Commit Graph

628 Commits (4de5613573531f6843ed1cfc57e39120587906c0)

Author SHA1 Message Date
PD-Team 3be5354a7d Delete CVE-2020-10199.yaml 2021-01-30 10:18:01 +05:30
PikPikcU 2c7a7a8b4d
Create CVE-2018-8033.yaml 2021-01-30 03:58:20 +00:00
PikPikcU fb97d100b8
Create CVE-2020-13937.yaml 2021-01-30 00:28:31 +00:00
PD-Team 064f084dee misc changes 2021-01-29 23:53:50 +05:30
PD-Team 544382d143
Merge pull request #767 from pudsec/master
Added CVE-2021-22873
2021-01-29 23:41:48 +05:30
PD-Team 865c778d4b few updates 2021-01-29 23:35:27 +05:30
PD-Team 2ff5e8ca42
Removing CVE-2020-10204
Reference:- https://github.com/projectdiscovery/nuclei-templates/pull/212#issuecomment-655051520
2021-01-29 23:15:54 +05:30
PD-Team 81891e9cbd file name update 2021-01-29 00:23:43 +05:30
PikPikcU ee82f8364e
Create CVE-2020-8515 2021-01-28 15:30:20 +00:00
PikPikcU 2c217760db
Update CVE-2020-17530.yaml 2021-01-27 19:07:23 +00:00
PikPikcU 72c8d0e2ef
Update CVE-2020-17530.yaml 2021-01-27 19:03:03 +00:00
PikPikcU ad23717e7c
Create CVE-2020-17530.yaml 2021-01-27 18:47:58 +00:00
pudsec 5e7ae851f1 Added CVE-2021-22873 2021-01-24 19:37:25 +08:00
PD-Team 8d647ffbad Update CVE-2020-5410.yaml 2021-01-14 20:21:36 +05:30
PD-Team dc24595935 BaseURL updates 2021-01-14 20:11:56 +05:30
Michael Henriksen b528ce663c Introduce a new risky-cves root folder
The template for CVE-2020-16139 lived in `cves/`
and was not ignored by default in .nuclei-ignore
for a considurable time because of directory
restructuring. The risky-cves root folder is
introduced to make this mistake less likely to
happen in the future.
2021-01-13 12:53:29 +01:00
team-projectdiscovery 106da77fc3 Preparing for request clustering 2021-01-13 13:01:46 +05:30
team-projectdiscovery d8fc0079d9 Adding CVE-2020-9376 2021-01-12 21:45:12 +05:30
team-projectdiscovery 1468d8a52c matcher updates 2021-01-11 12:14:22 +05:30
team-projectdiscovery b5dd30abf5 fixes 2021-01-11 04:09:54 +05:30
team-projectdiscovery a52ffe5c4e fixes and updates 2021-01-10 19:45:36 +05:30
team-projectdiscovery 664a6f3b04 more cves 🔥 2021-01-09 20:15:11 +05:30
team-projectdiscovery eaaf56e9da workflow updates 2021-01-09 18:58:57 +05:30
team-projectdiscovery 87ec61f0de Update CVE-2020-17518.yaml 2021-01-08 00:19:39 +05:30
team-projectdiscovery 32143aa738 Create CVE-2020-17518.yaml 2021-01-06 23:08:45 +05:30
team-projectdiscovery dfd308612b adding CVE-2020-17519 2021-01-06 12:38:41 +05:30
team-projectdiscovery 9ec41352f6 matcher update 2021-01-05 00:33:42 +05:30
team-projectdiscovery 4f2a99345c cve id updates 2021-01-02 10:32:50 +05:30
team-projectdiscovery 82b5a7f57b misc changes 2021-01-02 10:30:39 +05:30
team-projectdiscovery 0cec810029 misc changes 2021-01-02 10:29:06 +05:30
team-projectdiscovery 6cc3f88a5d misc changes 2021-01-02 10:26:15 +05:30
team-projectdiscovery ba58677a74 moving cves to year based structure
easy for viewing / running templates based on years.
2021-01-02 09:52:04 +05:30
team-projectdiscovery e7677fcc81 Update CVE-2020-10148.yaml 2021-01-01 17:03:22 +05:30
team-projectdiscovery c0609a6dd9 misc changes 2021-01-01 16:41:05 +05:30
team-projectdiscovery 7c0bfcd167 Update CVE-2020-10148.yaml 2021-01-01 16:10:35 +05:30
team-projectdiscovery 9ccdc41c6a updating matchers and path 2021-01-01 16:08:09 +05:30
Dwi Siswanto dfd822bfe2 ✏️ Replace reference 2020-12-31 16:12:13 +07:00
Dwi Siswanto 7bc5bf03be 🔨 Splitting matcher parts 2020-12-31 15:51:24 +07:00
Dwi Siswanto 87f2961ed0 🔨 Simplify matchers & add more references 2020-12-31 15:40:10 +07:00
Dwi Siswanto 4b0c979208 🔥 Add CVE-2020-10148 2020-12-29 14:32:08 +07:00
dsm 6c575732f4
Fixed small typing error
Changed temaplte to template
2020-12-25 14:44:40 -03:00
team-projectdiscovery a5e062992d Update CVE-2008-2398.yaml 2020-12-25 20:34:57 +05:30
team-projectdiscovery eded3a5bc5 Update CVE-2008-2398.yaml 2020-12-25 20:13:47 +05:30
team-projectdiscovery 6bc5af5ce2 updating rules 2020-12-25 15:26:00 +05:30
Ganesh Bagaria e5234dbcc6
Add CVE-2019-11869
XSS in Yuzo Related Posts plugin before 5.12.94
2020-12-25 13:51:48 +05:30
team-projectdiscovery 7a1c7f63b7 Update CVE-2019-20141.yaml 2020-12-23 19:08:42 +05:30
team-projectdiscovery 441c1d2c40 updated rails6-xss 2020-12-23 14:54:03 +05:30
team-projectdiscovery 365098fd7b Update CVE-2020-8185.yaml 2020-12-23 08:03:49 +05:30
rootxharsh 93154ff6ae Formatted YAML 2020-12-23 04:03:16 +05:30
rootxharsh 61beebde41 Add Rails 6 XSS 2020-12-23 03:55:41 +05:30
team-projectdiscovery 077fda9228 Update CVE-2008-2398.yaml 2020-12-16 11:06:39 +05:30
shubham chaskar 8c9ce49b2d
cve-2008-2398 added 2020-12-16 01:20:04 +05:30
Philippe Pépos Petitclerc 00ef32a392 Reintroduce CVE-2019-15858.yaml check
Old version had a lot of FP as it did not check if the returned page was
acutally the correct readme. So I added a check for the name of the
plugin and another one to ensure there is a changelog. This shoud remove
almost all false positives.
2020-12-14 20:53:39 -05:00
team-projectdiscovery d0df82d928 Adding content type checks for XSS templates 2020-12-14 00:54:23 +05:30
PD-Team f5a5a0883d
Merge pull request #675 from geeknik/patch-27
Delete CVE-2019-11043.yaml
2020-12-14 00:42:16 +05:30
Geeknik Labs 5e844c925f
Delete CVE-2019-11043.yaml
This is the incorrect way to test for this particular bug. The person who pointed this out has no desire to open a pull request. So we nuke this file.
2020-12-12 19:45:59 +00:00
Dwi Siswanto 044bf5d19b 🔥 Add CVE-2020-11738 2020-12-12 12:03:34 +07:00
Dwi Siswanto d383687b6a 🔥 Add CVE-2020-7318 2020-12-09 15:54:40 +07:00
bauthard 33c36b045e
Merge pull request #667 from dwisiswant0/add/CVE-2020-4463
Add CVE-2020-4463
2020-12-07 20:31:05 +05:30
bauthard dd077a0300 Adding small note 2020-12-07 20:30:11 +05:30
bauthard ad01bb0633 Temporarily removing due to f/p 2020-12-07 20:18:03 +05:30
Dwi Siswanto 676b5d23ef 🔥 Add CVE-2020-4463 2020-12-07 14:59:25 +07:00
bauthard e22932c1fa Improving matchers 2020-12-06 15:12:32 +05:30
bauthard 04d566eea5 misc changes 2020-12-06 15:02:10 +05:30
ree4pwn b7102ea11b
Update CVE-2019-11581.yaml 2020-12-05 17:21:28 +08:00
ree4pwn bf3e0f501a
Update CVE-2019-11581.yaml 2020-12-05 17:17:48 +08:00
ree4pwn b19bcfacf8
Update CVE-2019-11581.yaml
Fix syntax error
2020-12-05 17:00:05 +08:00
ree4pwn d3a77c422d
Update and rename cve-2019-11581.yaml to CVE-2019-11581.yaml 2020-12-05 16:53:14 +08:00
ree4pwn 3a7130030e
cve-2019-11581
Jira template injection
2020-12-05 16:51:54 +08:00
bauthard 950d3e4f24 Create CVE-2019-15858.yaml 2020-12-02 10:55:57 +05:30
bauthard 2ef8cb5c8f
temporary remove 2020-12-02 10:47:07 +05:30
bauthard 6b5734f25d
Merge pull request #630 from Patralos/master
cve-2019-15858 reversed check
2020-12-02 10:22:45 +05:30
Dwi Siswanto 06b94ebae3 🔥 Add CVE-2020-23972 2020-12-01 16:25:33 +07:00
bauthard 7d0d8bdb99 Update CVE-2019-11043.yaml 2020-11-29 17:38:24 +05:30
Geeknik Labs 0bc9e92da6
Update CVE-2019-11043.yaml 2020-11-28 19:14:21 +00:00
bauthard 231974676e
Merge pull request #650 from projectdiscovery/bugfix-cve-2019-12725
fixing unmarshal error
2020-11-27 01:19:50 +05:30
bauthard 519ddb4ce5
reverting the change 2020-11-27 01:19:35 +05:30
bauthard 1b203b350b
Update CVE-2019-12725.yaml 2020-11-27 01:16:49 +05:30
Mzack9999 f5e5515a35 fixing unmarshal error 2020-11-26 20:36:28 +01:00
bauthard 0fae570c4c Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates 2020-11-26 20:59:30 +05:30
bauthard a1732cc1a3 Removing cve-2020-14815
This will be added back with support of https://github.com/projectdiscovery/nuclei/issues/295
2020-11-26 20:59:10 +05:30
bauthard 3d7e839a99 Update CVE-2019-12725.yaml 2020-11-26 14:42:15 +05:30
Dwi Siswanto f9301c5808 🔥 Add CVE-2019-12725 2020-11-26 11:24:02 +07:00
bauthard 6c4fcfc602 Adding marker to payload 2020-11-26 02:02:20 +05:30
Dwi Siswanto e39ffdf513 🔨 Fix false-positive for CVE-2013-2251 2020-11-25 07:26:52 +07:00
bauthard 6f3b2cdd0c adding more info and matchers 2020-11-25 01:30:01 +05:30
shelld3v b81c8ea57d
🔥 Add CVE-2018-13380 2020-11-24 21:30:18 +07:00
Dwi Siswanto 05796b0692 🔥 Rename cve-* files to CVEs 2020-11-22 05:49:16 +07:00
bauthard 971f016178 few updates 2020-11-21 20:39:12 +05:30
SaN ThosH bf5e619803
Create CVE-2019-6340.yaml 2020-11-21 13:07:33 +05:30
bauthard beb578cdf0 Marker updates to payloads
Adding § marker to variable names to avoid any confusion with real data and variable name, supported from nuclei v2.2.0
2020-11-21 12:25:49 +05:30
Patralos f35eec7ba1
remove empty lines 2020-11-20 10:33:26 +01:00
Patralos becd37a635
cve-2019-15858 reversed check
2.2.5 is the fixed version and should therefore be absent.
2020-11-20 10:28:29 +01:00
bauthard 1ec8040a8d
Merge pull request #624 from dwisiswant0/add/CVE-2020-13942
Add CVE-2020-13942
2020-11-19 00:42:55 +05:30
Dwi Siswanto 05f41079f4 🔥 Add CVE-2020-13942 2020-11-19 00:47:19 +07:00
Dwi Siswanto 63cfa344bd 🔥 Add CVE-2020-16846 2020-11-19 00:21:07 +07:00
bauthard 071e3b25c9 few updates 2020-11-17 16:27:15 +05:30
Sandor Toth 0202889780 cve-2017-12637.yaml tab fixed 2020-11-17 11:18:19 +01:00
Sandor Toth f5e1d23545 cve-2017-12637.yaml added 2020-11-17 11:14:41 +01:00
Dwi Siswanto d6198665e7 🔥 Add CVE-2020-8209
References:
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
2020-11-16 21:49:51 +07:00