pussycat0x
|
8de6c0cb81
|
Update CVE-2023-25135.yaml
|
2023-05-10 20:45:19 +05:30 |
pussycat0x
|
36819b63eb
|
minor -update
|
2023-05-10 20:43:56 +05:30 |
pussycat0x
|
dc3180fd24
|
protocol -update
|
2023-05-10 19:14:55 +05:30 |
Dhiyaneshwaran
|
cba7f8b5e5
|
changing from system to var_dump
|
2023-05-10 17:51:16 +05:30 |
Ritik Chaddha
|
2696334222
|
updated matcher
|
2023-05-10 17:42:58 +05:30 |
Dhiyaneshwaran
|
68828dd492
|
Merge pull request #7183 from projectdiscovery/cve-templates1
CVE templates added
|
2023-05-10 01:09:21 +05:30 |
pussycat0x
|
58f7db754f
|
protocol-update
|
2023-05-10 01:00:43 +05:30 |
sandeep
|
aa90fc9036
|
added additional matcher to make it strict
|
2023-05-09 22:50:55 +05:30 |
Dhiyaneshwaran
|
b3dc6cf70a
|
change in query
|
2023-05-09 22:42:10 +05:30 |
Dhiyaneshwaran
|
f2890ae2fa
|
Create CVE-2023-25135.yaml
|
2023-05-09 22:10:11 +05:30 |
pussycat0x
|
e27cde97f6
|
protocol update
|
2023-05-09 21:46:34 +05:30 |
Ritik Chaddha
|
b79431ad43
|
updated path and matchers
|
2023-05-09 21:45:10 +05:30 |
Parth Malhotra
|
777f1efbc1
|
Update CVE-2023-31059.yaml
|
2023-05-09 21:42:39 +05:30 |
Parth Malhotra
|
1baf108a3f
|
Update CVE-2023-31059.yaml
|
2023-05-09 21:38:13 +05:30 |
Parth Malhotra
|
cdfe62741d
|
Create CVE-2023-31059.yaml
|
2023-05-09 21:35:10 +05:30 |
Parth Malhotra
|
6ef29cb29e
|
Create CVE-2023-31059.yaml
|
2023-05-09 21:30:06 +05:30 |
Ritik Chaddha
|
68b0734657
|
removed matcher condition
|
2023-05-09 19:36:13 +05:30 |
sandeep
|
c59974226f
|
strict dsl matcher with addition check
|
2023-05-09 18:40:00 +05:30 |
Sandeep Singh
|
6addff3ac6
|
misc syntax fixes (#7201)
|
2023-05-09 18:13:13 +05:30 |
Parth Malhotra
|
0450d1224f
|
Create CVE-2023-25717.yaml
|
2023-05-09 18:05:28 +05:30 |
pussycat0x
|
68a1ea89e0
|
Update CVE-2023-26360.yaml
|
2023-05-09 16:51:33 +05:30 |
Dhiyaneshwaran
|
5c3ef6fa06
|
fix trail space
|
2023-05-09 15:07:07 +05:30 |
Dhiyaneshwaran
|
cb9fce3f99
|
Create CVE-2023-26360.yaml
|
2023-05-09 15:03:18 +05:30 |
Dhiyaneshwaran
|
70a4c7180c
|
description added
|
2023-05-08 22:56:05 +05:30 |
Dhiyaneshwaran
|
badb9b7945
|
Create CVE-2022-24716.yaml
|
2023-05-08 22:54:19 +05:30 |
Ritik Chaddha
|
a4f51aca8f
|
updated info
|
2023-05-08 13:08:31 +05:30 |
sandeep
|
dd953b4706
|
Added spm + shodan query
|
2023-05-08 12:58:19 +05:30 |
Co5mos
|
ed206e5c27
|
Update CVE-2023-2356 Template
|
2023-05-08 15:12:08 +08:00 |
j3ssie
|
b89dee6aae
|
Path Traversal in Ghost CMS < 5.42.1
|
2023-05-08 13:27:57 +07:00 |
Ritik Chaddha
|
f96e98052e
|
payload update
|
2023-05-08 11:07:00 +05:30 |
Dhiyaneshwaran
|
5875abf833
|
Merge pull request #7182 from ViCrack/CVE-2020-14883
Updated CVE-2020-14883
|
2023-05-08 11:03:41 +05:30 |
Arm!tage
|
9dbcf5b78a
|
change to default password
|
2023-05-08 00:19:29 +08:00 |
ViCrack
|
5b88116b2e
|
fix xstream
|
2023-05-07 00:36:32 +08:00 |
ViCrack
|
4e638c079f
|
replace cat command with rand_int
|
2023-05-06 23:08:06 +08:00 |
Prince Chaddha
|
124b2230cf
|
templates added
|
2023-05-06 17:42:20 +05:30 |
Ritik Chaddha
|
1732a81929
|
added shodan
|
2023-05-06 12:38:20 +05:30 |
Ritik Chaddha
|
cb6ebb417b
|
updated variable and matcher
|
2023-05-06 12:29:32 +05:30 |
ViCrack
|
df22dcc281
|
add support for Windows
|
2023-05-06 14:21:07 +08:00 |
pussycat0x
|
0e09e7c289
|
Merge pull request #7179 from dogasantos/CVE-2021-43798.yaml
fixed false positive produce by the old win.ini regex
|
2023-05-05 23:02:26 +05:30 |
pussycat0x
|
906a0a65e3
|
Update CVE-2021-43798.yaml
|
2023-05-05 22:56:15 +05:30 |
Dhiyaneshwaran
|
511a601dd6
|
Merge pull request #7175 from Co5mos/CVE-2022-40879
Updated CVE-2022-40879 Template
|
2023-05-05 22:52:41 +05:30 |
Dhiyaneshwaran
|
c585da0abe
|
Merge pull request #7176 from Co5mos/CVE-2022-0678
Updated CVE-2022-0678 Template
|
2023-05-05 22:52:23 +05:30 |
pussycat0x
|
8bafd0510d
|
Merge branch 'main' into CVE-2021-43798.yaml
|
2023-05-05 22:51:45 +05:30 |
pussycat0x
|
a82301ad7b
|
Merge pull request #7171 from Mys7ic/fix_CVE-2021-43798
fix regex for win.ini
|
2023-05-05 22:36:01 +05:30 |
pussycat0x
|
983915d4bc
|
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml
|
2023-05-05 19:02:53 +05:30 |
Dhiyaneshwaran
|
6ea44267d5
|
Merge branch 'main' into main
|
2023-05-05 18:35:06 +05:30 |
pussycat0x
|
4660c9abf3
|
lint -fix
|
2023-05-05 16:48:47 +05:30 |
Prince Chaddha
|
9a11ae394b
|
Merge pull request #7046 from projectdiscovery/add-cpe-epss
Added CPE and EPSS Score to CVE Templates
|
2023-05-05 15:33:15 +05:30 |
mlec
|
a6c3f4f9c1
|
fix(false-positive): Remove trailing space 🩹
|
2023-05-05 08:27:56 +02:00 |
mlec
|
8c792b2911
|
fix(false-positive): Add removed part after rebased 🩹
Refs:
- https://github.com/projectdiscovery/nuclei-templates/issues/5934
- https://github.com/projectdiscovery/nuclei-templates/pull/5939
|
2023-05-05 08:17:35 +02:00 |
pussycat0x
|
576c0d64d4
|
Merge pull request #7154 from j4vaovo/patch-33
Create CVE-2017-17731.yaml
|
2023-05-05 11:47:15 +05:30 |
pussycat0x
|
0649a8eec8
|
Update and rename http/cves/CVE-2017-17731.yaml to http/cves/2017/CVE-2017-17731.yaml
|
2023-05-05 11:43:29 +05:30 |
pussycat0x
|
a7b52d98a9
|
Merge branch 'main' into main
|
2023-05-05 10:38:42 +05:30 |
pussycat0x
|
9e7fa915d9
|
protocol update
|
2023-05-05 10:35:38 +05:30 |
pussycat0x
|
9159fde669
|
Update and rename cves/2021/CVE-2021-40870.yaml to http/cves/2021/CVE-2021-40870.yaml
|
2023-05-05 10:35:10 +05:30 |
pussycat0x
|
8458967376
|
Rename cves/2020/CVE-2020-5847.yaml to http/cves/2020/CVE-2020-5847.yaml
|
2023-05-05 10:33:34 +05:30 |
Ritik Chaddha
|
c6c2a0d413
|
Update CVE-2018-13379.yaml
|
2023-05-05 00:05:34 +05:30 |
Ritik Chaddha
|
9f85fbc113
|
Update CVE-2019-19908.yaml
|
2023-05-05 00:04:56 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
dogasantos
|
dfadeb5774
|
fixed false positive produce by the old win.ini regex
|
2023-05-04 14:28:33 -03:00 |
Co5mos
|
c6e1cabcfe
|
Added CVE-2023-2356 Template
|
2023-05-04 20:59:25 +08:00 |
Co5mos
|
c76b0a862a
|
Updated CVE-2022-0678 Template
|
2023-05-04 20:37:18 +08:00 |
Co5mos
|
4565b0a6fe
|
Updated CVE-2022-40879 Template
|
2023-05-04 20:34:45 +08:00 |
myztique
|
e5c97d8319
|
fix regex for win.ini
|
2023-05-03 15:00:00 +02:00 |
sandeep
|
2175d81329
|
removed duplicate key
|
2023-05-02 18:29:30 +05:30 |
sandeep
|
ea116bde6b
|
moving file around
|
2023-05-02 18:24:56 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
sandeep
|
a470c2a150
|
Merge remote-tracking branch 'origin' into add-max-request
|
2023-05-02 17:52:27 +05:30 |
Dhiyaneshwaran
|
5d204637bd
|
Update CVE-2017-17731.yaml
|
2023-05-02 16:39:12 +05:30 |
Dhiyaneshwaran
|
3a0ceae738
|
fix
|
2023-05-02 16:29:15 +05:30 |
Prince Chaddha
|
59ac982c42
|
Create CVE-2019-3398.yaml
|
2023-05-01 17:54:05 +05:30 |
Prince Chaddha
|
d6d8d9f4ae
|
Merge branch 'main' into patch-23
|
2023-05-01 09:07:54 +05:30 |
Prince Chaddha
|
966d37b02e
|
updated template path and protocol name
|
2023-05-01 09:07:12 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
MostInterestingBotInTheWorld
|
a34153eb9c
|
Dashboard Content Enhancements (#7149)
Dashboard Content Enhancements
|
2023-04-28 09:11:35 -04:00 |
Ritik Chaddha
|
392187b67e
|
Merge branch 'main' into CVE-2023-20864
|
2023-04-28 16:17:54 +05:30 |
Dhiyaneshwaran
|
27f30265bd
|
Merge pull request #7126 from projectdiscovery/CVE-2023-27350
PaperCut - Unauthenticated Remote Code Execution CVE-2023-27350
|
2023-04-28 16:01:47 +05:30 |
Dhiyaneshwaran
|
77ee8acc56
|
change to http
|
2023-04-28 15:32:24 +05:30 |
Dhiyaneshwaran
|
00ef22599c
|
Rename cves/2023/CVE-2023-27350.yaml to http/cves/2023/CVE-2023-27350.yaml
|
2023-04-28 15:32:02 +05:30 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
pussycat0x
|
dd2b93a095
|
Merge pull request #7145 from projectdiscovery/CVE-2023-29489
Create CVE-2023-29489.yaml
|
2023-04-28 13:18:18 +05:30 |
pussycat0x
|
474f99f7c4
|
Rename CVE-2023-29489.yaml to CVE-2023-29489.yaml
|
2023-04-28 13:15:11 +05:30 |
pussycat0x
|
f04bd2658b
|
Merge pull request #7150 from Co5mos/CVE-2023-1671
Added CVE-2023-1671 Template
|
2023-04-28 10:40:31 +05:30 |
j4vaovo
|
ca0b9665cd
|
Create CVE-2017-17731.yaml
|
2023-04-28 08:53:23 +08:00 |
Dhiyaneshwaran
|
658575fb02
|
Merge pull request #5520 from edoardottt/CVE-2020-27481
Add CVE-2020-27481
|
2023-04-27 23:10:11 +05:30 |
Dhiyaneshwaran
|
38514e4bd1
|
Update and rename cves/2020/CVE-2020-27481.yaml to http/cves/2020/CVE-2020-27481.yaml
|
2023-04-27 23:06:26 +05:30 |
Dhiyaneshwaran
|
2a363a80a2
|
Update and rename cves/2023/CVE-2023-1671.yaml to http/cves/2023/CVE-2023-1671.yaml
|
2023-04-27 22:45:45 +05:30 |
Ritik Chaddha
|
793b661255
|
Update and rename cves/2023/CVE-2023-20864.yaml to http/cves/2023/CVE-2023-20864.yaml
|
2023-04-27 21:14:42 +05:30 |
pussycat0x
|
795999751e
|
Refactoring the directory structure based on protocols (#7146)
* Refactoring the directory structure based on protocols
* Update CVE-2021-30175.yaml
* lint fix
---------
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
|
2023-04-27 17:01:53 +05:30 |
pussycat0x
|
ada36e744f
|
Refactoring the directory structure based on protocols (#7147)
* @pussycat0x Refactoring the directory structure based on protocols
* Update CVE-2023-29922.yaml
|
2023-04-27 17:01:18 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |