Ritik Chaddha
|
842de5f2fc
|
Merge pull request #7915 from j4vaovo/main-1
fix CVE-2022-31879 (false-positive)
|
2023-08-22 16:51:20 +05:30 |
Ritik Chaddha
|
458de8e58d
|
Update CVE-2022-31879.yaml
|
2023-08-22 16:48:17 +05:30 |
pussycat0x
|
f2b8e85198
|
Merge pull request #7947 from harsh2403/main-4
Create CVE-2022-1756.yaml
|
2023-08-19 13:57:11 +05:30 |
pussycat0x
|
e431b55d95
|
minor - update
|
2023-08-19 13:48:57 +05:30 |
Dhiyaneshwaran
|
29a2bb4471
|
body_2
|
2023-08-18 21:39:23 +05:30 |
Dhiyaneshwaran
|
93ff151bb9
|
revert changes
|
2023-08-18 21:36:49 +05:30 |
Dhiyaneshwaran
|
1cf8f26c6f
|
Create CVE-2022-39986.yaml
|
2023-08-18 16:01:22 +05:30 |
Dhiyaneshwaran
|
b60230b423
|
fix template with remediation
|
2023-08-17 14:42:24 +05:30 |
Harsh Yadav
|
d61d1513d1
|
Create CVE-2022-1756.yaml
|
2023-08-17 13:19:11 +05:30 |
Dhiyaneshwaran
|
2dea3f4a44
|
remove version detection templates
|
2023-08-17 12:30:13 +05:30 |
Dhiyaneshwaran
|
de378a520a
|
fix it bro
|
2023-08-16 15:14:58 +05:30 |
Dhiyaneshwaran
|
f2e033df45
|
trailspace fix please
|
2023-08-16 15:07:30 +05:30 |
Dhiyaneshwaran
|
0907a448be
|
classification added
|
2023-08-16 14:58:32 +05:30 |
Dhiyaneshwaran
|
83e0faedc1
|
fix trailspace and metadata
|
2023-08-16 14:52:52 +05:30 |
Arm!tage
|
94a06bd2fe
|
add cve-2022-46463
|
2023-08-16 16:57:23 +08:00 |
Arm!tage
|
ff554bd551
|
add cve-2022-46463.yaml
|
2023-08-16 16:46:20 +08:00 |
Dhiyaneshwaran
|
f786c1b2ae
|
added and condition for status code
|
2023-08-14 10:39:29 +05:30 |
J4vaovo
|
a0eaa1db71
|
Update CVE-2022-31879.yaml
|
2023-08-13 10:04:23 +08:00 |
J4vaovo
|
9571447984
|
Update CVE-2022-31879.yaml
|
2023-08-12 16:18:49 +08:00 |
GitHub Action
|
23203f762e
|
TemplateMan Update [Thu Aug 10 06:15:29 UTC 2023] 🤖
|
2023-08-10 06:15:29 +00:00 |
Dhiyaneshwaran
|
de6be72170
|
Merge pull request #7577 from harsh2403/patch-13
Create CVE-2022-46443.yaml
|
2023-08-10 11:43:36 +05:30 |
GitHub Action
|
44b57daf35
|
TemplateMan Update [Wed Aug 9 20:42:51 UTC 2023] 🤖
|
2023-08-09 20:42:52 +00:00 |
E1A
|
16d188bc0d
|
CVE-2022-24384.yaml (#7900)
* CVE-2017-7925.yaml
Research done and updated template after issue: https://github.com/projectdiscovery/nuclei-templates/issues/5639
* Update CVE-2017-7925.yaml
* Update CVE-2017-7925.yaml
* improved matcher + metadata + extractor
* removing duplicate template
* Add files via upload
* misc update
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-08-10 02:10:58 +05:30 |
Ritik Chaddha
|
f1be164d40
|
updated matcher
|
2023-08-09 14:00:30 +05:30 |
Ritik Chaddha
|
968a843e20
|
updated matcher
|
2023-08-09 13:10:41 +05:30 |
Dhiyaneshwaran
|
7510a36c1c
|
trail space fix
|
2023-08-05 15:37:45 +05:30 |
Dhiyaneshwaran
|
91fe10fa9d
|
Create CVE-2022-2414.yaml
|
2023-08-05 15:26:39 +05:30 |
Ritik Chaddha
|
f31286d8f7
|
lint fix
|
2023-08-02 14:12:07 +05:30 |
Ritik Chaddha
|
247ac7624b
|
Create CVE-2022-0169.yaml
|
2023-08-02 14:09:49 +05:30 |
Dhiyaneshwaran
|
8fab7c9881
|
Merge pull request #5959 from gy741/rule-add-v136
Create CVE-2022-40843
|
2023-08-02 10:56:33 +05:30 |
Dhiyaneshwaran
|
fab7db909a
|
http update
|
2023-08-02 10:00:36 +05:30 |
Dhiyaneshwaran
|
f82cf5b7ca
|
fix matcher for sqli template
|
2023-08-02 09:23:57 +05:30 |
Ritik Chaddha
|
5698c2f45a
|
Rename cves/2022/CVE-2022-40843.yaml to http/cves/2022/CVE-2022-40843.yaml
|
2023-08-01 11:44:50 +05:30 |
GitHub Action
|
3d89aaa7d1
|
TemplateMan Update [Fri Jul 21 13:22:02 UTC 2023] 🤖
|
2023-07-21 13:22:05 +00:00 |
Dhiyaneshwaran
|
51d1eebb3d
|
Merge pull request #7449 from ctflearner/CVE-2022-23102
Create CVE-2022-23102.yaml
|
2023-07-21 18:50:00 +05:30 |
Dhiyaneshwaran
|
bd1099b8d4
|
minor update
|
2023-07-21 18:44:54 +05:30 |
Ritik Chaddha
|
7717133cf9
|
re-write template
Added additional req, matchers and info
|
2023-07-21 18:40:36 +05:30 |
Dhiyaneshwaran
|
f8d7275527
|
Replaced Hardcoded Nuclei Keyword
|
2023-07-20 13:13:09 +05:30 |
sandeep
|
83bf20510f
|
more updates
|
2023-07-15 21:59:17 +05:30 |
mastercho
|
66e5c0af5b
|
Fixed Spaces
|
2023-07-13 20:04:28 +03:00 |
mastercho
|
2c6aa8b152
|
Added Prestashop SQLi
|
2023-07-13 19:54:13 +03:00 |
Sandeep Singh
|
fd675eaba3
|
Merge branch 'main' into cve_enrichment
|
2023-07-12 21:27:27 +05:30 |
sandeep
|
b5a88ad386
|
tags update
|
2023-07-12 17:26:50 +05:30 |
Ritik Chaddha
|
709fde5fd1
|
updated info
|
2023-07-12 17:12:54 +05:30 |
Dhiyaneshwaran
|
8339bcff3e
|
Update and rename CVE-2023-29298.yaml to CVE-2022-4057.yaml
|
2023-07-12 14:48:02 +05:30 |
pussycat0x
|
7d70eaa50d
|
Update CVE-2022-45354.yaml
|
2023-07-12 11:47:34 +05:30 |
Dhiyaneshwaran
|
836fb614d5
|
fix-template
|
2023-07-12 01:27:47 +05:30 |
Dhiyaneshwaran
|
5a2cd2b88a
|
Create CVE-2022-45354.yaml
|
2023-07-12 01:24:50 +05:30 |
sandeep
|
dd83af0228
|
CVE Enrichment 🎉
|
2023-07-12 01:19:27 +05:30 |
Ritik Chaddha
|
83e310c4e6
|
Merge branch 'main' into patch-13
|
2023-07-11 23:34:02 +05:30 |
sandeep
|
8dcd4dded7
|
moving files around
|
2023-07-11 02:24:59 +05:30 |
GitHub Action
|
02599a324a
|
TemplateMan Update [Mon Jul 10 12:34:24 UTC 2023] 🤖
|
2023-07-10 12:34:24 +00:00 |
Dhiyaneshwaran
|
091fb42570
|
Merge pull request #7579 from harsh2403/patch-14
Create CVE-2022-46071.yaml
|
2023-07-10 18:02:31 +05:30 |
Ritik Chaddha
|
dd6be10dc8
|
updated info
|
2023-07-10 17:59:22 +05:30 |
GitHub Action
|
fdb634b5ae
|
TemplateMan Update [Sat Jul 8 19:17:12 UTC 2023] 🤖
|
2023-07-08 19:17:13 +00:00 |
pussycat0x
|
9bb0d73588
|
Merge pull request #7580 from harsh2403/patch-15
Create CVE-2022-46073.yaml
|
2023-07-09 00:44:46 +05:30 |
Dhiyaneshwaran
|
4bc6ae766b
|
base url update and reference
|
2023-07-07 18:24:25 +05:30 |
Prince Chaddha
|
b316cc936f
|
Merge pull request #7618 from projectdiscovery/remove-comments
removed enhanced by comments
|
2023-07-07 17:00:46 +05:30 |
Prince Chaddha
|
0a681ec0bb
|
removed empty lines
|
2023-07-07 16:56:27 +05:30 |
GitHub Action
|
cb26083079
|
TemplateMan Update [Fri Jul 7 11:17:58 UTC 2023] 🤖
|
2023-07-07 11:17:59 +00:00 |
pussycat0x
|
cb6eaf95a2
|
Merge pull request #7637 from projectdiscovery/cve-templates4
CVEs added
|
2023-07-07 16:46:09 +05:30 |
pussycat0x
|
0ccffd229a
|
Merge branch 'main' into remove-comments
|
2023-07-07 16:38:46 +05:30 |
Dhiyaneshwaran
|
6c7678fcec
|
Merge branch 'cve-templates4' of https://github.com/projectdiscovery/nuclei-templates into cve-templates4
|
2023-07-07 16:21:19 +05:30 |
Dhiyaneshwaran
|
c77309373b
|
fix payload and directory
|
2023-07-07 16:21:07 +05:30 |
pussycat0x
|
993541f0aa
|
tag - update
|
2023-07-07 16:18:49 +05:30 |
pussycat0x
|
6469c023c4
|
Update CVE-2022-44948.yaml
|
2023-07-07 16:03:56 +05:30 |
Prince Chaddha
|
7d7e4f43ac
|
updated stored tags
|
2023-07-07 15:34:00 +05:30 |
Prince Chaddha
|
7b99d90f26
|
updated tags
|
2023-07-07 15:32:52 +05:30 |
Prince Chaddha
|
332e19282e
|
templates added
|
2023-07-07 15:08:49 +05:30 |
Prince Chaddha
|
2a82723e63
|
Update CVE-2022-40083.yaml
|
2023-07-07 10:33:56 +05:30 |
Prince Chaddha
|
75ed275328
|
removed enhanced by comments
|
2023-07-05 13:37:58 +05:30 |
GitHub Action
|
c8865f547b
|
TemplateMan Update [Sun Jul 2 17:00:35 UTC 2023] 🤖
|
2023-07-02 17:00:36 +00:00 |
sandeep
|
86657e1304
|
formatting update
|
2023-07-02 15:57:35 +05:30 |
sandeep
|
91b9e43339
|
added request to remove node created for test
|
2023-07-02 15:52:39 +05:30 |
sandeep
|
e453b7c517
|
added non breaking redirect url
|
2023-07-02 15:51:33 +05:30 |
Arm!tage
|
5603a4344d
|
fix CVE-2022-46934.yaml (#7505)
* fix CVE-2022-46934.yaml
* add tags
* add kkfileview-ssrf.yaml
* misc fixes
* Update kkfileview-ssrf.yaml
* misc fixes
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-01 22:09:12 +05:30 |
GitHub Action
|
6c021afe10
|
TemplateMan Update [Sat Jul 1 12:35:32 UTC 2023] 🤖
|
2023-07-01 12:35:32 +00:00 |
pussycat0x
|
5b57c913b5
|
name -update
|
2023-07-01 14:00:50 +05:30 |
sandeep
|
4ae90399de
|
removed request for diff ports
nuclei expect port scanned input for http templates
|
2023-06-30 23:57:26 +05:30 |
Harsh Yadav
|
736f62487c
|
Create CVE-2022-46073.yaml
|
2023-06-30 18:18:15 +05:30 |
Ritik Chaddha
|
7eac52e666
|
lint fix
|
2023-06-30 17:51:12 +05:30 |
Harsh Yadav
|
44da26c74c
|
Create CVE-2022-46071.yaml
|
2023-06-30 12:44:02 +05:30 |
Harsh Yadav
|
ff2703868f
|
Create CVE-2022-46443.yaml
|
2023-06-29 23:07:08 +05:30 |
Dhiyaneshwaran
|
131e8bfb0c
|
Create CVE-2022-40022.yaml
|
2023-06-22 11:16:36 +05:30 |
GitHub Action
|
41277637c0
|
TemplateMan Update [Wed Jun 21 21:03:53 UTC 2023] 🤖
|
2023-06-21 21:03:54 +00:00 |
sandeep
|
c90fa30096
|
removed deprecated header syntax with latest one
|
2023-06-20 02:40:30 +05:30 |
Dhiyaneshwaran
|
a1b59c6d32
|
rename file and tag added
|
2023-06-19 12:07:33 +05:30 |
J4vaovo
|
182af15c86
|
Update CVE-2022-23544.yaml
|
2023-06-18 02:35:12 +08:00 |
J4vaovo
|
76333efa1f
|
Update CVE-2022-23544.yaml
|
2023-06-17 18:42:40 +08:00 |
J4vaovo
|
64f18feec4
|
Create CVE-2022-23544.yaml
|
2023-06-17 03:48:01 +08:00 |
Dhiyaneshwaran
|
3d34c7b63f
|
Merge pull request #7452 from ctflearner/CVE-2022-0869
Create CVE-2022-0869.yaml
|
2023-06-15 22:06:21 +05:30 |
Dhiyaneshwaran
|
150475424a
|
added metadata
|
2023-06-15 22:00:09 +05:30 |
Dhiyaneshwaran
|
21a4d630ba
|
Update CVE-2022-0869.yaml
|
2023-06-15 21:54:33 +05:30 |
pussycat0x
|
7679e160fd
|
Update CVE-2022-23102.yaml
|
2023-06-15 17:46:41 +05:30 |
Dhiyaneshwaran
|
47b568a695
|
fix-template
|
2023-06-15 15:31:11 +05:30 |
ctflearner
|
0ba6e7ac6c
|
Create CVE-2022-0869.yaml
Added a New Nuclei Template as CVE-2022-0869
|
2023-06-15 13:01:32 +05:30 |
ctflearner
|
dce4169ad3
|
Create CVE-2022-23102.yaml
Added a New Nuclei Template as CVE-2022-23102
|
2023-06-15 12:36:37 +05:30 |
Ritik Chaddha
|
ce9517665b
|
updated matchers
|
2023-06-15 09:38:56 +05:30 |
J4vaovo
|
9f3116bf02
|
Update CVE-2022-25481.yaml
|
2023-06-10 21:33:20 +08:00 |
Ritik Chaddha
|
a4699f5b9f
|
Merge pull request #7335 from j4vaovo/patch-48
fix CVE-2022-1595-false positive
|
2023-06-08 23:47:52 +05:30 |
Ritik Chaddha
|
6f874d5d47
|
Update CVE-2022-1595.yaml
|
2023-06-08 23:40:56 +05:30 |
Ritik Chaddha
|
50b5047265
|
update
|
2023-06-05 13:06:24 +05:30 |
Ritik Chaddha
|
bbdceb3b4a
|
updated metadata and matchers
|
2023-06-05 12:57:06 +05:30 |
Prince Chaddha
|
ffc66c4bd8
|
templates added
|
2023-06-05 12:33:16 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
J4vaovo
|
92d7192ed3
|
Update CVE-2022-1595.yaml
|
2023-06-01 13:01:39 +08:00 |
Ritik Chaddha
|
e7ce7295b5
|
Update CVE-2022-1595.yaml
|
2023-05-31 13:13:33 +05:30 |
J4vaovo
|
5b9ab2065a
|
Update CVE-2022-1595.yaml
|
2023-05-31 11:14:06 +08:00 |
Dhiyaneshwaran
|
67859eff2c
|
Create CVE-2022-2733.yaml
|
2023-05-22 15:49:45 +05:30 |
pussycat0x
|
726d826284
|
Merge pull request #7212 from Zeyad-Azima/patch-1
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI p…
|
2023-05-20 23:42:33 +05:30 |
Dhiyaneshwaran
|
ce1a476baf
|
trailspace fix
|
2023-05-18 21:05:15 +05:30 |
Dhiyaneshwaran
|
4939442773
|
re-wrote-template
|
2023-05-18 20:59:40 +05:30 |
GitHub Action
|
1c5197c6f7
|
Auto Generated CVE annotations [Thu May 11 13:27:36 UTC 2023] 🤖
|
2023-05-11 13:27:36 +00:00 |
Zer0verflow
|
7b035ab1eb
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:54:49 +08:00 |
Zer0verflow
|
749f2b5aa3
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:50:07 +08:00 |
Zer0verflow
|
80d33d7741
|
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI privilege escalation
|
2023-05-11 10:57:33 +08:00 |
Dhiyaneshwaran
|
0dcedab251
|
Merge pull request #7203 from david-bla/add-sophos-mobile-xxe_cve-2022-3980
add template for sophos mobile xxe ssrf (cve-2022-3980)
|
2023-05-11 07:36:04 +05:30 |
Dhiyaneshwaran
|
333b861ffc
|
shodan query update
|
2023-05-11 07:31:07 +05:30 |
pussycat0x
|
1cbcce382d
|
Merge pull request #7196 from projectdiscovery/CVE-2022-24716
CVE 2022 24716
|
2023-05-11 00:42:58 +05:30 |
Dhiyaneshwaran
|
2f84af20e0
|
Update CVE-2022-24716.yaml
|
2023-05-11 00:30:35 +05:30 |
Ritik Chaddha
|
2696334222
|
updated matcher
|
2023-05-10 17:42:58 +05:30 |
sandeep
|
aa90fc9036
|
added additional matcher to make it strict
|
2023-05-09 22:50:55 +05:30 |
Ritik Chaddha
|
b79431ad43
|
updated path and matchers
|
2023-05-09 21:45:10 +05:30 |
Ritik Chaddha
|
68b0734657
|
removed matcher condition
|
2023-05-09 19:36:13 +05:30 |
Dhiyaneshwaran
|
70a4c7180c
|
description added
|
2023-05-08 22:56:05 +05:30 |
Dhiyaneshwaran
|
badb9b7945
|
Create CVE-2022-24716.yaml
|
2023-05-08 22:54:19 +05:30 |
Prince Chaddha
|
124b2230cf
|
templates added
|
2023-05-06 17:42:20 +05:30 |
Dhiyaneshwaran
|
511a601dd6
|
Merge pull request #7175 from Co5mos/CVE-2022-40879
Updated CVE-2022-40879 Template
|
2023-05-05 22:52:41 +05:30 |
Dhiyaneshwaran
|
c585da0abe
|
Merge pull request #7176 from Co5mos/CVE-2022-0678
Updated CVE-2022-0678 Template
|
2023-05-05 22:52:23 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
Co5mos
|
c76b0a862a
|
Updated CVE-2022-0678 Template
|
2023-05-04 20:37:18 +08:00 |
Co5mos
|
4565b0a6fe
|
Updated CVE-2022-40879 Template
|
2023-05-04 20:34:45 +08:00 |
sandeep
|
2175d81329
|
removed duplicate key
|
2023-05-02 18:29:30 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
MostInterestingBotInTheWorld
|
a34153eb9c
|
Dashboard Content Enhancements (#7149)
Dashboard Content Enhancements
|
2023-04-28 09:11:35 -04:00 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |