Commit Graph

1217 Commits (371a59605128e51ca648fb7cbf88e96148640ffc)

Author SHA1 Message Date
Ritik Chaddha 252160437e Update CVE-2021-21402.yaml 2022-05-11 12:07:40 +05:30
Ritik Chaddha 8e630baecd Update CVE-2021-44451.yaml 2022-05-10 18:15:11 +05:30
Ritik Chaddha 53d1ef5348 Update CVE-2021-38540.yaml 2022-05-10 18:15:09 +05:30
MostInterestingBotInTheWorld 73e289527d
Dashboard Content Enhancements (#4339)
* Spacing issues
2022-05-09 12:16:12 -04:00
MostInterestingBotInTheWorld 9ff9285916
Dashboard Content Enhancements (#4338)
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
vrenzolaverace f0a431bcc8
Add CVE-2021-37416 (#4235)
* Add CVE-2022-0208

* misc updates

* Add CVE-2021-37416

* Added metadata + additional page specific matcher

* additional metadata

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-09 15:21:53 +05:30
pussycat0x a8f5c98f2c
FortiGate config-audit (#4275)
* Add files via upload

* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖

* moving templates into jolokia directory

* duplicate of jolokia-unauthenticated-lfi

* merged similar templates into one with updated matchers

* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖

* Delete .new-additions

* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖

* conflict update

* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖

* Add files via upload

* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖

* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖

* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml

* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖

* mise update

* Create config-audit

* Delete config-audit

* Add files via upload

* matcher fixes / ext update / typos update

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-07 12:19:43 +05:30
sandeep e4760f13bf Removed duplicate CVE template 2022-05-07 11:01:47 +05:30
sandeep c3ca28246b misc updates 2022-05-07 10:57:44 +05:30
sandeep 1fdb124853 fixed line break between header and body 2022-05-06 15:55:50 +05:30
sandeep 54501558c2 template fix 2022-05-06 00:02:41 +05:30
GitHub Action fbc2ba38ee Auto Generated CVE annotations [Thu May 5 12:13:55 UTC 2022] 🤖 2022-05-05 12:13:55 +00:00
MostInterestingBotInTheWorld 03b7a5f0fe
Dashboard Content Enhancements (#4289)
Dashboard content enhancements.
2022-05-02 17:50:47 -04:00
GitHub Action 58de44b9d4 Auto Generated CVE annotations [Mon May 2 19:44:49 UTC 2022] 🤖 2022-05-02 19:44:49 +00:00
Prince Chaddha e279027adc
Update CVE-2021-39312.yaml 2022-05-03 01:05:45 +05:30
Dhiyaneshwaran 101f0e4607
Update CVE-2021-39312.yaml 2022-05-01 16:10:55 +05:30
Dhiyaneshwaran 7ee380cb9e
Create CVE-2021-39312.yaml 2022-05-01 16:08:22 +05:30
GitHub Action cc3e2ba7fa Auto Generated CVE annotations [Sat Apr 30 20:57:29 UTC 2022] 🤖 2022-04-30 20:57:29 +00:00
Prince Chaddha b6c8d874d1
Update CVE-2021-25118.yaml 2022-05-01 02:20:08 +05:30
Prince Chaddha 0154892ec8
Create CVE-2021-25118.yaml 2022-05-01 02:10:38 +05:30
GitHub Action 9d9c66412d Auto Generated CVE annotations [Sat Apr 30 20:29:38 UTC 2022] 🤖 2022-04-30 20:29:38 +00:00
Prince Chaddha 29d40af49f
Update and rename vulnerabilities/other/viaware-rce.yaml to cves/2021/CVE-2021-36356.yaml 2022-05-01 01:57:39 +05:30
Prince Chaddha a11f95b8bf
Create CVE-2021-25111.yaml 2022-04-30 01:49:48 +05:30
MostInterestingBotInTheWorld 44520223c1
Dashboard Content Enhancements (#4268)
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
Muhammad Daffa a424cf57ae
Update CVE-2021-39350.yaml 2022-04-29 22:09:54 +07:00
Prince Chaddha bfa0105bf3
Update CVE-2021-20158.yaml 2022-04-29 16:03:18 +05:30
Dwi Siswanto 631f56bae7
fix(linter): De-dupe meta (#4264) 2022-04-29 14:40:18 +05:30
pussycat0x ccc7835baf
Sucuri Website Firewall - Not Configured Default page (#4254)
* Add files via upload

* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖

* moving templates into jolokia directory

* duplicate of jolokia-unauthenticated-lfi

* merged similar templates into one with updated matchers

* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖

* Delete .new-additions

* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖

* conflict update

* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖

* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖

* Add files via upload

* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖

* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖

* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml

* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖

* mise update

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-29 12:14:52 +05:30
sullo c3d4dfd6ae
Tenda Template Enhancementleanup (#4257)
* Replace § markers with {{ }} pairs

* Clean up new Tenda admin panel template

* Update tenda-11n-wireless-router-login.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
xiaoheihei1107 75cb4e3297
Add CVE-2021-22054.yaml (#4251)
* Create CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-28 13:18:32 +05:30
Prince Chaddha aaf32a716a
Merge pull request #4249 from For3stCo1d/CVE-2021-46417.yaml
Create CVE-2021-46417.yaml
2022-04-28 01:38:59 +05:30
Prince Chaddha 208f676590
Update CVE-2021-46417.yaml 2022-04-28 01:36:11 +05:30
林寒 006c2e71e0
update CWE-ID 2022-04-27 23:45:58 +08:00
林寒 1525af197c
Create CVE-2021-46417.yaml 2022-04-27 23:43:24 +08:00
MostInterestingBotInTheWorld aa888bca8d
Dashboard Content Enhancements (#4238)
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Adam Crosser fd3a7c8fc5
Zoho Desktop Central Authentication Bypass Vulnerability (CVE-2021-44515) (#4142)
* Added Template for CVE-2021-44515

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:42:25 +05:30
Adam Crosser 031720fc5f
Created Template for CVE-2021-44077 (#4129)
* Created Template for CVE-2021-44077

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:15:34 +05:30
sandeep 9e505d4609 added missing tags 2022-04-22 22:13:51 +05:30
forgedhallpass 5451673368 Moved and renamed templates containing a CVE under their correct location 2022-04-22 19:25:23 +03:00
forgedhallpass 9f8650b0b8 Classification CVE id fix in CVE-2021-40542.yaml 2022-04-22 19:21:28 +03:00
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld 31312b1c19
Dashboard Content Enhancements (#4191)
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action 8c19fffb6a Auto Generated CVE annotations [Thu Apr 21 09:35:20 UTC 2022] 🤖 2022-04-21 09:35:20 +00:00
MostInterestingBotInTheWorld 3e2e842d0e
Dashboard Content Ehnancements (#4183)
* Spacing and other template cleanups
* duplicate yaml tags

Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Prince Chaddha 927a2f68e2
Update CVE-2021-31805.yaml 2022-04-18 15:12:27 +04:00
Prince Chaddha 5467e632dc
Create CVE-2021-31805.yaml 2022-04-18 15:08:19 +04:00
GitHub Action 4e6338a4a0 Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖 2022-04-16 13:18:49 +00:00
MostInterestingBotInTheWorld 5730781afa
Dashboard Content Enhancements (#4157)
* Enhancement: exposures/files/joomla-file-listing.yaml by cs

* Enhancement: cves/2019/CVE-2019-5418.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2021/CVE-2021-20091.yaml by mp

* Enhancement: cves/2021/CVE-2021-20092.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: cves/2017/CVE-2017-9833.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: misconfiguration/symfony-debugmode.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: cves/2021/CVE-2021-31682.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Relocating to CVE folder

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-2628.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2019/CVE-2019-2588.yaml by mp

* Enhancement: cves/2021/CVE-2021-31755.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments

* Tag typo

Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha ba3f842314
Update CVE-2021-24987.yaml 2022-04-15 18:40:28 +04:00
Prince Chaddha ce757d0581
Create CVE-2021-24987.yaml 2022-04-15 17:50:49 +04:00
Muhammad Daffa f8240809bd
Update CVE-2021-24340.yaml (#4134) 2022-04-13 14:21:49 +05:30
sandeep 4b395a60d1 template location fix 2022-04-11 18:43:12 +05:30
MostInterestingBotInTheWorld a24ef794b7
Dashboard Content Enhancements (#4031)
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
GitHub Action 83dae0cac1 Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖 2022-04-06 04:33:20 +00:00
Prince Chaddha a0e7094664
Update CVE-2021-24746.yaml 2022-04-06 09:55:48 +05:30
Prince Chaddha 68f4159393
Create CVE-2021-24746.yaml 2022-04-06 09:36:53 +05:30
Prince Chaddha 21a73f490c Update CVE-2021-24746.yaml 2022-04-06 09:35:04 +05:30
GitHub Action 9045a7bd9c Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖 2022-04-06 04:01:51 +00:00
Prince Chaddha 90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha f0af9a04b6
Update CVE-2021-24746.yaml 2022-04-05 23:28:52 +05:30
GitHub Action 15575ec82e Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖 2022-04-05 13:17:39 +00:00
Prince Chaddha 77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha 3586ec841c
Update CVE-2021-26598.yaml 2022-04-05 00:13:18 +05:30
Prince Chaddha c9e108c7db
Update CVE-2021-26598.yaml 2022-04-04 23:57:11 +05:30
Rodrigo Schio 4d690358ae
fix match and extractors regexes (#4040) 2022-04-04 18:08:25 +05:30
GwanYeong Kim 1e374c7482 Create CVE-2021-26598.yaml
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
Prince Chaddha c1a7f2398c
Create CVE-2021-24746.yaml 2022-04-02 16:15:26 +05:30
Prince Chaddha a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
Prince Chaddha 14d40fdb50
Update CVE-2021-44103.yaml 2022-04-02 14:47:22 +05:30
Prince Chaddha d3c4313f64
Update CVE-2021-44103.yaml 2022-04-02 14:39:25 +05:30
GitHub Action 5e128f2c52 Auto Generated CVE annotations [Sat Apr 2 07:59:47 UTC 2022] 🤖 2022-04-02 07:59:47 +00:00
rschio da4c4dde5d remove trailing spaces 2022-04-01 12:53:54 -04:00
Sandeep Singh a6a4d78065
Added CVE-2021-46387 (#4022) 2022-04-01 15:13:57 +05:30
MostInterestingBotInTheWorld 6ddfbac2b4
Dashboard Content Enhancement (#4020)
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

* Syntax  restore some characters

* Spacing

* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp

* Enhancement: cves/2019/CVE-2019-10068.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-11580.yaml by mp

* Enhancement: cves/2019/CVE-2019-11581.yaml by mp

* Enhancement: cves/2019/CVE-2019-12314.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Link wrapping issue

* Enhancement: cves/2019/CVE-2019-13462.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16759.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cves/2019/CVE-2019-16278.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-12725.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs

* Enhancement: cves/2021/CVE-2021-33807.yaml by mp

* Enhancement: cves/2010/CVE-2010-0943.yaml by mp

* Enhancement: cves/2008/CVE-2008-6172.yaml by mp

* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: network/cisco-smi-exposure.yaml by mp

* Enhancement: cves/2021/CVE-2021-37704.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2019/CVE-2019-16313.yaml by mp

* Enhancement: cves/2021/CVE-2021-3017.yaml by mp

* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2021/CVE-2021-37573.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2018/CVE-2018-11709.yaml by mp

* Enhancement: cves/2014/CVE-2014-2321.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Manual enhancement

* Manual enhancement push due to dashboard failure

* Testing of dashboard accidentally commited to dashboard branch

* Spacing
Put some CVEs in the classification

* Add missing cve-id fields to templates in cve/

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
rschio 32d9039f6b add CVE-2021-44103
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
2022-04-01 03:39:18 -04:00
GitHub Action 074936d227 Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖 2022-03-31 19:40:33 +00:00
Adam Crosser 235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) (#4019)
* Updated CVE-2022-22963

* Added CVE-2021-21311 Template

* Added Shodan Query

* Updated Title

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30
MostInterestingBotInTheWorld 13bfc8ff57
Dashboard Content Enhancements (#3998)
* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
Prince Chaddha b6dd43c0c9
Merge pull request #3984 from Akokonunes/patch-132
Create CVE-2021-46381.yaml
2022-03-29 12:14:05 +05:30
Prince Chaddha 708921b3e5
Update and rename CVE-2021-46381.yaml to cves/2021/CVE-2021-46381.yaml 2022-03-29 12:09:40 +05:30
Sandeep Singh 5f28041069
Added Spring Boot Log4j Remote Code Injection (#3993)
* Added Spring Boot Log4j Remote Code Injection

* minor improvements to CVE-2021-44228

* URI based payload update to catch injection point
2022-03-28 01:46:50 +05:30
sandeep 7b83c9990a minor updates to template names 2022-03-27 22:13:08 +05:30
GitHub Action c8380b3bf8 Auto Generated CVE annotations [Sun Mar 27 14:25:50 UTC 2022] 🤖 2022-03-27 14:25:50 +00:00
Dhiyaneshwaran 014a8c9192
4 New Wordpress Authenticated Templates (#3990)
* Create xss-childlist-selector.yaml

* Update xss-childlist-selector.yaml

* Rename xss-childlist-selector.yaml to aem-xss-childlist-selector.yaml

* adding metadata

* Create CVE-2021-25112.yaml

* Create CVE-2022-0189.yaml

* Create CVE-2021-25055.yaml

* Create CVE-2022-0148.yaml

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-27 19:55:03 +05:30
GitHub Action ac87976a84 Auto Generated CVE annotations [Sat Mar 26 09:11:31 UTC 2022] 🤖 2022-03-26 09:11:31 +00:00
MostInterestingBotInTheWorld 814d07fb7d
Dashboard Content Enhancements (#3961)
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp

* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp

* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp

* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp

* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp

* Enhancement: dns/azure-takeover-detection.yaml by mp

* Enhancement: dns/cname-fingerprint.yaml by mp

* Enhancement: dns/cname-service-detection.yaml by mp

* Enhancement: dns/detect-dangling-cname.yaml by mp

* Enhancement: dns/dns-waf-detect.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: dns/dnssec-detection.yaml by mp

* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
GitHub Action 83ecf7060b Auto Generated CVE annotations [Wed Mar 23 10:44:27 UTC 2022] 🤖 2022-03-23 10:44:27 +00:00
Sandeep Singh 8c12450b09
Added CVE-2021-42063 (#3956) 2022-03-23 16:13:38 +05:30
Prince Chaddha ca54dd0026
Merge pull request #3946 from bartutku/CVE-2021-41691
CVE-2021-41691
2022-03-23 13:17:18 +05:30
sandeep ec99241f0e Updated "/etc/passwd" regex to avoid possible false positive results. 2022-03-22 13:31:31 +05:30
Sandeep Singh 21c2c0cd2c
lint update 2022-03-22 13:04:29 +05:30
Prince Chaddha bc30daa9fb
Update CVE-2021-41691.yaml 2022-03-22 12:38:45 +05:30
Prince Chaddha 75845a7b6e
Merge pull request #3951 from z3dc0ps/master
changed 'burpcollaborator.net' to "{{interactsh-url}}"
2022-03-22 11:35:52 +05:30
MostInterestingBotInTheWorld 9663595dd1
Dashboard Text Enhancements (#3948)
Dashboard content enhancements
2022-03-21 23:48:47 -04:00
z3dc0ps 8f37ae4a2f
Update CVE-2021-21315.yaml 2022-03-22 01:46:15 +05:30
bartutku 9fb6c93947 CVE-2021-41691 2022-03-21 16:49:56 +03:00
GitHub Action 6b562eb6f7 Auto Generated CVE annotations [Sun Mar 20 07:45:32 UTC 2022] 🤖 2022-03-20 07:45:32 +00:00
darkc0d37 36ff44ab40
Ivanti EPM CSA Code Injection(CVE-2021-44529) (#3937)
* Added CVE-2021-44529

* Added CVE-2021-44529

* Added CVE-2021-44529

* metadata updates

* contributors update

Co-authored-by: Tirtha Mandal <darkc0d3@Tirthas-MacBook-Pro.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-20 13:14:37 +05:30
Sandeep Singh ec2246ee22
added confluence metadata and minor matcher updates (#3929) 2022-03-19 16:12:08 +05:30
sandeep a97dccb54a additional matcher update 2022-03-19 16:10:43 +05:30
Dwi Siswanto 1878c50193
Add Pascom advisories (#3862)
* pascom: Add CVE-2021-45967

* pascom: Add CVE-2021-45968
2022-03-19 16:09:09 +05:30
sandeep dd2322c7f2 tags update 2022-03-19 15:15:41 +05:30
GitHub Action 145620c09c Auto Generated CVE annotations [Sat Mar 19 09:06:25 UTC 2022] 🤖 2022-03-19 09:06:25 +00:00
cckuailong 9fe955392a
add CVE-2021-41282 (#3844)
* add CVE-2021-41282

* tags update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:35:40 +05:30
sandeep a3a709045a tag update 2022-03-19 14:25:34 +05:30
cckuailong 5b787f0260
add CVE-2021-35587 (#3872)
* add CVE-2021-35587

* fix verbose space

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:24:33 +05:30
Roberto Nunes 66fadd57ad
Create CVE-2021-34805.yaml (#3919)
* Create CVE-2021-34805.yaml

* misc fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 14:18:46 +05:30
MostInterestingBotInTheWorld 056323ec5a
Dashboard Text Enhancements (#3927)
Dashboard text enhancements
2022-03-17 13:01:45 -04:00
gilfoyle97 0fa555567a
Request: Fix CVE-2021-21234 (#3920)
* Fixed CVE-2019-9670

* more strict matchers

* Fix CVE-2021-21234

* more strict matcher

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-17 14:59:53 +05:30
sandeep 5303173354 additional word matcher 2022-03-14 16:09:08 +05:30
GitHub Action bcd67b9429 Auto Generated CVE annotations [Fri Mar 11 09:46:35 UTC 2022] 🤖 2022-03-11 09:46:35 +00:00
MostInterestingBotInTheWorld c1601ceded
Merge branch 'projectdiscovery:master' into dashboard 2022-03-08 09:36:06 -05:00
MostInterestingBotInTheWorld 73a06a5fab Enhancement: cves/2021/CVE-2021-44521.yaml by mp 2022-03-07 16:29:30 -05:00
sandeep 20774864c5 misc updates 2022-03-08 01:28:57 +05:30
edoardottt 7032b928cc Add CVE-2021-3002 2022-03-07 20:47:40 +01:00
sullo 2d0d48fdb7 Trailing space 2022-03-07 14:26:37 -05:00
MostInterestingBotInTheWorld 81868f926d Enhancement: cves/2021/CVE-2021-4191.yaml by mp 2022-03-07 14:12:26 -05:00
MostInterestingBotInTheWorld bcc094893a Enhancement: cves/2021/CVE-2021-41649.yaml by mp 2022-03-07 14:02:44 -05:00
MostInterestingBotInTheWorld 138142bdba Enhancement: cves/2021/CVE-2021-41648.yaml by mp 2022-03-07 13:45:31 -05:00
MostInterestingBotInTheWorld 7f5de64a29 Enhancement: cves/2021/CVE-2021-41467.yaml by mp 2022-03-07 13:41:37 -05:00
MostInterestingBotInTheWorld 042d3eb4a4 Enhancement: cves/2021/CVE-2021-41349.yaml by mp 2022-03-07 13:40:20 -05:00
MostInterestingBotInTheWorld 49623611cb Enhancement: cves/2021/CVE-2021-41381.yaml by mp 2022-03-07 10:46:28 -05:00
MostInterestingBotInTheWorld 3ed70c8627 Enhancement: cves/2021/CVE-2021-41349.yaml by mp 2022-03-07 10:43:02 -05:00
MostInterestingBotInTheWorld d58cf407d9 Enhancement: cves/2021/CVE-2021-41293.yaml by mp 2022-03-07 10:36:19 -05:00
sullo c002e6c7d5 Accidentally added a vim command 2022-03-07 09:13:57 -05:00
sullo 4266bdad25 Spacing 2022-03-07 09:08:43 -05:00
MostInterestingBotInTheWorld 21d872d42c
Merge branch 'projectdiscovery:master' into dashboard 2022-03-07 08:10:22 -05:00
MostInterestingBotInTheWorld d743fb7969 Enhancement: cves/2021/CVE-2021-41291.yaml by mp 2022-03-06 12:04:24 -05:00
MostInterestingBotInTheWorld 925f08ff70 Enhancement: cves/2021/CVE-2021-41277.yaml by mp 2022-03-06 12:01:47 -05:00
MostInterestingBotInTheWorld 92aa22ebe8 Enhancement: cves/2021/CVE-2021-41266.yaml by mp 2022-03-06 11:56:57 -05:00
MostInterestingBotInTheWorld 739edecc0f Enhancement: cves/2021/CVE-2021-41174.yaml by mp 2022-03-06 11:52:34 -05:00
MostInterestingBotInTheWorld 220bc5a35a Enhancement: cves/2021/CVE-2021-40978.yaml by mp 2022-03-06 11:50:17 -05:00
MostInterestingBotInTheWorld b20659acef Enhancement: cves/2021/CVE-2021-40960.yaml by mp 2022-03-06 11:43:48 -05:00
MostInterestingBotInTheWorld 0739f98dc7 Enhancement: cves/2021/CVE-2021-40875.yaml by mp 2022-03-06 11:41:44 -05:00
MostInterestingBotInTheWorld b03d23b035 Enhancement: cves/2021/CVE-2021-40870.yaml by mp 2022-03-06 11:35:55 -05:00
MostInterestingBotInTheWorld 57ab79164b Enhancement: cves/2021/CVE-2021-40868.yaml by mp 2022-03-06 11:31:51 -05:00
sandeep 25c8f1bc11 cve tag update 2022-03-05 13:46:55 +05:30
sandeep faea03749e tags update + extractor 2022-03-05 13:42:33 +05:30
sandeep 3fd92dbdcd indentation update 2022-03-05 13:15:21 +05:30
zsusac d18e7535d2 Add template for CVE-2021-4191 2022-03-04 16:56:50 -05:00
sandeep 9f5cc1ca80 added gitlab metadata 2022-03-04 19:20:03 +05:30
initstring 3389b0b7aa removing irrelevant oast tag 2022-03-04 14:25:00 +11:00
initstring ce85dd4283 Fixed CVE-2021-22214 2022-03-04 13:04:56 +11:00
GitHub Action ac76cf7004 Auto Generated CVE annotations [Thu Mar 3 21:15:02 UTC 2022] 🤖 2022-03-03 21:15:02 +00:00
Sandeep Singh 0f47239f2a
Merge pull request #3807 from projectdiscovery/CVE-2021-44521
Apache Cassandra Load UDF RCE
2022-03-04 02:43:42 +05:30
Prince Chaddha b0e13cb19d
Merge pull request #3791 from pussycat0x/master
New Template Added
2022-03-03 16:44:20 +05:30
sandeep 6d32b81b2a GitLab metadata update 2022-03-02 13:05:29 +05:30
sandeep 12e01e2786 Apache Cassandra Load UDF RCE
Co-Authored-By: Y4er <40487319+Y4er@users.noreply.github.com>
2022-03-02 01:06:31 +05:30
MostInterestingBotInTheWorld 390fe3b65f Enhancement: cves/2021/CVE-2021-45380.yaml by mp 2022-02-28 17:19:33 -05:00
MostInterestingBotInTheWorld 9e84dd3d67 Enhancement: cves/2021/CVE-2021-45092.yaml by mp 2022-02-28 16:47:00 -05:00