Dhiyaneshwaran
|
6b9d2d8791
|
minor enhancement
|
2023-06-06 12:12:39 +05:30 |
Ritik Chaddha
|
1e1becbe31
|
lint fix
|
2023-06-06 09:36:47 +05:30 |
sandeep
|
ffd3754f68
|
syntax fixes
|
2023-06-06 03:45:15 +05:30 |
ErikOwen
|
58c473547d
|
add network tag to templates in network/
|
2023-06-05 11:07:02 -07:00 |
pussycat0x
|
6870afdbaf
|
condition - update
|
2023-06-05 19:50:08 +05:30 |
Dhiyaneshwaran
|
98d42373cc
|
added metadata
|
2023-06-05 17:00:49 +05:30 |
pussycat0x
|
96e6a4ef23
|
Update CVE-2023-33246.yaml
|
2023-06-05 16:38:24 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
pussycat0x
|
b10e9e7a8a
|
Rename cves/2022/CVE-2022-24706.yaml to network/cves/2022/CVE-2022-24706.yaml
|
2023-06-02 13:14:45 +05:30 |
Ritik Chaddha
|
5606478cc2
|
update max-req=> max-request
|
2023-06-01 23:08:50 +05:30 |
Ritik Chaddha
|
bc3dd3c0d4
|
Revert "update max-req => max-request"
This reverts commit d82143eacc .
|
2023-06-01 22:48:38 +05:30 |
Ritik Chaddha
|
d82143eacc
|
update max-req => max-request
|
2023-06-01 22:46:25 +05:30 |
sandeep
|
60331c8e46
|
lint update
|
2023-06-01 21:51:22 +05:30 |
sandeep
|
a9427d2479
|
misc updates
|
2023-06-01 21:47:35 +05:30 |
pussycat0x
|
65d9266e31
|
CVE-2023-33246 RocketMQ versions <= 5.1.0 Remote Code Execution
|
2023-06-01 21:02:58 +05:30 |
pussycat0x
|
511a84bd24
|
Update CVE-2020-1938.yaml
|
2023-05-31 08:41:37 +05:30 |
pussycat0x
|
6b6bfb32aa
|
CVE-2020-1938 minor - update
|
2023-05-31 08:34:41 +05:30 |
Ruben Condor
|
a1faf3d103
|
Updated CVE-2020-11981
|
2023-05-29 14:32:09 +03:00 |
Ritik Chaddha
|
c9db123f00
|
Merge branch 'main' into CVE-2017-5645
|
2023-05-24 21:44:34 +05:30 |
Ritik Chaddha
|
ea95e195d3
|
updated info
|
2023-05-24 21:42:39 +05:30 |
pussycat0x
|
70f90eb489
|
minor -update
|
2023-05-24 20:09:45 +05:30 |
Ritik Chaddha
|
d7307f30cb
|
Merge pull request #7251 from projectdiscovery/princechaddha-patch-5
Create CVE-2016-3510.yaml
|
2023-05-18 19:51:30 +05:30 |
Ritik Chaddha
|
5e6c3691c0
|
updated info
|
2023-05-18 19:48:04 +05:30 |
Dhiyaneshwaran
|
89ac9e63d6
|
Merge pull request #7242 from projectdiscovery/pussycat0x-patch-6
CVE-2020-11981
|
2023-05-18 15:10:00 +05:30 |
Dhiyaneshwaran
|
d9a02b0c53
|
added additional matcher
|
2023-05-18 14:58:30 +05:30 |
Ritik Chaddha
|
12b7b57f30
|
lint fix
|
2023-05-18 12:00:39 +05:30 |
Prince Chaddha
|
e93696fa8a
|
Create CVE-2016-3510.yaml
|
2023-05-18 11:30:51 +05:30 |
pussycat0x
|
5c0e6198cd
|
minor -update
|
2023-05-17 18:46:14 +05:30 |
pussycat0x
|
c7be82ceee
|
Update CVE-2020-11981.yaml
|
2023-05-17 02:03:10 +05:30 |
Ritik Chaddha
|
e80da2de1e
|
lint fix
|
2023-05-16 23:39:07 +05:30 |
pussycat0x
|
e9465adf12
|
CVE-2020-11981
|
2023-05-16 21:59:43 +05:30 |
Ricardo
|
46117c8435
|
Update CVE-2022-0543.yaml
Support TLS enabled Redis
|
2023-05-11 15:34:05 +01:00 |
pussycat0x
|
983915d4bc
|
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml
|
2023-05-05 19:02:53 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |
Notealot
|
4d524fd178
|
Update CVE-2011-2523.yaml (#6975)
|
2023-03-28 16:52:10 +05:30 |
sullo
|
b349a35aa5
|
Add space after #
|
2023-03-10 15:27:26 -05:00 |
Ritik Chaddha
|
b0a48d26bb
|
updated matcher and cmd
|
2023-03-03 15:09:15 +05:30 |
pussycat0x
|
4355ce32d1
|
Create CVE-2011-2523.yaml
|
2023-03-03 15:00:28 +05:30 |