MostInterestingBotInTheWorld
6ddfbac2b4
Dashboard Content Enhancement ( #4020 )
...
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
* Syntax restore some characters
* Spacing
* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp
* Enhancement: cves/2019/CVE-2019-10068.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-11580.yaml by mp
* Enhancement: cves/2019/CVE-2019-11581.yaml by mp
* Enhancement: cves/2019/CVE-2019-12314.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Link wrapping issue
* Enhancement: cves/2019/CVE-2019-13462.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16759.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cves/2019/CVE-2019-16278.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-12725.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs
* Enhancement: cves/2021/CVE-2021-33807.yaml by mp
* Enhancement: cves/2010/CVE-2010-0943.yaml by mp
* Enhancement: cves/2008/CVE-2008-6172.yaml by mp
* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: network/cisco-smi-exposure.yaml by mp
* Enhancement: cves/2021/CVE-2021-37704.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2019/CVE-2019-16313.yaml by mp
* Enhancement: cves/2021/CVE-2021-3017.yaml by mp
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2021/CVE-2021-37573.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2018/CVE-2018-11709.yaml by mp
* Enhancement: cves/2014/CVE-2014-2321.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Manual enhancement
* Manual enhancement push due to dashboard failure
* Testing of dashboard accidentally commited to dashboard branch
* Spacing
Put some CVEs in the classification
* Add missing cve-id fields to templates in cve/
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
sandeep
754ba8574e
Added stop-at-first-match
2022-03-30 15:19:04 +05:30
MostInterestingBotInTheWorld
13bfc8ff57
Dashboard Content Enhancements ( #3998 )
...
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
sandeep
9012b2396a
misc update to CVE-2020-10148
2022-03-29 16:00:27 +05:30
gilfoyle97
91db326b54
Fix CVE-2020-17456 (false positive) ( #3997 )
...
* Fix CVE-2020-17456 (false positive)
* additional matchers
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-28 16:35:16 +05:30
MostInterestingBotInTheWorld
814d07fb7d
Dashboard Content Enhancements ( #3961 )
...
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp
* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp
* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp
* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp
* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp
* Enhancement: dns/azure-takeover-detection.yaml by mp
* Enhancement: dns/cname-fingerprint.yaml by mp
* Enhancement: dns/cname-service-detection.yaml by mp
* Enhancement: dns/detect-dangling-cname.yaml by mp
* Enhancement: dns/dns-waf-detect.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: dns/dnssec-detection.yaml by mp
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
sandeep
ec99241f0e
Updated "/etc/passwd" regex to avoid possible false positive results.
2022-03-22 13:31:31 +05:30
Prince Chaddha
063d6ad7eb
Update CVE-2020-5412.yaml
2022-03-22 11:32:56 +05:30
Prince Chaddha
2d8bc7577a
Update CVE-2020-5412.yaml
2022-03-22 11:25:29 +05:30
z3dc0ps
d2afc026eb
Update CVE-2020-5412.yaml
2022-03-22 01:45:11 +05:30
Markus
9e43f3cc18
[false-positive] WordPress Contact Form 7 Plugin - Unrestricted File Upload ( #3825 )
...
* Update CVE-2020-35489.yaml
Fix for the false positives mentioned in #3816
* Update CVE-2020-35489.yaml
Fix for the false positives mentioned in #3816
* misc update
* version comparison with new helper function
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:48:01 +05:30
GitHub Action
3f3ba47aaa
Auto Generated CVE annotations [Mon Mar 21 12:12:32 UTC 2022] 🤖
2022-03-21 12:12:32 +00:00
Prince Chaddha
d42c946e20
Merge pull request #3907 from gy741/rule-add-v101
...
Create CVE-2020-17456.yaml
2022-03-21 17:41:48 +05:30
Prince Chaddha
f4fdbbf415
Update and rename CVE-2020-27467.yaml to cves/2020/CVE-2020-27467.yaml
2022-03-21 16:56:48 +05:30
MostInterestingBotInTheWorld
056323ec5a
Dashboard Text Enhancements ( #3927 )
...
Dashboard text enhancements
2022-03-17 13:01:45 -04:00
Prince Chaddha
4c1b01bfc3
Update CVE-2020-17456.yaml
2022-03-15 16:36:08 +05:30
GwanYeong Kim
ec174819c4
Create CVE-2020-17456.yaml
...
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-15 19:13:50 +09:00
Prince Chaddha
d016e3102f
Update CVE-2020-13158.yaml
2022-03-11 14:24:04 +05:30
Prince Chaddha
d3221ba5d6
Update and rename CVE-2020-13158.yaml to cves/2020/CVE-2020-13158.yaml
2022-03-11 14:21:56 +05:30
sandeep
67e20bc87f
puppet templates
2022-03-09 00:17:22 +05:30
Prince Chaddha
e14b913101
Update CVE-2020-15050.yaml
2022-03-08 11:12:39 +05:30
GwanYeong Kim
ba14674e22
Create CVE-2020-15050.yaml
...
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-07 19:19:01 +09:00
sandeep
3a6c69df71
template name updates
2022-03-04 22:12:30 +05:30
sandeep
af09a6ce4b
Added CVE-2020-2103
...
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
2022-03-04 21:50:03 +05:30
Prince Chaddha
b0e13cb19d
Merge pull request #3791 from pussycat0x/master
...
New Template Added
2022-03-03 16:44:20 +05:30
sandeep
6d32b81b2a
GitLab metadata update
2022-03-02 13:05:29 +05:30
sandeep
1b76c3e7e8
updated tags and id
2022-03-01 19:10:54 +05:30
sullo
93e9c04f38
Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard
2022-02-28 17:31:38 -05:00
Prince Chaddha
cc3505d3b6
added deleted templates
2022-03-01 02:15:19 +05:30
MostInterestingBotInTheWorld
3208a72e63
Enhancement: cves/2020/CVE-2020-13937.yaml by cs
2022-02-28 13:45:46 -05:00
pussycat0x
9aa861f09a
Delete CVE-2020-28976.yaml
2022-02-28 22:31:03 +05:30
sullo
73c4e88830
Rename vulnerabilities/wordpress/easy-wp-smtp-listing.yaml to CVE-2020-35234.yaml
2022-02-28 11:25:50 -05:00
GitHub Action
5b154f6b93
Auto Generated CVE annotations [Sun Feb 27 15:44:38 UTC 2022] 🤖
2022-02-27 15:44:38 +00:00
pussycat0x
afcc610cd8
Add files via upload
2022-02-27 21:12:39 +05:30
MostInterestingBotInTheWorld
b631f45e1c
Dashboard Text Enhancements ( #3778 )
...
Dashboard text enhancements
2022-02-25 17:07:55 -05:00
MostInterestingBotInTheWorld
9b82c296e1
Dashboard Enhancements ( #3722 )
...
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Enhancement: cves/2010/CVE-2010-1957.yaml by mp
* Enhancement: cves/2010/CVE-2010-1977.yaml by mp
* Enhancement: cves/2010/CVE-2010-1979.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-1983.yaml by mp
* Enhancement: cves/2010/CVE-2010-2033.yaml by mp
* Enhancement: cves/2010/CVE-2010-2034.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2036.yaml by mp
* Enhancement: cves/2010/CVE-2010-2037.yaml by mp
* Enhancement: cves/2010/CVE-2010-2045.yaml by mp
* Enhancement: cves/2010/CVE-2010-2050.yaml by mp
* Enhancement: cves/2010/CVE-2010-2122.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2128.yaml by mp
* Enhancement: cves/2010/CVE-2010-2259.yaml by mp
* Enhancement: cves/2010/CVE-2010-2307.yaml by mp
* Enhancement: cves/2010/CVE-2010-2507.yaml by mp
* Enhancement: cves/2010/CVE-2010-2680.yaml by mp
* Enhancement: cves/2010/CVE-2010-2682.yaml by mp
* Enhancement: cves/2010/CVE-2010-2857.yaml by mp
* Enhancement: cves/2010/CVE-2010-2861.yaml by mp
* Enhancement: cves/2010/CVE-2010-2918.yaml by mp
* Enhancement: cves/2010/CVE-2010-2920.yaml by mp
* Enhancement: cves/2010/CVE-2010-3203.yaml by mp
* Enhancement: cves/2010/CVE-2010-3426.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4231.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4719.yaml by mp
* Enhancement: cves/2010/CVE-2010-4769.yaml by mp
* Enhancement: cves/2010/CVE-2010-4977.yaml by mp
* Enhancement: cves/2010/CVE-2010-5028.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2010/CVE-2010-5286.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-1669.yaml by mp
* Enhancement: cves/2011/CVE-2011-2744.yaml by mp
* Enhancement: cves/2000/CVE-2000-0114.yaml by mp
* Enhancement: cves/2011/CVE-2011-3315.yaml by mp
* Enhancement: cves/2011/CVE-2011-4336.yaml by mp
* Enhancement: cves/2011/CVE-2011-4618.yaml by mp
* Enhancement: cves/2011/CVE-2011-4624.yaml by mp
* Enhancement: cves/2011/CVE-2011-4804.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2012/CVE-2012-1823.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-1226.yaml by mp
* Enhancement: cves/2012/CVE-2012-0996.yaml by mp
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-27358.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2012/CVE-2012-1835.yaml by mp
* Enhancement: cves/2012/CVE-2012-0901.yaml by mp
* Enhancement: cves/2011/CVE-2011-5265.yaml by mp
* Enhancement: cves/2011/CVE-2011-5181.yaml by mp
* Enhancement: cves/2011/CVE-2011-5179.yaml by mp
* Enhancement: cves/2011/CVE-2011-5107.yaml by mp
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2012/CVE-2012-0991.yaml by mp
* Enhancement: cves/2012/CVE-2012-0981.yaml by mp
* Enhancement: cves/2012/CVE-2012-0896.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
Co-authored-by: sullo <sullo@cirt.net>
2022-02-21 13:33:16 -05:00
sandeep
159e94d0c2
added content type check
2022-02-18 02:15:13 +05:30
Sandeep Singh
07e31135ae
Added Consul Templates ( #3720 )
...
* added request condition to avoid false positive detection
* misc updates
2022-02-17 23:55:37 +05:30
Prince Chaddha
627ef6412e
Update mongodb-unauth.yaml ( #3712 )
...
* Update mongodb-unauth.yaml
* Update CVE-2020-11110.yaml
* Update CVE-2020-11110.yaml
2022-02-16 18:03:09 +05:30
sullo
4cf3791eb3
Merge pull request #3686 from MostInterestingBotInTheWorld/dashboard
...
Dashboard Updates: Multiple content enhancements
2022-02-08 17:07:01 -05:00
Prince Chaddha
8664885b45
Update CVE-2020-35749.yaml
2022-02-09 00:13:40 +05:30
Prince Chaddha
8c14733e0b
Update and rename CVE-2020-13121.yaml to cves/2020/CVE-2020-13121.yaml
2022-02-08 23:35:08 +05:30
MostInterestingBotInTheWorld
2ab1c4cacc
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-08 11:36:43 -05:00
cckuailong
f29d2b20df
add some wp plugins cves
2022-02-08 09:07:19 +08:00
Prince Chaddha
389089d63c
Merge pull request #3668 from Akokonunes/patch-113
...
Create CVE-2020-12447.yaml
2022-02-08 00:37:11 +05:30
Prince Chaddha
4e00ba83f3
Update and rename CVE-2020-12447.yaml to cves/2020/CVE-2020-12447.yaml
2022-02-08 00:35:52 +05:30
sullo
ee235ad8e6
Extraneous comment
2022-02-07 09:01:46 -05:00
MostInterestingBotInTheWorld
4f497cbd17
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:02:22 -05:00
MostInterestingBotInTheWorld
e124b4333b
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:01:13 -05:00
MostInterestingBotInTheWorld
d7ac754156
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 15:55:59 -05:00
MostInterestingBotInTheWorld
a3d83420ac
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 14:29:39 -05:00
Prince Chaddha
42bc941827
Update and rename CVE-2020-36365.yaml to cves/2020/CVE-2020-36365.yaml
2022-02-03 02:39:33 +05:30
Prince Chaddha
dca4cdc12f
Update CVE-2020-35489.yaml
2022-02-01 01:28:32 +05:30
Prince Chaddha
fdddc48c2f
Update CVE-2020-18268.yaml
2022-02-01 00:42:58 +05:30
Prince Chaddha
992687329c
Update CVE-2020-18268.yaml
2022-02-01 00:41:58 +05:30
Prince Chaddha
fd777fd0b6
Update and rename CVE-2020-18268.yaml to cves/2020/CVE-2020-18268.yaml
2022-01-27 14:18:01 +05:30
Sullo
9a8482172d
Remove:
...
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
- spaces after : in some files
2022-01-25 14:38:53 -05:00
Leovalcante
bac26e1669
Create check for cve-2020-24391 mongo-express RCE ( #3566 )
...
* Create check for cve-2020-24391 mongo-express RCE
* random file to write + matcher updates + extractor
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-20 14:55:01 +05:30
sandeep
f6e3df8b33
CVE-2020-13483 Update
2022-01-19 13:44:01 +05:30
Roberto Nunes
f8013457b6
Create CVE-2020-23575.yaml ( #3547 )
...
* Create CVE-2020-23575.yaml
* Update and rename CVE-2020-23575.yaml to cves/2020/CVE-2020-23575.yaml
* minor update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 13:12:16 +05:30
GitHub Action
8244d08f57
Auto Generated CVE annotations [Sun Jan 16 16:40:51 UTC 2022] 🤖
2022-01-16 16:40:51 +00:00
Sandeep Singh
f6377b09ec
Added Apache APISIX's Admin API Default Access Token (RCE) ( #3544 )
2022-01-16 22:08:55 +05:30
gy741
e5958c1364
Update tags ( #3538 )
2022-01-16 02:08:21 +05:30
Prince Chaddha
aa8fd16018
Merge pull request #3515 from Akokonunes/patch-104
...
Create CVE-2020-11529.yaml
2022-01-11 14:37:32 +05:30
Prince Chaddha
7f26b9e895
Update and rename CVE-2020-11529.yaml to cves/2020/CVE-2020-11529.yaml
2022-01-11 14:35:53 +05:30
Prince Chaddha
6ea0a7f492
Update CVE-2020-7136.yaml
2022-01-11 13:43:30 +05:30
GwanYeong Kim
351dc3e460
Create CVE-2020-7136.yaml
...
A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:39:41 +09:00
Muhammad Daffa
068d576d22
Update CVE-2020-8641.yaml ( #3505 )
2022-01-08 20:23:53 +05:30
Roberto Nunes
691688fb66
Create CVE-2020-23015.yaml ( #3502 )
...
* Create CVE-2020-23015.yaml
* moving template to cves directory
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 16:52:50 +05:30
sandeep
6b30e12e86
lint fixes
2022-01-07 13:04:40 +05:30
Sandeep Singh
844c3b4a02
Network template updates & fixes ( #3497 )
...
* Fixed template syntax
* network template update and fixes
2022-01-07 12:58:37 +05:30
PikPikcU
c3360c9d23
Create CVE-2020-13258.yaml
2022-01-06 21:49:47 -05:00
Pathtaga
e281e5bf88
Updated all templates tags with technologies ( #3478 )
...
* Updated tags for template sonicwall-email-security-detect.yaml
* Updated tags for template detect-sentry.yaml
* Updated tags for template kong-detect.yaml
* Updated tags for template openam-detect.yaml
* Updated tags for template shiro-detect.yaml
* Updated tags for template iplanet-web-server.yaml
* Updated tags for template graylog-api-browser.yaml
* Updated tags for template prtg-detect.yaml
* Updated tags for template node-red-detect.yaml
* Updated tags for template abyss-web-server.yaml
* Updated tags for template geo-webserver.yaml
* Updated tags for template autobahn-python-detect.yaml
* Updated tags for template default-lighttpd-page.yaml
* Updated tags for template microsoft-iis-8.yaml
* Updated tags for template lucee-detect.yaml
* Updated tags for template php-proxy-detect.yaml
* Updated tags for template jenkins-detect.yaml
* Updated tags for template cockpit-detect.yaml
* Updated tags for template csrfguard-detect.yaml
* Updated tags for template dwr-index-detect.yaml
* Updated tags for template netsweeper-webadmin-detect.yaml
* Updated tags for template weblogic-detect.yaml
* Updated tags for template s3-detect.yaml
* Updated tags for template tileserver-gl.yaml
* Updated tags for template springboot-actuator.yaml
* Updated tags for template terraform-detect.yaml
* Updated tags for template redmine-cli-detect.yaml
* Updated tags for template mrtg-detect.yaml
* Updated tags for template tableau-server-detect.yaml
* Updated tags for template magmi-detect.yaml
* Updated tags for template oidc-detect.yaml
* Updated tags for template tor-socks-proxy.yaml
* Updated tags for template synology-web-station.yaml
* Updated tags for template herokuapp-detect.yaml
* Updated tags for template gunicorn-detect.yaml
* Updated tags for template sql-server-reporting.yaml
* Updated tags for template google-bucket-service.yaml
* Updated tags for template kubernetes-mirantis.yaml
* Updated tags for template kubernetes-enterprise-manager.yaml
* Updated tags for template oracle-iplanet-web-server.yaml
* Updated tags for template dell-idrac7-detect.yaml
* Updated tags for template dell-idrac6-detect.yaml
* Updated tags for template dell-idrac9-detect.yaml
* Updated tags for template dell-idrac8-detect.yaml
* Updated tags for template apache-guacamole.yaml
* Updated tags for template aws-cloudfront-service.yaml
* Updated tags for template aws-bucket-service.yaml
* Updated tags for template nginx-linux-page.yaml
* Updated tags for template telerik-fileupload-detect.yaml
* Updated tags for template telerik-dialoghandler-detect.yaml
* Updated tags for template htaccess-config.yaml
* Updated tags for template microsoft-azure-error.yaml
* Updated tags for template detect-options-method.yaml
* Updated tags for template unpatched-coldfusion.yaml
* Updated tags for template moodle-changelog.yaml
* Updated tags for template detect-dns-over-https.yaml
* Updated tags for template CVE-2019-19134.yaml
* Updated tags for template CVE-2019-3929.yaml
* Updated tags for template CVE-2019-19908.yaml
* Updated tags for template CVE-2019-10475.yaml
* Updated tags for template CVE-2019-17382.yaml
* Updated tags for template CVE-2019-16332.yaml
* Updated tags for template CVE-2019-14974.yaml
* Updated tags for template CVE-2019-19368.yaml
* Updated tags for template CVE-2019-12725.yaml
* Updated tags for template CVE-2019-15501.yaml
* Updated tags for template CVE-2019-9733.yaml
* Updated tags for template CVE-2019-14322.yaml
* Updated tags for template CVE-2019-9955.yaml
* Updated tags for template CVE-2019-0230.yaml
* Updated tags for template CVE-2019-10232.yaml
* Updated tags for template CVE-2019-17506.yaml
* Updated tags for template CVE-2019-8449.yaml
* Updated tags for template CVE-2019-12593.yaml
* Updated tags for template CVE-2019-10092.yaml
* Updated tags for template CVE-2019-1821.yaml
* Updated tags for template CVE-2019-3401.yaml
* Updated tags for template CVE-2019-16662.yaml
* Updated tags for template CVE-2019-5418.yaml
* Updated tags for template CVE-2016-4975.yaml
* Updated tags for template CVE-2016-1000137.yaml
* Updated tags for template CVE-2016-7552.yaml
* Updated tags for template CVE-2016-10956.yaml
* Updated tags for template CVE-2016-1000146.yaml
* Updated tags for template CVE-2013-2251.yaml
* Updated tags for template CVE-2013-1965.yaml
* Updated tags for template CVE-2014-2323.yaml
* Updated tags for template CVE-2014-5111.yaml
* Updated tags for template CVE-2014-2962.yaml
* Updated tags for template CVE-2014-4561.yaml
* Updated tags for template CVE-2014-4558.yaml
* Updated tags for template CVE-2014-3120.yaml
* Updated tags for template CVE-2007-5728.yaml
* Updated tags for template CVE-2009-4679.yaml
* Updated tags for template CVE-2009-1558.yaml
* Updated tags for template CVE-2009-4202.yaml
* Updated tags for template CVE-2009-0932.yaml
* Updated tags for template CVE-2015-2068.yaml
* Updated tags for template CVE-2015-8813.yaml
* Updated tags for template CVE-2015-7450.yaml
* Updated tags for template CVE-2015-2067.yaml
* Updated tags for template CVE-2015-3306.yaml
* Updated tags for template CVE-2015-3337.yaml
* Updated tags for template CVE-2015-1427.yaml
* Updated tags for template CVE-2015-1503.yaml
* Updated tags for template CVE-2015-1880.yaml
* Updated tags for template CVE-2018-3810.yaml
* Updated tags for template CVE-2018-18069.yaml
* Updated tags for template CVE-2018-17246.yaml
* Updated tags for template CVE-2018-10141.yaml
* Updated tags for template CVE-2018-16341.yaml
* Updated tags for template CVE-2018-18777.yaml
* Updated tags for template CVE-2018-15138.yaml
* Updated tags for template CVE-2018-11784.yaml
* Updated tags for template CVE-2018-16299.yaml
* Updated tags for template CVE-2018-7251.yaml
* Updated tags for template CVE-2018-1273.yaml
* Updated tags for template CVE-2018-1271.yaml
* Updated tags for template CVE-2018-11759.yaml
* Updated tags for template CVE-2018-3167.yaml
* Updated tags for template CVE-2018-7490.yaml
* Updated tags for template CVE-2018-2628.yaml
* Updated tags for template CVE-2018-13380.yaml
* Updated tags for template CVE-2018-2893.yaml
* Updated tags for template CVE-2018-5316.yaml
* Updated tags for template CVE-2018-20985.yaml
* Updated tags for template CVE-2018-10818.yaml
* Updated tags for template CVE-2018-1000861.yaml
* Updated tags for template CVE-2018-0296.yaml
* Updated tags for template CVE-2018-19458.yaml
* Updated tags for template CVE-2018-3760.yaml
* Updated tags for template CVE-2018-12998.yaml
* Updated tags for template CVE-2018-9118.yaml
* Updated tags for template CVE-2018-1000130.yaml
* Updated tags for template CVE-2008-6668.yaml
* Updated tags for template CVE-2017-7269.yaml
* Updated tags for template CVE-2017-1000170.yaml
* Updated tags for template CVE-2017-16877.yaml
* Updated tags for template CVE-2017-1000486.yaml
* Updated tags for template CVE-2017-9822.yaml
* Updated tags for template CVE-2017-0929.yaml
* Updated tags for template CVE-2017-7921.yaml
* Updated tags for template CVE-2017-14535.yaml
* Updated tags for template CVE-2017-5521.yaml
* Updated tags for template CVE-2017-12637.yaml
* Updated tags for template CVE-2017-12635.yaml
* Updated tags for template CVE-2017-11610.yaml
* Updated tags for template CVE-2021-20114.yaml
* Updated tags for template CVE-2021-40856.yaml
* Updated tags for template CVE-2021-21972.yaml
* Updated tags for template CVE-2021-31602.yaml
* Updated tags for template CVE-2021-41773.yaml
* Updated tags for template CVE-2021-37704.yaml
* Updated tags for template CVE-2021-45046.yaml
* Updated tags for template CVE-2021-26084.yaml
* Updated tags for template CVE-2021-27931.yaml
* Updated tags for template CVE-2021-24291.yaml
* Updated tags for template CVE-2021-41648.yaml
* Updated tags for template CVE-2021-37216.yaml
* Updated tags for template CVE-2021-22005.yaml
* Updated tags for template CVE-2021-37573.yaml
* Updated tags for template CVE-2021-31755.yaml
* Updated tags for template CVE-2021-43287.yaml
* Updated tags for template CVE-2021-24274.yaml
* Updated tags for template CVE-2021-33564.yaml
* Updated tags for template CVE-2021-22145.yaml
* Updated tags for template CVE-2021-24237.yaml
* Updated tags for template CVE-2021-44848.yaml
* Updated tags for template CVE-2021-25646.yaml
* Updated tags for template CVE-2021-21816.yaml
* Updated tags for template CVE-2021-41649.yaml
* Updated tags for template CVE-2021-41291.yaml
* Updated tags for template CVE-2021-41293.yaml
* Updated tags for template CVE-2021-21801.yaml
* Updated tags for template CVE-2021-29156.yaml
* Updated tags for template CVE-2021-34370.yaml
* Updated tags for template CVE-2021-27132.yaml
* Updated tags for template CVE-2021-28151.yaml
* Updated tags for template CVE-2021-26812.yaml
* Updated tags for template CVE-2021-21985.yaml
* Updated tags for template CVE-2021-43778.yaml
* Updated tags for template CVE-2021-25281.yaml
* Updated tags for template CVE-2021-40539.yaml
* Updated tags for template CVE-2021-36749.yaml
* Updated tags for template CVE-2021-21234.yaml
* Updated tags for template CVE-2021-33221.yaml
* Updated tags for template CVE-2021-42013.yaml
* Updated tags for template CVE-2021-33807.yaml
* Updated tags for template CVE-2021-44228.yaml
* Updated tags for template CVE-2012-0896.yaml
* Updated tags for template CVE-2012-0991.yaml
* Updated tags for template CVE-2012-0392.yaml
* Updated tags for template CVE-2012-4940.yaml
* Updated tags for template CVE-2012-1226.yaml
* Updated tags for template CVE-2012-4878.yaml
* Updated tags for template CVE-2010-1304.yaml
* Updated tags for template CVE-2010-1217.yaml
* Updated tags for template CVE-2010-0759.yaml
* Updated tags for template CVE-2010-2307.yaml
* Updated tags for template CVE-2010-4231.yaml
* Updated tags for template CVE-2010-2861.yaml
* Updated tags for template CVE-2010-4282.yaml
* Updated tags for template CVE-2010-1302.yaml
* Updated tags for template CVE-2010-1461.yaml
* Updated tags for template CVE-2020-4463.yaml
* Updated tags for template CVE-2020-1943.yaml
* Updated tags for template CVE-2020-36289.yaml
* Updated tags for template CVE-2020-17518.yaml
* Updated tags for template CVE-2020-12800.yaml
* Updated tags for template CVE-2020-10770.yaml
* Updated tags for template CVE-2020-17506.yaml
* Updated tags for template CVE-2020-11547.yaml
* Updated tags for template CVE-2020-11034.yaml
* Updated tags for template CVE-2020-24589.yaml
* Updated tags for template CVE-2020-9054.yaml
* Updated tags for template CVE-2020-28976.yaml
* Updated tags for template CVE-2020-16952.yaml
* Updated tags for template CVE-2020-24312.yaml
* Updated tags for template CVE-2020-8512.yaml
* Updated tags for template CVE-2020-14179.yaml
* Updated tags for template CVE-2020-6308.yaml
* Updated tags for template CVE-2020-35846.yaml
* Updated tags for template CVE-2020-7318.yaml
* Updated tags for template CVE-2020-2140.yaml
* Updated tags for template CVE-2020-5410.yaml
* Updated tags for template CVE-2020-5777.yaml
* Updated tags for template CVE-2020-13700.yaml
* Updated tags for template CVE-2020-5775.yaml
* Updated tags for template CVE-2020-13167.yaml
* Updated tags for template CVE-2020-35848.yaml
* Updated tags for template CVE-2020-9484.yaml
* Updated tags for template CVE-2020-15505.yaml
* Updated tags for template CVE-2020-9047.yaml
* Updated tags for template CVE-2020-17519.yaml
* Updated tags for template CVE-2020-17505.yaml
* Updated tags for template CVE-2020-9376.yaml
* Updated tags for template CVE-2020-8497.yaml
* Updated tags for template CVE-2020-14092.yaml
* Updated tags for template CVE-2020-10148.yaml
* Updated tags for template CVE-2020-35847.yaml
* Updated tags for template CVE-2020-12116.yaml
* Updated tags for template CVE-2020-11930.yaml
* Updated tags for template CVE-2020-24186.yaml
* Updated tags for template CVE-2020-9496.yaml
* Updated tags for template CVE-2020-35489.yaml
* Updated tags for template CVE-2020-26413.yaml
* Updated tags for template CVE-2020-2096.yaml
* misc updates
* misc update
* more updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 01:04:16 +05:30
Sandeep Singh
de9c4d605c
Apache Tomcat Template improvements ( #3446 )
...
* Improved Tomcat matchers / extractors / paths
* removed duplicate detections / matchers
* removed duplicate template
* Added missing tomcat tags
2021-12-29 19:10:59 +05:30
sandeep
85956018f8
Added metadata
2021-12-28 18:16:23 +05:30
Sandeep Singh
5d7d4409a0
Added CVE-2020-11546 ( #3436 )
...
Co-Authored-By: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
Co-authored-by: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
2021-12-28 18:13:04 +05:30
Prince Chaddha
c92010033b
Update CVE-2020-8497.yaml
2021-12-06 10:39:43 +05:30
GwanYeong Kim
b76c1d20f3
Create CVE-2020-8497.yaml
...
In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-06 08:36:14 +09:00
GitHub Action
2f6733c202
Auto Generated CVE annotations [Mon Nov 29 14:34:36 UTC 2021] 🤖
2021-11-29 14:34:36 +00:00
Sandeep Singh
38839cfbbc
Added Commvault CommCell Directory Traversal (CVE-2020-25780) ( #3182 )
2021-11-29 20:02:59 +05:30
GitHub Action
bcb798df8b
Auto Generated CVE annotations [Sun Nov 28 20:49:07 UTC 2021] 🤖
2021-11-28 20:49:07 +00:00
sandeep
b7cb6a63cb
moving template into cves
2021-11-29 02:17:27 +05:30
sandeep
682db62431
Fixed CVE-2020-14882 payload + matcher
2021-11-29 01:15:05 +05:30
Prince Chaddha
168db8a984
Update CVE-2020-2096.yaml
2021-11-24 11:58:52 +04:00
yuan
641ffd4e93
update CVE-2020-2096
2021-11-23 19:01:24 +08:00
GitHub Action
65ec414ae7
Auto Generated CVE annotations [Tue Nov 23 04:08:40 UTC 2021] 🤖
2021-11-23 04:08:40 +00:00
Prince Chaddha
1c569d76cb
Update CVE-2020-20982.yaml
2021-11-23 07:57:11 +04:00
PikPikcU
8463cfd824
Create CVE-2020-20982.yaml
2021-11-22 22:56:22 +07:00
Prince Chaddha
26a9bbc797
Update and rename CVE-2020-19360.yaml to cves/2020/CVE-2020-19360.yaml
2021-11-13 23:34:22 +05:30
GitHub Action
56c9fb7a7b
Auto Generated CVE annotations [Sat Nov 6 17:09:47 UTC 2021] 🤖
2021-11-06 17:09:47 +00:00
sandeep
dbbb08e40c
misc updates
2021-11-06 22:36:37 +05:30
Prince Chaddha
0e27f24138
Update CVE-2020-26413.yaml
2021-11-06 20:18:27 +05:30
Prince Chaddha
5aeb4de8c8
Create CVE-2020-26413.yaml
2021-11-06 18:22:50 +05:30
Chill3d
e6d40037c5
Typo on rocketchat tag
2021-10-27 10:30:43 +02:00
Sandeep Singh
b8aaf28eb6
Merge pull request #2901 from lethargynavigator/master
...
CVE-2020-24589 template
2021-10-21 22:27:25 +05:30
sandeep
e7768bb348
misc update
2021-10-21 22:25:42 +05:30
lethargynavigator
15a8208fc6
full poc
2021-10-21 11:02:55 -04:00
Sandeep Singh
a21cec6362
Merge pull request #2844 from projectdiscovery/more-fixes
...
Changes to adopt v2.5.3 engine
2021-10-21 07:21:20 +05:30
sandeep
33badb66d1
oob tags update
2021-10-19 02:10:26 +05:30
Prince Chaddha
fc81dd3b24
Update CVE-2020-10770.yaml
2021-10-18 21:03:29 +05:30
GitHub Action
e8218febf5
Auto Generated CVE annotations [Sun Oct 17 16:03:20 UTC 2021] 🤖
2021-10-17 16:03:20 +00:00
Dhiyaneshwaran
a9eca98f7f
Update CVE-2020-10770.yaml
2021-10-17 21:31:55 +05:30
Dhiyaneshwaran
9c8d006dbe
Create CVE-2020-10770.yaml
2021-10-17 21:29:45 +05:30
lethargynavigator
2871cc6b02
CVE-2020-24589 template
2021-10-15 20:37:03 -04:00
Sandeep Singh
9273a765c0
Merge branch 'master' into more-fixes
2021-10-13 13:48:52 +05:30
GitHub Action
5cf090ddec
Auto Generated CVE annotations [Sun Oct 10 22:40:30 UTC 2021] 🤖
2021-10-10 22:40:30 +00:00
sandeep
d76884c109
moving files around
2021-10-11 04:07:10 +05:30
sandeep
5072932509
more updates
2021-10-10 06:43:30 +05:30
sandeep
53fc9bcb3f
misc fixes
2021-10-07 05:23:20 +05:30
sandeep
937ff9f7ee
misc update
2021-10-05 22:00:59 +05:30
Sandeep Singh
ada6fcef43
Update CVE-2020-2036.yaml
2021-10-02 17:56:42 +05:30
Philippe Delteil
8185a0e9c0
Update CVE-2020-2036.yaml
2021-10-02 03:24:29 -03:00
sullo
c0003f8731
Update CVE-2020-29453.yaml
2021-09-30 14:27:12 -04:00
sullo
784d9560be
Fix CVSS score
...
incorrectly changed cvss score
2021-09-30 14:26:37 -04:00
Sullo
3878138bfe
* Added Host headers where needed (validated via disclosures/posts)
...
* Added CVE simple-employee-rce.yaml
2021-09-30 12:52:05 -04:00
sullo
6b5d52084d
Update cvss/severity for CVE-2020-29453
2021-09-29 10:35:52 -04:00
sandeep
ff1537d7da
fixing tags typos
2021-09-21 15:43:08 +05:30
sandeep
7b23f4ebd4
outdated template cleanups
2021-09-21 14:34:20 +05:30
Sandeep Singh
0f03f5ff55
Merge pull request #2692 from projectdiscovery/metadata-attribute-update
2021-09-18 18:19:07 +05:30
GitHub Action
a866f1e777
Auto Generated CVE annotations [Fri Sep 17 11:08:30 UTC 2021] 🤖
2021-09-17 11:08:30 +00:00
Prince Chaddha
7fc3c211d8
Merge pull request #2667 from pikpikcu/patch-268
...
Added Jeesns POC
2021-09-17 16:37:25 +05:30
Prince Chaddha
9357ac4153
Update CVE-2020-19282.yaml
2021-09-17 16:33:45 +05:30
Prince Chaddha
51672dd85d
Update CVE-2020-19295.yaml
2021-09-17 16:32:41 +05:30
Prince Chaddha
ae221b7892
Update CVE-2020-19283.yaml
2021-09-17 16:32:27 +05:30
Prince Chaddha
92014aa363
Update CVE-2020-19295.yaml
2021-09-17 16:31:20 +05:30
sandeep
676b51d20c
Metadata attribute update
2021-09-16 21:24:33 +05:30
GitHub Action
7542ad2c07
Auto Generated CVE annotations [Thu Sep 16 13:05:34 UTC 2021] 🤖
2021-09-16 13:05:34 +00:00
forgedhallpass
d0f5daca61
#276 Replace space character with dash in template ID.
2021-09-16 16:04:04 +03:00
GitHub Action
f19daba616
Auto Generated CVE annotations [Wed Sep 15 12:04:47 UTC 2021] 🤖
2021-09-15 12:04:47 +00:00
Prince Chaddha
f5c71d54e2
Merge pull request #2677 from pikpikcu/patch-278
...
Create CVE-2020-28351.yaml
2021-09-15 17:33:36 +05:30
Prince Chaddha
6539892061
Update CVE-2020-28351.yaml
2021-09-15 17:24:42 +05:30
GitHub Action
18534fa692
Auto Generated CVE annotations [Wed Sep 15 11:53:20 UTC 2021] 🤖
2021-09-15 11:53:20 +00:00
Prince Chaddha
68cdcd3034
Update CVE-2020-24912.yaml
2021-09-15 17:20:24 +05:30
Prince Chaddha
bc1d567455
Update CVE-2020-24912.yaml
2021-09-15 16:50:33 +05:30
Prince Chaddha
86a369132e
Update CVE-2020-24912.yaml
2021-09-15 16:49:18 +05:30
PikPikcU
80072c8e97
Create CVE-2020-28351.yaml
2021-09-15 13:13:50 +07:00
PikPikcU
bb8e0616e9
Create CVE-2020-24912.yaml
2021-09-15 13:00:51 +07:00
PikPikcU
1d63ebfe45
Update CVE-2020-19295.yaml
2021-09-15 11:30:58 +07:00
PikPikcU
c5416951e5
Update CVE-2020-19283.yaml
2021-09-15 11:30:38 +07:00
PikPikcU
4a10930690
Update CVE-2020-19282.yaml
2021-09-15 11:30:18 +07:00
PikPikcU
6985e77e20
Update CVE-2020-19295.yaml
2021-09-15 10:45:24 +07:00
PikPikcU
5fb54fd82e
Update CVE-2020-19283.yaml
2021-09-15 10:45:04 +07:00
PikPikcU
42cf71e956
Create CVE-2020-19295.yaml
2021-09-15 10:41:12 +07:00
PikPikcU
6e09439dec
Create CVE-2020-19283.yaml
2021-09-15 10:37:44 +07:00
PikPikcU
4340807fb6
Create CVE-2020-19282.yaml
2021-09-15 09:56:03 +07:00
sandeep
29a944ea73
payload update
2021-09-12 20:22:03 +05:30
sandeep
e6d97e26c5
additional matcher
2021-09-12 18:31:46 +05:30
Ice3man543
e9f728c321
Added cve annotations + severity adjustments
2021-09-10 16:56:40 +05:30
sandeep
bd24dc198e
Coverage for all templates using tags
2021-09-09 19:08:13 +05:30
Prince Chaddha
90eba9d883
Update CVE-2020-7961.yaml
2021-09-09 11:46:54 +05:30
Prince Chaddha
43b45a7b63
Update CVE-2020-12720.yaml
2021-09-09 11:42:52 +05:30
sandeep
609705f676
removed extra headers not required for template
2021-09-08 17:47:19 +05:30
sullo
ef1f7c5e92
Updates across many templates for clarity, spelling, and grammar.
2021-09-05 17:13:45 -04:00
Sandeep Singh
f6c72769ce
temporary moving to another branch
2021-09-03 22:29:55 +05:30
sandeep
90f8caf302
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into pr/2481
2021-09-03 14:55:30 +05:30
sandeep
c41a498505
added tags
2021-09-03 12:52:27 +05:30
Prince Chaddha
58a886ad6e
Update CVE-2020-28976.yaml
2021-09-03 09:24:21 +05:30
Borna Nematzadeh
6e7c3ab0a2
Update CVE-2020-28976.yaml
2021-09-02 12:26:10 -07:00
LogicalHunter
f0197ae9ac
Added CVE-2020-28976.yaml Template
2021-09-02 12:13:21 -07:00
Prince Chaddha
3b32de60be
Update CVE-2020-11547.yaml
2021-09-02 18:25:16 +05:30
betul.kiral
5c94814e00
Adding CVE-2020-11547
2021-09-02 14:43:37 +03:00
sandeep
c81725e991
Removed duplicate template
2021-09-01 12:36:20 +05:30
Noam Rathaus
51eb639de8
Updated
2021-08-30 12:49:23 +03:00
Noam Rathaus
86f3c08ba6
Vendor writes it as "NETGEAR"
2021-08-29 09:39:06 +03:00
Noam Rathaus
67fa97aed1
Add vendor KB
2021-08-29 09:36:59 +03:00
socketz
c766a8454d
Fixed yaml linting errors
2021-08-25 14:09:42 +02:00
socketz
f290b9f60d
Deleted duplicate and in wrong directory
2021-08-25 07:55:46 +02:00
sandeep
d705fbd84b
Update CVE-2020-11420.yaml
2021-08-25 00:33:54 +05:30
sandeep
3c95101f5a
Update CVE-2020-11420.yaml
2021-08-25 00:31:27 +05:30
sandeep
65d9d8acb2
lint fix
2021-08-24 23:13:00 +05:30
forgedhallpass
110f9c9ddd
Merge remote-tracking branch 'origin' into dynamic_attributes
2021-08-24 20:38:11 +03:00
socketz
7d6a6c137a
Added CVE-2020-11420
2021-08-24 14:43:45 +02:00
sandeep
85f8cf2c41
Update CVE-2020-12800.yaml
2021-08-24 05:00:04 +05:30
sandeep
fba4461932
Added CVE-2020-12800
2021-08-24 04:57:51 +05:30
forgedhallpass
296edfc37b
Merge remote-tracking branch 'origin' into dynamic_attributes
2021-08-23 14:40:33 +03:00
Sandeep Singh
04b401a8ef
Merge pull request #2456 from projectdiscovery/payloads-update
...
Payloads positional update to keep the request format uniform
2021-08-23 15:26:35 +05:30
sandeep
451e938d46
misc changes
2021-08-23 14:54:04 +05:30
Dwi Siswanto
be3d5c9d08
Add CVE-2020-29453
2021-08-23 11:30:16 +07:00
sandeep
2aa54304ee
Payloads positional update to keep the request format uniform
2021-08-22 23:39:33 +05:30
forgedhallpass
dc4cc62629
Merge remote-tracking branch 'origin/master' into dynamic_attributes
2021-08-20 15:35:17 +03:00
sandeep
3f803deb28
more updates
2021-08-20 02:14:42 +05:30
forgedhallpass
77103bc629
Satisfying the linter (all errors and warnings)
...
* whitespace modifications only
2021-08-19 17:44:46 +03:00
forgedhallpass
2a320412bf
Misc (minor)
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 17:25:01 +03:00
forgedhallpass
97d4f8705b
Fixed mistakes/typos
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:55 +03:00
forgedhallpass
f55d6b75e1
Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:12 +03:00
forgedhallpass
7b29be739e
Merge branch 'master' into dynamic_attributes
2021-08-19 16:23:26 +03:00
forgedhallpass
ffaff64565
Changes fixes/around dynamic attributes ("additional-fields")
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:17:27 +03:00
forgedhallpass
0b432b341b
Added comments with URLs under the "references" field
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:15:35 +03:00
Prince Chaddha
3a8b5df438
Update CVE-2020-25223.yaml
2021-08-19 16:35:50 +05:30
GwanYeong Kim
673fe80660
Create CVE-2020-25223.yaml
...
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-19 18:37:59 +09:00
forgedhallpass
cdf9451158
Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
forgedhallpass
4c920b2552
Rename "references" to "reference" to match the expected template info structure
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:29:20 +03:00
sandeep
63431349aa
minor update
2021-08-10 20:13:14 +05:30
Geeknik Labs
d6bd06a878
Update CVE-2020-24312.yaml
...
Fixes a false positive.
2021-08-09 20:43:58 -05:00
Prince Chaddha
bc236580ee
Merge pull request #1856 from Akokonunes/patch-15
...
Create CVE-2019-9618.yaml
2021-08-07 19:55:08 +05:30
Prince Chaddha
3395eff8a0
Merge pull request #2316 from gy741/rule-add-v49
...
Create CVE-2020-7796.yaml
2021-08-03 19:57:45 +05:30
Prince Chaddha
23bc448b1b
Merge pull request #2199 from pikpikcu/patch-208
...
Add OpenSIS POC
2021-08-03 19:53:32 +05:30
Prince Chaddha
b927288f30
Update CVE-2020-6637.yaml
2021-08-03 19:25:06 +05:30
Prince Chaddha
107c3594bf
Update CVE-2020-6637.yaml
2021-08-03 13:24:31 +05:30
sandeep
3c03e28e55
Update CVE-2020-7796.yaml
2021-08-03 12:50:22 +05:30
sandeep
d8007437ae
Update CVE-2020-7796.yaml
2021-08-03 12:50:10 +05:30
Prince Chaddha
b02ea3266b
Update CVE-2020-7796.yaml
2021-08-03 12:47:55 +05:30
Prince Chaddha
9620f4616e
Update CVE-2020-7796.yaml
2021-08-03 12:42:56 +05:30
GwanYeong Kim
9c16967fa5
Create CVE-2020-7796.yaml
...
Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-03 09:31:23 +09:00
GwanYeong Kim
8627aadce0
Create CVE-2020-27361.yaml
...
An issue exists within Akkadian Provisioning Manager 4.50.02 which allows attackers to view sensitive information within the /pme subdirectories.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-03 01:17:48 +09:00
Prince Chaddha
a3cba3b1e1
Merge pull request #2280 from daffainfo/patch-120
...
Create CVE-2020-35598.yaml
2021-08-02 17:14:38 +05:30
sandeep
a24977aab9
Update CVE-2020-6637.yaml
2021-08-02 01:42:01 +05:30
Noam Rathaus
734dde35cc
Fix FP - https://github.com/projectdiscovery/nuclei-templates/issues/2217
2021-08-01 08:52:30 +03:00
Muhammad Daffa
b826d82268
Create CVE-2020-35598.yaml
2021-08-01 06:40:11 +07:00
Toufik Airane
1cce455f1c
Update CVE-2020-13927.yaml
...
Following the discussion https://github.com/projectdiscovery/nuclei-templates/discussions/1477 .
According to NIST, It's a critical issue.
https://nvd.nist.gov/vuln/detail/CVE-2020-13927
2021-07-30 16:40:41 +02:00
Muhammad Daffa
da3ba72db3
Create CVE-2020-11455.yaml
2021-07-29 05:43:07 +07:00
Sandeep Singh
32e18be51a
Merge pull request #2215 from TheConciergeDev/patch-4
...
Renamed yaml file
2021-07-27 17:27:23 +05:30
Prince Chaddha
fdfd4232a5
Merge pull request #2225 from pikpikcu/patch-231
...
Create CVE-2020-26153.yaml
2021-07-27 17:22:04 +05:30
Prince Chaddha
cdb91d44f3
Update CVE-2020-26153.yaml
2021-07-27 17:20:54 +05:30
Prince Chaddha
4a5d374227
Merge pull request #2212 from pikpikcu/patch-220
...
Add Jeedom XSS
2021-07-27 17:18:07 +05:30
Prince Chaddha
142eb2fe3b
Update CVE-2020-9036.yaml
2021-07-27 17:12:32 +05:30
Prince Chaddha
c4e75a7eb5
Merge pull request #2203 from pikpikcu/patch-211
...
Add CVE-2020-27735
2021-07-27 17:08:21 +05:30
PikPikcU
d561a8711d
Create CVE-2020-26153.yaml
2021-07-27 18:19:44 +07:00
Prince Chaddha
d9f20b63e4
Update CVE-2020-27735.yaml
2021-07-27 16:32:50 +05:30
Prince Chaddha
6e7aba2fb9
Update CVE-2020-27735.yaml
2021-07-27 13:55:45 +05:30
Prince Chaddha
4a13112125
Update CVE-2020-27735.yaml
2021-07-27 13:33:41 +05:30
TheConciergeDev
62df9585f9
Renamed yaml file
...
Added missing "-" in filename
2021-07-27 09:28:54 +02:00
PikPikcU
6f91b5d052
Create CVE-2020-9036.yaml
2021-07-27 13:45:01 +07:00
Prince Chaddha
76a39c9ef5
Update CVE 2020-6171.yaml
2021-07-27 11:58:42 +05:30
PikPikcU
751626e435
Update CVE 2020-6171.yaml
2021-07-27 12:24:17 +07:00
PikPikcU
ddc251861f
Create CVE 2020-6171.yaml
2021-07-27 12:21:52 +07:00
Prince Chaddha
caf6bb61c3
Update CVE-2020-27735.yaml
2021-07-27 10:41:08 +05:30
Prince Chaddha
b2f1863fd7
Update CVE-2020-35774.yaml
2021-07-27 10:40:55 +05:30
Prince Chaddha
b75c2dde67
Update CVE-2020-35774.yaml
2021-07-27 10:38:46 +05:30
PikPikcU
326c8265ef
Create CVE-2020-35774.yaml
2021-07-27 10:31:48 +07:00
PikPikcU
f619caf26a
Create CVE-2020-27735.yaml
2021-07-27 10:23:23 +07:00
PikPikcU
96c03d93cc
Update CVE-2020-6637.yaml
2021-07-27 07:38:49 +07:00
PikPikcU
b1dfb89f88
Create CVE-2020-6637.yaml
2021-07-27 07:36:48 +07:00
sandeep
9c66387f0f
More CVEs Template
2021-07-26 22:48:45 +05:30
Sandeep Singh
79c077ddf7
Merge pull request #1874 from Vladimir-Ivanov-Git/CVE-2020-6207
...
CVE-2020-6207 SAP SolMan RCE
2021-07-26 18:26:55 +05:30
Sandeep Singh
8130cd2c3b
Update CVE-2020-6207.yaml
2021-07-26 18:26:19 +05:30
Prince Chaddha
4ee46bf076
Merge pull request #2112 from daffainfo/patch-91
...
Create CVE-2020-35580.yaml
2021-07-26 14:06:50 +05:30
Prince Chaddha
84161bc33e
Update CVE-2020-8813.yaml
2021-07-26 13:27:19 +05:30
GwanYeong Kim
620ff3f367
Create CVE-2020-8813.yaml
...
This vulnerability could be exploited without authentication if Cacti is enabling “Guest Realtime Graphs” privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-26 11:32:23 +09:00
Muhammad Daffa
fed682443e
Update CVE-2020-35580.yaml
2021-07-26 06:55:48 +07:00
GwanYeong Kim
b9fadff659
Create CVE-2020-5307.yaml
...
PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-25 11:50:53 +09:00
sandeep
6ccc5f8792
matcher update to handle edge cases
2021-07-25 03:05:55 +05:30
Prince Chaddha
f32521ad9d
Merge pull request #2113 from daffainfo/patch-92
...
Create CVE-2020-29227.yaml
2021-07-24 12:22:54 +05:30
Prince Chaddha
af4081d0ec
Update CVE-2020-29227.yaml
2021-07-24 12:17:56 +05:30
Prince Chaddha
956eb6691f
Update CVE-2020-29227.yaml
2021-07-24 12:16:30 +05:30
Prince Chaddha
f40aca136b
Update CVE-2020-29227.yaml
2021-07-24 12:15:24 +05:30
Prince Chaddha
31f62d59ce
Update CVE-2020-13117.yaml
2021-07-24 11:39:47 +05:30
Prince Chaddha
f60a9ed891
Update CVE-2020-13117.yaml
2021-07-23 15:06:51 +05:30
GwanYeong Kim
7298a0b35d
Create CVE-2020-13117.yaml
...
Several Wavlink products are affected by a vulnerability that may allow remote unauthenticated users to execute arbitrary commands as root on Wavlink devices. The user input is not properly sanitized which allows command injection via the "key" parameter in a login request. It has been tested on Wavlink WN575A4 and WN579X3 devices, but other products may be affected.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-23 11:14:31 +09:00
Muhammad Daffa
65bddf3e33
Create CVE-2020-29227.yaml
2021-07-20 20:08:18 +07:00
Muhammad Daffa
f7d4a642f1
Create CVE-2020-35580.yaml
2021-07-20 20:02:49 +07:00
Sandeep Singh
ac39bd3284
Merge pull request #2100 from daffainfo/master
...
Renamed CVE-2020-8771.yaml
2021-07-20 11:38:35 +05:30
Sandeep Singh
14beefec28
Update CVE-2020-8771.yaml
2021-07-20 11:35:57 +05:30
sandeep
19fe96bc45
minor improvements and file name update
2021-07-20 11:33:16 +05:30
Muhammad Daffa
d27fb4c3b0
Renamed CVE-2020-8771.yaml
2021-07-20 12:49:16 +07:00
Sandeep Singh
6eee57115c
Merge pull request #2083 from projectdiscovery/fixing-xss-matchers
...
fixing-xss-matchers
2021-07-20 00:28:01 +05:30
sandeep
414883f719
Update CVE-2020-12054.yaml
2021-07-19 23:55:15 +05:30
sandeep
7d9dbc4aad
Update CVE-2020-28188.yaml
2021-07-19 16:41:12 +05:30
GwanYeong Kim
edabf1e7ca
Create CVE-2020-28188.yaml
...
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-19 15:13:57 +09:00
Prince Chaddha
75c5a8c68e
Update CVE-2020-17362.yaml
2021-07-19 11:35:47 +05:30
Prince Chaddha
c22839b3fd
Update CVE-2020-12054.yaml
2021-07-19 11:35:24 +05:30
sandeep
965e6fcc00
minor update
2021-07-18 23:24:55 +05:30
GwanYeong Kim
fb22fd40c5
Create CVE-2020-27866.yaml
...
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 10:03:38 +09:00
sandeep
048cdff225
Additional matcher
2021-07-17 02:07:26 +05:30
Prince Chaddha
33a0ede229
Merge pull request #2009 from gy741/rule-add-v24
...
Create CVE-2020-26919, CVE-2020-25506, OptiLink ONT1GEW GPON RCE, CVE-2021-31755
2021-07-16 18:04:52 +05:30
Prince Chaddha
4da4ebf224
Merge pull request #2020 from gy741/rule-add-v25
...
Create CVE-2020-35713.yaml
2021-07-16 17:31:26 +05:30
Prince Chaddha
f4f05394e1
Update CVE-2020-35713.yaml
2021-07-16 17:30:35 +05:30
Regala
6aef970258
Update CVE-2020-17362.yaml
...
Added "nova-lite" matcher; massively reduce false positives.
2021-07-16 12:19:30 +01:00
sandeep
94ae6ea0bf
Added tag
2021-07-15 23:47:05 +05:30
sandeep
97dfd43f1e
Added tag and removed unsafe
2021-07-15 23:46:08 +05:30
Prince Chaddha
b7d2ac2843
Merge pull request #2023 from daffainfo/patch-61
...
Create CVE-2020-12054.yaml
2021-07-15 17:27:05 +05:30
Prince Chaddha
89112a18d6
Update CVE-2020-12054.yaml
2021-07-15 17:25:22 +05:30
Prince Chaddha
93293c986a
Update CVE-2020-17362.yaml
2021-07-15 17:22:49 +05:30
Muhammad Daffa
cb364b16c5
Update CVE-2020-12054.yaml
2021-07-15 18:30:38 +07:00
Muhammad Daffa
dc2cf528bd
Create CVE-2020-12054.yaml
2021-07-15 18:27:45 +07:00
Muhammad Daffa
6d3e02ddc1
Create CVE-2020-17362.yaml
2021-07-15 18:14:59 +07:00
GwanYeong Kim
f8f9f539ea
Create CVE-2020-35713.yaml
...
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 18:10:11 +09:00
GwanYeong Kim
a3699d912a
Create CVE-2020-25506.yaml
...
The exploit targets a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 14:28:14 +09:00
GwanYeong Kim
67ae44be04
Create CVE-2020-26919.yaml
...
it was found that every section of the web could be used as a valid endpoint to submit POST requests being the action defined by the submitId argument. The problem was located in the login.html webpage, that has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow users execute system commands.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 10:54:56 +09:00
Sandeep Singh
89e1a8da93
Merge pull request #1962 from dwisiswant0/hotfix/CVE-2020-24148
2021-07-13 05:01:01 +05:30
Dwi Siswanto
a91516cbb5
Misplaced of CVE-2020-24148
2021-07-13 05:24:03 +07:00
Prince Chaddha
7f0f8beff2
Update CVE-2020-29395.yaml
2021-07-11 10:14:56 +05:30
Muhammad Daffa
da45bdf0ef
Create CVE-2020-29395.yaml
2021-07-11 07:58:31 +07:00
Ivanov Vladimir
8938010a7a
Add CVE-2020-6207.yaml
2021-07-05 20:36:55 +03:00
sandeep
f21b239853
misc changes
2021-07-03 15:23:28 +05:30
Sandeep Singh
52e0c861a1
Merge pull request #1733 from milo2012/master
...
Added CVE-2018-1000130/ CVE-2018-2628/ CVE-2018-2628/ CVE-2019-3401/ CVE-2020-1938/ oracle-bi-default-login/ jolokia-heap-disclosure
2021-07-02 18:27:45 +05:30
sandeep
e2a0f93f79
misc updates
2021-07-02 18:24:31 +05:30
sandeep
96fc7bb341
more strict matchers
2021-06-30 03:26:01 +05:30
sandeep
d1e4b5c510
minor updates
2021-06-25 10:51:00 +05:30
PikPikcU
19d80d9d0a
Create CVE-2020-3580.yaml
2021-06-24 15:34:19 +00:00
sandeep
3844df9fc8
misc changes
2021-06-21 18:09:16 +05:30
Prince Chaddha
592b2e7222
Update CVE-2020-1938.yaml
2021-06-21 14:28:51 +05:30
Prince Chaddha
cb4d12cc8c
Moved to cves/2018
2021-06-21 14:20:20 +05:30
Dhiyaneshwaran
8b43919211
Update CVE-2020-11930.yaml
2021-06-21 14:15:45 +05:30
Dhiyaneshwaran
216b484aec
Update CVE-2020-11930.yaml
2021-06-21 14:15:09 +05:30
Dhiyaneshwaran
ebc202adcb
Create CVE-2020-11930.yaml
2021-06-21 14:11:20 +05:30
Keith
55b89115aa
add CVE-2018-2628 - Oracle WebLogic Server Deserialization RCE
2021-06-21 06:24:33 +08:00
sandeep
c7a11cd1b1
Added CVE-2020-11110
2021-06-20 20:00:19 +05:30
Keith
e8e5dd5c83
add CVE-2020-1938.yaml - Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability
2021-06-19 21:59:42 +08:00
Prince Chaddha
55c1984a52
Template Moved to cves
2021-06-19 01:58:02 +05:30
Philippe Delteil
d25869d764
Update CVE-2020-36289.yaml
2021-06-14 11:50:25 -04:00
sandeep
5c80980915
Added CVE-2020-36289
2021-06-09 21:13:52 +05:30
Prince Chaddha
83ce809e8d
Updated author names
2021-06-09 17:50:56 +05:30
sandeep
14fa085d1b
more improvements
2021-06-05 12:15:32 +05:30
sandeep
55c0e1b103
Improved matchers for CVE-2020-6287
2021-06-05 10:29:59 +05:30
Sandeep Singh
c0103e0b8a
Merge pull request #1608 from Mad-robot/master
...
Create CVE-2020-6308.yaml
2021-06-05 00:04:56 +05:30
sandeep
83d359f6cf
updating tags
2021-06-05 00:02:33 +05:30
sandeep
11cb8b3106
Update CVE-2020-6308.yaml
2021-06-05 00:00:50 +05:30
sandeep
0e3ed049ae
misc changes
2021-06-03 23:00:47 +05:30
sandeep
bdc803fd4b
Added CVE-2020-13927
2021-06-03 14:23:34 +05:30
sandeep
4a0e83037d
Update CVE-2020-11978.yaml
2021-06-03 13:58:41 +05:30
sandeep
6652b2ddb6
Added CVE-2020-11978
2021-06-03 13:57:09 +05:30
Noam Rathaus
e3f42066bf
Spelling
2021-06-02 09:39:35 +03:00
SaN ThosH
f28fdf610b
Create CVE-2020-6308.yaml
2021-06-02 11:39:27 +05:30
sandeep
01995c82ab
misc changes
2021-05-28 09:26:30 +05:30
PikPikcU
830a187e0d
Update CVE-2020-35736.yaml
2021-05-27 15:02:32 +00:00
PikPikcU
ddf6bcb7ca
Update CVE-2020-35736.yaml
2021-05-27 14:51:03 +00:00
PikPikcU
f981074e3f
Update CVE-2020-35736.yaml
2021-05-27 13:03:59 +00:00
PikPikcU
b7d8536a01
Create CVE-2020-35736.yaml
2021-05-27 12:56:22 +00:00
Dhiyaneshwaran
633b9c39ee
Update CVE-2020-19625.yaml
2021-05-26 16:39:57 +05:30
sandeep
cad836d34e
Added CVE-2020-15227
2021-05-22 17:22:45 +05:30
Sandeep Singh
a320fd7720
Merge pull request #1494 from Techbrunch/magento-stuff
...
Security Checks for Magento - Templates and workflow
2021-05-20 20:04:25 +05:30
sandeep
74449f98ed
Removing additional requests
2021-05-19 06:50:49 +05:30
Geeknik Labs
0c6a3051e8
Create CVE-2020-36112.yaml
2021-05-18 22:56:54 +00:00
Techbrunch
776776621a
Added a few Magento related templates
2021-05-18 15:53:10 +02:00
sandeep
ce200510a6
changed for testing locally, reverting it back
2021-05-17 21:45:53 +05:30
sandeep
fa73765221
regex update
2021-05-17 21:42:41 +05:30
Noam Rathaus
ae6b2b42bf
Shorter check
2021-05-16 16:12:59 +03:00
Noam Rathaus
6df4482c23
Make description more managable
2021-05-16 15:46:17 +03:00
Noam Rathaus
f659e820b7
Much better description and references
2021-05-16 15:44:54 +03:00
sandeep
fdec804118
Template fix
2021-05-15 19:25:57 +05:30
sandeep
d63b9e1cb8
Adding missing tags
2021-05-13 00:54:59 +05:30
sandeep
20eae78810
improved matcher
2021-05-12 00:32:16 +05:30
sandeep
ce680a546c
Improved matcher
2021-05-12 00:25:14 +05:30
sandeep
682b9fbbc3
Adding status matcher
2021-05-11 02:48:45 +05:30
sandeep
bfddeccb31
path update
2021-05-11 02:42:34 +05:30
sandeep
c0f5cf03ab
tags update
2021-05-09 20:41:52 +05:30
sandeep
5fca66c2a5
Added CVE-2020-9490
2021-05-07 19:24:44 +05:30
sandeep
a14c1ce233
Added strict matcher
2021-05-05 17:26:14 +05:30
sandeep
931f8833bf
removing weak matcher
2021-05-05 17:13:51 +05:30
sandeep
1d2a7b370f
Adding strict matcher
2021-05-05 17:04:46 +05:30
sandeep
c2c381787f
updating condition
2021-05-05 16:58:40 +05:30
Sandeep Singh
68a9a5f954
Merge pull request #1302 from projectdiscovery/CVE-2020-7247
...
Adding CVE-2020-7247 🔥 🔥
2021-05-05 00:02:23 +05:30
Sandeep Singh
f838747ec1
Merge pull request #1393 from DhiyaneshGeek/master
...
ZyXEL NAS RCE,Oracle iPlanet Improper Authorization,NetScalar AAA Login Panel,ShareCenter Login Page
2021-05-02 17:18:15 +05:30
sandeep
534fcc8964
Update CVE-2020-9315.yaml
2021-05-02 17:14:03 +05:30
sandeep
837ca10f23
minor updates
2021-05-02 17:07:30 +05:30
Noam Rathaus
e76d10a3c7
Make reference visible
2021-05-02 08:51:18 +03:00
Dhiyaneshwaran
3ec1a82d82
Create CVE-2020-9315.yaml
2021-05-01 16:38:36 +05:30
Dhiyaneshwaran
3012822716
Create CVE-2020-9054.yaml
2021-05-01 16:15:03 +05:30
Noam Rathaus
bfc959a5a6
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates
2021-04-30 20:11:38 +03:00
sandeep
dad40cadfc
Temporarily moving to branch
2021-04-30 21:45:18 +05:30
Noam Rathaus
1f2b2d05c1
False positive in the matcher, the content of the file has: "= 5.3.1 =" in it, not just a number on its own in addition, it has "1. ... something" in it causing FP
2021-04-27 16:09:27 +03:00
sandeep
8b7fbeb786
Added hostname
2021-04-25 13:02:41 +05:30
Prince Chaddha
12186514e3
Create CVE-2020-14750.yaml
2021-04-23 18:09:54 +05:30
sandeep
5af8fe5e34
Moving into draft for better matching
2021-04-23 12:45:49 +05:30
sandeep
0e2a270a11
minor update
2021-04-21 22:08:46 +05:30
jeyaseelan8
5b598fb291
Add files via upload
2021-04-21 21:05:47 +05:30
Noam Rathaus
3a8edbffe6
I think the 'words' were placed in the wrong place
2021-04-19 09:32:33 +03:00
sandeep
af3905d2db
Update CVE-2020-7247.yaml
2021-04-18 20:18:32 +05:30
sandeep
dad0d1b3a4
Adding CVE-2020-7247
2021-04-18 20:15:41 +05:30
sandeep
8652ce2262
minor update
2021-04-17 21:24:29 +05:30
Prince Chaddha
d4e78af66b
Update CVE-2020-19625.yaml
2021-04-15 23:37:47 +05:30
Geeknik Labs
3ebf76685a
Create CVE-2020-19625.yaml
2021-04-15 13:16:11 +00:00
sandeep
3eea755de1
Adding status matcher
2021-04-14 01:37:04 +05:30
Dwi Siswanto
eed5fb11da
Add CVE-2020-35846
2021-04-14 02:45:06 +07:00
Dwi Siswanto
8ab8a1d53e
Add CVE-2020-35848
2021-04-14 02:30:08 +07:00
Dwi Siswanto
65a7eae942
Add CVE-2020-35847
2021-04-14 02:19:41 +07:00
sandeep
b05c8f402b
Added CVE-2020-15500
2021-04-11 16:12:21 +05:30
PD-Team
2d3051aea1
Merge pull request #1207 from nrathaus/master
...
Fixed some template issues
2021-04-07 14:27:19 +05:30
Julian Vilas
7b44702946
Remove duplicated CVE-2020-26073 template
2021-04-06 15:40:01 +02:00
Noam Rathaus
b6b0b3dfda
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates
2021-04-06 13:19:07 +03:00
sandeep
8fdfc64e54
misc tag updates
2021-04-06 12:16:11 +05:30
Noam Rathaus
1790babdd4
Better reference
2021-04-04 12:49:07 +03:00
sandeep
3f8303a1de
Update CVE-2020-24550.yaml
2021-04-02 14:31:43 +05:30
Dhiyaneshwaran
7111fb4bbe
Create CVE-2020-24550.yaml
2021-04-02 14:11:43 +05:30
sandeep
15aba2ca14
improved matcher
2021-04-01 14:31:34 +05:30
sandeep
5df627a909
Update CVE-2020-25078.yaml
2021-04-01 12:53:55 +05:30
PikPikcU
052c61ba31
Update CVE-2020-25078.yaml
2021-04-01 03:49:46 +00:00
PikPikcU
3735db2221
Create CVE-2020-25078.yaml
2021-04-01 03:35:06 +00:00
Prince Chaddha
c6bb3b0151
Merge pull request #1164 from geeknik/patch-34
...
Create CVE-2020-23517.yaml
2021-03-31 15:39:35 +05:30
sandeep
fd763a3d69
Update CVE-2020-15148.yaml
2021-03-31 15:35:43 +05:30
PikPikcU
4d1addb6f1
Create CVE-2020-15148.yaml
2021-03-29 20:47:04 +00:00
Geeknik Labs
4363fcded1
Update CVE-2020-23517.yaml
2021-03-29 19:37:59 +00:00
Geeknik Labs
8ec0053387
Create CVE-2020-23517.yaml
2021-03-29 15:52:28 +00:00
sandeep
4f7faf94ff
Create CVE-2020-28208.yaml
2021-03-29 17:09:45 +05:30
Mzack9999
351167e91f
removing redundant boolean check
2021-03-25 00:28:50 +01:00
PD-Team
4bbbd79b70
Merge pull request #1124 from alanbriangh/master
...
Add CVE-2020-35489 Detection
2021-03-25 01:29:36 +05:30
sandeep
904c9666d1
matcher and workflow update
2021-03-25 01:28:03 +05:30
PD-Team
5d8bf70470
Merge pull request #1137 from nrathaus/master
...
Description and References on some templates were missing
2021-03-24 23:02:15 +05:30
sandeep
423be58952
Update CVE-2020-17453.yaml
2021-03-24 22:42:56 +05:30
SaN ThosH
92cda223eb
Create CVE-2020-17453.yaml
2021-03-24 21:05:32 +05:30
Noam Rathaus
be600fd099
References
2021-03-24 09:01:00 +02:00
Noam Rathaus
f56f240951
Descriptions and references
2021-03-24 09:00:21 +02:00
Noam Rathaus
314a487512
Description
2021-03-24 08:56:49 +02:00
Noam Rathaus
4d7b0396ae
Description
2021-03-24 08:54:09 +02:00
Noam Rathaus
6e7314ac41
Better description
2021-03-24 08:51:54 +02:00
Noam Rathaus
532c5373a1
Missing description
2021-03-24 08:50:41 +02:00
Noam Rathaus
904f156121
Missing description
2021-03-24 08:50:31 +02:00
Noam Rathaus
ee8c34576c
Description and reference
2021-03-22 10:55:38 +02:00
Noam Rathaus
555dba6268
References
2021-03-22 10:54:22 +02:00