sullo
b65c24c45e
Normalization of Cross-Site Scripting names ( #5329 )
2022-09-09 23:04:37 +05:30
Sandeep Singh
b59ff42aaf
additional reference to cves templates ( #4395 )
...
* additional reference to cves templates
* Update CVE-2006-1681.yaml
* Update CVE-2009-3318.yaml
* Update CVE-2009-4223.yaml
* Update CVE-2010-0942.yaml
* Update CVE-2010-0944.yaml
* Update CVE-2010-0972.yaml
* Update CVE-2010-1304.yaml
* Update CVE-2010-1308.yaml
* Update CVE-2010-1313.yaml
* Update CVE-2010-1461.yaml
* Update CVE-2010-1470.yaml
* Update CVE-2010-1471.yaml
* Update CVE-2010-1472.yaml
* Update CVE-2010-1474.yaml
* removed duplicate references
* misc fix
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld
5730781afa
Dashboard Content Enhancements ( #4157 )
...
* Enhancement: exposures/files/joomla-file-listing.yaml by cs
* Enhancement: cves/2019/CVE-2019-5418.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2021/CVE-2021-20091.yaml by mp
* Enhancement: cves/2021/CVE-2021-20092.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: cves/2017/CVE-2017-9833.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: misconfiguration/symfony-debugmode.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: cves/2021/CVE-2021-31682.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Relocating to CVE folder
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-2628.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2019/CVE-2019-2588.yaml by mp
* Enhancement: cves/2021/CVE-2021-31755.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments
* Tag typo
Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
sandeep
fe6dbc8b4d
misc update
2021-10-31 16:56:16 +05:30
GwanYeong Kim
43629d5f49
Create CVE-2021-31682.yaml
...
The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-10-30 19:36:29 +09:00