Commit Graph

239 Commits (3538d5c96d5b02615ef8c1de3ffaca0469344b20)

Author SHA1 Message Date
东方有鱼名为咸 3ec6f5a27b
add CVE-2022-24112.yaml (#3751)
* Create CVE-2022-24112.yaml

* minor improvements

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-23 13:25:27 +05:30
sandeep 736e7427d6 added missing tags 2022-02-22 19:53:43 +05:30
Prince Chaddha 22f35f3e23
Merge pull request #3730 from DhiyaneshGeek/master
10 New Wordpress Template
2022-02-22 14:47:20 +05:30
Prince Chaddha fd011250b3
Update CVE-2022-25323.yaml 2022-02-22 14:09:05 +05:30
Prince Chaddha 363bc051a5
Update CVE-2022-0149.yaml 2022-02-22 13:33:56 +05:30
Prince Chaddha 87961281a8
Update CVE-2022-0149.yaml 2022-02-22 13:33:25 +05:30
林寒 56713b8175
Create CVE-2022-23131.yaml 2022-02-20 20:37:19 +08:00
PikPikcU 280de89a19
Update CVE-2022-25323.yaml 2022-02-19 17:32:56 -05:00
PikPikcU 2ca53695ca
Create CVE-2022-25323.yaml 2022-02-19 17:32:01 -05:00
GitHub Action 1fdab1ebfb Auto Generated CVE annotations [Sat Feb 19 11:22:51 UTC 2022] 🤖 2022-02-19 11:22:51 +00:00
Dhiyaneshwaran 45aacdad8c
Create CVE-2022-0149.yaml 2022-02-19 16:51:38 +05:30
cckuailong 5e5d294656
add CVE-2022-23808 (#3697)
* add CVE-2022-23808

* Update CVE-2022-23808.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-14 17:13:04 +05:30
GitHub Action c548ca9f59 Auto Generated CVE annotations [Wed Feb 9 19:42:28 UTC 2022] 🤖 2022-02-09 19:42:28 +00:00
Prince Chaddha c065716a94
Merge pull request #3672 from pikpikcu/patch-321
Create CVE-2022-0432
2022-02-10 01:10:52 +05:30
Prince Chaddha f8a31448f9
Update CVE-2022-0432.yaml 2022-02-10 01:06:59 +05:30
Prince Chaddha 9e26df67b3
Update CVE-2022-0432.yaml 2022-02-10 00:58:51 +05:30
GitHub Action 94ac089ed7 Auto Generated CVE annotations [Sun Feb 6 18:32:16 UTC 2022] 🤖 2022-02-06 18:32:16 +00:00
sandeep 574acfaddc minor template update 2022-02-06 23:59:47 +05:30
PikPikcU 0d5e0e891d
Update CVE-2022-0378.yaml 2022-02-06 05:18:24 -05:00
PikPikcU 0d311a72c3
Update CVE-2022-0281.yaml 2022-02-06 05:17:40 -05:00
PikPikcU 9e641734a3
Create CVE-2022-0432.yaml 2022-02-06 01:04:17 -05:00
PikPikcU 4f8a0ac62c
Create CVE-2022-0378.yaml 2022-02-06 00:41:20 -05:00
PikPikcU a12753c7fe
Create CVE-2022-0281.yaml 2022-02-06 00:28:32 -05:00
sandeep d34ca992d3 Added CVE-2022-21371 2022-01-28 16:59:22 +05:30
sandeep 57d742bfb4 Removing temporarily due to limited information 2022-01-28 16:58:30 +05:30
sandeep 9fa97d4221 path update 2022-01-28 16:55:45 +05:30
Prince Chaddha dfdfc369d1
Merge pull request #3597 from paradessia/master
CVE-2022-21371
2022-01-28 11:14:44 +05:30
cckuailong 5b424fafe1
add CVE-2022-23944 (#3605)
* add CVE-2022-23944

* fix CVE-2021-23944 matcher type

* Update CVE-2022-23944.yaml

* minor updates

Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-27 15:59:26 +05:30
Sullo 9a8482172d Remove:
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
 - spaces after : in some files
2022-01-25 14:38:53 -05:00
Prince Chaddha 97b38b98b4
Update CVE-2022-21371.yaml 2022-01-25 21:06:14 +05:30
GitHub Action 48add9c36b Auto Generated CVE annotations [Tue Jan 25 11:06:39 UTC 2022] 🤖 2022-01-25 11:06:39 +00:00
Prince Chaddha 2460dceff3
Update CVE-2022-21371.yaml 2022-01-25 16:36:10 +05:30
GitHub Action 5f2efaf5df Auto Generated CVE annotations [Tue Jan 25 09:56:37 UTC 2022] 🤖 2022-01-25 09:56:37 +00:00
on abfbfe29ae CVE-2022-21371.yaml 2022-01-25 12:48:56 +03:00
GitHub Action e035a797c6 Auto Generated CVE annotations [Tue Jan 25 09:41:31 UTC 2022] 🤖 2022-01-25 09:41:31 +00:00
Prince Chaddha 5511ff1efd
Merge pull request #3578 from hexcat/add-wp-html-mail-xss
Added wp-html-mail-xss template
2022-01-24 14:21:06 +05:30
Prince Chaddha 6dd35d6491
Update and rename vulnerabilities/wordpress/wp-html-mail-xss.yaml to cves/2022/CVE-2022-0218.yaml 2022-01-24 14:17:01 +05:30
Prince Chaddha e9897bddaa
Update CVE-2022-23178.yaml 2022-01-24 12:37:55 +05:30
GwanYeong Kim 2d53221aea Create CVE-2022-23178.yaml
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-23 20:28:25 +09:00