Geeknik Labs
9c169bd682
Create CVE-2021-44528.yaml ( #3342 )
2021-12-15 20:43:07 +05:30
sandeep
c9ddd7a0ae
update: id + reference update
2021-12-14 21:07:46 +05:30
sandeep
34d4557dad
update: making it compatible with self-hosted interactsh server
2021-12-14 03:21:47 +05:30
Evan Rubinstein
dddb0bbb82
Added CVE-2021-24997 ( #3298 )
...
* Added CVE-39226
* Added CVE-39226
* Delete CVE-39226.yaml
* Renamed CVE-39226 to CVE-2021-39226
Fixed naming error
* Added Wp-Guppy-Information-Disclosure template
* Removed File
Found better descriptor
* Added CVE-2021-24997
Added WordPress Guppy Information Disclosure CVE
* Fixed CVE-2021-24997
Fixed YAML formatting
* Fixed Typo
URL Path had an extra double quote
* Auto Generated Templates Stats [Wed Dec 8 23:07:24 UTC 2021] 🤖
* Deleted Blank Space
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Added CVE-2021-43496
* Update CVE-2021-43496.yaml
* fix: syntax update
* Added New Vuln
* Update CVE-2021-24997.yaml
* Update CVE-2021-43496.yaml
* Update and rename hd-netowrk-realtime-monitor-system-LFI.yaml to hdnetwork-realtime-lfi.yaml
* fix: lints update
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2021-12-14 02:22:26 +05:30
Nicolas
1411edf332
Updated CVE-2021-44228.yaml ( #3335 )
...
Co-authored-by: olacin <olacin@users.noreply.github.com>
2021-12-13 20:24:06 +05:30
Prince Chaddha
fe4ec9185f
Merge pull request #3325 from 5tr1x/patch-1
...
Add X-Forwarded-For and Authentication headers
2021-12-12 17:31:07 +05:30
Prince Chaddha
1824aef5f5
Update and rename CVE-2018-7467.yaml to cves/2018/CVE-2018-7467.yaml
2021-12-12 16:53:17 +05:30
5tr1x
5dc71681c5
Add X-Forwarded-For and Authentication headers
2021-12-11 15:43:22 -06:00
Mohamed Elbadry
33fbe53930
Create CVE-2021-44228.yaml ( #3319 )
...
* Create CVE-2021-44228.yaml
* fix: syntax fix
* update: added additional path based payload
* update: strict matcher + pulling hostname information of the system
* update: added path based payload
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-12 00:56:50 +05:30
Muhammad Daffa
18d54f5204
Edit magmi workflow ( #3312 )
2021-12-09 23:28:33 +05:30
GitHub Action
a19b941193
Auto Generated CVE annotations [Wed Dec 8 11:18:20 UTC 2021] 🤖
2021-12-08 11:18:20 +00:00
Sandeep Singh
2521cb62bf
Added CVE-2021-43798 ( #3296 )
...
* Added CVE-2021-43798
* updated with default plugin list
* Update grafana-file-read.yaml
2021-12-08 16:46:47 +05:30
Prince Chaddha
548980ae5b
Update CVE-2021-40856.yaml
2021-12-08 10:25:18 +05:30
GwanYeong Kim
48c6834de6
Create CVE-2021-40856.yaml
...
Inserting the prefix "/about/../" allows bypassing the authentication check for the web-based configuration management interface. This enables attackers to gain access to the login credentials used for authentication at the PBX, among other data.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-08 09:54:30 +09:00
Prince Chaddha
7905d1dfd7
Merge pull request #3281 from daffainfo/master
...
Add 10 templates and edit 1 workflows netsweeper
2021-12-07 13:59:14 +05:30
Prince Chaddha
684abeb93e
Update CVE-2014-9618.yaml
2021-12-07 13:42:19 +05:30
Prince Chaddha
2fcb784fcf
Update CVE-2014-9617.yaml
2021-12-07 13:38:32 +05:30
Prince Chaddha
6d73776e5d
Update CVE-2014-9615.yaml
2021-12-07 13:25:57 +05:30
Prince Chaddha
7bee8bedd9
Update CVE-2014-9614.yaml
2021-12-07 13:13:49 +05:30
Prince Chaddha
ac1439c40f
Update CVE-2014-9608.yaml
2021-12-07 13:05:50 +05:30
Prince Chaddha
891a922592
Update CVE-2014-9609.yaml
2021-12-07 12:56:58 +05:30
Prince Chaddha
c3f2e61e48
Update CVE-2014-9608.yaml
2021-12-07 12:55:09 +05:30
Prince Chaddha
881ea5dd3c
Update CVE-2014-9607.yaml
2021-12-07 12:48:33 +05:30
Prince Chaddha
d38243621e
Update CVE-2014-9606.yaml
2021-12-07 12:43:19 +05:30
Prince Chaddha
7983f04c51
Update and rename CVE-2014-3110.yaml to CVE-2014-2908.yaml
2021-12-07 10:28:21 +05:30
Prince Chaddha
f0fbe930f6
Update CVE-2014-3110.yaml
2021-12-07 10:23:35 +05:30
Muhammad Daffa
04dc5d7532
Update CVE-2014-9614.yaml
2021-12-06 23:49:04 +07:00
Muhammad Daffa
b24b6e8fa1
Update CVE-2014-9614.yaml
2021-12-06 23:48:38 +07:00
GitHub Action
3bf8c4f4b4
Auto Generated CVE annotations [Mon Dec 6 16:40:52 UTC 2021] 🤖
2021-12-06 16:40:52 +00:00
daffainfo
b90d0b7e3e
Add 10 templates and edit 1 workflows
2021-12-06 23:38:54 +07:00
Muhammad Daffa
f8771cea8f
Create CVE-2014-3110.yaml
2021-12-06 22:13:40 +07:00
Prince Chaddha
3d7060f0d2
Update and rename CVE-2018-8727.yaml to cves/2018/CVE-2018-8727.yaml
2021-12-06 18:31:06 +05:30
Prince Chaddha
c92010033b
Update CVE-2020-8497.yaml
2021-12-06 10:39:43 +05:30
GwanYeong Kim
b76c1d20f3
Create CVE-2020-8497.yaml
...
In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-06 08:36:14 +09:00
sandeep
b8d068416f
update: added reference for CVE-2021-38314
2021-12-04 22:17:25 +05:30
sandeep
f64926808d
Added missing tag
2021-12-04 12:50:04 +05:30
GitHub Action
01cb3156ce
Auto Generated CVE annotations [Sat Dec 4 07:17:12 UTC 2021] 🤖
2021-12-04 07:17:12 +00:00
sandeep
d2d0d4bf8d
minor update to description
2021-12-04 12:44:08 +05:30
alph4byt3
09468dc0f8
Create CVE-2021-29490.yaml
2021-12-04 12:40:47 +05:30
alph4byt3
5180d138bf
Delete CVE-2021-29490
2021-12-04 12:40:47 +05:30
alph4byt3
41148c9f86
Create CVE-2021-29490
2021-12-04 12:40:47 +05:30
Prince Chaddha
a04590433f
Merge pull request #3193 from Akokonunes/patch-78
...
Create CVE-2018-7719.yaml
2021-12-03 14:56:42 +05:30
GitHub Action
ee1c16543d
Auto Generated CVE annotations [Fri Dec 3 09:17:18 UTC 2021] 🤖
2021-12-03 09:17:18 +00:00
Prince Chaddha
7a32fc3941
Update and rename CVE-2021-27310.yaml to cves/2021/CVE-2021-27310.yaml
2021-12-03 14:43:25 +05:30
Prince Chaddha
7bd27557d8
Merge pull request #3253 from projectdiscovery/pr-fix-1
...
Update CVE-2021-30213.yaml
2021-12-03 14:32:47 +05:30
Prince Chaddha
0ac3b4da59
Merge pull request #3252 from projectdiscovery/pr-fix
...
Update CVE-2021-27931.yaml
2021-12-03 14:32:06 +05:30
Prince Chaddha
10c0f1b22f
Update CVE-2021-30213.yaml
2021-12-03 14:31:08 +05:30
Prince Chaddha
04bb340596
Update CVE-2021-27931.yaml
2021-12-03 14:30:44 +05:30
Prince Chaddha
5a36367340
Merge branch 'master' into pr-fix-1
2021-12-03 13:49:27 +05:30
Prince Chaddha
3cade85cc8
Merge branch 'master' into pr-fix
2021-12-03 13:23:33 +05:30