Ritik Chaddha
af83d90a99
Update CVE-2020-22211.yaml
2022-06-28 14:55:12 +05:30
Ritik Chaddha
5f4a64a91a
Update CVE-2020-22209.yaml
2022-06-28 14:54:03 +05:30
Ritik Chaddha
2ba3d154ba
Update CVE-2020-22210.yaml
2022-06-28 14:50:44 +05:30
Ritik Chaddha
6bb869ac29
Update CVE-2020-22208.yaml
2022-06-28 14:43:20 +05:30
Prince Chaddha
aab3dbf34b
Update CVE-2020-9315.yaml
2022-06-28 08:52:21 +05:30
Prince Chaddha
626f8b06f3
Update CVE-2020-9315.yaml
2022-06-28 08:46:41 +05:30
Prince Chaddha
58427e0d41
Update CVE-2020-9490.yaml
2022-06-28 08:41:34 +05:30
Prince Chaddha
fb4bed8369
Update CVE-2020-8982.yaml
2022-06-28 08:39:11 +05:30
Prince Chaddha
8a3e40c8cd
Update CVE-2020-9047.yaml
2022-06-28 08:38:22 +05:30
Prince Chaddha
3957ba18f8
Update CVE-2020-9315.yaml
2022-06-28 08:37:51 +05:30
Prince Chaddha
772164de85
Update CVE-2020-9376.yaml
2022-06-28 08:36:16 +05:30
Prince Chaddha
0d84ee7a1b
Update CVE-2020-9425.yaml
2022-06-28 08:35:28 +05:30
MostInterestingBotInTheWorld
7f119d5268
Merge branch 'master' into dashboard
2022-06-27 15:07:55 -04:00
MostInterestingBotInTheWorld
ceb455e952
Enhancement: cves/2020/CVE-2020-8982.yaml by mp
2022-06-27 14:40:32 -04:00
MostInterestingBotInTheWorld
2ba6fa6163
Enhancement: cves/2020/CVE-2020-9047.yaml by mp
2022-06-27 14:39:48 -04:00
MostInterestingBotInTheWorld
9001568d67
Enhancement: cves/2020/CVE-2020-9376.yaml by mp
2022-06-27 14:38:41 -04:00
MostInterestingBotInTheWorld
48f7a4ea94
Enhancement: cves/2020/CVE-2020-9490.yaml by mp
2022-06-27 14:24:26 -04:00
MostInterestingBotInTheWorld
378fd786e2
Enhancement: cves/2020/CVE-2020-9425.yaml by mp
2022-06-27 14:23:05 -04:00
MostInterestingBotInTheWorld
930aafa21e
Enhancement: cves/2020/CVE-2020-9376.yaml by mp
2022-06-27 14:21:20 -04:00
MostInterestingBotInTheWorld
58792416b8
Enhancement: cves/2020/CVE-2020-9315.yaml by mp
2022-06-27 14:20:12 -04:00
MostInterestingBotInTheWorld
2948dc4dde
Enhancement: cves/2020/CVE-2020-9047.yaml by mp
2022-06-27 14:18:09 -04:00
MostInterestingBotInTheWorld
e8f1a4abe3
Enhancement: cves/2020/CVE-2020-8982.yaml by mp
2022-06-27 14:15:00 -04:00
MostInterestingBotInTheWorld
f81fc737c2
Enhancement: cves/2020/CVE-2020-8813.yaml by mp
2022-06-27 14:12:09 -04:00
sandeep
0180779d24
template id and tags fixes
2022-06-27 15:13:42 +05:30
sandeep
87c9007f60
added missing cve tags
2022-06-27 14:59:47 +05:30
Ritik Chaddha
c62e3e72b6
Update CVE-2020-20982.yaml
2022-06-25 14:34:40 +05:30
Prince Chaddha
f95372222b
Update CVE-2020-20982.yaml
2022-06-25 07:47:04 +05:30
sullo
32bab78eb6
Langage standardization across the template set
2022-06-21 16:46:20 -04:00
sullo
7f1962ceb5
Enhancements & Cleanups
2022-06-21 09:31:04 -04:00
MostInterestingBotInTheWorld
8bb6be6e1c
Enhancement: cves/2020/CVE-2020-22210.yaml by cs
2022-06-21 08:56:18 -04:00
MostInterestingBotInTheWorld
4a12276321
Enhancement: cves/2020/CVE-2020-22211.yaml by cs
2022-06-21 08:55:52 -04:00
GitHub Action
bdd892516e
Auto Generated CVE annotations [Thu Jun 16 04:52:10 UTC 2022] 🤖
2022-06-16 04:52:10 +00:00
Prince Chaddha
d952450a6f
metadata-update
2022-06-16 10:05:56 +05:30
Prince Chaddha
493ea898ea
Merge branch 'Update-metadata-query' of https://github.com/ritikchaddha/nuclei-templates into ritikchaddha-Update-metadata-query
2022-06-16 10:03:41 +05:30
Ritik Chaddha
3273f169ac
Update CVE-2020-5776.yaml
2022-06-16 01:27:25 +05:30
Ritik Chaddha
dd1285cd80
Update CVE-2020-5777.yaml
2022-06-16 01:27:23 +05:30
Sandeep Singh
0b8fe245cd
Added strict matchers ( #4589 )
2022-06-15 05:03:00 +05:30
Prince Chaddha
580a152b19
Merge pull request #4540 from ritikchaddha/patch-74
...
Create CVE-2020-22208.yaml
2022-06-10 20:02:50 +05:30
Prince Chaddha
0a067faf7e
Merge pull request #4539 from ritikchaddha/patch-73
...
Create CVE-2020-22209.yaml
2022-06-10 19:12:18 +05:30
Prince Chaddha
9bd944cc15
Update CVE-2020-22208.yaml
2022-06-10 19:12:01 +05:30
Prince Chaddha
b9cddc461a
Update CVE-2020-22209.yaml
2022-06-10 19:08:43 +05:30
Prince Chaddha
7d73301a95
Merge pull request #4537 from ritikchaddha/patch-71
...
Create CVE-2020-22211.yaml
2022-06-10 19:07:01 +05:30
Prince Chaddha
ba7416227b
Merge pull request #4538 from ritikchaddha/patch-72
...
Create CVE-2020-22210.yaml
2022-06-10 19:05:04 +05:30
Prince Chaddha
2116e26725
Update CVE-2020-22211.yaml
2022-06-10 19:04:19 +05:30
MostInterestingBotInTheWorld
b883737198
Dashboard Content Enhancements ( #4567 )
...
Dashboard Content Enhancements
2022-06-09 16:35:21 -04:00
Prince Chaddha
db806be93d
Update CVE-2020-22211.yaml
2022-06-09 17:10:43 +05:30
Prince Chaddha
5b40d7f07b
Update CVE-2020-22211.yaml
2022-06-09 17:08:54 +05:30
Prince Chaddha
ef9ee3e505
Update CVE-2020-22211.yaml
2022-06-09 17:08:02 +05:30
Prince Chaddha
a0aa01b898
Update CVE-2020-22211.yaml
2022-06-09 10:33:02 +05:30
Aaron Chen
5aa779a068
Fix templates: change alert(xss) to alert(/xss/) ( #4564 )
2022-06-09 10:11:03 +05:30
Prince Chaddha
7ada510859
Fixed possible FPs in open redirect templates ( #4544 )
...
* Fixed possible FPs in open redirect templates
We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.
* updated example domain
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
Ritik Chaddha
404f532df6
Update CVE-2020-22211.yaml
2022-06-05 17:16:08 +05:30
Prince Chaddha
1a54b625b8
Update CVE-2020-22208.yaml
2022-06-05 17:15:29 +05:30
Ritik Chaddha
6be001ec61
Update CVE-2020-22210.yaml
2022-06-05 17:15:00 +05:30
Ritik Chaddha
f44f6a0719
Update CVE-2020-22209.yaml
2022-06-05 17:14:16 +05:30
Prince Chaddha
dd3c883933
Update CVE-2020-22210.yaml
2022-06-05 16:32:35 +05:30
Ritik Chaddha
f79c2d50f2
Create CVE-2020-22208.yaml
2022-06-05 16:10:44 +05:30
Ritik Chaddha
5127e1b920
Create CVE-2020-22209.yaml
2022-06-05 16:10:34 +05:30
Ritik Chaddha
0912b651bd
Create CVE-2020-22210.yaml
2022-06-05 16:10:20 +05:30
Ritik Chaddha
161155c001
Create CVE-2020-22211.yaml
2022-06-05 16:09:55 +05:30
Ritik Chaddha
914aa45704
Update and rename cves/2020/CVE-2020-22210.yaml to vulnerabilities/other/74cms-sqli.yaml
2022-06-05 15:04:44 +05:30
GitHub Action
2b8d79ede7
Auto Generated CVE annotations [Sat Jun 4 11:45:09 UTC 2022] 🤖
2022-06-04 11:45:09 +00:00
Prince Chaddha
63a781fcba
Update CVE-2020-29597.yaml
2022-06-04 16:47:47 +05:30
Prince Chaddha
acfc3a2a49
Create CVE-2020-29597.yaml
2022-06-04 16:45:28 +05:30
Yuzhe-Zhang-0
9d8806582d
added cisa tags to appropriate templates ( #4523 )
2022-06-02 03:01:44 +05:30
Sandeep Singh
1d5d9504fc
Added Weblogic UDDIexplorer and other template updates ( #4488 )
...
* Added Weblogic UDDIexplorer and other template updates
* misc updates
2022-05-27 00:05:42 +05:30
MostInterestingBotInTheWorld
5eb6b79331
Dashboard Content Enhancements ( #4426 )
...
Dashboard Content Enhancements
2022-05-18 16:58:07 -04:00
GitHub Action
d0832c679e
Auto Generated CVE annotations [Tue May 17 20:46:49 UTC 2022] 🤖
2022-05-17 20:46:49 +00:00
Sandeep Singh
b59ff42aaf
additional reference to cves templates ( #4395 )
...
* additional reference to cves templates
* Update CVE-2006-1681.yaml
* Update CVE-2009-3318.yaml
* Update CVE-2009-4223.yaml
* Update CVE-2010-0942.yaml
* Update CVE-2010-0944.yaml
* Update CVE-2010-0972.yaml
* Update CVE-2010-1304.yaml
* Update CVE-2010-1308.yaml
* Update CVE-2010-1313.yaml
* Update CVE-2010-1461.yaml
* Update CVE-2010-1470.yaml
* Update CVE-2010-1471.yaml
* Update CVE-2010-1472.yaml
* Update CVE-2010-1474.yaml
* removed duplicate references
* misc fix
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
MostInterestingBotInTheWorld
83cc50ce3e
Dashboard Content Enhancements ( #4411 )
...
* standardizing enhanced by tag
* Fix spacing. Add classification->cve
* Enhancement: cves/2021/CVE-2021-20158.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Typo
* Enhancement: cves/2021/CVE-2021-20837.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21479.yaml by mp
* Enhancement: cves/2021/CVE-2021-21881.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-22005.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Enhancement: cves/2021/CVE-2021-24472.yaml by mp
* Enhancement: cves/2021/CVE-2021-20090.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-21985.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Restore empty lines
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Remove unnecessary file
* Restore content after bad dashboard edit
* Enhancement: undefined by cs
* Spacing issues
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Delete null file created by dashboard
* Remove improper Enhanced tag
* Spacing issues
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Remove test dashboard commits
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Not really enhanced
* Add classification->cve-id
* Restore content from dashboard mess up
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Restore newlines
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2015/CVE-2015-3224.yaml by mp
* Enhancement: cves/2015/CVE-2015-7450.yaml by mp
* Enhancement: cves/2016/CVE-2016-10134.yaml by mp
* Enhancement: cves/2016/CVE-2016-1555.yaml by mp
* Enhancement: cves/2016/CVE-2016-2004.yaml by mp
* Enhancement: cves/2016/CVE-2016-5649.yaml by mp
* Enhancement: cves/2016/CVE-2016-7552.yaml by mp
* Enhancement: cves/2017/CVE-2017-1000486.yaml by mp
* Enhancement: cves/2017/CVE-2017-11444.yaml by mp
* Spacing issues
* Added better reference
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-12611.yaml by mp
* Enhancement: cves/2017/CVE-2017-12635.yaml by mp
* Enhancement: cves/2017/CVE-2017-14135.yaml by mp
* Enhancement: cves/2017/CVE-2017-3881.yaml by mp
* Enhancement: cves/2017/CVE-2017-7269.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Enhancement: cves/2017/CVE-2017-9791.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Spacing and other minor issues
* Update CVE-2015-1427.yaml
* Update CVE-2017-12149.yaml
* Update CVE-2017-12542.yaml
* Update CVE-2017-12635.yaml
* Update CVE-2017-14135.yaml
* Update CVE-2017-3881.yaml
* Update CVE-2017-7269.yaml
* Update CVE-2017-8917.yaml
* Update CVE-2017-9791.yaml
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-32204.yaml by mp
* Enhancement: cnvd/2020/CNVD-2020-68596.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-09650.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-26422.yaml by mp
* Enhancement: cnvd/2022/CNVD-2022-03672.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-0127.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000226.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-1273.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-14064.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Cleanup and spacing
* Remove blank cve-id lines
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17246.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Enhancement: cves/2018/CVE-2018-18925.yaml by mp
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-2894.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7602.yaml by mp
* Enhancement: cves/2018/CVE-2018-9161.yaml by mp
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Many title clean-ups for more standardization.
Some vendor name clean-up
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Spacing issues
* Remove 2 blank newlines
* Enhancement: vulnerabilities/other/tamronos-rce.yaml by cs
* Enhancement: cves/2018/CVE-2018-9845.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-16920.yaml by mp
* Enhancement: cves/2019/CVE-2019-17270.yaml by mp
* Enhancement: cves/2019/CVE-2019-17382.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2019/CVE-2019-17506.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11710.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-12800.yaml by mp
* Enhancement: cves/2020/CVE-2020-13117.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-13942.yaml by mp
* Spacing, syntax error
* Spacing, correct this time.
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2020/CVE-2020-29227.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Enhancement: cves/2021/CVE-2021-24762.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Extra newlines and one sp;acing issue
* Update CVE-2018-9995.yaml
* Update CVE-2019-0230.yaml
* Update CVE-2019-16920.yaml
* Update CVE-2019-17270.yaml
* Update CVE-2019-17382.yaml
* Update CVE-2019-17444.yaml
* Update CVE-2019-17506.yaml
* Update CVE-2020-10148.yaml
* Update CVE-2020-11710.yaml
* Update CVE-2020-11854.yaml
* Update CVE-2020-12800.yaml
* Update CVE-2020-13167.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2020-13942.yaml
* Update CVE-2020-15920.yaml
* Update CVE-2020-29227.yaml
* Update CVE-2021-24499.yaml
* Update CVE-2021-24762.yaml
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-17 14:41:26 +05:30
Prince Chaddha
22f054cf0c
Update CVE-2020-13117.yaml
2022-05-15 16:47:36 +05:30
MostInterestingBotInTheWorld
581b7a627b
Dashboard Content Enhancements ( #4381 )
...
Dashboard Content Enhancements
2022-05-13 16:26:43 -04:00
Ritik Chaddha
27a039a70c
Update metadata query ( #4350 )
...
* Update adobe-component-login.yaml
* Update cold-fusion-cfcache-map.yaml
* Update unpatched-coldfusion.yaml
* Update coldfusion-debug-xss.yaml
* Update CVE-2020-11978.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2021-38540.yaml
* Update CVE-2021-44451.yaml
* Update CVE-2022-24288.yaml
* Update airflow-debug.yaml
* Update airflow-detect.yaml
* Update CVE-2010-0219.yaml
* Update apache-axis-detect.yaml
* Update CVE-2020-11991.yaml
* Update apache-cocoon-detect.yaml
* Update CVE-2021-21402.yaml
* Update jellyfin-detect.yaml
* Update CVE-2021-21402.yaml
* Update CVE-2021-21402.yaml
* Update ecology-arbitrary-file-upload.yaml
* Update ecology-v8-sqli.yaml
* Update ecology-syncuserinfo-sqli.yaml
* Update ecology-filedownload-directory-traversal.yaml
* Update CNVD-2021-15822.yaml
* Update dedecms-carbuyaction-fileinclude.yaml
* Update dedecms-openredirect.yaml
* Update tamronos-rce.yaml
* Update natshell-path-traversal.yaml
2022-05-12 19:48:36 +05:30
Prince Chaddha
cbf0e34259
Update CVE-2020-36510.yaml
2022-05-12 17:00:02 +05:30
Prince Chaddha
d550e17fe0
Update CVE-2020-36510.yaml
2022-05-12 16:58:57 +05:30
GitHub Action
462a6d2f9c
Auto Generated CVE annotations [Wed May 11 13:16:45 UTC 2022] 🤖
2022-05-11 13:16:45 +00:00
Veshraj Ghimire
eb2f235971
Merge branch 'projectdiscovery:master' into master
2022-05-11 19:01:00 +05:45
Prince Chaddha
062dd6a567
Update and rename vulnerabilities/wordpress/15Zine-xss.yaml to cves/2020/CVE-2020-36510.yaml
2022-05-11 18:20:11 +05:30
Ritik Chaddha
5ca86de12e
Update CVE-2020-11991.yaml
2022-05-10 19:05:35 +05:30
Ritik Chaddha
37b6dcdd9d
Update CVE-2020-13927.yaml
2022-05-10 18:15:06 +05:30
Ritik Chaddha
23d058285e
Update CVE-2020-11978.yaml
2022-05-10 18:15:02 +05:30
MostInterestingBotInTheWorld
73e289527d
Dashboard Content Enhancements ( #4339 )
...
* Spacing issues
2022-05-09 12:16:12 -04:00
MostInterestingBotInTheWorld
9ff9285916
Dashboard Content Enhancements ( #4338 )
...
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
Sandeep Singh
958b15663c
Strict matchers / f/p fix ( #4320 )
...
* more strict matcher + matcher fix
* misc updates
2022-05-08 12:13:38 +05:30
MostInterestingBotInTheWorld
44520223c1
Dashboard Content Enhancements ( #4268 )
...
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
sullo
c3d4dfd6ae
Tenda Template Enhancementleanup ( #4257 )
...
* Replace § markers with {{ }} pairs
* Clean up new Tenda admin panel template
* Update tenda-11n-wireless-router-login.yaml
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
Prince Chaddha
bc831be504
Merge pull request #4241 from p-l-/fix-cve-2020-16952
...
Fix CVE-2020-16952 template
2022-04-26 03:48:21 +04:00
Prince Chaddha
ffbeb784f4
Update CVE-2020-16952.yaml
2022-04-26 03:43:33 +04:00
Pierre Lalet
e20ac0da50
Fix CVE-2020-16952 template
...
The headers are normalized by nuclei, and
MicrosoftSharePointTeamServices will never match.
2022-04-25 21:42:29 +02:00
MostInterestingBotInTheWorld
aa888bca8d
Dashboard Content Enhancements ( #4238 )
...
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
sandeep
922d1d9aec
more strict matchers
2022-04-23 00:30:59 +05:30
sandeep
9e505d4609
added missing tags
2022-04-22 22:13:51 +05:30
forgedhallpass
5451673368
Moved and renamed templates containing a CVE under their correct location
2022-04-22 19:25:23 +03:00
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld
31312b1c19
Dashboard Content Enhancements ( #4191 )
...
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action
775b18dfb2
Auto Generated CVE annotations [Tue Apr 19 21:56:21 UTC 2022] 🤖
2022-04-19 21:56:21 +00:00
Prince Chaddha
f1a525907e
Update CVE-2020-7980.yaml
2022-04-20 01:50:19 +04:00
Ritik Chaddha
f532a0ead3
Update CVE-2020-7980.yaml
2022-04-20 02:46:41 +05:30
Ritik Chaddha
fd6b099f41
Create CVE-2020-7980.yaml
2022-04-20 02:40:53 +05:30
MostInterestingBotInTheWorld
5730781afa
Dashboard Content Enhancements ( #4157 )
...
* Enhancement: exposures/files/joomla-file-listing.yaml by cs
* Enhancement: cves/2019/CVE-2019-5418.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2021/CVE-2021-20091.yaml by mp
* Enhancement: cves/2021/CVE-2021-20092.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: cves/2017/CVE-2017-9833.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: misconfiguration/symfony-debugmode.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: cves/2021/CVE-2021-31682.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Relocating to CVE folder
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-2628.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2019/CVE-2019-2588.yaml by mp
* Enhancement: cves/2021/CVE-2021-31755.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments
* Tag typo
Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha
0359adc0d0
Update CVE-2020-28351.yaml
2022-04-12 23:29:20 +05:30
MostInterestingBotInTheWorld
45174dee16
Dashboard Content Enhancements ( #4111 )
...
Dashboard Content Enhancements
2022-04-11 10:42:35 -04:00
Muhammad Daffa
3b4158529f
Update CVE-2020-35489.yaml ( #4105 )
2022-04-11 16:18:13 +05:30
Sandeep Singh
2503c42816
payload + matchers update ( #4094 )
2022-04-09 20:22:22 +05:30
MostInterestingBotInTheWorld
a24ef794b7
Dashboard Content Enhancements ( #4031 )
...
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
Prince Chaddha
963742768a
Update and rename CVE-2020-27191.yaml to cves/2020/CVE-2020-27191.yaml
2022-04-04 18:08:30 +05:30
MostInterestingBotInTheWorld
6ddfbac2b4
Dashboard Content Enhancement ( #4020 )
...
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
* Syntax restore some characters
* Spacing
* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp
* Enhancement: cves/2019/CVE-2019-10068.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-11580.yaml by mp
* Enhancement: cves/2019/CVE-2019-11581.yaml by mp
* Enhancement: cves/2019/CVE-2019-12314.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Link wrapping issue
* Enhancement: cves/2019/CVE-2019-13462.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16759.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cves/2019/CVE-2019-16278.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-12725.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs
* Enhancement: cves/2021/CVE-2021-33807.yaml by mp
* Enhancement: cves/2010/CVE-2010-0943.yaml by mp
* Enhancement: cves/2008/CVE-2008-6172.yaml by mp
* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: network/cisco-smi-exposure.yaml by mp
* Enhancement: cves/2021/CVE-2021-37704.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2019/CVE-2019-16313.yaml by mp
* Enhancement: cves/2021/CVE-2021-3017.yaml by mp
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2021/CVE-2021-37573.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2018/CVE-2018-11709.yaml by mp
* Enhancement: cves/2014/CVE-2014-2321.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Manual enhancement
* Manual enhancement push due to dashboard failure
* Testing of dashboard accidentally commited to dashboard branch
* Spacing
Put some CVEs in the classification
* Add missing cve-id fields to templates in cve/
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
sandeep
754ba8574e
Added stop-at-first-match
2022-03-30 15:19:04 +05:30
MostInterestingBotInTheWorld
13bfc8ff57
Dashboard Content Enhancements ( #3998 )
...
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
sandeep
9012b2396a
misc update to CVE-2020-10148
2022-03-29 16:00:27 +05:30
gilfoyle97
91db326b54
Fix CVE-2020-17456 (false positive) ( #3997 )
...
* Fix CVE-2020-17456 (false positive)
* additional matchers
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-28 16:35:16 +05:30
MostInterestingBotInTheWorld
814d07fb7d
Dashboard Content Enhancements ( #3961 )
...
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp
* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp
* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp
* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp
* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp
* Enhancement: dns/azure-takeover-detection.yaml by mp
* Enhancement: dns/cname-fingerprint.yaml by mp
* Enhancement: dns/cname-service-detection.yaml by mp
* Enhancement: dns/detect-dangling-cname.yaml by mp
* Enhancement: dns/dns-waf-detect.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: dns/dnssec-detection.yaml by mp
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
sandeep
ec99241f0e
Updated "/etc/passwd" regex to avoid possible false positive results.
2022-03-22 13:31:31 +05:30
Prince Chaddha
063d6ad7eb
Update CVE-2020-5412.yaml
2022-03-22 11:32:56 +05:30
Prince Chaddha
2d8bc7577a
Update CVE-2020-5412.yaml
2022-03-22 11:25:29 +05:30
z3dc0ps
d2afc026eb
Update CVE-2020-5412.yaml
2022-03-22 01:45:11 +05:30
Markus
9e43f3cc18
[false-positive] WordPress Contact Form 7 Plugin - Unrestricted File Upload ( #3825 )
...
* Update CVE-2020-35489.yaml
Fix for the false positives mentioned in #3816
* Update CVE-2020-35489.yaml
Fix for the false positives mentioned in #3816
* misc update
* version comparison with new helper function
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:48:01 +05:30
GitHub Action
3f3ba47aaa
Auto Generated CVE annotations [Mon Mar 21 12:12:32 UTC 2022] 🤖
2022-03-21 12:12:32 +00:00
Prince Chaddha
d42c946e20
Merge pull request #3907 from gy741/rule-add-v101
...
Create CVE-2020-17456.yaml
2022-03-21 17:41:48 +05:30
Prince Chaddha
f4fdbbf415
Update and rename CVE-2020-27467.yaml to cves/2020/CVE-2020-27467.yaml
2022-03-21 16:56:48 +05:30
MostInterestingBotInTheWorld
056323ec5a
Dashboard Text Enhancements ( #3927 )
...
Dashboard text enhancements
2022-03-17 13:01:45 -04:00
Prince Chaddha
4c1b01bfc3
Update CVE-2020-17456.yaml
2022-03-15 16:36:08 +05:30
GwanYeong Kim
ec174819c4
Create CVE-2020-17456.yaml
...
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-15 19:13:50 +09:00
Prince Chaddha
d016e3102f
Update CVE-2020-13158.yaml
2022-03-11 14:24:04 +05:30
Prince Chaddha
d3221ba5d6
Update and rename CVE-2020-13158.yaml to cves/2020/CVE-2020-13158.yaml
2022-03-11 14:21:56 +05:30
sandeep
67e20bc87f
puppet templates
2022-03-09 00:17:22 +05:30
Prince Chaddha
e14b913101
Update CVE-2020-15050.yaml
2022-03-08 11:12:39 +05:30
GwanYeong Kim
ba14674e22
Create CVE-2020-15050.yaml
...
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-07 19:19:01 +09:00
sandeep
3a6c69df71
template name updates
2022-03-04 22:12:30 +05:30
sandeep
af09a6ce4b
Added CVE-2020-2103
...
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
2022-03-04 21:50:03 +05:30
Prince Chaddha
b0e13cb19d
Merge pull request #3791 from pussycat0x/master
...
New Template Added
2022-03-03 16:44:20 +05:30
sandeep
6d32b81b2a
GitLab metadata update
2022-03-02 13:05:29 +05:30
sandeep
1b76c3e7e8
updated tags and id
2022-03-01 19:10:54 +05:30
sullo
93e9c04f38
Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard
2022-02-28 17:31:38 -05:00
Prince Chaddha
cc3505d3b6
added deleted templates
2022-03-01 02:15:19 +05:30
MostInterestingBotInTheWorld
3208a72e63
Enhancement: cves/2020/CVE-2020-13937.yaml by cs
2022-02-28 13:45:46 -05:00
pussycat0x
9aa861f09a
Delete CVE-2020-28976.yaml
2022-02-28 22:31:03 +05:30
sullo
73c4e88830
Rename vulnerabilities/wordpress/easy-wp-smtp-listing.yaml to CVE-2020-35234.yaml
2022-02-28 11:25:50 -05:00
GitHub Action
5b154f6b93
Auto Generated CVE annotations [Sun Feb 27 15:44:38 UTC 2022] 🤖
2022-02-27 15:44:38 +00:00
pussycat0x
afcc610cd8
Add files via upload
2022-02-27 21:12:39 +05:30
MostInterestingBotInTheWorld
b631f45e1c
Dashboard Text Enhancements ( #3778 )
...
Dashboard text enhancements
2022-02-25 17:07:55 -05:00
MostInterestingBotInTheWorld
9b82c296e1
Dashboard Enhancements ( #3722 )
...
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Enhancement: cves/2010/CVE-2010-1957.yaml by mp
* Enhancement: cves/2010/CVE-2010-1977.yaml by mp
* Enhancement: cves/2010/CVE-2010-1979.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-1983.yaml by mp
* Enhancement: cves/2010/CVE-2010-2033.yaml by mp
* Enhancement: cves/2010/CVE-2010-2034.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2036.yaml by mp
* Enhancement: cves/2010/CVE-2010-2037.yaml by mp
* Enhancement: cves/2010/CVE-2010-2045.yaml by mp
* Enhancement: cves/2010/CVE-2010-2050.yaml by mp
* Enhancement: cves/2010/CVE-2010-2122.yaml by mp
* Enhancement: cves/2010/CVE-2010-1980.yaml by mp
* Enhancement: cves/2010/CVE-2010-1981.yaml by mp
* Enhancement: cves/2010/CVE-2010-1982.yaml by mp
* Enhancement: cves/2010/CVE-2010-2035.yaml by mp
* Enhancement: cves/2010/CVE-2010-2128.yaml by mp
* Enhancement: cves/2010/CVE-2010-2259.yaml by mp
* Enhancement: cves/2010/CVE-2010-2307.yaml by mp
* Enhancement: cves/2010/CVE-2010-2507.yaml by mp
* Enhancement: cves/2010/CVE-2010-2680.yaml by mp
* Enhancement: cves/2010/CVE-2010-2682.yaml by mp
* Enhancement: cves/2010/CVE-2010-2857.yaml by mp
* Enhancement: cves/2010/CVE-2010-2861.yaml by mp
* Enhancement: cves/2010/CVE-2010-2918.yaml by mp
* Enhancement: cves/2010/CVE-2010-2920.yaml by mp
* Enhancement: cves/2010/CVE-2010-3203.yaml by mp
* Enhancement: cves/2010/CVE-2010-3426.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4231.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4282.yaml by mp
* Enhancement: cves/2010/CVE-2010-4617.yaml by mp
* Enhancement: cves/2010/CVE-2010-4719.yaml by mp
* Enhancement: cves/2010/CVE-2010-4769.yaml by mp
* Enhancement: cves/2010/CVE-2010-4977.yaml by mp
* Enhancement: cves/2010/CVE-2010-5028.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2010/CVE-2010-5286.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-1669.yaml by mp
* Enhancement: cves/2011/CVE-2011-2744.yaml by mp
* Enhancement: cves/2000/CVE-2000-0114.yaml by mp
* Enhancement: cves/2011/CVE-2011-3315.yaml by mp
* Enhancement: cves/2011/CVE-2011-4336.yaml by mp
* Enhancement: cves/2011/CVE-2011-4618.yaml by mp
* Enhancement: cves/2011/CVE-2011-4624.yaml by mp
* Enhancement: cves/2011/CVE-2011-4804.yaml by mp
* Enhancement: cves/2011/CVE-2011-0049.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2011/CVE-2011-2780.yaml by mp
* Enhancement: cves/2012/CVE-2012-1823.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-1226.yaml by mp
* Enhancement: cves/2012/CVE-2012-0996.yaml by mp
* Enhancement: cves/2021/CVE-2021-39226.yaml by cs
* Enhancement: cves/2021/CVE-2021-27358.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2021/CVE-2021-43798.yaml by cs
* Enhancement: cves/2012/CVE-2012-1835.yaml by mp
* Enhancement: cves/2012/CVE-2012-0901.yaml by mp
* Enhancement: cves/2011/CVE-2011-5265.yaml by mp
* Enhancement: cves/2011/CVE-2011-5181.yaml by mp
* Enhancement: cves/2011/CVE-2011-5179.yaml by mp
* Enhancement: cves/2011/CVE-2011-5107.yaml by mp
* Enhancement: cves/2011/CVE-2011-5106.yaml by mp
* Enhancement: cves/2011/CVE-2011-4926.yaml by mp
* Enhancement: cves/2012/CVE-2012-0991.yaml by mp
* Enhancement: cves/2012/CVE-2012-0981.yaml by mp
* Enhancement: cves/2012/CVE-2012-0896.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
Co-authored-by: sullo <sullo@cirt.net>
2022-02-21 13:33:16 -05:00
sandeep
159e94d0c2
added content type check
2022-02-18 02:15:13 +05:30
Sandeep Singh
07e31135ae
Added Consul Templates ( #3720 )
...
* added request condition to avoid false positive detection
* misc updates
2022-02-17 23:55:37 +05:30
Prince Chaddha
627ef6412e
Update mongodb-unauth.yaml ( #3712 )
...
* Update mongodb-unauth.yaml
* Update CVE-2020-11110.yaml
* Update CVE-2020-11110.yaml
2022-02-16 18:03:09 +05:30
sullo
4cf3791eb3
Merge pull request #3686 from MostInterestingBotInTheWorld/dashboard
...
Dashboard Updates: Multiple content enhancements
2022-02-08 17:07:01 -05:00
Prince Chaddha
8664885b45
Update CVE-2020-35749.yaml
2022-02-09 00:13:40 +05:30
Prince Chaddha
8c14733e0b
Update and rename CVE-2020-13121.yaml to cves/2020/CVE-2020-13121.yaml
2022-02-08 23:35:08 +05:30
MostInterestingBotInTheWorld
2ab1c4cacc
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-08 11:36:43 -05:00
cckuailong
f29d2b20df
add some wp plugins cves
2022-02-08 09:07:19 +08:00
Prince Chaddha
389089d63c
Merge pull request #3668 from Akokonunes/patch-113
...
Create CVE-2020-12447.yaml
2022-02-08 00:37:11 +05:30
Prince Chaddha
4e00ba83f3
Update and rename CVE-2020-12447.yaml to cves/2020/CVE-2020-12447.yaml
2022-02-08 00:35:52 +05:30
sullo
ee235ad8e6
Extraneous comment
2022-02-07 09:01:46 -05:00
MostInterestingBotInTheWorld
4f497cbd17
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:02:22 -05:00
MostInterestingBotInTheWorld
e124b4333b
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:01:13 -05:00
MostInterestingBotInTheWorld
d7ac754156
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 15:55:59 -05:00
MostInterestingBotInTheWorld
a3d83420ac
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 14:29:39 -05:00
Prince Chaddha
42bc941827
Update and rename CVE-2020-36365.yaml to cves/2020/CVE-2020-36365.yaml
2022-02-03 02:39:33 +05:30
Prince Chaddha
dca4cdc12f
Update CVE-2020-35489.yaml
2022-02-01 01:28:32 +05:30
Prince Chaddha
fdddc48c2f
Update CVE-2020-18268.yaml
2022-02-01 00:42:58 +05:30
Prince Chaddha
992687329c
Update CVE-2020-18268.yaml
2022-02-01 00:41:58 +05:30
Prince Chaddha
fd777fd0b6
Update and rename CVE-2020-18268.yaml to cves/2020/CVE-2020-18268.yaml
2022-01-27 14:18:01 +05:30
Sullo
9a8482172d
Remove:
...
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
- spaces after : in some files
2022-01-25 14:38:53 -05:00
Leovalcante
bac26e1669
Create check for cve-2020-24391 mongo-express RCE ( #3566 )
...
* Create check for cve-2020-24391 mongo-express RCE
* random file to write + matcher updates + extractor
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-20 14:55:01 +05:30
sandeep
f6e3df8b33
CVE-2020-13483 Update
2022-01-19 13:44:01 +05:30
Roberto Nunes
f8013457b6
Create CVE-2020-23575.yaml ( #3547 )
...
* Create CVE-2020-23575.yaml
* Update and rename CVE-2020-23575.yaml to cves/2020/CVE-2020-23575.yaml
* minor update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 13:12:16 +05:30
GitHub Action
8244d08f57
Auto Generated CVE annotations [Sun Jan 16 16:40:51 UTC 2022] 🤖
2022-01-16 16:40:51 +00:00
Sandeep Singh
f6377b09ec
Added Apache APISIX's Admin API Default Access Token (RCE) ( #3544 )
2022-01-16 22:08:55 +05:30
gy741
e5958c1364
Update tags ( #3538 )
2022-01-16 02:08:21 +05:30
Prince Chaddha
aa8fd16018
Merge pull request #3515 from Akokonunes/patch-104
...
Create CVE-2020-11529.yaml
2022-01-11 14:37:32 +05:30
Prince Chaddha
7f26b9e895
Update and rename CVE-2020-11529.yaml to cves/2020/CVE-2020-11529.yaml
2022-01-11 14:35:53 +05:30
Prince Chaddha
6ea0a7f492
Update CVE-2020-7136.yaml
2022-01-11 13:43:30 +05:30
GwanYeong Kim
351dc3e460
Create CVE-2020-7136.yaml
...
A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:39:41 +09:00
Muhammad Daffa
068d576d22
Update CVE-2020-8641.yaml ( #3505 )
2022-01-08 20:23:53 +05:30
Roberto Nunes
691688fb66
Create CVE-2020-23015.yaml ( #3502 )
...
* Create CVE-2020-23015.yaml
* moving template to cves directory
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 16:52:50 +05:30
sandeep
6b30e12e86
lint fixes
2022-01-07 13:04:40 +05:30
Sandeep Singh
844c3b4a02
Network template updates & fixes ( #3497 )
...
* Fixed template syntax
* network template update and fixes
2022-01-07 12:58:37 +05:30
PikPikcU
c3360c9d23
Create CVE-2020-13258.yaml
2022-01-06 21:49:47 -05:00
Pathtaga
e281e5bf88
Updated all templates tags with technologies ( #3478 )
...
* Updated tags for template sonicwall-email-security-detect.yaml
* Updated tags for template detect-sentry.yaml
* Updated tags for template kong-detect.yaml
* Updated tags for template openam-detect.yaml
* Updated tags for template shiro-detect.yaml
* Updated tags for template iplanet-web-server.yaml
* Updated tags for template graylog-api-browser.yaml
* Updated tags for template prtg-detect.yaml
* Updated tags for template node-red-detect.yaml
* Updated tags for template abyss-web-server.yaml
* Updated tags for template geo-webserver.yaml
* Updated tags for template autobahn-python-detect.yaml
* Updated tags for template default-lighttpd-page.yaml
* Updated tags for template microsoft-iis-8.yaml
* Updated tags for template lucee-detect.yaml
* Updated tags for template php-proxy-detect.yaml
* Updated tags for template jenkins-detect.yaml
* Updated tags for template cockpit-detect.yaml
* Updated tags for template csrfguard-detect.yaml
* Updated tags for template dwr-index-detect.yaml
* Updated tags for template netsweeper-webadmin-detect.yaml
* Updated tags for template weblogic-detect.yaml
* Updated tags for template s3-detect.yaml
* Updated tags for template tileserver-gl.yaml
* Updated tags for template springboot-actuator.yaml
* Updated tags for template terraform-detect.yaml
* Updated tags for template redmine-cli-detect.yaml
* Updated tags for template mrtg-detect.yaml
* Updated tags for template tableau-server-detect.yaml
* Updated tags for template magmi-detect.yaml
* Updated tags for template oidc-detect.yaml
* Updated tags for template tor-socks-proxy.yaml
* Updated tags for template synology-web-station.yaml
* Updated tags for template herokuapp-detect.yaml
* Updated tags for template gunicorn-detect.yaml
* Updated tags for template sql-server-reporting.yaml
* Updated tags for template google-bucket-service.yaml
* Updated tags for template kubernetes-mirantis.yaml
* Updated tags for template kubernetes-enterprise-manager.yaml
* Updated tags for template oracle-iplanet-web-server.yaml
* Updated tags for template dell-idrac7-detect.yaml
* Updated tags for template dell-idrac6-detect.yaml
* Updated tags for template dell-idrac9-detect.yaml
* Updated tags for template dell-idrac8-detect.yaml
* Updated tags for template apache-guacamole.yaml
* Updated tags for template aws-cloudfront-service.yaml
* Updated tags for template aws-bucket-service.yaml
* Updated tags for template nginx-linux-page.yaml
* Updated tags for template telerik-fileupload-detect.yaml
* Updated tags for template telerik-dialoghandler-detect.yaml
* Updated tags for template htaccess-config.yaml
* Updated tags for template microsoft-azure-error.yaml
* Updated tags for template detect-options-method.yaml
* Updated tags for template unpatched-coldfusion.yaml
* Updated tags for template moodle-changelog.yaml
* Updated tags for template detect-dns-over-https.yaml
* Updated tags for template CVE-2019-19134.yaml
* Updated tags for template CVE-2019-3929.yaml
* Updated tags for template CVE-2019-19908.yaml
* Updated tags for template CVE-2019-10475.yaml
* Updated tags for template CVE-2019-17382.yaml
* Updated tags for template CVE-2019-16332.yaml
* Updated tags for template CVE-2019-14974.yaml
* Updated tags for template CVE-2019-19368.yaml
* Updated tags for template CVE-2019-12725.yaml
* Updated tags for template CVE-2019-15501.yaml
* Updated tags for template CVE-2019-9733.yaml
* Updated tags for template CVE-2019-14322.yaml
* Updated tags for template CVE-2019-9955.yaml
* Updated tags for template CVE-2019-0230.yaml
* Updated tags for template CVE-2019-10232.yaml
* Updated tags for template CVE-2019-17506.yaml
* Updated tags for template CVE-2019-8449.yaml
* Updated tags for template CVE-2019-12593.yaml
* Updated tags for template CVE-2019-10092.yaml
* Updated tags for template CVE-2019-1821.yaml
* Updated tags for template CVE-2019-3401.yaml
* Updated tags for template CVE-2019-16662.yaml
* Updated tags for template CVE-2019-5418.yaml
* Updated tags for template CVE-2016-4975.yaml
* Updated tags for template CVE-2016-1000137.yaml
* Updated tags for template CVE-2016-7552.yaml
* Updated tags for template CVE-2016-10956.yaml
* Updated tags for template CVE-2016-1000146.yaml
* Updated tags for template CVE-2013-2251.yaml
* Updated tags for template CVE-2013-1965.yaml
* Updated tags for template CVE-2014-2323.yaml
* Updated tags for template CVE-2014-5111.yaml
* Updated tags for template CVE-2014-2962.yaml
* Updated tags for template CVE-2014-4561.yaml
* Updated tags for template CVE-2014-4558.yaml
* Updated tags for template CVE-2014-3120.yaml
* Updated tags for template CVE-2007-5728.yaml
* Updated tags for template CVE-2009-4679.yaml
* Updated tags for template CVE-2009-1558.yaml
* Updated tags for template CVE-2009-4202.yaml
* Updated tags for template CVE-2009-0932.yaml
* Updated tags for template CVE-2015-2068.yaml
* Updated tags for template CVE-2015-8813.yaml
* Updated tags for template CVE-2015-7450.yaml
* Updated tags for template CVE-2015-2067.yaml
* Updated tags for template CVE-2015-3306.yaml
* Updated tags for template CVE-2015-3337.yaml
* Updated tags for template CVE-2015-1427.yaml
* Updated tags for template CVE-2015-1503.yaml
* Updated tags for template CVE-2015-1880.yaml
* Updated tags for template CVE-2018-3810.yaml
* Updated tags for template CVE-2018-18069.yaml
* Updated tags for template CVE-2018-17246.yaml
* Updated tags for template CVE-2018-10141.yaml
* Updated tags for template CVE-2018-16341.yaml
* Updated tags for template CVE-2018-18777.yaml
* Updated tags for template CVE-2018-15138.yaml
* Updated tags for template CVE-2018-11784.yaml
* Updated tags for template CVE-2018-16299.yaml
* Updated tags for template CVE-2018-7251.yaml
* Updated tags for template CVE-2018-1273.yaml
* Updated tags for template CVE-2018-1271.yaml
* Updated tags for template CVE-2018-11759.yaml
* Updated tags for template CVE-2018-3167.yaml
* Updated tags for template CVE-2018-7490.yaml
* Updated tags for template CVE-2018-2628.yaml
* Updated tags for template CVE-2018-13380.yaml
* Updated tags for template CVE-2018-2893.yaml
* Updated tags for template CVE-2018-5316.yaml
* Updated tags for template CVE-2018-20985.yaml
* Updated tags for template CVE-2018-10818.yaml
* Updated tags for template CVE-2018-1000861.yaml
* Updated tags for template CVE-2018-0296.yaml
* Updated tags for template CVE-2018-19458.yaml
* Updated tags for template CVE-2018-3760.yaml
* Updated tags for template CVE-2018-12998.yaml
* Updated tags for template CVE-2018-9118.yaml
* Updated tags for template CVE-2018-1000130.yaml
* Updated tags for template CVE-2008-6668.yaml
* Updated tags for template CVE-2017-7269.yaml
* Updated tags for template CVE-2017-1000170.yaml
* Updated tags for template CVE-2017-16877.yaml
* Updated tags for template CVE-2017-1000486.yaml
* Updated tags for template CVE-2017-9822.yaml
* Updated tags for template CVE-2017-0929.yaml
* Updated tags for template CVE-2017-7921.yaml
* Updated tags for template CVE-2017-14535.yaml
* Updated tags for template CVE-2017-5521.yaml
* Updated tags for template CVE-2017-12637.yaml
* Updated tags for template CVE-2017-12635.yaml
* Updated tags for template CVE-2017-11610.yaml
* Updated tags for template CVE-2021-20114.yaml
* Updated tags for template CVE-2021-40856.yaml
* Updated tags for template CVE-2021-21972.yaml
* Updated tags for template CVE-2021-31602.yaml
* Updated tags for template CVE-2021-41773.yaml
* Updated tags for template CVE-2021-37704.yaml
* Updated tags for template CVE-2021-45046.yaml
* Updated tags for template CVE-2021-26084.yaml
* Updated tags for template CVE-2021-27931.yaml
* Updated tags for template CVE-2021-24291.yaml
* Updated tags for template CVE-2021-41648.yaml
* Updated tags for template CVE-2021-37216.yaml
* Updated tags for template CVE-2021-22005.yaml
* Updated tags for template CVE-2021-37573.yaml
* Updated tags for template CVE-2021-31755.yaml
* Updated tags for template CVE-2021-43287.yaml
* Updated tags for template CVE-2021-24274.yaml
* Updated tags for template CVE-2021-33564.yaml
* Updated tags for template CVE-2021-22145.yaml
* Updated tags for template CVE-2021-24237.yaml
* Updated tags for template CVE-2021-44848.yaml
* Updated tags for template CVE-2021-25646.yaml
* Updated tags for template CVE-2021-21816.yaml
* Updated tags for template CVE-2021-41649.yaml
* Updated tags for template CVE-2021-41291.yaml
* Updated tags for template CVE-2021-41293.yaml
* Updated tags for template CVE-2021-21801.yaml
* Updated tags for template CVE-2021-29156.yaml
* Updated tags for template CVE-2021-34370.yaml
* Updated tags for template CVE-2021-27132.yaml
* Updated tags for template CVE-2021-28151.yaml
* Updated tags for template CVE-2021-26812.yaml
* Updated tags for template CVE-2021-21985.yaml
* Updated tags for template CVE-2021-43778.yaml
* Updated tags for template CVE-2021-25281.yaml
* Updated tags for template CVE-2021-40539.yaml
* Updated tags for template CVE-2021-36749.yaml
* Updated tags for template CVE-2021-21234.yaml
* Updated tags for template CVE-2021-33221.yaml
* Updated tags for template CVE-2021-42013.yaml
* Updated tags for template CVE-2021-33807.yaml
* Updated tags for template CVE-2021-44228.yaml
* Updated tags for template CVE-2012-0896.yaml
* Updated tags for template CVE-2012-0991.yaml
* Updated tags for template CVE-2012-0392.yaml
* Updated tags for template CVE-2012-4940.yaml
* Updated tags for template CVE-2012-1226.yaml
* Updated tags for template CVE-2012-4878.yaml
* Updated tags for template CVE-2010-1304.yaml
* Updated tags for template CVE-2010-1217.yaml
* Updated tags for template CVE-2010-0759.yaml
* Updated tags for template CVE-2010-2307.yaml
* Updated tags for template CVE-2010-4231.yaml
* Updated tags for template CVE-2010-2861.yaml
* Updated tags for template CVE-2010-4282.yaml
* Updated tags for template CVE-2010-1302.yaml
* Updated tags for template CVE-2010-1461.yaml
* Updated tags for template CVE-2020-4463.yaml
* Updated tags for template CVE-2020-1943.yaml
* Updated tags for template CVE-2020-36289.yaml
* Updated tags for template CVE-2020-17518.yaml
* Updated tags for template CVE-2020-12800.yaml
* Updated tags for template CVE-2020-10770.yaml
* Updated tags for template CVE-2020-17506.yaml
* Updated tags for template CVE-2020-11547.yaml
* Updated tags for template CVE-2020-11034.yaml
* Updated tags for template CVE-2020-24589.yaml
* Updated tags for template CVE-2020-9054.yaml
* Updated tags for template CVE-2020-28976.yaml
* Updated tags for template CVE-2020-16952.yaml
* Updated tags for template CVE-2020-24312.yaml
* Updated tags for template CVE-2020-8512.yaml
* Updated tags for template CVE-2020-14179.yaml
* Updated tags for template CVE-2020-6308.yaml
* Updated tags for template CVE-2020-35846.yaml
* Updated tags for template CVE-2020-7318.yaml
* Updated tags for template CVE-2020-2140.yaml
* Updated tags for template CVE-2020-5410.yaml
* Updated tags for template CVE-2020-5777.yaml
* Updated tags for template CVE-2020-13700.yaml
* Updated tags for template CVE-2020-5775.yaml
* Updated tags for template CVE-2020-13167.yaml
* Updated tags for template CVE-2020-35848.yaml
* Updated tags for template CVE-2020-9484.yaml
* Updated tags for template CVE-2020-15505.yaml
* Updated tags for template CVE-2020-9047.yaml
* Updated tags for template CVE-2020-17519.yaml
* Updated tags for template CVE-2020-17505.yaml
* Updated tags for template CVE-2020-9376.yaml
* Updated tags for template CVE-2020-8497.yaml
* Updated tags for template CVE-2020-14092.yaml
* Updated tags for template CVE-2020-10148.yaml
* Updated tags for template CVE-2020-35847.yaml
* Updated tags for template CVE-2020-12116.yaml
* Updated tags for template CVE-2020-11930.yaml
* Updated tags for template CVE-2020-24186.yaml
* Updated tags for template CVE-2020-9496.yaml
* Updated tags for template CVE-2020-35489.yaml
* Updated tags for template CVE-2020-26413.yaml
* Updated tags for template CVE-2020-2096.yaml
* misc updates
* misc update
* more updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 01:04:16 +05:30
Sandeep Singh
de9c4d605c
Apache Tomcat Template improvements ( #3446 )
...
* Improved Tomcat matchers / extractors / paths
* removed duplicate detections / matchers
* removed duplicate template
* Added missing tomcat tags
2021-12-29 19:10:59 +05:30
sandeep
85956018f8
Added metadata
2021-12-28 18:16:23 +05:30
Sandeep Singh
5d7d4409a0
Added CVE-2020-11546 ( #3436 )
...
Co-Authored-By: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
Co-authored-by: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
2021-12-28 18:13:04 +05:30
Prince Chaddha
c92010033b
Update CVE-2020-8497.yaml
2021-12-06 10:39:43 +05:30
GwanYeong Kim
b76c1d20f3
Create CVE-2020-8497.yaml
...
In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-06 08:36:14 +09:00
GitHub Action
2f6733c202
Auto Generated CVE annotations [Mon Nov 29 14:34:36 UTC 2021] 🤖
2021-11-29 14:34:36 +00:00
Sandeep Singh
38839cfbbc
Added Commvault CommCell Directory Traversal (CVE-2020-25780) ( #3182 )
2021-11-29 20:02:59 +05:30
GitHub Action
bcb798df8b
Auto Generated CVE annotations [Sun Nov 28 20:49:07 UTC 2021] 🤖
2021-11-28 20:49:07 +00:00
sandeep
b7cb6a63cb
moving template into cves
2021-11-29 02:17:27 +05:30
sandeep
682db62431
Fixed CVE-2020-14882 payload + matcher
2021-11-29 01:15:05 +05:30
Prince Chaddha
168db8a984
Update CVE-2020-2096.yaml
2021-11-24 11:58:52 +04:00
yuan
641ffd4e93
update CVE-2020-2096
2021-11-23 19:01:24 +08:00
GitHub Action
65ec414ae7
Auto Generated CVE annotations [Tue Nov 23 04:08:40 UTC 2021] 🤖
2021-11-23 04:08:40 +00:00
Prince Chaddha
1c569d76cb
Update CVE-2020-20982.yaml
2021-11-23 07:57:11 +04:00
PikPikcU
8463cfd824
Create CVE-2020-20982.yaml
2021-11-22 22:56:22 +07:00
Prince Chaddha
26a9bbc797
Update and rename CVE-2020-19360.yaml to cves/2020/CVE-2020-19360.yaml
2021-11-13 23:34:22 +05:30
GitHub Action
56c9fb7a7b
Auto Generated CVE annotations [Sat Nov 6 17:09:47 UTC 2021] 🤖
2021-11-06 17:09:47 +00:00
sandeep
dbbb08e40c
misc updates
2021-11-06 22:36:37 +05:30
Prince Chaddha
0e27f24138
Update CVE-2020-26413.yaml
2021-11-06 20:18:27 +05:30
Prince Chaddha
5aeb4de8c8
Create CVE-2020-26413.yaml
2021-11-06 18:22:50 +05:30
Chill3d
e6d40037c5
Typo on rocketchat tag
2021-10-27 10:30:43 +02:00
Sandeep Singh
b8aaf28eb6
Merge pull request #2901 from lethargynavigator/master
...
CVE-2020-24589 template
2021-10-21 22:27:25 +05:30
sandeep
e7768bb348
misc update
2021-10-21 22:25:42 +05:30
lethargynavigator
15a8208fc6
full poc
2021-10-21 11:02:55 -04:00
Sandeep Singh
a21cec6362
Merge pull request #2844 from projectdiscovery/more-fixes
...
Changes to adopt v2.5.3 engine
2021-10-21 07:21:20 +05:30
sandeep
33badb66d1
oob tags update
2021-10-19 02:10:26 +05:30
Prince Chaddha
fc81dd3b24
Update CVE-2020-10770.yaml
2021-10-18 21:03:29 +05:30
GitHub Action
e8218febf5
Auto Generated CVE annotations [Sun Oct 17 16:03:20 UTC 2021] 🤖
2021-10-17 16:03:20 +00:00
Dhiyaneshwaran
a9eca98f7f
Update CVE-2020-10770.yaml
2021-10-17 21:31:55 +05:30
Dhiyaneshwaran
9c8d006dbe
Create CVE-2020-10770.yaml
2021-10-17 21:29:45 +05:30
lethargynavigator
2871cc6b02
CVE-2020-24589 template
2021-10-15 20:37:03 -04:00
Sandeep Singh
9273a765c0
Merge branch 'master' into more-fixes
2021-10-13 13:48:52 +05:30
GitHub Action
5cf090ddec
Auto Generated CVE annotations [Sun Oct 10 22:40:30 UTC 2021] 🤖
2021-10-10 22:40:30 +00:00
sandeep
d76884c109
moving files around
2021-10-11 04:07:10 +05:30
sandeep
5072932509
more updates
2021-10-10 06:43:30 +05:30
sandeep
53fc9bcb3f
misc fixes
2021-10-07 05:23:20 +05:30
sandeep
937ff9f7ee
misc update
2021-10-05 22:00:59 +05:30
Sandeep Singh
ada6fcef43
Update CVE-2020-2036.yaml
2021-10-02 17:56:42 +05:30
Philippe Delteil
8185a0e9c0
Update CVE-2020-2036.yaml
2021-10-02 03:24:29 -03:00
sullo
c0003f8731
Update CVE-2020-29453.yaml
2021-09-30 14:27:12 -04:00
sullo
784d9560be
Fix CVSS score
...
incorrectly changed cvss score
2021-09-30 14:26:37 -04:00
Sullo
3878138bfe
* Added Host headers where needed (validated via disclosures/posts)
...
* Added CVE simple-employee-rce.yaml
2021-09-30 12:52:05 -04:00
sullo
6b5d52084d
Update cvss/severity for CVE-2020-29453
2021-09-29 10:35:52 -04:00
sandeep
ff1537d7da
fixing tags typos
2021-09-21 15:43:08 +05:30
sandeep
7b23f4ebd4
outdated template cleanups
2021-09-21 14:34:20 +05:30
Sandeep Singh
0f03f5ff55
Merge pull request #2692 from projectdiscovery/metadata-attribute-update
2021-09-18 18:19:07 +05:30
GitHub Action
a866f1e777
Auto Generated CVE annotations [Fri Sep 17 11:08:30 UTC 2021] 🤖
2021-09-17 11:08:30 +00:00
Prince Chaddha
7fc3c211d8
Merge pull request #2667 from pikpikcu/patch-268
...
Added Jeesns POC
2021-09-17 16:37:25 +05:30
Prince Chaddha
9357ac4153
Update CVE-2020-19282.yaml
2021-09-17 16:33:45 +05:30
Prince Chaddha
51672dd85d
Update CVE-2020-19295.yaml
2021-09-17 16:32:41 +05:30
Prince Chaddha
ae221b7892
Update CVE-2020-19283.yaml
2021-09-17 16:32:27 +05:30
Prince Chaddha
92014aa363
Update CVE-2020-19295.yaml
2021-09-17 16:31:20 +05:30
sandeep
676b51d20c
Metadata attribute update
2021-09-16 21:24:33 +05:30
GitHub Action
7542ad2c07
Auto Generated CVE annotations [Thu Sep 16 13:05:34 UTC 2021] 🤖
2021-09-16 13:05:34 +00:00
forgedhallpass
d0f5daca61
#276 Replace space character with dash in template ID.
2021-09-16 16:04:04 +03:00
GitHub Action
f19daba616
Auto Generated CVE annotations [Wed Sep 15 12:04:47 UTC 2021] 🤖
2021-09-15 12:04:47 +00:00
Prince Chaddha
f5c71d54e2
Merge pull request #2677 from pikpikcu/patch-278
...
Create CVE-2020-28351.yaml
2021-09-15 17:33:36 +05:30
Prince Chaddha
6539892061
Update CVE-2020-28351.yaml
2021-09-15 17:24:42 +05:30
GitHub Action
18534fa692
Auto Generated CVE annotations [Wed Sep 15 11:53:20 UTC 2021] 🤖
2021-09-15 11:53:20 +00:00
Prince Chaddha
68cdcd3034
Update CVE-2020-24912.yaml
2021-09-15 17:20:24 +05:30
Prince Chaddha
bc1d567455
Update CVE-2020-24912.yaml
2021-09-15 16:50:33 +05:30
Prince Chaddha
86a369132e
Update CVE-2020-24912.yaml
2021-09-15 16:49:18 +05:30
PikPikcU
80072c8e97
Create CVE-2020-28351.yaml
2021-09-15 13:13:50 +07:00
PikPikcU
bb8e0616e9
Create CVE-2020-24912.yaml
2021-09-15 13:00:51 +07:00
PikPikcU
1d63ebfe45
Update CVE-2020-19295.yaml
2021-09-15 11:30:58 +07:00
PikPikcU
c5416951e5
Update CVE-2020-19283.yaml
2021-09-15 11:30:38 +07:00
PikPikcU
4a10930690
Update CVE-2020-19282.yaml
2021-09-15 11:30:18 +07:00
PikPikcU
6985e77e20
Update CVE-2020-19295.yaml
2021-09-15 10:45:24 +07:00
PikPikcU
5fb54fd82e
Update CVE-2020-19283.yaml
2021-09-15 10:45:04 +07:00
PikPikcU
42cf71e956
Create CVE-2020-19295.yaml
2021-09-15 10:41:12 +07:00
PikPikcU
6e09439dec
Create CVE-2020-19283.yaml
2021-09-15 10:37:44 +07:00
PikPikcU
4340807fb6
Create CVE-2020-19282.yaml
2021-09-15 09:56:03 +07:00
sandeep
29a944ea73
payload update
2021-09-12 20:22:03 +05:30
sandeep
e6d97e26c5
additional matcher
2021-09-12 18:31:46 +05:30
Ice3man543
e9f728c321
Added cve annotations + severity adjustments
2021-09-10 16:56:40 +05:30
sandeep
bd24dc198e
Coverage for all templates using tags
2021-09-09 19:08:13 +05:30
Prince Chaddha
90eba9d883
Update CVE-2020-7961.yaml
2021-09-09 11:46:54 +05:30
Prince Chaddha
43b45a7b63
Update CVE-2020-12720.yaml
2021-09-09 11:42:52 +05:30
sandeep
609705f676
removed extra headers not required for template
2021-09-08 17:47:19 +05:30
sullo
ef1f7c5e92
Updates across many templates for clarity, spelling, and grammar.
2021-09-05 17:13:45 -04:00
Sandeep Singh
f6c72769ce
temporary moving to another branch
2021-09-03 22:29:55 +05:30
sandeep
90f8caf302
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into pr/2481
2021-09-03 14:55:30 +05:30
sandeep
c41a498505
added tags
2021-09-03 12:52:27 +05:30
Prince Chaddha
58a886ad6e
Update CVE-2020-28976.yaml
2021-09-03 09:24:21 +05:30
Borna Nematzadeh
6e7c3ab0a2
Update CVE-2020-28976.yaml
2021-09-02 12:26:10 -07:00
LogicalHunter
f0197ae9ac
Added CVE-2020-28976.yaml Template
2021-09-02 12:13:21 -07:00
Prince Chaddha
3b32de60be
Update CVE-2020-11547.yaml
2021-09-02 18:25:16 +05:30
betul.kiral
5c94814e00
Adding CVE-2020-11547
2021-09-02 14:43:37 +03:00
sandeep
c81725e991
Removed duplicate template
2021-09-01 12:36:20 +05:30
Noam Rathaus
51eb639de8
Updated
2021-08-30 12:49:23 +03:00
Noam Rathaus
86f3c08ba6
Vendor writes it as "NETGEAR"
2021-08-29 09:39:06 +03:00
Noam Rathaus
67fa97aed1
Add vendor KB
2021-08-29 09:36:59 +03:00
socketz
c766a8454d
Fixed yaml linting errors
2021-08-25 14:09:42 +02:00
socketz
f290b9f60d
Deleted duplicate and in wrong directory
2021-08-25 07:55:46 +02:00
sandeep
d705fbd84b
Update CVE-2020-11420.yaml
2021-08-25 00:33:54 +05:30
sandeep
3c95101f5a
Update CVE-2020-11420.yaml
2021-08-25 00:31:27 +05:30
sandeep
65d9d8acb2
lint fix
2021-08-24 23:13:00 +05:30
forgedhallpass
110f9c9ddd
Merge remote-tracking branch 'origin' into dynamic_attributes
2021-08-24 20:38:11 +03:00
socketz
7d6a6c137a
Added CVE-2020-11420
2021-08-24 14:43:45 +02:00
sandeep
85f8cf2c41
Update CVE-2020-12800.yaml
2021-08-24 05:00:04 +05:30
sandeep
fba4461932
Added CVE-2020-12800
2021-08-24 04:57:51 +05:30
forgedhallpass
296edfc37b
Merge remote-tracking branch 'origin' into dynamic_attributes
2021-08-23 14:40:33 +03:00
Sandeep Singh
04b401a8ef
Merge pull request #2456 from projectdiscovery/payloads-update
...
Payloads positional update to keep the request format uniform
2021-08-23 15:26:35 +05:30
sandeep
451e938d46
misc changes
2021-08-23 14:54:04 +05:30
Dwi Siswanto
be3d5c9d08
Add CVE-2020-29453
2021-08-23 11:30:16 +07:00
sandeep
2aa54304ee
Payloads positional update to keep the request format uniform
2021-08-22 23:39:33 +05:30
forgedhallpass
dc4cc62629
Merge remote-tracking branch 'origin/master' into dynamic_attributes
2021-08-20 15:35:17 +03:00
sandeep
3f803deb28
more updates
2021-08-20 02:14:42 +05:30
forgedhallpass
77103bc629
Satisfying the linter (all errors and warnings)
...
* whitespace modifications only
2021-08-19 17:44:46 +03:00
forgedhallpass
2a320412bf
Misc (minor)
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 17:25:01 +03:00
forgedhallpass
97d4f8705b
Fixed mistakes/typos
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:55 +03:00
forgedhallpass
f55d6b75e1
Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:12 +03:00
forgedhallpass
7b29be739e
Merge branch 'master' into dynamic_attributes
2021-08-19 16:23:26 +03:00
forgedhallpass
ffaff64565
Changes fixes/around dynamic attributes ("additional-fields")
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:17:27 +03:00
forgedhallpass
0b432b341b
Added comments with URLs under the "references" field
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:15:35 +03:00
Prince Chaddha
3a8b5df438
Update CVE-2020-25223.yaml
2021-08-19 16:35:50 +05:30
GwanYeong Kim
673fe80660
Create CVE-2020-25223.yaml
...
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-19 18:37:59 +09:00
forgedhallpass
cdf9451158
Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
forgedhallpass
4c920b2552
Rename "references" to "reference" to match the expected template info structure
...
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:29:20 +03:00
sandeep
63431349aa
minor update
2021-08-10 20:13:14 +05:30
Geeknik Labs
d6bd06a878
Update CVE-2020-24312.yaml
...
Fixes a false positive.
2021-08-09 20:43:58 -05:00