11:41:44 -05:00
MostInterestingBotInTheWorld
b03d23b035
Enhancement: cves/2021/CVE-2021-40870.yaml by mp
2022-03-06 11:35:55 -05:00
MostInterestingBotInTheWorld
57ab79164b
Enhancement: cves/2021/CVE-2021-40868.yaml by mp
2022-03-06 11:31:51 -05:00
sandeep
25c8f1bc11
cve tag update
2022-03-05 13:46:55 +05:30
sandeep
faea03749e
tags update + extractor
2022-03-05 13:42:33 +05:30
sandeep
3fd92dbdcd
indentation update
2022-03-05 13:15:21 +05:30
zsusac
d18e7535d2
Add template for CVE-2021-4191
2022-03-04 16:56:50 -05:00
sandeep
9f5cc1ca80
added gitlab metadata
2022-03-04 19:20:03 +05:30
initstring
3389b0b7aa
removing irrelevant oast tag
2022-03-04 14:25:00 +11:00
initstring
ce85dd4283
Fixed CVE-2021-22214
2022-03-04 13:04:56 +11:00
GitHub Action
ac76cf7004
Auto Generated CVE annotations [Thu Mar 3 21:15:02 UTC 2022] 🤖
2022-03-03 21:15:02 +00:00
Sandeep Singh
0f47239f2a
Merge pull request #3807 from projectdiscovery/CVE-2021-44521
...
Apache Cassandra Load UDF RCE
2022-03-04 02:43:42 +05:30
Prince Chaddha
b0e13cb19d
Merge pull request #3791 from pussycat0x/master
...
New Template Added
2022-03-03 16:44:20 +05:30
sandeep
6d32b81b2a
GitLab metadata update
2022-03-02 13:05:29 +05:30
sandeep
12e01e2786
Apache Cassandra Load UDF RCE
...
Co-Authored-By: Y4er <40487319+Y4er@users.noreply.github.com>
2022-03-02 01:06:31 +05:30
MostInterestingBotInTheWorld
390fe3b65f
Enhancement: cves/2021/CVE-2021-45380.yaml by mp
2022-02-28 17:19:33 -05:00
MostInterestingBotInTheWorld
9e84dd3d67
Enhancement: cves/2021/CVE-2021-45092.yaml by mp
2022-02-28 16:47:00 -05:00
MostInterestingBotInTheWorld
c608d27364
Enhancement: cves/2021/CVE-2021-45046.yaml by mp
2022-02-28 16:46:46 -05:00
MostInterestingBotInTheWorld
3cddcc31a3
Enhancement: cves/2021/CVE-2021-45043.yaml by mp
2022-02-28 16:45:51 -05:00
MostInterestingBotInTheWorld
cc27c92bf6
Enhancement: cves/2021/CVE-2021-44228.yaml by mp
2022-02-28 16:43:59 -05:00
MostInterestingBotInTheWorld
195455a4a9
Enhancement: cves/2021/CVE-2021-43798.yaml by mp
2022-02-28 16:42:50 -05:00
MostInterestingBotInTheWorld
a1951877d5
Enhancement: cves/2021/CVE-2021-43287.yaml by mp
2022-02-28 16:40:27 -05:00
Prince Chaddha
cc3505d3b6
added deleted templates
2022-03-01 02:15:19 +05:30
MostInterestingBotInTheWorld
453188e041
Enhancement: cves/2021/CVE-2021-46005.yaml by mp
2022-02-28 15:07:15 -05:00
MostInterestingBotInTheWorld
bc1359fb51
Enhancement: cves/2021/CVE-2021-45380.yaml by mp
2022-02-28 14:57:33 -05:00
MostInterestingBotInTheWorld
51dd8b488b
Enhancement: cves/2021/CVE-2021-45232.yaml by mp
2022-02-28 14:56:46 -05:00
MostInterestingBotInTheWorld
776b796ce9
Enhancement: cves/2021/CVE-2021-44228.yaml by cs
2022-02-28 14:52:32 -05:00
MostInterestingBotInTheWorld
75d91bdf95
Enhancement: cves/2021/CVE-2021-45092.yaml by mp
2022-02-28 14:50:44 -05:00
MostInterestingBotInTheWorld
fd60d738d5
Enhancement: cves/2021/CVE-2021-45046.yaml by mp
2022-02-28 13:56:15 -05:00
MostInterestingBotInTheWorld
9ab6b54780
Enhancement: cves/2021/CVE-2021-45043.yaml by mp
2022-02-28 13:54:12 -05:00
MostInterestingBotInTheWorld
e465219477
Enhancement: cves/2021/CVE-2021-44848.yaml by mp
2022-02-28 13:51:40 -05:00
MostInterestingBotInTheWorld
2abb82480f
Enhancement: cves/2021/CVE-2021-44528.yaml by mp
2022-02-28 13:50:48 -05:00
MostInterestingBotInTheWorld
e07f94c294
Enhancement: cves/2021/CVE-2021-44427.yaml by mp
2022-02-28 13:49:59 -05:00
MostInterestingBotInTheWorld
ede14c11e7
Enhancement: cves/2021/CVE-2021-44228.yaml by mp
2022-02-28 13:48:26 -05:00
MostInterestingBotInTheWorld
6cb038b6ff
Enhancement: cves/2021/CVE-2021-43810.yaml by mp
2022-02-28 13:45:33 -05:00
MostInterestingBotInTheWorld
5ababa0db3
Enhancement: cves/2021/CVE-2021-43798.yaml by mp
2022-02-28 13:44:10 -05:00
MostInterestingBotInTheWorld
5fd4d78f23
Enhancement: cves/2021/CVE-2021-43778.yaml by mp
2022-02-28 13:41:58 -05:00
MostInterestingBotInTheWorld
2b2bfd9d47
Enhancement: cves/2021/CVE-2021-43496.yaml by mp
2022-02-28 13:39:57 -05:00
MostInterestingBotInTheWorld
6ee197b56d
Enhancement: cves/2021/CVE-2021-43495.yaml by mp
2022-02-28 13:37:19 -05:00
MostInterestingBotInTheWorld
c40f12d4a7
Enhancement: cves/2021/CVE-2021-43287.yaml by mp
2022-02-28 13:36:02 -05:00
MostInterestingBotInTheWorld
7efa94a6b8
Enhancement: cves/2021/CVE-2021-43062.yaml by mp
2022-02-28 13:07:38 -05:00
MostInterestingBotInTheWorld
e8abd2c811
Enhancement: cves/2021/CVE-2021-43062.yaml by mp
2022-02-28 13:06:34 -05:00
MostInterestingBotInTheWorld
855a848fd0
Enhancement: cves/2021/CVE-2021-42567.yaml by mp
2022-02-28 13:05:03 -05:00
MostInterestingBotInTheWorld
f2909c7bb9
Enhancement: cves/2021/CVE-2021-42566.yaml by mp
2022-02-28 12:52:06 -05:00
pussycat0x
43d242e195
Delete CVE-2021-39316.yaml
2022-02-28 22:31:33 +05:30
sullo
8188cb1216
Syntax and language
2022-02-28 11:05:59 -05:00
MostInterestingBotInTheWorld
f18404302a
Dashboard Text Enhancement ( #3798 )
...
Dashboard text enhancements
2022-02-28 09:09:26 -05:00
GitHub Action
5b154f6b93
Auto Generated CVE annotations [Sun Feb 27 15:44:38 UTC 2022] 🤖
2022-02-27 15:44:38 +00:00
pussycat0x
51231d0ea6
Add files via upload
2022-02-27 21:13:00 +05:30
Prince Chaddha
87b8f90358
Merge pull request #3771 from cckuailong/test1
...
add CVE-2021-24762
2022-02-27 19:48:49 +05:30
Prince Chaddha
23816a3181
Update CVE-2021-24762.yaml
2022-02-27 19:34:26 +05:30
Prince Chaddha
c2a9428dd7
Update CVE-2021-24762.yaml
2022-02-27 19:29:50 +05:30
GitHub Action
01064ceeab
Auto Generated CVE annotations [Sun Feb 27 10:32:13 UTC 2022] 🤖
2022-02-27 10:32:13 +00:00
Prince Chaddha
f689c390d9
Merge pull request #3777 from bananabr/redash
...
Redash
2022-02-27 02:29:52 +05:30
Prince Chaddha
04ae5b2e4d
Update CVE-2021-41192.yaml
2022-02-27 02:27:18 +05:30
MostInterestingBotInTheWorld
b631f45e1c
Dashboard Text Enhancements ( #3778 )
...
Dashboard text enhancements
2022-02-25 17:07:55 -05:00
Daniel Santos
dde0b0f394
CVE-2021-41192: refactor
2022-02-25 13:19:01 -06:00
Daniel Santos
7a843ee405
CVE-2021-41192: refactor
2022-02-25 13:10:32 -06:00
Daniel Santos
a8826a4e54
CVE-2021-41192
2022-02-25 10:17:47 -06:00
cckuailong
b845cefc2b
add CVE-2021-24762
2022-02-25 14:27:21 +08:00
xiaoheihei1107
c61a253f75
Create CVE-2021-3293.yaml ( #3748 )
...
* Create CVE-2021-3293.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-23 13:54:44 +05:30
MostInterestingBotInTheWorld
3e13f1cce6
Dashboard Template Enhancements ( #3752 )
...
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Enhancement: cves/2010/CVE-2010-1957.yaml by mp
* Enhancement: cves/2010/CVE-2010-1977.yaml by mp
* Enhancement: cves/2010/CVE-2010-1979.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-1983.yaml by mp
* Enhancement: cves/2010/CVE-2010-2033.yaml by mp
* Enhancement: cves/2010/CVE-2010-2034.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2036.yaml by mp
* Enhancement: cves/2010/CVE-2010-2037.yaml by mp
* Enhancement: cves/2010/CVE-2010-2045.yaml by mp
* Enhancement: cves/2010/CVE-2010-2050.yaml by mp
* Enhancement: cves/2010/CVE-2010-2122.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2128.yaml by mp
* Enhancement: cves/2010/CVE-2010-2259.yaml by mp
* Enhancement: cves/2010/CVE-2010-2307.yaml by mp
* Enhancement: cves/2010/CVE-2010-2507.yaml by mp
* Enhancement: cves/2010/CVE-2010-2680.yaml by mp
* Enhancement: cves/2010/CVE-2010-2682.yaml by mp
* Enhancement: cves/2010/CVE-2010-2857.yaml by mp
* Enhancement: cves/2010/CVE-2010-2861.yaml by mp
* Enhancement: cves/2010/CVE-2010-2918.yaml by mp
* Enhancement: cves/2010/CVE-2010-2920.yaml by mp
* Enhancement: cves/2010/CVE-2010-3203.yaml by mp
* Enhancement: cves/2010/CVE-2010-3426.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4231.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4719.yaml by mp
* Enhancement: cves/2010/CVE-2010-4769.yaml by mp
* Enhancement: cves/2010/CVE-2010-4977.yaml by mp
* Enhancement: cves/2010/CVE-2010-5028.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2010/CVE-2010-5286.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-1669.yaml by mp
* Enhancement: cves/2011/CVE-2011-2744.yaml by mp
* Enhancement: cves/2000/CVE-2000-0114.yaml by mp
* Enhancement: cves/2011/CVE-2011-3315.yaml by mp
* Enhancement: cves/2011/CVE-2011-4336.yaml by mp
* Enhancement: cves/2011/CVE-2011-4618.yaml by mp
* Enhancement: cves/2011/CVE-2011-4624.yaml by mp
* Enhancement: cves/2011/CVE-2011-4804.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2012/CVE-2012-1823.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-1226.yaml by mp
* Enhancement: cves/2012/CVE-2012-0996.yaml by mp
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-27358.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2012/CVE-2012-1835.yaml by mp
* Enhancement: cves/2012/CVE-2012-0901.yaml by mp
* Enhancement: cves/2011/CVE-2011-5265.yaml by mp
* Enhancement: cves/2011/CVE-2011-5181.yaml by mp
* Enhancement: cves/2011/CVE-2011-5179.yaml by mp
* Enhancement: cves/2011/CVE-2011-5107.yaml by mp
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2012/CVE-2012-0991.yaml by mp
* Enhancement: cves/2012/CVE-2012-0981.yaml by mp
* Enhancement: cves/2012/CVE-2012-0896.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2013/CVE-2013-2287.yaml by mp
* Enhancement: cves/2012/CVE-2012-5913.yaml by mp
* Enhancement: cves/2012/CVE-2012-4889.yaml by mp
* Enhancement: cves/2012/CVE-2012-4768.yaml by mp
* Enhancement: cves/2012/CVE-2012-4547.yaml by mp
* Enhancement: cves/2012/CVE-2012-4273.yaml by mp
* Enhancement: cves/2012/CVE-2012-4242.yaml by mp
* Enhancement: cves/2012/CVE-2012-2371.yaml by mp
* Enhancement: cves/2013/CVE-2013-2248.yaml by mp
* Enhancement: cves/2012/CVE-2012-4940.yaml by mp
* Enhancement: cves/2012/CVE-2012-4878.yaml by mp
* Enhancement: cves/2012/CVE-2012-4253.yaml by mp
* Enhancement: cves/2012/CVE-2012-4253.yaml by mp
Trailing space
* Enhancement: cves/2013/CVE-2013-2251.yaml by mp
* Enhancement: cves/2013/CVE-2013-1965.yaml by mp
* Enhancement: cves/2012/CVE-2012-3153.yaml by mp
* Enhancement: cves/2012/CVE-2012-5913.yaml by mp
* Enhancement: cves/2012/CVE-2012-4242.yaml by mp
* Merge conflict
* Fix references syntax
* Fix syntax. Again.
* Update CVE-2011-4926.yaml
* Enhancement: cves/2021/CVE-2021-28073.yaml by cs
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-20167.yaml by cs
* Enhancement: cves/2021/CVE-2021-40438.yaml by cs
* Enhancement: cves/2021/CVE-2021-40438.yaml by cs
Co-authored-by: sullo <sullo@cirt.net>
2022-02-23 13:30:19 +05:30
sandeep
736e7427d6
added missing tags
2022-02-22 19:53:43 +05:30
GitHub Action
6411ca373f
Auto Generated CVE annotations [Tue Feb 22 13:26:30 UTC 2022] 🤖
2022-02-22 13:26:30 +00:00
sandeep
12bcede1ac
template id update
2022-02-22 18:53:25 +05:30
Prince Chaddha
22f35f3e23
Merge pull request #3730 from DhiyaneshGeek/master
...
10 New Wordpress Template
2022-02-22 14:47:20 +05:30
Prince Chaddha
af6ef0d47f
Delete CVE-2021-25047.yaml
2022-02-22 14:33:45 +05:30
Prince Chaddha
ca9a2339f3
Update CVE-2021-25047.yaml
2022-02-22 14:00:06 +05:30
Prince Chaddha
db4028cd73
Update CVE-2021-25063.yaml
2022-02-22 13:19:04 +05:30
Prince Chaddha
0368a87af9
Update CVE-2021-25063.yaml
2022-02-22 13:15:25 +05:30
MostInterestingBotInTheWorld
9b82c296e1
Dashboard Enhancements ( #3722 )
...
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Enhancement: cves/2010/CVE-2010-1957.yaml by mp
* Enhancement: cves/2010/CVE-2010-1977.yaml by mp
* Enhancement: cves/2010/CVE-2010-1979.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-1983.yaml by mp
* Enhancement: cves/2010/CVE-2010-2033.yaml by mp
* Enhancement: cves/2010/CVE-2010-2034.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2036.yaml by mp
* Enhancement: cves/2010/CVE-2010-2037.yaml by mp
* Enhancement: cves/2010/CVE-2010-2045.yaml by mp
* Enhancement: cves/2010/CVE-2010-2050.yaml by mp
* Enhancement: cves/2010/CVE-2010-2122.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2128.yaml by mp
* Enhancement: cves/2010/CVE-2010-2259.yaml by mp
* Enhancement: cves/2010/CVE-2010-2307.yaml by mp
* Enhancement: cves/2010/CVE-2010-2507.yaml by mp
* Enhancement: cves/2010/CVE-2010-2680.yaml by mp
* Enhancement: cves/2010/CVE-2010-2682.yaml by mp
* Enhancement: cves/2010/CVE-2010-2857.yaml by mp
* Enhancement: cves/2010/CVE-2010-2861.yaml by mp
* Enhancement: cves/2010/CVE-2010-2918.yaml by mp
* Enhancement: cves/2010/CVE-2010-2920.yaml by mp
* Enhancement: cves/2010/CVE-2010-3203.yaml by mp
* Enhancement: cves/2010/CVE-2010-3426.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4231.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4719.yaml by mp
* Enhancement: cves/2010/CVE-2010-4769.yaml by mp
* Enhancement: cves/2010/CVE-2010-4977.yaml by mp
* Enhancement: cves/2010/CVE-2010-5028.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2010/CVE-2010-5286.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-1669.yaml by mp
* Enhancement: cves/2011/CVE-2011-2744.yaml by mp
* Enhancement: cves/2000/CVE-2000-0114.yaml by mp
* Enhancement: cves/2011/CVE-2011-3315.yaml by mp
* Enhancement: cves/2011/CVE-2011-4336.yaml by mp
* Enhancement: cves/2011/CVE-2011-4618.yaml by mp
* Enhancement: cves/2011/CVE-2011-4624.yaml by mp
* Enhancement: cves/2011/CVE-2011-4804.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2012/CVE-2012-1823.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-1226.yaml by mp
* Enhancement: cves/2012/CVE-2012-0996.yaml by mp
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-27358.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2012/CVE-2012-1835.yaml by mp
* Enhancement: cves/2012/CVE-2012-0901.yaml by mp
* Enhancement: cves/2011/CVE-2011-5265.yaml by mp
* Enhancement: cves/2011/CVE-2011-5181.yaml by mp
* Enhancement: cves/2011/CVE-2011-5179.yaml by mp
* Enhancement: cves/2011/CVE-2011-5107.yaml by mp
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2012/CVE-2012-0991.yaml by mp
* Enhancement: cves/2012/CVE-2012-0981.yaml by mp
* Enhancement: cves/2012/CVE-2012-0896.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
Co-authored-by: sullo <sullo@cirt.net>
2022-02-21 13:33:16 -05:00
Ajaysen R
327cb49d54
Create CVE-2021-43062.yaml ( #3741 )
...
* Create CVE-2021-43062.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-21 18:28:24 +05:30
GitHub Action
185fe98b83
Auto Generated CVE annotations [Sat Feb 19 11:28:47 UTC 2022] 🤖
2022-02-19 11:28:47 +00:00
Dhiyaneshwaran
61ae4fa4b8
Create CVE-2021-25047.yaml
2022-02-19 16:57:34 +05:30
GitHub Action
55a470f07b
Auto Generated CVE annotations [Sat Feb 19 11:25:57 UTC 2022] 🤖
2022-02-19 11:25:57 +00:00
Dhiyaneshwaran
e065a7b7bb
Create CVE-2021-25063.yaml
2022-02-19 16:54:34 +05:30
MostInterestingBotInTheWorld
2af991eaac
Enhancement: cves/2021/CVE-2021-1497.yaml by cs ( #3716 )
2022-02-16 11:11:34 -05:00
MostInterestingBotInTheWorld
e5e0e1ebf4
Dashboard Content Enhancements ( #3711 )
...
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1340.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1315.yaml by mp
* Enhancement: cves/2010/CVE-2010-1314.yaml by mp
* Enhancement: cves/2010/CVE-2010-1313.yaml by mp
* Enhancement: cves/2010/CVE-2010-1312.yaml by mp
* Enhancement: cves/2010/CVE-2010-1308.yaml by mp
* Enhancement: cves/2010/CVE-2010-1307.yaml by mp
* Enhancement: cves/2010/CVE-2010-1306.yaml by mp
* Enhancement: cves/2010/CVE-2010-1305.yaml by mp
* Enhancement: cves/2010/CVE-2010-1304.yaml by mp
* Enhancement: cves/2010/CVE-2010-1302.yaml by mp
* Enhancement: cves/2010/CVE-2010-1219.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1354.yaml by mp
* Enhancement: cves/2010/CVE-2010-1461.yaml by mp
* Enhancement: cves/2010/CVE-2010-1469.yaml by mp
* Enhancement: cves/2010/CVE-2010-1470.yaml by mp
* Enhancement: cves/2010/CVE-2010-1471.yaml by mp
* Enhancement: cves/2010/CVE-2010-1472.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1476.yaml by mp
* Enhancement: cves/2010/CVE-2010-1478.yaml by mp
* Enhancement: cves/2010/CVE-2010-1491.yaml by mp
* Enhancement: cves/2010/CVE-2010-1494.yaml by mp
* Enhancement: cves/2010/CVE-2010-1495.yaml by mp
* Enhancement: cves/2010/CVE-2010-1531.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: cves/2016/CVE-2016-4975.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-digitalocean.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-hetzner.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-aws.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-google.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-azure.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-localhost.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-internal.yaml by cs
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Spacing fixes and enhancement to CNVD-2019-01348.yaml
* Spacing fixes, and enhancement to CNVD-2019-01348.yaml
* Merge artifact
* Spacing
* Minor tags cleanup
* Enhancement: cves/2010/CVE-2010-1532.yaml by mp
* Enhancement: cves/2010/CVE-2010-1533.yaml by mp
* Enhancement: cves/2010/CVE-2010-1534.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: cves/2010/CVE-2010-1540.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1603.yaml by mp
* Enhancement: cves/2010/CVE-2010-1607.yaml by mp
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2010/CVE-2010-1657.yaml by mp
* Enhancement: cves/2010/CVE-2010-1657.yaml by mp
* Enhancement: cves/2010/CVE-2010-1658.yaml by mp
* Enhancement: cves/2010/CVE-2010-1659.yaml by mp
* Enhancement: cves/2010/CVE-2010-1714.yaml by mp
* Enhancement: cves/2010/CVE-2010-1715.yaml by mp
* Enhancement: cves/2010/CVE-2010-1532.yaml by mp
* Enhancement: cves/2010/CVE-2010-1533.yaml by mp
* Enhancement: cves/2010/CVE-2010-1534.yaml by mp
* Enhancement: cves/2010/CVE-2010-1534.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: cves/2010/CVE-2010-1540.yaml by mp
* Enhancement: cves/2010/CVE-2010-1540.yaml by mp
* Enhancement: cves/2010/CVE-2010-1717.yaml by mp
* Enhancement: cves/2010/CVE-2010-1718.yaml by mp
* Enhancement: cves/2010/CVE-2010-1719.yaml by mp
* Enhancement: cves/2010/CVE-2010-1722.yaml by mp
* Enhancement: cves/2010/CVE-2010-1723.yaml by mp
* Enhancement: cves/2010/CVE-2010-1858.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Enhancement: cves/2010/CVE-2010-1952.yaml by mp
* Enhancement: cves/2010/CVE-2010-1953.yaml by mp
* Enhancement: cves/2010/CVE-2010-1954.yaml by mp
* Enhancement: cves/2010/CVE-2010-1955.yaml by mp
* Enhancement: cves/2010/CVE-2010-1956.yaml by mp
* Information Enhancements
Co-authored-by: sullo <sullo@cirt.net>
2022-02-16 04:17:54 +05:30
MostInterestingBotInTheWorld
25938bc625
Dashboard ( #3706 )
...
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1340.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1315.yaml by mp
* Enhancement: cves/2010/CVE-2010-1314.yaml by mp
* Enhancement: cves/2010/CVE-2010-1313.yaml by mp
* Enhancement: cves/2010/CVE-2010-1312.yaml by mp
* Enhancement: cves/2010/CVE-2010-1308.yaml by mp
* Enhancement: cves/2010/CVE-2010-1307.yaml by mp
* Enhancement: cves/2010/CVE-2010-1306.yaml by mp
* Enhancement: cves/2010/CVE-2010-1305.yaml by mp
* Enhancement: cves/2010/CVE-2010-1304.yaml by mp
* Enhancement: cves/2010/CVE-2010-1302.yaml by mp
* Enhancement: cves/2010/CVE-2010-1219.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1354.yaml by mp
* Enhancement: cves/2010/CVE-2010-1461.yaml by mp
* Enhancement: cves/2010/CVE-2010-1469.yaml by mp
* Enhancement: cves/2010/CVE-2010-1470.yaml by mp
* Enhancement: cves/2010/CVE-2010-1471.yaml by mp
* Enhancement: cves/2010/CVE-2010-1472.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1476.yaml by mp
* Enhancement: cves/2010/CVE-2010-1478.yaml by mp
* Enhancement: cves/2010/CVE-2010-1491.yaml by mp
* Enhancement: cves/2010/CVE-2010-1494.yaml by mp
* Enhancement: cves/2010/CVE-2010-1495.yaml by mp
* Enhancement: cves/2010/CVE-2010-1531.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: cves/2016/CVE-2016-4975.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-digitalocean.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-hetzner.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-aws.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-google.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-azure.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-localhost.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-internal.yaml by cs
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Spacing fixes and enhancement to CNVD-2019-01348.yaml
* Spacing fixes, and enhancement to CNVD-2019-01348.yaml
* Merge artifact
* Spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-02-15 11:39:56 +05:30
Sandeep Singh
99c131b1a6
Added Cobbler provisioning server Templates ( #3698 )
...
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
Co-authored-by: csh <25989137+c-sh0@users.noreply.github.com>
2022-02-14 22:50:32 +05:30
sullo
4cf3791eb3
Merge pull request #3686 from MostInterestingBotInTheWorld/dashboard
...
Dashboard Updates: Multiple content enhancements
2022-02-08 17:07:01 -05:00
sullo
a459b22355
Duplicate comment
2022-02-08 17:03:36 -05:00
Prince Chaddha
c19dcd5c2a
Merge pull request #3683 from cckuailong/master
...
add some wp plugins cves
2022-02-09 01:39:00 +05:30
Prince Chaddha
ba7c71e081
Update CVE-2021-24488.yaml
2022-02-09 00:57:33 +05:30
Prince Chaddha
ce903c73f2
Update CVE-2021-24947.yaml
2022-02-09 00:55:00 +05:30
Prince Chaddha
b64401ab02
Update CVE-2021-25052.yaml
2022-02-09 00:53:44 +05:30
Prince Chaddha
4fe9243d9d
Update CVE-2021-25008.yaml
2022-02-09 00:49:53 +05:30
Prince Chaddha
4fea6b14f4
Update CVE-2021-24991.yaml
2022-02-09 00:42:32 +05:30
Prince Chaddha
81a4316d2e
Update CVE-2021-24947.yaml
2022-02-09 00:38:33 +05:30
Prince Chaddha
2d3240a98f
Update CVE-2021-24926.yaml
2022-02-09 00:36:16 +05:30
Prince Chaddha
a167a69be6
Update CVE-2021-24488.yaml
2022-02-09 00:32:39 +05:30
Prince Chaddha
1dc5ff098a
Update CVE-2021-24300.yaml
2022-02-09 00:19:44 +05:30
Prince Chaddha
a657179cf2
Merge pull request #3667 from projectdiscovery/wp-templates
...
Moving authenticated wp templates from issues
2022-02-09 00:07:52 +05:30
Prince Chaddha
ce2d45b355
Update CVE-2021-24510.yaml
2022-02-08 23:59:45 +05:30
Prince Chaddha
49c2f2816a
Update CVE-2021-34640.yaml
2022-02-08 23:59:30 +05:30
Prince Chaddha
495ca9dc6c
Update CVE-2021-20792.yaml
2022-02-08 23:56:17 +05:30
Prince Chaddha
5519bd7d67
Update CVE-2021-34643.yaml
2022-02-08 23:50:44 +05:30
Prince Chaddha
eb324d24f4
Update CVE-2021-39322.yaml
2022-02-08 23:46:35 +05:30
MostInterestingBotInTheWorld
9f550a29ef
Enhancement: cves/2021/CVE-2021-37538.yaml by mp
2022-02-08 11:46:14 -05:00
MostInterestingBotInTheWorld
35bcf2e361
Enhancement: cves/2021/CVE-2021-42237.yaml by mp
2022-02-08 11:40:30 -05:00
cckuailong
f29d2b20df
add some wp plugins cves
2022-02-08 09:07:19 +08:00
sullo
929f8e0f64
Merge pull request #3665 from MostInterestingBotInTheWorld/dashboard
...
Enhancements: Various text cleanups
2022-02-07 09:00:27 -05:00
Prince Chaddha
71abfd0939
Update CVE-2021-24510.yaml
2022-02-05 01:05:57 +05:30
Prince Chaddha
1be67200cb
Create CVE-2021-39322.yaml
2022-02-05 00:51:50 +05:30
Prince Chaddha
96b7380c80
Create CVE-2021-34643.yaml
2022-02-05 00:50:43 +05:30
Prince Chaddha
9a702c2c16
Create CVE-2021-34640.yaml
2022-02-05 00:49:25 +05:30
Prince Chaddha
d4b4e69752
Create CVE-2021-24510.yaml
2022-02-05 00:48:10 +05:30
Prince Chaddha
dbfa7efae0
Create CVE-2021-20792.yaml
2022-02-05 00:46:00 +05:30
sullo
8461d21658
Remove trailing spaces
2022-02-04 14:09:21 -05:00
Prince Chaddha
685495df91
Update CVE-2021-20158.yaml
2022-02-04 23:31:10 +05:30
GwanYeong Kim
fcc39f52ee
Create CVE-2021-20158.yaml
...
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicous actor to force the change of the admin password due to a hidden administrative command.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-02-05 01:29:16 +09:00
MostInterestingBotInTheWorld
811dc2d70e
Enhancement: cves/2021/CVE-2021-26855.yaml by mp
2022-02-04 11:13:25 -05:00
MostInterestingBotInTheWorld
163ae2f24e
Merge branch 'projectdiscovery:master' into dashboard
2022-02-04 09:19:12 -05:00
Prince Chaddha
480dea094b
Update CVE-2021-20150.yaml
2022-02-04 01:20:39 +05:30
Prince Chaddha
f846faa127
Update CVE-2021-20150.yaml
2022-02-04 01:13:30 +05:30
Prince Chaddha
d2e4be88e6
Update CVE-2021-20150.yaml
2022-02-04 01:13:00 +05:30
GwanYeong Kim
bc87c82d9b
Create CVE-2021-20150.yaml
...
Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. Authentication can be bypassed and a user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-02-03 18:06:04 +09:00
Prince Chaddha
99931f2e0b
Merge pull request #3651 from dwisiswant0/add/CVE-2021-32853
...
Add CVE-2021-32853
2022-02-03 02:16:08 +05:30
Prince Chaddha
b023c8206e
Update CVE-2021-32853.yaml
2022-02-03 02:14:21 +05:30
Prince Chaddha
9f63a2f4fb
Update CVE-2021-32853.yaml
2022-02-03 02:06:26 +05:30
Prince Chaddha
110704dd3e
Update CVE-2021-32853.yaml
2022-02-03 02:01:24 +05:30
Prince Chaddha
6c39177ddc
Delete CVE-2021-32818.yaml
2022-02-03 01:11:45 +05:30
MostInterestingBotInTheWorld
0d1f876866
Enhancement: cves/2021/CVE-2021-37538.yaml by mp
2022-02-02 12:15:24 -05:00
Sandeep Singh
633205a001
Update CVE-2021-32853.yaml
2022-02-02 13:56:12 +05:30
Dwi Siswanto
940db2f928
Add CVE-2021-32853
2022-02-02 13:27:36 +07:00
Prince Chaddha
cf9821e3b1
Update CVE-2021-26247.yaml
2022-02-02 00:48:29 +05:30
GitHub Action
8868b0f56b
Auto Generated CVE annotations [Tue Feb 1 06:10:46 UTC 2022] 🤖
2022-02-01 06:10:46 +00:00
Dhiyaneshwaran
a5bd8630c8
Create CVE-2021-32818.yaml
2022-02-01 11:39:12 +05:30
GitHub Action
a18a19ff3c
Auto Generated CVE annotations [Tue Feb 1 06:06:15 UTC 2022] 🤖
2022-02-01 06:06:15 +00:00
Dhiyaneshwaran
bcc7113677
Create CVE-2021-26247.yaml
2022-02-01 11:34:51 +05:30
Prince Chaddha
8efaa0754e
Merge pull request #3633 from cckuailong/master
...
add CVE-2021-46005 (Sourcecodester Car Rental Management System 1.0 - Stored XSS)
2022-01-31 23:38:53 +05:30
Prince Chaddha
cd221355ee
Update CVE-2021-46005.yaml
2022-01-31 23:34:34 +05:30
Prince Chaddha
fb48b67f39
Update CVE-2021-46005.yaml
2022-01-31 23:29:36 +05:30
Roberto Nunes
9c4df9e91a
Create CVE-2021-25864.yaml ( #3631 )
...
* Create CVE-2021-25864.yaml
* moving template to cves folder
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-31 14:36:37 +05:30
Sandeep Singh
cfb6fff36d
removing trailing spaces
2022-01-29 19:24:58 +05:30
cckuailong
80b60ef829
add CVE-2021-46005
2022-01-29 21:22:44 +08:00
GitHub Action
7ce2191287
Auto Generated CVE annotations [Fri Jan 28 09:01:49 UTC 2022] 🤖
2022-01-28 09:01:49 +00:00
Prince Chaddha
850ae90f55
Update CVE-2021-45380.yaml
2022-01-28 10:59:21 +05:30
PikPikcU
4beabd88f9
Create CVE-2021-45380.yaml
2022-01-27 13:40:43 -05:00
GitHub Action
4bd8b86a3e
Auto Generated CVE annotations [Thu Jan 27 10:22:20 UTC 2022] 🤖
2022-01-27 10:22:20 +00:00
Sandeep Singh
53da8a8206
Added CVE-2021-21973 ( #3615 )
...
* Added CVE-2021-21973
* minor update
2022-01-27 15:50:44 +05:30
GitHub Action
3a1d847b57
Auto Generated CVE annotations [Wed Jan 26 17:59:10 UTC 2022] 🤖
2022-01-26 17:59:10 +00:00
Smaran Chand
0babc27b75
Added elFinder filemanger exposed ( #3602 )
...
* Added elFinder filemanger exposed
* Template name / id update + more reference
* template name update
* matcher update
* Modified the matcher.
* minor updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-26 23:27:45 +05:30
Sullo
9a8482172d
Remove:
...
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
- spaces after : in some files
2022-01-25 14:38:53 -05:00
GitHub Action
173f0ef2d3
Auto Generated CVE annotations [Tue Jan 25 16:51:00 UTC 2022] 🤖
2022-01-25 16:51:00 +00:00
Sandeep Singh
4401b9ebe9
Merge pull request #3599 from projectdiscovery/CVE-2021-24838
...
Added CVE-2021-24838
2022-01-25 22:19:30 +05:30
Sandeep Singh
494a80799c
Merge pull request #3600 from MostInterestingBotInTheWorld/dashboard
...
Enhancement: cves/2021/CVE-2021-29156.yaml by cs
2022-01-25 22:09:27 +05:30
sandeep
8c7ec49185
lint fix
2022-01-25 22:08:01 +05:30
sandeep
47e34dba46
Added CVE-2021-24838
2022-01-25 17:14:00 +05:30
Prince Chaddha
6a2ff6f09e
Update CVE-2021-39350.yaml
2022-01-25 17:08:01 +05:30
GwanYeong Kim
67b2955d98
Create CVE-2021-39350.yaml
...
The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-25 17:31:13 +09:00
Prince Chaddha
25e3537212
Update CVE-2021-43810.yaml
2022-01-25 12:34:20 +05:30
GwanYeong Kim
c368e33117
Create CVE-2021-43810.yaml
...
Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-25 13:55:34 +09:00
MostInterestingBotInTheWorld
44d23ef3eb
Enhancement: cves/2021/CVE-2021-29156.yaml by cs
2022-01-24 13:45:03 -05:00
GitHub Action
f882764c9b
Auto Generated CVE annotations [Mon Jan 24 07:12:56 UTC 2022] 🤖
2022-01-24 07:12:56 +00:00
Prince Chaddha
fa30e05f61
Merge pull request #3586 from V35HR4J/master
...
Create CVE-2021-39433.yaml
2022-01-24 12:40:15 +05:30
Prince Chaddha
03697ed21a
Update CVE-2021-39433.yaml
2022-01-24 12:28:03 +05:30
Veshraj Ghimire
df907cc2e3
Create CVE-2021-39433.yaml
2022-01-23 21:00:30 +05:45
Prince Chaddha
1d15a5464a
Update CVE-2021-24750.yaml
2022-01-23 14:51:25 +05:30
Prince Chaddha
3c9e02150d
Update CVE-2021-24750.yaml
2022-01-23 14:39:38 +05:30
Prince Chaddha
75184ca383
Update CVE-2021-24750.yaml
2022-01-23 14:38:12 +05:30
cckuailong
dad34d012c
add CVE-2021-24750
2022-01-23 13:17:20 +08:00
sandeep
2a8d8e1095
more updates
2022-01-22 23:27:52 +05:30
sandeep
6b14c6c6fc
CVE-2021-40438 update
2022-01-22 23:18:07 +05:30
Sandeep Singh
1b0c7f1b7f
CVE-2021-22205 update ( #3568 )
...
*moved cves/2021/CVE-2021-22205.yaml to vulnerabilities/gitlab/gitlab-rce.yaml
*template extension update + added missing severity + misc updates
2022-01-20 14:25:57 +05:30
Greg Johnson
e0a2d35a8d
add passive fingerprinting template for CVE-2021-22205 ( #3565 )
...
Co-authored-by: Greg Johnson (codeEmitter) <gjohnson@gitlab.com>
2022-01-20 14:12:37 +05:30
pussycat0x
650a38ffde
Qualcomm 4G LTE WiFi VoIP-Router ( #3555 )
...
* Add files via upload
* Auto Generated CVE annotations [Mon Jan 17 16:05:35 UTC 2022] 🤖
* Update CVE-2021-44528.yaml
* Update CVE-2021-45232.yaml
* Add files via upload
* removing duplicate template
* moving template around
* template fix
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-19 13:33:34 +05:30
sandeep
e51d401214
template fix
2022-01-19 13:32:16 +05:30
sandeep
fd023b42a8
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into pr/3550
2022-01-19 13:25:06 +05:30
Roberto Nunes
2cadf76241
Create CVE-2021-32618.yaml ( #3546 )
...
* Create CVE-2021-32618.yaml
* Update and rename CVE-2021-32618.yaml to cves/2021/CVE-2021-32618.yaml
* matcher update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 12:51:00 +05:30
GitHub Action
2c250d66c7
Auto Generated CVE annotations [Tue Jan 18 05:22:01 UTC 2022] 🤖
2022-01-18 05:22:01 +00:00
Dwi Siswanto
b8dabfbcbb
Add CVE-2021-20038 ( #3542 )
...
* Add CVE-2021-20038
* misc: Update author
2022-01-18 10:50:14 +05:30
Prince Chaddha
bc5fba6fbf
Update CVE-2021-45232.yaml
2022-01-17 22:20:44 +05:30
Prince Chaddha
f988ad8ff4
Update CVE-2021-44528.yaml
2022-01-17 22:19:22 +05:30
GitHub Action
4f81203546
Auto Generated CVE annotations [Mon Jan 17 16:05:35 UTC 2022] 🤖
2022-01-17 16:05:35 +00:00
Patrick
1086ca1a30
added template for CVE-2021-42551 ( #3541 )
...
* added template for CVE-2021-42551
* Update CVE-2021-42551.yaml
* Update CVE-2021-42551.yaml
* unbricked CVE-2021-42551
* additional page specific matcher
Co-authored-by: Patrick <patrick.schmid@redguard.ch>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-16 19:01:29 +05:30
gy741
e5958c1364
Update tags ( #3538 )
2022-01-16 02:08:21 +05:30
GitHub Action
d5e2eb7d41
Auto Generated CVE annotations [Sat Jan 15 19:05:39 UTC 2022] 🤖
2022-01-15 19:05:39 +00:00
GitHub Action
bc3fa19859
Auto Generated CVE annotations [Thu Jan 13 05:21:21 UTC 2022] 🤖
2022-01-13 05:21:21 +00:00
Muhammad Daffa
64cf0fa4ba
Rename maian cart rce ( #3532 )
...
* Update and rename vulnerabilities/other/maian-cart-preauth-rce.yaml to cves/2021/CVE-2021-32172.yaml
* Update CVE-2021-32172.yaml
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-01-13 10:48:51 +05:30
sandeep
5c471a6168
removing duplicate template
2022-01-12 17:28:47 +05:30
Prince Chaddha
a53ae7b694
Merge pull request #3518 from gy741/rule-add-v85
...
Create CVE-2021-20167.yaml
2022-01-11 14:54:05 +05:30
GitHub Action
c40624e7d9
Auto Generated CVE annotations [Tue Jan 11 08:57:41 UTC 2022] 🤖
2022-01-11 08:57:41 +00:00
Prince Chaddha
70677b3b5a
Update CVE-2021–20837.yaml
2022-01-11 14:12:04 +05:30
Prince Chaddha
9afd4bcfd8
Update CVE-2021-20167.yaml
2022-01-11 13:57:07 +05:30
GwanYeong Kim
d772fd884b
Create CVE-2021-20167.yaml
...
This vulnerability uses a combination of CVE-2021-20166 and CVE-2021-20167. Netgear RAX43 version 1.0.3.96 contains a command injection and authbypass vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter. and The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:00:56 +09:00
PikPikcU
83e431802e
Create CVE-2021–20837.yaml
2022-01-10 21:44:31 -05:00
Roberto Nunes
484d77de7c
Create CVE-2021-39501.yaml ( #3501 )
...
* Create CVE-2021-39501.yaml
* moving template to cves directory
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 17:00:19 +05:30
GitHub Action
451313a0af
Auto Generated CVE annotations [Sat Jan 8 10:57:43 UTC 2022] 🤖
2022-01-08 10:57:43 +00:00
JAS-37
0c7d13d152
add CVE-2021-31862 template ( #3491 )
...
* add CVE-2021-31862 template
* updated matchers
* Added SysAid panel + workflow
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-07 13:28:38 +05:30
Aaron Chen
d0f71c6d1b
Update CVE-2021-31589.yaml ( #3489 )
2022-01-06 12:05:23 +05:30
Ahmed Aboul-Ela
f279bd78d1
Add CVE-2021-31589 ( #3486 )
...
* Add CVE-2021-31589
Committer: Ahmed Aboul-Ela <ahmed.aboul3la@gmail.com>
* lint fixes
* updated matchers
* Added metadata
* Added Bomgar Login Panel detection
* Added Bomgar workflow
* Added favicon detection
Co-authored-by: Ahmed Aboul-Ela <ahmed@secgeek.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 18:39:53 +05:30
Prince Chaddha
a9ef4d2612
Merge pull request #3480 from gy741/rule-add-v81
...
Create CVE-2021-21881.yaml
2022-01-05 13:01:57 +05:30
Prince Chaddha
fefd3343eb
Update CVE-2021-21881.yaml
2022-01-05 13:00:40 +05:30
Prince Chaddha
616bea3a88
Update CVE-2021-21881.yaml
2022-01-05 12:59:27 +05:30
Pathtaga
e281e5bf88
Updated all templates tags with technologies ( #3478 )
...
* Updated tags for template sonicwall-email-security-detect.yaml
* Updated tags for template detect-sentry.yaml
* Updated tags for template kong-detect.yaml
* Updated tags for template openam-detect.yaml
* Updated tags for template shiro-detect.yaml
* Updated tags for template iplanet-web-server.yaml
* Updated tags for template graylog-api-browser.yaml
* Updated tags for template prtg-detect.yaml
* Updated tags for template node-red-detect.yaml
* Updated tags for template abyss-web-server.yaml
* Updated tags for template geo-webserver.yaml
* Updated tags for template autobahn-python-detect.yaml
* Updated tags for template default-lighttpd-page.yaml
* Updated tags for template microsoft-iis-8.yaml
* Updated tags for template lucee-detect.yaml
* Updated tags for template php-proxy-detect.yaml
* Updated tags for template jenkins-detect.yaml
* Updated tags for template cockpit-detect.yaml
* Updated tags for template csrfguard-detect.yaml
* Updated tags for template dwr-index-detect.yaml
* Updated tags for template netsweeper-webadmin-detect.yaml
* Updated tags for template weblogic-detect.yaml
* Updated tags for template s3-detect.yaml
* Updated tags for template tileserver-gl.yaml
* Updated tags for template springboot-actuator.yaml
* Updated tags for template terraform-detect.yaml
* Updated tags for template redmine-cli-detect.yaml
* Updated tags for template mrtg-detect.yaml
* Updated tags for template tableau-server-detect.yaml
* Updated tags for template magmi-detect.yaml
* Updated tags for template oidc-detect.yaml
* Updated tags for template tor-socks-proxy.yaml
* Updated tags for template synology-web-station.yaml
* Updated tags for template herokuapp-detect.yaml
* Updated tags for template gunicorn-detect.yaml
* Updated tags for template sql-server-reporting.yaml
* Updated tags for template google-bucket-service.yaml
* Updated tags for template kubernetes-mirantis.yaml
* Updated tags for template kubernetes-enterprise-manager.yaml
* Updated tags for template oracle-iplanet-web-server.yaml
* Updated tags for template dell-idrac7-detect.yaml
* Updated tags for template dell-idrac6-detect.yaml
* Updated tags for template dell-idrac9-detect.yaml
* Updated tags for template dell-idrac8-detect.yaml
* Updated tags for template apache-guacamole.yaml
* Updated tags for template aws-cloudfront-service.yaml
* Updated tags for template aws-bucket-service.yaml
* Updated tags for template nginx-linux-page.yaml
* Updated tags for template telerik-fileupload-detect.yaml
* Updated tags for template telerik-dialoghandler-detect.yaml
* Updated tags for template htaccess-config.yaml
* Updated tags for template microsoft-azure-error.yaml
* Updated tags for template detect-options-method.yaml
* Updated tags for template unpatched-coldfusion.yaml
* Updated tags for template moodle-changelog.yaml
* Updated tags for template detect-dns-over-https.yaml
* Updated tags for template CVE-2019-19134.yaml
* Updated tags for template CVE-2019-3929.yaml
* Updated tags for template CVE-2019-19908.yaml
* Updated tags for template CVE-2019-10475.yaml
* Updated tags for template CVE-2019-17382.yaml
* Updated tags for template CVE-2019-16332.yaml
* Updated tags for template CVE-2019-14974.yaml
* Updated tags for template CVE-2019-19368.yaml
* Updated tags for template CVE-2019-12725.yaml
* Updated tags for template CVE-2019-15501.yaml
* Updated tags for template CVE-2019-9733.yaml
* Updated tags for template CVE-2019-14322.yaml
* Updated tags for template CVE-2019-9955.yaml
* Updated tags for template CVE-2019-0230.yaml
* Updated tags for template CVE-2019-10232.yaml
* Updated tags for template CVE-2019-17506.yaml
* Updated tags for template CVE-2019-8449.yaml
* Updated tags for template CVE-2019-12593.yaml
* Updated tags for template CVE-2019-10092.yaml
* Updated tags for template CVE-2019-1821.yaml
* Updated tags for template CVE-2019-3401.yaml
* Updated tags for template CVE-2019-16662.yaml
* Updated tags for template CVE-2019-5418.yaml
* Updated tags for template CVE-2016-4975.yaml
* Updated tags for template CVE-2016-1000137.yaml
* Updated tags for template CVE-2016-7552.yaml
* Updated tags for template CVE-2016-10956.yaml
* Updated tags for template CVE-2016-1000146.yaml
* Updated tags for template CVE-2013-2251.yaml
* Updated tags for template CVE-2013-1965.yaml
* Updated tags for template CVE-2014-2323.yaml
* Updated tags for template CVE-2014-5111.yaml
* Updated tags for template CVE-2014-2962.yaml
* Updated tags for template CVE-2014-4561.yaml
* Updated tags for template CVE-2014-4558.yaml
* Updated tags for template CVE-2014-3120.yaml
* Updated tags for template CVE-2007-5728.yaml
* Updated tags for template CVE-2009-4679.yaml
* Updated tags for template CVE-2009-1558.yaml
* Updated tags for template CVE-2009-4202.yaml
* Updated tags for template CVE-2009-0932.yaml
* Updated tags for template CVE-2015-2068.yaml
* Updated tags for template CVE-2015-8813.yaml
* Updated tags for template CVE-2015-7450.yaml
* Updated tags for template CVE-2015-2067.yaml
* Updated tags for template CVE-2015-3306.yaml
* Updated tags for template CVE-2015-3337.yaml
* Updated tags for template CVE-2015-1427.yaml
* Updated tags for template CVE-2015-1503.yaml
* Updated tags for template CVE-2015-1880.yaml
* Updated tags for template CVE-2018-3810.yaml
* Updated tags for template CVE-2018-18069.yaml
* Updated tags for template CVE-2018-17246.yaml
* Updated tags for template CVE-2018-10141.yaml
* Updated tags for template CVE-2018-16341.yaml
* Updated tags for template CVE-2018-18777.yaml
* Updated tags for template CVE-2018-15138.yaml
* Updated tags for template CVE-2018-11784.yaml
* Updated tags for template CVE-2018-16299.yaml
* Updated tags for template CVE-2018-7251.yaml
* Updated tags for template CVE-2018-1273.yaml
* Updated tags for template CVE-2018-1271.yaml
* Updated tags for template CVE-2018-11759.yaml
* Updated tags for template CVE-2018-3167.yaml
* Updated tags for template CVE-2018-7490.yaml
* Updated tags for template CVE-2018-2628.yaml
* Updated tags for template CVE-2018-13380.yaml
* Updated tags for template CVE-2018-2893.yaml
* Updated tags for template CVE-2018-5316.yaml
* Updated tags for template CVE-2018-20985.yaml
* Updated tags for template CVE-2018-10818.yaml
* Updated tags for template CVE-2018-1000861.yaml
* Updated tags for template CVE-2018-0296.yaml
* Updated tags for template CVE-2018-19458.yaml
* Updated tags for template CVE-2018-3760.yaml
* Updated tags for template CVE-2018-12998.yaml
* Updated tags for template CVE-2018-9118.yaml
* Updated tags for template CVE-2018-1000130.yaml
* Updated tags for template CVE-2008-6668.yaml
* Updated tags for template CVE-2017-7269.yaml
* Updated tags for template CVE-2017-1000170.yaml
* Updated tags for template CVE-2017-16877.yaml
* Updated tags for template CVE-2017-1000486.yaml
* Updated tags for template CVE-2017-9822.yaml
* Updated tags for template CVE-2017-0929.yaml
* Updated tags for template CVE-2017-7921.yaml
* Updated tags for template CVE-2017-14535.yaml
* Updated tags for template CVE-2017-5521.yaml
* Updated tags for template CVE-2017-12637.yaml
* Updated tags for template CVE-2017-12635.yaml
* Updated tags for template CVE-2017-11610.yaml
* Updated tags for template CVE-2021-20114.yaml
* Updated tags for template CVE-2021-40856.yaml
* Updated tags for template CVE-2021-21972.yaml
* Updated tags for template CVE-2021-31602.yaml
* Updated tags for template CVE-2021-41773.yaml
* Updated tags for template CVE-2021-37704.yaml
* Updated tags for template CVE-2021-45046.yaml
* Updated tags for template CVE-2021-26084.yaml
* Updated tags for template CVE-2021-27931.yaml
* Updated tags for template CVE-2021-24291.yaml
* Updated tags for template CVE-2021-41648.yaml
* Updated tags for template CVE-2021-37216.yaml
* Updated tags for template CVE-2021-22005.yaml
* Updated tags for template CVE-2021-37573.yaml
* Updated tags for template CVE-2021-31755.yaml
* Updated tags for template CVE-2021-43287.yaml
* Updated tags for template CVE-2021-24274.yaml
* Updated tags for template CVE-2021-33564.yaml
* Updated tags for template CVE-2021-22145.yaml
* Updated tags for template CVE-2021-24237.yaml
* Updated tags for template CVE-2021-44848.yaml
* Updated tags for template CVE-2021-25646.yaml
* Updated tags for template CVE-2021-21816.yaml
* Updated tags for template CVE-2021-41649.yaml
* Updated tags for template CVE-2021-41291.yaml
* Updated tags for template CVE-2021-41293.yaml
* Updated tags for template CVE-2021-21801.yaml
* Updated tags for template CVE-2021-29156.yaml
* Updated tags for template CVE-2021-34370.yaml
* Updated tags for template CVE-2021-27132.yaml
* Updated tags for template CVE-2021-28151.yaml
* Updated tags for template CVE-2021-26812.yaml
* Updated tags for template CVE-2021-21985.yaml
* Updated tags for template CVE-2021-43778.yaml
* Updated tags for template CVE-2021-25281.yaml
* Updated tags for template CVE-2021-40539.yaml
* Updated tags for template CVE-2021-36749.yaml
* Updated tags for template CVE-2021-21234.yaml
* Updated tags for template CVE-2021-33221.yaml
* Updated tags for template CVE-2021-42013.yaml
* Updated tags for template CVE-2021-33807.yaml
* Updated tags for template CVE-2021-44228.yaml
* Updated tags for template CVE-2012-0896.yaml
* Updated tags for template CVE-2012-0991.yaml
* Updated tags for template CVE-2012-0392.yaml
* Updated tags for template CVE-2012-4940.yaml
* Updated tags for template CVE-2012-1226.yaml
* Updated tags for template CVE-2012-4878.yaml
* Updated tags for template CVE-2010-1304.yaml
* Updated tags for template CVE-2010-1217.yaml
* Updated tags for template CVE-2010-0759.yaml
* Updated tags for template CVE-2010-2307.yaml
* Updated tags for template CVE-2010-4231.yaml
* Updated tags for template CVE-2010-2861.yaml
* Updated tags for template CVE-2010-4282.yaml
* Updated tags for template CVE-2010-1302.yaml
* Updated tags for template CVE-2010-1461.yaml
* Updated tags for template CVE-2020-4463.yaml
* Updated tags for template CVE-2020-1943.yaml
* Updated tags for template CVE-2020-36289.yaml
* Updated tags for template CVE-2020-17518.yaml
* Updated tags for template CVE-2020-12800.yaml
* Updated tags for template CVE-2020-10770.yaml
* Updated tags for template CVE-2020-17506.yaml
* Updated tags for template CVE-2020-11547.yaml
* Updated tags for template CVE-2020-11034.yaml
* Updated tags for template CVE-2020-24589.yaml
* Updated tags for template CVE-2020-9054.yaml
* Updated tags for template CVE-2020-28976.yaml
* Updated tags for template CVE-2020-16952.yaml
* Updated tags for template CVE-2020-24312.yaml
* Updated tags for template CVE-2020-8512.yaml
* Updated tags for template CVE-2020-14179.yaml
* Updated tags for template CVE-2020-6308.yaml
* Updated tags for template CVE-2020-35846.yaml
* Updated tags for template CVE-2020-7318.yaml
* Updated tags for template CVE-2020-2140.yaml
* Updated tags for template CVE-2020-5410.yaml
* Updated tags for template CVE-2020-5777.yaml
* Updated tags for template CVE-2020-13700.yaml
* Updated tags for template CVE-2020-5775.yaml
* Updated tags for template CVE-2020-13167.yaml
* Updated tags for template CVE-2020-35848.yaml
* Updated tags for template CVE-2020-9484.yaml
* Updated tags for template CVE-2020-15505.yaml
* Updated tags for template CVE-2020-9047.yaml
* Updated tags for template CVE-2020-17519.yaml
* Updated tags for template CVE-2020-17505.yaml
* Updated tags for template CVE-2020-9376.yaml
* Updated tags for template CVE-2020-8497.yaml
* Updated tags for template CVE-2020-14092.yaml
* Updated tags for template CVE-2020-10148.yaml
* Updated tags for template CVE-2020-35847.yaml
* Updated tags for template CVE-2020-12116.yaml
* Updated tags for template CVE-2020-11930.yaml
* Updated tags for template CVE-2020-24186.yaml
* Updated tags for template CVE-2020-9496.yaml
* Updated tags for template CVE-2020-35489.yaml
* Updated tags for template CVE-2020-26413.yaml
* Updated tags for template CVE-2020-2096.yaml
* misc updates
* misc update
* more updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 01:04:16 +05:30
GwanYeong Kim
d572716df0
Create CVE-2021-21881.yaml
...
An OS command injection vulnerability exists in the Web Manager Wireless Network Scanner functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-04 23:14:12 +09:00
GitHub Action
86c11d1b40
Auto Generated CVE annotations [Tue Jan 4 11:55:25 UTC 2022] 🤖
2022-01-04 11:55:25 +00:00
pajoda
c45934891f
Create CVE-2021-36748.yaml ( #2446 )
...
* Create CVE-2021-36748.yaml
* Update indentation
* minor update
* Update CVE-2021-36748.yaml
* Additional unique matchers + easily readable syntax
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-04 17:23:56 +05:30
sandeep
6f3591f920
rseenet tags update
2022-01-01 12:28:32 +05:30
sandeep
7eba1c5a0a
added reference for rce
2021-12-31 17:53:27 +05:30
GitHub Action
e238128b1c
Auto Generated CVE annotations [Thu Dec 30 11:40:55 UTC 2021] 🤖
2021-12-30 11:40:55 +00:00
Sandeep Singh
de7bef1300
Added CVE-2021-42567 (Apereo CAS Reflected XSS) ( #3450 )
...
* Added CVE-2021-42567 (Apereo CAS Reflected XSS)
* Added login panel detection
2021-12-30 17:09:29 +05:30
Prince Chaddha
a94c5d62a1
Update CVE-2021-40859.yaml
2021-12-30 12:15:22 +05:30
Prince Chaddha
f3deec4325
Update CVE-2021-40859.yaml
2021-12-30 12:15:02 +05:30
Sandeep Singh
a10aff06e5
Merge branch 'master' into master
2021-12-29 21:28:30 +05:30
sandeep
8744282d5b
removing matcher to avoid false negative result.
2021-12-29 12:10:51 +05:30
东方有鱼名为咸
7a05f1b538
add CVE-2021-45232.yaml ( #3437 )
...
* Create CVE-2021-45232.yaml
* matcher fixes
* more reference
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-28 19:43:00 +05:30
GitHub Action
c33766a93f
Auto Generated CVE annotations [Fri Dec 24 13:38:52 UTC 2021] 🤖
2021-12-24 13:38:52 +00:00
Prince Chaddha
415f37a7a6
Update CVE-2021-27358.yaml
2021-12-24 19:02:18 +05:30
sandeep
f892a053a2
Added Grafana unauthenticated snapshot creation
2021-12-24 17:47:55 +05:30
sandeep
54e064767d
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates
2021-12-23 21:46:10 +05:30
sandeep
99f5a47202
minor update
2021-12-23 21:40:28 +05:30
GitHub Action
132108f849
Auto Generated CVE annotations [Thu Dec 23 15:43:46 UTC 2021] 🤖
2021-12-23 15:43:46 +00:00
ImNightmaree
a76a9baaf4
Create CVE-2021-45046 ( #3378 )
...
* Create CVE-2021-45046
* Update and rename CVE-2021-45046 to CVE-2021-45046.yaml
* minor update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-23 21:11:50 +05:30
Mohamed Elbadry
d2d47bfcb0
Update CVE-2021-44228.yaml - Extract DNS interaction IP ( #3396 )
...
* Update CVE-2021-44228.yaml
* lint fix
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-22 18:17:30 +05:30
GitHub Action
d253ff84ef
Auto Generated CVE annotations [Wed Dec 22 06:47:35 UTC 2021] 🤖
2021-12-22 06:47:35 +00:00
pussycat0x
8a77db7919
unauthorized Puppet Node Manager ( #3388 )
...
* Add files via upload
* Update unauthorized-puppet-node-manager-detect.yaml
* Add files via upload
* Add files via upload
* Update CVE-2021-40859.yaml
* misc updates
* minor updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-22 12:16:05 +05:30
sandeep
df2418ce18
misc updates
2021-12-22 12:10:38 +05:30
pussycat0x
08d097a751
Update CVE-2021-40859.yaml
2021-12-22 09:33:06 +05:30
pussycat0x
4b6a46f06f
Add files via upload
2021-12-22 09:30:36 +05:30
GitHub Action
10ba4de0d7
Auto Generated CVE annotations [Tue Dec 21 12:32:40 UTC 2021] 🤖
2021-12-21 12:32:40 +00:00
Prince Chaddha
b622f5145d
Merge pull request #3383 from projectdiscovery/princechaddha-patch-2
...
Create CVE-2021-26085.yaml
2021-12-21 18:00:47 +05:30
GitHub Action
19bfb84638
Auto Generated CVE annotations [Tue Dec 21 11:06:14 UTC 2021] 🤖
2021-12-21 11:06:14 +00:00
GitHub Action
7fe5c23627
Auto Generated CVE annotations [Mon Dec 20 14:33:22 UTC 2021] 🤖
2021-12-20 14:33:22 +00:00
Prince Chaddha
b8ee43e27a
Create CVE-2021-26085.yaml
2021-12-20 15:20:14 +05:30
Prince Chaddha
ca6146a4af
Update CVE-2021-44228.yaml
2021-12-19 14:52:29 +05:30
Prince Chaddha
fc566d27a8
Create CVE-2021-45092.yaml ( #3372 )
...
* Create CVE-2021-45092.yaml
* Added Thinfinity Iframe Injection
Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
* Added Thinfinity VirtualUI User Enumeration
Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
* added missing tag
Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
2021-12-18 14:32:44 +05:30
Abhiram V
dd40419ea5
Updated CVE-2021-44228 with most common vulnerable headers ( #3334 )
...
* Updated with common headers which can be exploited
Reference : https://blog.qualys.com/vulnerabilities-threat-research/2021/12/10/apache-log4j2-zero-day-exploited-in-the-wild-log4shell
These headers are collected from above blog in Detecting the Vulnerability part
* fix: lint update
* Update CVE-2021-44228.yaml
* Update CVE-2021-44228.yaml
* Updated changed matchers and extractors regex according to v8.7.3 update
* payload updates for CVE-2021-44228
- more injection points
- a fixed regex to extract uppercase hostnames
- standardized payloads
- printed injection points
Source - https://twitter.com/0xceba/status/1471664540542648322
Co-Authored-By: 0xceba <44234156+0xceba@users.noreply.github.com>
Co-Authored-By: Abhiram V <61599526+Anon-Artist@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: 0xceba <44234156+0xceba@users.noreply.github.com>
2021-12-18 10:51:45 +05:30
sandeep
b8fa0d5857
update: added more reference
2021-12-15 21:26:35 +05:30
Geeknik Labs
9c169bd682
Create CVE-2021-44528.yaml ( #3342 )
2021-12-15 20:43:07 +05:30
sandeep
c9ddd7a0ae
update: id + reference update
2021-12-14 21:07:46 +05:30
sandeep
34d4557dad
update: making it compatible with self-hosted interactsh server
2021-12-14 03:21:47 +05:30
Evan Rubinstein
dddb0bbb82
Added CVE-2021-24997 ( #3298 )
...
* Added CVE-39226
* Added CVE-39226
* Delete CVE-39226.yaml
* Renamed CVE-39226 to CVE-2021-39226
Fixed naming error
* Added Wp-Guppy-Information-Disclosure template
* Removed File
Found better descriptor
* Added CVE-2021-24997
Added WordPress Guppy Information Disclosure CVE
* Fixed CVE-2021-24997
Fixed YAML formatting
* Fixed Typo
URL Path had an extra double quote
* Auto Generated Templates Stats [Wed Dec 8 23:07:24 UTC 2021] 🤖
* Deleted Blank Space
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Added CVE-2021-43496
* Update CVE-2021-43496.yaml
* fix: syntax update
* Added New Vuln
* Update CVE-2021-24997.yaml
* Update CVE-2021-43496.yaml
* Update and rename hd-netowrk-realtime-monitor-system-LFI.yaml to hdnetwork-realtime-lfi.yaml
* fix: lints update
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2021-12-14 02:22:26 +05:30
Nicolas
1411edf332
Updated CVE-2021-44228.yaml ( #3335 )
...
Co-authored-by: olacin <olacin@users.noreply.github.com>
2021-12-13 20:24:06 +05:30
5tr1x
5dc71681c5
Add X-Forwarded-For and Authentication headers
2021-12-11 15:43:22 -06:00
Mohamed Elbadry
33fbe53930
Create CVE-2021-44228.yaml ( #3319 )
...
* Create CVE-2021-44228.yaml
* fix: syntax fix
* update: added additional path based payload
* update: strict matcher + pulling hostname information of the system
* update: added path based payload
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-12 00:56:50 +05:30
GitHub Action
a19b941193
Auto Generated CVE annotations [Wed Dec 8 11:18:20 UTC 2021] 🤖
2021-12-08 11:18:20 +00:00
Sandeep Singh
2521cb62bf
Added CVE-2021-43798 ( #3296 )
...
* Added CVE-2021-43798
* updated with default plugin list
* Update grafana-file-read.yaml
2021-12-08 16:46:47 +05:30
Prince Chaddha
548980ae5b
Update CVE-2021-40856.yaml
2021-12-08 10:25:18 +05:30
GwanYeong Kim
48c6834de6
Create CVE-2021-40856.yaml
...
Inserting the prefix "/about/../" allows bypassing the authentication check for the web-based configuration management interface. This enables attackers to gain access to the login credentials used for authentication at the PBX, among other data.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-08 09:54:30 +09:00
sandeep
b8d068416f
update: added reference for CVE-2021-38314
2021-12-04 22:17:25 +05:30
sandeep
f64926808d
Added missing tag
2021-12-04 12:50:04 +05:30
GitHub Action
01cb3156ce
Auto Generated CVE annotations [Sat Dec 4 07:17:12 UTC 2021] 🤖
2021-12-04 07:17:12 +00:00
sandeep
d2d0d4bf8d
minor update to description
2021-12-04 12:44:08 +05:30
alph4byt3
09468dc0f8
Create CVE-2021-29490.yaml
2021-12-04 12:40:47 +05:30
alph4byt3
5180d138bf
Delete CVE-2021-29490
2021-12-04 12:40:47 +05:30
alph4byt3
41148c9f86
Create CVE-2021-29490
2021-12-04 12:40:47 +05:30
GitHub Action
ee1c16543d
Auto Generated CVE annotations [Fri Dec 3 09:17:18 UTC 2021] 🤖
2021-12-03 09:17:18 +00:00
Prince Chaddha
7a32fc3941
Update and rename CVE-2021-27310.yaml to cves/2021/CVE-2021-27310.yaml
2021-12-03 14:43:25 +05:30
Prince Chaddha
7bd27557d8
Merge pull request #3253 from projectdiscovery/pr-fix-1
...
Update CVE-2021-30213.yaml
2021-12-03 14:32:47 +05:30
Prince Chaddha
0ac3b4da59
Merge pull request #3252 from projectdiscovery/pr-fix
...
Update CVE-2021-27931.yaml
2021-12-03 14:32:06 +05:30
Prince Chaddha
10c0f1b22f
Update CVE-2021-30213.yaml
2021-12-03 14:31:08 +05:30
Prince Chaddha
04bb340596
Update CVE-2021-27931.yaml
2021-12-03 14:30:44 +05:30
Prince Chaddha
5a36367340
Merge branch 'master' into pr-fix-1
2021-12-03 13:49:27 +05:30
Prince Chaddha
3cade85cc8
Merge branch 'master' into pr-fix
2021-12-03 13:23:33 +05:30
GitHub Action
6731cb176b
Auto Generated CVE annotations [Fri Dec 3 07:23:34 UTC 2021] 🤖
2021-12-03 07:23:34 +00:00
Prince Chaddha
ccca1add3f
Update CVE-2021-30213.yaml
2021-12-03 12:53:01 +05:30
Prince Chaddha
e53cdde0c0
Merge pull request #3199 from alph4byt3/alph4byt3-patch-1
...
Create CVE-2021-30213.yaml
2021-12-03 12:52:11 +05:30
GitHub Action
5afe45cba5
Auto Generated CVE annotations [Fri Dec 3 07:19:34 UTC 2021] 🤖
2021-12-03 07:19:34 +00:00
Prince Chaddha
636a82effd
Update CVE-2021-27931.yaml
2021-12-03 12:48:47 +05:30
Prince Chaddha
025475d950
Merge pull request #3251 from projectdiscovery/pr-fix
...
Update and rename CVE-2021-40542.yaml to cves/2021/CVE-2021-40542.yaml
2021-12-03 12:48:01 +05:30
Prince Chaddha
bac5f0f843
Merge pull request #3206 from alph4byt3/patch-1
...
Create CVE-2021-27931.yaml
2021-12-03 12:47:18 +05:30
Prince Chaddha
0457cbd6b2
Update and rename CVE-2021-40542.yaml to cves/2021/CVE-2021-40542.yaml
2021-12-03 12:42:37 +05:30
sandeep
1dabef2e6f
Revert "CVE update - CVE-2021-22049"
...
This reverts commit 70128c2587
.
2021-12-02 01:34:29 +05:30
sandeep
70128c2587
CVE update - CVE-2021-22049
2021-12-02 01:31:41 +05:30
sandeep
814bf92a00
File name update - CVE-2021-39226
2021-12-02 01:14:10 +05:30
Sandeep Singh
19fcafa546
CVE-2021-39226 ( #3241 )
...
* Added CVE-39226
Co-Authored-By: Evan Rubinstein <70485623+evanRubinsteinIT@users.noreply.github.com>
Co-authored-by: Evan Rubinstein <70485623+evanRubinsteinIT@users.noreply.github.com>
2021-12-02 01:07:40 +05:30
sullo
854b464b1d
Add remediation information to CVE-2021-40539 and CVE-2021-44427 ( #3237 )
...
* Added remediation to CVE-2021-40539
* Added remediation to CVE-2021-44427
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2021-12-01 22:23:24 +05:30
Prince Chaddha
c9b6c8e463
Merge pull request #3235 from cckuailong/master
...
add CVE-2021-43778.yaml
2021-12-01 19:21:08 +05:30
Prince Chaddha
93f9f3ccac
Update CVE-2021-43778.yaml
2021-12-01 19:19:10 +05:30
GitHub Action
d3649d4f43
Auto Generated CVE annotations [Wed Dec 1 13:42:24 UTC 2021] 🤖
2021-12-01 13:42:24 +00:00
cckuailong
2a8ca5d836
add CVE-2021-43778.yaml
2021-12-01 15:04:29 +08:00
GitHub Action
fb048c7972
Auto Generated CVE annotations [Tue Nov 30 18:51:32 UTC 2021] 🤖
2021-11-30 18:51:32 +00:00
Sandeep Singh
eb5a6ab341
Added CVE-2021-41266 ( #3229 )
...
Co-Authored-By: Lenin Alevski <1795553+Alevsk@users.noreply.github.com>
2021-12-01 00:19:41 +05:30
Prince Chaddha
d484fed316
Merge pull request #3224 from xShuden/master
...
Create CVE-2021-44427.yaml
2021-11-30 21:55:47 +04:00
Prince Chaddha
f6a952d4be
Update CVE-2021-44427.yaml
2021-11-30 23:23:31 +05:30
Prince Chaddha
ae078ecd51
Merge pull request #3223 from gy741/rule-add-v74
...
Create CVE-2021-41653.yaml
2021-11-30 20:54:55 +04:00
Prince Chaddha
0b82e570d1
Update CVE-2021-41653.yaml
2021-11-30 22:22:16 +05:30
Aaron Chen
38f147a716
create CVE-2021-41951 ( #3202 )
...
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2021-11-30 22:19:12 +05:30
Sandeep Singh
949cd0d5a6
CVE 2021 41951 ( #3226 )
...
* create CVE-2021-41951
Co-authored-by: Aaron Chen <aaronchen.lisp@gmail.com>
2021-11-30 22:15:32 +05:30
Furkan Sayım
3ae4c1b484
Create CVE-2021-44427.yaml
2021-11-30 16:56:38 +01:00
GwanYeong Kim
3dd0c78fff
Create CVE-2021-41653.yaml
...
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-11-30 14:35:25 +09:00
forgedhallpass
7ef4f90cf0
feat: CVE-2021-22053 ( #3220 )
...
* feat: CVE-2021-22053
2021-11-29 18:42:08 +05:30
GitHub Action
302227a09d
Auto Generated CVE annotations [Sun Nov 28 20:31:30 UTC 2021] 🤖
2021-11-28 20:31:30 +00:00
sandeep
d00dea3f6b
removed unwanted headers
2021-11-29 00:05:36 +05:30
sandeep
685c46640e
Added Apache Airflow - Unauthenticated variable Import
2021-11-28 23:47:12 +05:30
sandeep
63b23a4848
Added additional reference
2021-11-28 17:22:02 +05:30
sandeep
7345869864
Added additional matcher
2021-11-27 10:04:24 +05:30
rotemr
0595a1dcf1
Add template for CVE-2021-24278
2021-11-27 01:32:48 +02:00
alph4byt3
3c1ae20146
Create CVE-2021-27931.yaml
2021-11-25 17:39:09 +02:00
alph4byt3
f2ff7a1a7e
Create CVE-2021-30213.yaml
2021-11-24 17:43:59 +02:00