Commit Graph

533 Commits (48aa04d45e1f5d3c8d26336578959cc72d7416b9)

Author SHA1 Message Date
J4vaovo 62a59e1bcd
Update CVE-2018-2893.yaml 2023-06-15 01:44:49 +08:00
J4vaovo 1f3cb91d40
Update CVE-2022-24706.yaml 2023-06-14 19:40:06 +08:00
J4vaovo 3473c3fc13
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 18:44:15 +08:00
J4vaovo 133c7c5854
Create apache-dubbo-unauth.yaml 2023-06-14 18:39:09 +08:00
J4vaovo 1ee72e0cf8
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 01:25:54 +08:00
J4vaovo 8adf33c65e
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 00:14:49 +08:00
J4vaovo 0cd15711c9
Update apache-rocketmq-broker-unauth.yaml 2023-06-14 00:13:51 +08:00
J4vaovo 445b079614
Create apache-rocketmq-broker-unauth.yaml 2023-06-14 00:10:15 +08:00
Prince Chaddha b86f5b4a3c
Fixed matchers-condition CVE-2020-11981 2023-06-13 14:22:29 +05:30
Prince Chaddha f9fd870fbb misc changes 2023-06-12 18:54:55 +05:30
Ritik Chaddha 25b6a01944
Merge pull request #7340 from projectdiscovery/pussycat0x-patch-14
CVE-2023-33246  -  RocketMQ <= 5.1.0 Remote Code Execution
2023-06-08 23:46:44 +05:30
Ritik Chaddha 13cfd3403b
Update CVE-2023-33246.yaml 2023-06-08 23:37:44 +05:30
sandeep bf7a9bea6c strict + fixed matcher 2023-06-07 17:54:20 +05:30
Dhiyaneshwaran d4c0410724
Update CVE-2022-24706.yaml 2023-06-06 12:47:45 +05:30
Dhiyaneshwaran f6a913e67d
protocol update 2023-06-06 12:43:28 +05:30
Dhiyaneshwaran 1e6a6f6937
Merge pull request #7070 from projectdiscovery/feat-CVE-2022-24706
Adding CVE-2022-24706 (couchdb RCE)
2023-06-06 12:40:24 +05:30
pussycat0x 6d24c721bf
data - update 2023-06-06 12:37:03 +05:30
Dhiyaneshwaran 6b9d2d8791
minor enhancement 2023-06-06 12:12:39 +05:30
Ritik Chaddha 1e1becbe31
lint fix 2023-06-06 09:36:47 +05:30
sandeep ffd3754f68 syntax fixes 2023-06-06 03:45:15 +05:30
ErikOwen 58c473547d add network tag to templates in network/ 2023-06-05 11:07:02 -07:00
pussycat0x 6870afdbaf
condition - update 2023-06-05 19:50:08 +05:30
Dhiyaneshwaran 98d42373cc
added metadata 2023-06-05 17:00:49 +05:30
pussycat0x 96e6a4ef23
Update CVE-2023-33246.yaml 2023-06-05 16:38:24 +05:30
sandeep e53d19f583 boolean format update 2023-06-04 13:43:42 +05:30
GitHub Action df5a969b80 Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖 2023-06-03 18:56:35 +00:00
pussycat0x b10e9e7a8a
Rename cves/2022/CVE-2022-24706.yaml to network/cves/2022/CVE-2022-24706.yaml 2023-06-02 13:14:45 +05:30
Ritik Chaddha 5606478cc2 update max-req=> max-request 2023-06-01 23:08:50 +05:30
Ritik Chaddha bc3dd3c0d4 Revert "update max-req => max-request"
This reverts commit d82143eacc.
2023-06-01 22:48:38 +05:30
Ritik Chaddha d82143eacc update max-req => max-request 2023-06-01 22:46:25 +05:30
sandeep 60331c8e46 lint update 2023-06-01 21:51:22 +05:30
sandeep a9427d2479 misc updates 2023-06-01 21:47:35 +05:30
pussycat0x 65d9266e31
CVE-2023-33246 RocketMQ versions <= 5.1.0 Remote Code Execution 2023-06-01 21:02:58 +05:30
Dhiyaneshwaran 96a1e25e14
Merge pull request #7305 from ruben-condor/add-classification-for-CVE-2020-11981.yaml
Updated CVE-2020-11981
2023-05-31 16:07:25 +05:30
pussycat0x 511a84bd24
Update CVE-2020-1938.yaml 2023-05-31 08:41:37 +05:30
pussycat0x 6b6bfb32aa
CVE-2020-1938 minor - update 2023-05-31 08:34:41 +05:30
Dhiyaneshwaran dd7721e326
Update axigen-mail-server-detect.yaml 2023-05-30 15:34:14 +05:30
Ruben Condor 4721c2fc48
Updated axigen-mail-server-detect.yaml 2023-05-30 12:09:21 +03:00
Ruben Condor a1faf3d103
Updated CVE-2020-11981 2023-05-29 14:32:09 +03:00
Ritik Chaddha c9db123f00
Merge branch 'main' into CVE-2017-5645 2023-05-24 21:44:34 +05:30
Ritik Chaddha ea95e195d3
updated info 2023-05-24 21:42:39 +05:30
pussycat0x 70f90eb489
minor -update 2023-05-24 20:09:45 +05:30
Prince Chaddha 5e478b89c7
Rename teamspeak3-detect to teamspeak3-detect.yaml 2023-05-19 12:17:23 +05:30
Ritik Chaddha d7307f30cb
Merge pull request #7251 from projectdiscovery/princechaddha-patch-5
Create CVE-2016-3510.yaml
2023-05-18 19:51:30 +05:30
Ritik Chaddha 5e6c3691c0
updated info 2023-05-18 19:48:04 +05:30
Dhiyaneshwaran 89ac9e63d6
Merge pull request #7242 from projectdiscovery/pussycat0x-patch-6
CVE-2020-11981
2023-05-18 15:10:00 +05:30
Dhiyaneshwaran d9a02b0c53
added additional matcher 2023-05-18 14:58:30 +05:30
Ritik Chaddha 12b7b57f30
lint fix 2023-05-18 12:00:39 +05:30
Prince Chaddha e93696fa8a
Create CVE-2016-3510.yaml 2023-05-18 11:30:51 +05:30
pussycat0x 5c0e6198cd
minor -update 2023-05-17 18:46:14 +05:30
Dhiyaneshwaran c3db741049
Merge pull request #7220 from ricardojba/patch-1
Update exposed-redis.yaml
2023-05-17 10:43:08 +05:30
pussycat0x c7be82ceee
Update CVE-2020-11981.yaml 2023-05-17 02:03:10 +05:30
Dhiyaneshwaran 24aaa07529
Merge pull request #7222 from ricardojba/patch-3
Update CVE-2022-0543.yaml
2023-05-17 01:37:52 +05:30
Ritik Chaddha e80da2de1e
lint fix 2023-05-16 23:39:07 +05:30
pussycat0x e9465adf12
CVE-2020-11981 2023-05-16 21:59:43 +05:30
Ricardo 46117c8435
Update CVE-2022-0543.yaml
Support TLS enabled Redis
2023-05-11 15:34:05 +01:00
Ricardo 5105ffc5c3
Update redis-detect.yaml
Detect TLS enabled Redis and TLS enabled Azure Cache for Redis
2023-05-11 15:30:15 +01:00
Ricardo fad493fcfb
Update exposed-redis.yaml
Detect TLS enabled Redis and TLS enabled Azure Cache for Redis
2023-05-11 15:27:52 +01:00
Ritik Chaddha 9a7ac7d2bd
Merge pull request #7208 from projectdiscovery/pussycat0x-patch-14
SMTP User Enumeration
2023-05-11 17:02:16 +05:30
Ritik Chaddha c187d4cc2c
Merge pull request #7181 from projectdiscovery/pussycat0x-patch-6
SMTP Commands Enumeration
2023-05-11 16:25:17 +05:30
pussycat0x 18323967e8
Create smtp-user-enum.yaml 2023-05-10 01:22:05 +05:30
pussycat0x 0246c47f00
Delete smtp-user-enum.yaml 2023-05-10 01:17:14 +05:30
pussycat0x 64b021ede2
SMTP User Enumeration 2023-05-10 01:11:48 +05:30
pussycat0x a289dc9ef5
Update smtp-commands-enum.yaml 2023-05-10 00:05:39 +05:30
pussycat0x 983915d4bc
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml 2023-05-05 19:02:53 +05:30
pussycat0x ed67d0b943
Update smtp-commands-enum.yaml 2023-05-05 18:58:03 +05:30
pussycat0x d17a0c1246
SMTP Commands Enumeration 2023-05-05 18:56:49 +05:30
Ritik Chaddha 561b42ebe7 Merge branch 'main' into add-cpe-epss 2023-05-05 00:00:13 +05:30
sandeep e5ae45127e Merge remote-tracking branch 'origin' into add-cpe-epss 2023-05-02 18:21:24 +05:30
sandeep 1f5b1f2c47 Added max request counter of each template 2023-04-28 13:41:21 +05:30
Prince Chaddha e0af666e1c
Refactoring the directory structure based on protocols (#7137)
* moving http templates

* updated cves.json

* moved network CVEs

* updated scripts

* updated workflows

* updated requests to http

* replaced network to tcp

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-04-27 09:58:59 +05:30
Dhiyaneshwaran c6718f1499
Update beanstalk-service.yaml 2023-04-21 17:12:11 +05:30
Dhiyaneshwaran 799f713b8c
Update msmq-detect.yaml 2023-04-21 17:11:37 +05:30
pussycat0x bf126b24c8
Protocol update network -> tcp 2023-04-20 02:46:20 +05:30
Ritik Chaddha 5dc6036a9a
Update msmq-detect.yaml 2023-04-20 02:28:15 +05:30
Ritik Chaddha d4b490195d
indentation fix 2023-04-19 23:17:04 +05:30
Brandon Hutchinson e34e263509 Added network/detection/msmq-detect.yaml 2023-04-19 15:34:10 +00:00
pussycat0x a623589fcc
Beanstalk Service - Detect 2023-04-12 17:26:45 +05:30
Prince Chaddha 899029a1aa
updated to host 2023-04-09 08:17:24 +05:30
pussycat0x 40465c769c
minor -update 2023-04-08 22:42:10 +05:30
pussycat0x 5fa705e717
Update kafka-topics-list.yaml 2023-04-05 13:16:13 +05:30
pussycat0x db1f466f51
fix -FP 2023-04-05 10:28:38 +05:30
Ritik Chaddha dec264a418
Merge pull request #7009 from MostInterestingBotInTheWorld/dashboard
Dashboard Content Enhancements
2023-03-31 21:19:24 +05:30
pussycat0x e53386d074
Update kafka-topics-list.yaml 2023-03-30 20:02:42 +05:30
pussycat0x 7ea625bf1f
Kafka Topics List 2023-03-30 17:10:37 +05:30
MostInterestingBotInTheWorld 455f69376f Enhancement: network/detection/rtsp-detect.yaml by md 2023-03-29 15:24:51 -04:00
MostInterestingBotInTheWorld 3e2df9f3cd Enhancement: network/detection/imap-detect.yaml by md 2023-03-29 15:22:47 -04:00
MostInterestingBotInTheWorld c8ed0959c9 Enhancement: network/detection/esmtp-detect.yaml by md 2023-03-29 15:21:25 -04:00
MostInterestingBotInTheWorld 400886032e Enhancement: network/detection/dotnet-remoting-service-detect.yaml by md 2023-03-29 15:15:20 -04:00
Notealot 4d524fd178
Update CVE-2011-2523.yaml (#6975) 2023-03-28 16:52:10 +05:30
MostInterestingBotInTheWorld 186745475b
dos2unix conversions (#6969)
* Add description and enhance one where the UI failed to save properly.
dos2unix on a template

* Change cvedetails link to nvd

* make severities match

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2017/CVE-2017-14524.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2019/CVE-2019-16759.yaml by md

* Enhancement: cves/2021/CVE-2021-22986.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24347.yaml by md

* Enhancement: cves/2021/CVE-2021-25003.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25298.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-28151.yaml by md

* Enhancement: cves/2021/CVE-2021-30128.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0885.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-24816.yaml by md

* Enhancement: cves/2022/CVE-2022-31499.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-34753.yaml by md

* Enhancement: cves/2022/CVE-2022-39952.yaml by md

* Enhancement: cves/2022/CVE-2022-4060.yaml by md

* Enhancement: cves/2022/CVE-2022-44877.yaml by md

* Enhancement: cves/2023/CVE-2023-0669.yaml by md

* Enhancement: cves/2023/CVE-2023-26255.yaml by md

* Enhancement: cves/2023/CVE-2023-26256.yaml by md

* Enhancement: exposures/files/salesforce-credentials.yaml by md

* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md

* Enhancement: network/backdoor/backdoored-zte.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-dbt.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md

* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md

* Enhancement: vulnerabilities/froxlor-xss.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md

* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md

* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md

* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md

* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Initial cleanups for syntax errors

* dashboard gremlins

* Add log4j back to name

* Enhancement: exposures/files/salesforce-credentials.yaml by cs

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs

* Enhancement: network/backdoor/backdoored-zte.yaml by cs

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs

* Sev and other info tweaks

* Merge conflict

* Run dos2unix against all templates

* too many newlines error

* Fix too many blank lines error

* Fix severity mismatches
Cleanup language on a new test

---------

Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 14:22:40 -04:00
sullo 96d0b8f950 Run dos2unix against all templates 2023-03-27 13:56:52 -04:00
MostInterestingBotInTheWorld 301fddaeb0
Dashboard Content Enhancements (#6965)
* Add description and enhance one where the UI failed to save properly.
dos2unix on a template

* Change cvedetails link to nvd

* make severities match

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2017/CVE-2017-14524.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2019/CVE-2019-16759.yaml by md

* Enhancement: cves/2021/CVE-2021-22986.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24347.yaml by md

* Enhancement: cves/2021/CVE-2021-25003.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25298.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-28151.yaml by md

* Enhancement: cves/2021/CVE-2021-30128.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0885.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-24816.yaml by md

* Enhancement: cves/2022/CVE-2022-31499.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-34753.yaml by md

* Enhancement: cves/2022/CVE-2022-39952.yaml by md

* Enhancement: cves/2022/CVE-2022-4060.yaml by md

* Enhancement: cves/2022/CVE-2022-44877.yaml by md

* Enhancement: cves/2023/CVE-2023-0669.yaml by md

* Enhancement: cves/2023/CVE-2023-26255.yaml by md

* Enhancement: cves/2023/CVE-2023-26256.yaml by md

* Enhancement: exposures/files/salesforce-credentials.yaml by md

* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md

* Enhancement: network/backdoor/backdoored-zte.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-dbt.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md

* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md

* Enhancement: vulnerabilities/froxlor-xss.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md

* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md

* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md

* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md

* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Initial cleanups for syntax errors

* dashboard gremlins

* Add log4j back to name

* Enhancement: exposures/files/salesforce-credentials.yaml by cs

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs

* Enhancement: network/backdoor/backdoored-zte.yaml by cs

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs

* Sev and other info tweaks

* Merge conflict

---------

Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 23:16:47 +05:30
MostInterestingBotInTheWorld 6df60bcdbc Enhancement: network/backdoor/backdoored-zte.yaml by cs 2023-03-27 10:21:11 -04:00
MostInterestingBotInTheWorld 061159686a Enhancement: network/detection/ibm-d2b-database-server.yaml by md 2023-03-22 14:32:23 -04:00
MostInterestingBotInTheWorld 56ffd6e01a Enhancement: network/backdoor/backdoored-zte.yaml by md 2023-03-22 14:28:53 -04:00
sullo d69d4c45ca Add description and enhance one where the UI failed to save properly.
dos2unix on a template
2023-03-17 15:01:01 -04:00
MostInterestingBotInTheWorld 7677e07dec
Merge branch 'main' into dashboard 2023-03-17 11:24:28 -04:00
Ritik Chaddha 2b5c3c48cc
Merge pull request #6823 from sullo/severity-matching
Match severity with CVSS
2023-03-15 20:48:33 +05:30
MostInterestingBotInTheWorld b5383637ac Enhancement: network/detection/pgsql-detect.yaml by md 2023-03-15 11:07:42 -04:00