Prince Chaddha
|
f075cb4a00
|
Updated condition
|
2023-08-25 19:30:49 +05:30 |
mastercho
|
60418c566f
|
Fix trailing space
|
2023-08-25 16:25:02 +03:00 |
mastercho
|
6b0b47a2d6
|
Fixed matchers and removed statuscode check as not always is 200
|
2023-08-25 16:17:54 +03:00 |
Prince Chaddha
|
d5c2557fbc
|
fixed trailing spaces
|
2023-08-25 18:04:57 +05:30 |
Prince Chaddha
|
55dc24a4c5
|
Merge branch 'main' into prestashopsqli
|
2023-08-25 17:59:19 +05:30 |
Prince Chaddha
|
c5e48e9cc8
|
updated matchers
|
2023-08-25 17:53:28 +05:30 |
Prince Chaddha
|
003c12a15e
|
updated matchers
|
2023-08-25 17:07:43 +05:30 |
Ritik Chaddha
|
17f6abec90
|
Merge pull request #8070 from projectdiscovery/CVE-2023-39026
Create CVE-2023-39026.yaml
|
2023-08-24 23:19:35 +05:30 |
Ritik Chaddha
|
bcf747cc69
|
update matchers|info
|
2023-08-24 23:15:24 +05:30 |
Dhiyaneshwaran
|
777a520c8e
|
Create CVE-2023-38035.yaml (#8075)
* Create CVE-2023-38035.yaml
* syntax fix
* working template
* misc updates
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-08-24 23:10:37 +05:30 |
GitHub Action
|
ce7d7f288c
|
TemplateMan Update [Thu Aug 24 06:15:35 UTC 2023] 🤖
|
2023-08-24 06:15:36 +00:00 |
pussycat0x
|
c63f2ee0ce
|
Merge pull request #8060 from projectdiscovery/CVE-2023-39141
Create CVE-2023-39141.yaml WebUI-Aria2 - Path traversal
|
2023-08-24 11:43:42 +05:30 |
pussycat0x
|
eeb0288c31
|
dsl -update
|
2023-08-24 11:37:23 +05:30 |
Dhiyaneshwaran
|
ec2d108430
|
Create CVE-2023-39026.yaml
|
2023-08-24 11:10:31 +05:30 |
Dhiyaneshwaran
|
73068f1b31
|
fix fp
|
2023-08-24 09:23:50 +05:30 |
Ritik Chaddha
|
7e53eed7dc
|
updated protocol
|
2023-08-23 22:47:11 +05:30 |
Ritik Chaddha
|
61f960a3bf
|
Update CVE-2023-3936.yaml
|
2023-08-23 22:39:04 +05:30 |
Dhiyaneshwaran
|
6372949eee
|
remove hardcoded
|
2023-08-23 22:38:12 +05:30 |
Ritik Chaddha
|
8ef36715e3
|
updated matcher/req/path&info
|
2023-08-23 22:36:12 +05:30 |
Dhiyaneshwaran
|
091f576f6b
|
added matchers-condition
|
2023-08-23 12:32:23 +05:30 |
Dhiyaneshwaran
|
af7eca0d3e
|
Create CVE-2023-39141.yaml
|
2023-08-23 12:30:27 +05:30 |
Dhiyaneshwaran
|
fdec38604c
|
remove kev
|
2023-08-21 19:13:44 +05:30 |
Dhiyaneshwaran
|
cf698f7907
|
Update CVE-2023-35082.yaml
|
2023-08-21 19:13:19 +05:30 |
Dhiyaneshwaran
|
ce775b4722
|
Update CVE-2023-39143.yaml
|
2023-08-21 19:12:47 +05:30 |
Prince Chaddha
|
b45bd30dde
|
Create CVE-2023-20073.yaml
|
2023-08-21 08:31:17 +05:30 |
mastercho
|
020f397cad
|
Fixed naming of apmarketplace, fixed old CVE from medium to lowand added another sqli prestashop
|
2023-08-19 02:19:47 +03:00 |
mastercho
|
cb8cbac9df
|
Revert "Added/Fixed/Updated XXX Template"
This reverts commit dd08abe04e .
wrong commit message
|
2023-08-19 02:15:25 +03:00 |
mastercho
|
dd08abe04e
|
Added/Fixed/Updated XXX Template
|
2023-08-19 02:14:45 +03:00 |
pentesttools-com
|
38eafd33a2
|
Modified reference format from string to list to match the remaining cve modules (#8006)
|
2023-08-18 17:48:01 +05:30 |
Dhiyaneshwaran
|
f8931e8381
|
nvd description updated
|
2023-08-18 13:30:45 +05:30 |
pentesttools-com
|
daba6e2efb
|
Merge branch 'projectdiscovery:main' into add-missing-descriptions-cves
|
2023-08-18 10:47:36 +03:00 |
pentesttools-com
|
3edf136ea4
|
Added description fields for CVE-2021-44139 CVE-2023-38205 CVE-2023-34960
|
2023-08-18 10:46:53 +03:00 |
Dhiyaneshwaran
|
56780f8f72
|
spacing
|
2023-08-18 10:33:49 +05:30 |
Dhiyaneshwaran
|
0a51273b76
|
fix template
|
2023-08-17 18:36:07 +05:30 |
Dhiyaneshwaran
|
2dea3f4a44
|
remove version detection templates
|
2023-08-17 12:30:13 +05:30 |
momika233
|
d3affcfbfa
|
Add files via upload
|
2023-08-16 00:37:28 +08:00 |
Dhiyaneshwaran
|
f6c1088240
|
Lexmark Command Injection ZDI-CAN-19470 Pwn2Own Toronto 2022 🔥 (#7910)
* Create CVE-2023-26067.yaml
* cmd exec check + better matchers
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-08-12 23:15:00 +05:30 |
Dhiyaneshwaran
|
cbffe81504
|
re-wrote template
|
2023-08-09 02:32:42 +05:30 |
Ritik Chaddha
|
29669603b3
|
Merge pull request #7845 from projectdiscovery/CVE-2023-22480
Create CVE-2023-22480.yaml (KubeOperator Foreground kubeconfig Download) 🔥
|
2023-08-07 23:13:23 +05:30 |
Ritik Chaddha
|
c281a1dc55
|
updated info
|
2023-08-07 22:53:08 +05:30 |
Dhiyaneshwaran
|
ff474e87f5
|
fix headers -> header
|
2023-08-07 21:27:41 +05:30 |
pussycat0x
|
6dd47c914d
|
Merge pull request #7847 from projectdiscovery/CVE-2023-22478
Create CVE-2023-22478.yaml (KubePi <= v1.6.4 LoginLogsSearch)
|
2023-08-07 19:35:43 +05:30 |
Dhiyaneshwaran
|
1e8df323d2
|
Merge pull request #7846 from numanturle/CVE-2023-39120
Create CVE-2023-39120.yaml
|
2023-08-07 16:07:53 +05:30 |
Dhiyaneshwaran
|
b58932e9c4
|
updated matcher and added metadata
|
2023-08-07 13:49:40 +05:30 |
Dhiyaneshwaran
|
3793c853fd
|
Create CVE-2023-39143.yaml (PaperCut Path Traversal Detection) KEV 🔥 (#7857)
* Create CVE-2023-39143.yaml
* added kev reference
* Fix FP and Match only against PaperCut
* updated to use dsl matchers
* classification update
* updated name
* misc update
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
|
2023-08-06 22:51:19 +05:30 |
numan
|
6ae1c5e514
|
Update CVE-2023-39120.yaml
fix typo
|
2023-08-05 13:38:40 +03:00 |
Dhiyaneshwaran
|
fda5981960
|
Create CVE-2023-22478.yaml
|
2023-08-05 14:33:01 +05:30 |
numan
|
eee628ac8a
|
Create CVE-2023-39120.yaml
|
2023-08-05 11:48:31 +03:00 |
Dhiyaneshwaran
|
4d1578d6e7
|
Create CVE-2023-22480.yaml
|
2023-08-05 14:16:12 +05:30 |
Dhiyaneshwaran
|
eba1d1ce83
|
Create CVE-2023-35082.yaml
|
2023-08-03 21:50:05 +05:30 |
Ritik Chaddha
|
133f18eca9
|
Merge pull request #7789 from projectdiscovery/CVE-2023-1698
Create CVE-2023-1698.yaml
|
2023-08-02 13:50:28 +05:30 |
Ritik Chaddha
|
580c51dbc2
|
updated matcher
|
2023-08-02 13:47:13 +05:30 |
pussycat0x
|
85ce257f9f
|
Merge pull request #7787 from projectdiscovery/CVE-2023-32117
Create CVE-2023-32117.yaml
|
2023-08-02 12:02:14 +05:30 |
pussycat0x
|
873bd7c3cc
|
Update CVE-2023-32117.yaml
|
2023-08-02 11:14:25 +05:30 |
pussycat0x
|
4d4d008de0
|
lint - fix
|
2023-08-02 11:08:15 +05:30 |
pussycat0x
|
ffd867ba2f
|
Update CVE-2023-32117.yaml
|
2023-08-02 11:05:02 +05:30 |
Dhiyaneshwaran
|
f82cf5b7ca
|
fix matcher for sqli template
|
2023-08-02 09:23:57 +05:30 |
Dhiyaneshwaran
|
5c66e70568
|
remove name
|
2023-08-01 15:04:14 +05:30 |
GitHub Action
|
69bed45657
|
TemplateMan Update [Tue Aug 1 07:02:52 UTC 2023] 🤖
|
2023-08-01 07:02:52 +00:00 |
Ritik Chaddha
|
ddd0a02fbf
|
updated quote and space
|
2023-08-01 11:28:24 +05:30 |
Ritik Chaddha
|
69fb2db5c1
|
Create CVE-2023-37580.yaml (Zimbra XSS)
|
2023-08-01 10:56:17 +05:30 |
Dhiyaneshwaran
|
c615ced4f8
|
fix-template
|
2023-08-01 09:53:40 +05:30 |
Ritik Chaddha
|
042ef1eba2
|
updated matcher
|
2023-07-31 18:56:35 +05:30 |
Ritik Chaddha
|
5b57ab4e93
|
Metadata update CVE-2023-35078.yaml
|
2023-07-31 18:52:18 +05:30 |
Dhiyaneshwaran
|
ca576f0407
|
Create CVE-2023-1698.yaml
|
2023-07-30 22:11:33 +05:30 |
Dhiyaneshwaran
|
e7dd8eaee5
|
Create CVE-2023-32117.yaml
|
2023-07-30 20:42:56 +05:30 |
GitHub Action
|
2a0775df9b
|
TemplateMan Update [Fri Jul 28 21:41:00 UTC 2023] 🤖
|
2023-07-28 21:41:01 +00:00 |
Sandeep Singh
|
455c23dc36
|
Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass (CVE-2023-35078) (#7785)
* Added CVE-2023-35078 - Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass
Co-Authored-By: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
* added reference
---------
Co-authored-by: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
|
2023-07-29 03:08:50 +05:30 |
GitHub Action
|
6f4ca8977e
|
TemplateMan Update [Fri Jul 28 21:08:22 UTC 2023] 🤖
|
2023-07-28 21:08:23 +00:00 |
Dhiyaneshwaran
|
2f2626a6b3
|
Create CVE-2023-35885.yaml (#7771)
* Create CVE-2023-35885.yaml
* using echo string instead of webshell
---------
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-29 02:36:02 +05:30 |
Sandeep Singh
|
92659332c3
|
Added CVE-2023-38646 (Metabase PreAuth RCE) (#7777)
* Added detection template for CVE-2023-38646
* payload update
|
2023-07-29 01:19:14 +05:30 |
GitHub Action
|
56316fa724
|
TemplateMan Update [Thu Jul 27 18:52:41 UTC 2023] 🤖
|
2023-07-27 18:52:42 +00:00 |
Ritik Chaddha
|
7c1cc02bb8
|
Merge pull request #7768 from HuTa0kj/dev/cve_2023_3836
Create CVE-2023-3836.yaml
|
2023-07-28 00:20:41 +05:30 |
Ritik Chaddha
|
c1ada9f68d
|
updated info
|
2023-07-28 00:17:36 +05:30 |
pussycat0x
|
a83b43697b
|
Merge pull request #7764 from projectdiscovery/use-headers_2
Update CVE-2023-2178.yaml
|
2023-07-27 14:48:19 +05:30 |
Dhiyaneshwaran
|
fe443b2d6d
|
CasaOS Authentication Bypass (CVE-2023-37265, CVE-2023-37266) (#7766)
* Create CVE-2023-37265.yaml
* Create CVE-2023-37266.yaml
|
2023-07-27 14:41:18 +05:30 |
Dhiyaneshwaran
|
877af18592
|
metadata
|
2023-07-26 14:55:27 +05:30 |
HuTa0
|
333233c53d
|
Fix Blank line
|
2023-07-26 17:10:21 +08:00 |
TFDDZ
|
5e9480eb49
|
Create CVE-2023-3836.yaml
|
2023-07-26 17:01:22 +08:00 |
Dhiyaneshwaran
|
9aa5690bd5
|
Merge pull request #7742 from ctflearner/CVE-2023-23161
Create CVE-2023-23161.yaml
|
2023-07-26 13:09:04 +05:30 |
Ritik Chaddha
|
f5ff8753de
|
updated matcher & info
|
2023-07-26 11:25:48 +05:30 |
Dhiyaneshwaran
|
6807ab9492
|
Update CVE-2023-2178.yaml
|
2023-07-25 17:57:42 +05:30 |
GitHub Action
|
9633a4f8d7
|
TemplateMan Update [Tue Jul 25 06:56:17 UTC 2023] 🤖
|
2023-07-25 06:56:17 +00:00 |
Ritik Chaddha
|
cd4831d909
|
Update CVE-2023-2178.yaml
|
2023-07-25 11:29:28 +05:30 |
Ritik Chaddha
|
2ccb307cbd
|
Create CVE-2023-2178.yaml
|
2023-07-25 11:28:16 +05:30 |
Dhiyaneshwaran
|
d201fcada6
|
metadata update
|
2023-07-22 21:34:47 +05:30 |
sandeep
|
e4cd8422ef
|
lint fix
|
2023-07-22 13:32:10 +05:30 |
ctflearner
|
d11708fead
|
Create CVE-2023-23161.yaml
|
2023-07-22 11:37:25 +05:30 |
sandeep
|
09d3e3facc
|
lint fix
|
2023-07-21 20:47:31 +05:30 |
Parth Malhotra
|
02b36239f5
|
Update CVE-2023-37462.yaml
|
2023-07-21 20:03:11 +05:30 |
Parth Malhotra
|
ae14c1dc03
|
Create CVE-2023-37462.yaml
|
2023-07-21 20:01:16 +05:30 |
Ritik Chaddha
|
49981b5a86
|
Merge pull request #7727 from projectdiscovery/CVE-2023-38205
Create CVE-2023-38205.yaml
|
2023-07-21 17:27:23 +05:30 |
Ritik Chaddha
|
14b1ec2fd9
|
updated metadata
|
2023-07-21 17:21:37 +05:30 |
Dhiyaneshwaran
|
b8383cbac0
|
Create CVE-2023-3765.yaml
|
2023-07-21 01:35:45 +05:30 |
Ritik Chaddha
|
e3ffead64f
|
Create CVE-2023-34192.yaml (Zimbra XSS)
|
2023-07-20 23:57:03 +05:30 |
Dhiyaneshwaran
|
0033cf148a
|
Create CVE-2023-38205.yaml
|
2023-07-20 02:55:31 +05:30 |
sandeep
|
190eeeec51
|
updated templates with outdated syntax
|
2023-07-18 14:50:20 +05:30 |
Dhiyaneshwaran
|
7535168054
|
Merge branch 'main' into patch-16
|
2023-07-18 13:24:10 +05:30 |
Dhiyaneshwaran
|
ab1a450b80
|
Merge pull request #7712 from projectdiscovery/CVE-2023-23491
Create CVE-2023-23491.yaml
|
2023-07-18 13:21:37 +05:30 |
Dhiyaneshwaran
|
35de9a4ee8
|
Merge pull request #7713 from projectdiscovery/CVE-2023-0448
Create CVE-2023-0448.yaml
|
2023-07-18 13:19:42 +05:30 |
Dhiyaneshwaran
|
2791b323e6
|
Merge pull request #7707 from harsh2403/patch-17
Create CVE-2023-28665.yaml
|
2023-07-18 13:10:55 +05:30 |
GitHub Action
|
0d4a5d9a66
|
TemplateMan Update [Tue Jul 18 06:03:59 UTC 2023] 🤖
|
2023-07-18 06:04:01 +00:00 |
GitHub Action
|
c877dacbfc
|
TemplateMan Update [Tue Jul 18 06:02:36 UTC 2023] 🤖
|
2023-07-18 06:02:36 +00:00 |
Prince Chaddha
|
3e4f912f0e
|
Merge pull request #7602 from bob-the-builder-v/main
Modified http/cves/2023/CVE-2023-32243.yaml for better detection
|
2023-07-18 11:31:50 +05:30 |
pussycat0x
|
0216f4ecc5
|
Merge pull request #7700 from projectdiscovery/CVE-2023-3345
Create CVE-2023-3345.yaml
|
2023-07-18 11:30:50 +05:30 |
Prince Chaddha
|
e7b1b5d82f
|
Update CVE-2023-32243.yaml
|
2023-07-18 11:26:19 +05:30 |
Dhiyaneshwaran
|
640215564a
|
Merge branch 'main' into main
|
2023-07-18 11:21:17 +05:30 |
Dhiyaneshwaran
|
054b260f0b
|
lower case tags and remediation
|
2023-07-18 11:19:43 +05:30 |
Ritik Chaddha
|
bf2a342699
|
url encode payload
|
2023-07-17 23:51:46 +05:30 |
Ritik Chaddha
|
088dc6b284
|
Create CVE-2023-0448.yaml
|
2023-07-17 23:48:03 +05:30 |
Ritik Chaddha
|
979684b27c
|
Create CVE-2023-23491.yaml
|
2023-07-17 23:36:18 +05:30 |
Ritik Chaddha
|
d71733a489
|
updated req,matchers,info
|
2023-07-17 23:01:00 +05:30 |
Harsh Yadav
|
d9d543bb0d
|
Create CVE-2023-28665.yaml
|
2023-07-16 23:36:40 +05:30 |
Ritik Chaddha
|
ea472731da
|
updated payload,matcher,info
|
2023-07-16 22:58:45 +05:30 |
Prince Chaddha
|
b04a740cfa
|
Merge pull request #7670 from projectdiscovery/cve_enrichment
CVE Enrichment 🎉
|
2023-07-16 17:16:51 +05:30 |
Dhiyaneshwaran
|
6426507ae8
|
Create CVE-2023-3460.yaml (#7704)
* Create CVE-2023-3460.yaml
* misc update
* Update CVE-2023-3460.yaml
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-16 15:20:13 +05:30 |
Harsh Yadav
|
d14aaa69c0
|
Create CVE-2023-1546.yaml
|
2023-07-15 23:36:25 +05:30 |
pussycat0x
|
1de9011299
|
Update CVE-2023-3345.yaml
|
2023-07-15 22:03:45 +05:30 |
sandeep
|
83bf20510f
|
more updates
|
2023-07-15 21:59:17 +05:30 |
Dhiyaneshwaran
|
703518f755
|
Create CVE-2023-3345.yaml
|
2023-07-15 18:02:13 +05:30 |
mastercho
|
66e5c0af5b
|
Fixed Spaces
|
2023-07-13 20:04:28 +03:00 |
mastercho
|
2c6aa8b152
|
Added Prestashop SQLi
|
2023-07-13 19:54:13 +03:00 |
Dhiyaneshwaran
|
a082d33481
|
typo
|
2023-07-13 13:39:02 +05:30 |
Dhiyaneshwaran
|
c77ec55fbb
|
added possible user enum endpoints
|
2023-07-13 13:37:51 +05:30 |
Ritik Chaddha
|
e47db87042
|
Update CVE-2023-37270.yaml
|
2023-07-13 13:27:33 +05:30 |
Ritik Chaddha
|
92675d0756
|
Update CVE-2023-37270.yaml
|
2023-07-13 13:24:44 +05:30 |
pussycat0x
|
b5789d2c1a
|
Merge pull request #7673 from projectdiscovery/CVE-2023-37270
Create CVE-2023-37270.yaml
|
2023-07-13 13:15:41 +05:30 |
pussycat0x
|
414b21ffb2
|
dsl matchers - update
|
2023-07-13 13:12:01 +05:30 |
pussycat0x
|
2b03e2782d
|
Update CVE-2023-37270.yaml
|
2023-07-13 13:01:44 +05:30 |
Ritik Chaddha
|
b4b1c6ded0
|
Update CVE-2023-37270.yaml
|
2023-07-13 12:57:00 +05:30 |
pussycat0x
|
32ff78d0bc
|
minor -changes
|
2023-07-13 12:48:08 +05:30 |
Sandeep Singh
|
f6cd430e59
|
Added CVE-2023-29300 (Adobe ColdFusion - Pre-Auth Remote Code Execution) (#7682)
|
2023-07-13 03:59:28 +05:30 |
Prince Chaddha
|
a20611fe5d
|
Create CVE-2023-29298.yaml (#7677)
* Create CVE-2023-29298.yaml
* fixed lint error
* matcher + misc updates
* strict matcher
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-13 03:38:33 +05:30 |
Sandeep Singh
|
fd675eaba3
|
Merge branch 'main' into cve_enrichment
|
2023-07-12 21:27:27 +05:30 |
pussycat0x
|
1c1614b207
|
Merge pull request #7665 from projectdiscovery/CVE-2023-2796
Create CVE-2023-2796.yaml
|
2023-07-12 11:46:24 +05:30 |
Ritik Chaddha
|
18279f40b1
|
tag updated
|
2023-07-12 10:22:14 +05:30 |
Ritik Chaddha
|
1856bf9a8e
|
Create CVE-2023-37270.yaml
|
2023-07-12 10:21:18 +05:30 |
Dhiyaneshwaran
|
8f7c078997
|
CVE-2023-24489 🔥 Citrix ShareFile StorageZones Controller - RCE (#7664)
* Create CVE-2023-24489
* Add files via upload
* fuzz tag updation
* Rename CVE-2023-24489 to CVE-2023-24489.yaml
* Update http/cves/2023/CVE-2023-24489.yaml
Co-authored-by: Dwi Siswanto <me@dw1.io>
* changes as per review
* misc update
* variable update
* more strict matcher
---------
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: Dwi Siswanto <me@dw1.io>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-12 01:53:18 +05:30 |
sandeep
|
dd83af0228
|
CVE Enrichment 🎉
|
2023-07-12 01:19:27 +05:30 |
Ritik Chaddha
|
2bc852f3d1
|
Update CVE-2023-2796.yaml
|
2023-07-11 23:32:39 +05:30 |
Dhiyaneshwaran
|
918e0b0891
|
Create CVE-2023-2796.yaml
|
2023-07-11 18:02:11 +05:30 |
E1A
|
93bf747773
|
Update CVE-2023-27524.yaml
|
2023-07-10 17:21:35 +02:00 |
Ritik Chaddha
|
167d0e267d
|
Merge pull request #7649 from edoardottt/main
Add CVE-2023-3479
|
2023-07-10 20:44:47 +05:30 |
Ritik Chaddha
|
f942b15400
|
updated matcher
|
2023-07-10 20:41:27 +05:30 |
Dhiyaneshwaran
|
685850abae
|
fix-matcher
|
2023-07-10 20:34:42 +05:30 |
GitHub Action
|
04800ddd75
|
TemplateMan Update [Mon Jul 10 12:43:00 UTC 2023] 🤖
|
2023-07-10 12:43:01 +00:00 |
Dhiyaneshwaran
|
b15ab9f3ae
|
Merge pull request #7539 from harsh2403/patch-7
Create CVE-2023-33440.yaml
|
2023-07-10 18:11:05 +05:30 |
Dhiyaneshwaran
|
942bb169ca
|
fix
|
2023-07-10 18:07:31 +05:30 |
GitHub Action
|
674cbf611f
|
TemplateMan Update [Mon Jul 10 12:35:12 UTC 2023] 🤖
|
2023-07-10 12:35:13 +00:00 |
Dhiyaneshwaran
|
da29099005
|
Merge pull request #7570 from harsh2403/patch-12
Create CVE-2023-33338.yaml
|
2023-07-10 18:03:25 +05:30 |
Ritik Chaddha
|
7a21bb6f23
|
matcher and req updated
|
2023-07-10 17:55:32 +05:30 |
Ritik Chaddha
|
33fdee9c77
|
matchers and req update
|
2023-07-10 17:40:18 +05:30 |
Dhiyaneshwaran
|
4ca99ac8f0
|
Merge pull request #7576 from projectdiscovery/CVE-2023-2982
Create CVE-2023-2982.yaml
|
2023-07-10 13:38:57 +05:30 |
GitHub Action
|
0dd1d1c36e
|
TemplateMan Update [Sun Jul 9 09:50:07 UTC 2023] 🤖
|
2023-07-09 09:50:08 +00:00 |
Sandeep Singh
|
616e1ec5b0
|
Added CVE-2023-36934 (MOVEit Transfer - SQL Injection) (#7650)
|
2023-07-09 15:17:35 +05:30 |
edoardottt
|
6dc7cbafe6
|
add CVE-2023-3479
|
2023-07-09 11:02:02 +02:00 |
Prince Chaddha
|
79203dca0e
|
Update CVE-2023-36346.yaml
|
2023-07-08 12:13:35 +05:30 |
Prince Chaddha
|
cd1b7781db
|
Update CVE-2023-36346.yaml
|
2023-07-08 11:53:21 +05:30 |
GitHub Action
|
646ffaf0b8
|
TemplateMan Update [Fri Jul 7 11:37:24 UTC 2023] 🤖
|
2023-07-07 11:37:25 +00:00 |
Prince Chaddha
|
f00f0b0488
|
Merge pull request #7552 from harsh2403/patch-10
Create CVE-2023-33439.yaml
|
2023-07-07 17:05:10 +05:30 |
Prince Chaddha
|
b316cc936f
|
Merge pull request #7618 from projectdiscovery/remove-comments
removed enhanced by comments
|
2023-07-07 17:00:46 +05:30 |
Prince Chaddha
|
0a681ec0bb
|
removed empty lines
|
2023-07-07 16:56:27 +05:30 |
GitHub Action
|
cb26083079
|
TemplateMan Update [Fri Jul 7 11:17:58 UTC 2023] 🤖
|
2023-07-07 11:17:59 +00:00 |
pussycat0x
|
cb6eaf95a2
|
Merge pull request #7637 from projectdiscovery/cve-templates4
CVEs added
|
2023-07-07 16:46:09 +05:30 |
pussycat0x
|
0ccffd229a
|
Merge branch 'main' into remove-comments
|
2023-07-07 16:38:46 +05:30 |
Dhiyaneshwaran
|
c77309373b
|
fix payload and directory
|
2023-07-07 16:21:07 +05:30 |
Prince Chaddha
|
7d7e4f43ac
|
updated stored tags
|
2023-07-07 15:34:00 +05:30 |
Ritik Chaddha
|
d389ef4754
|
Update CVE-2023-33439.yaml
|
2023-07-07 15:30:05 +05:30 |
Prince Chaddha
|
332e19282e
|
templates added
|
2023-07-07 15:08:49 +05:30 |
pussycat0x
|
a8503c567d
|
Merge pull request #7616 from projectdiscovery/CVE-2023-2822
Create CVE-2023-2822.yaml
|
2023-07-07 15:04:52 +05:30 |
pussycat0x
|
0a0525fa67
|
Update CVE-2023-0297.yaml
|
2023-07-07 10:38:10 +05:30 |
Dhiyaneshwaran
|
03b1f956c8
|
trail space fix
|
2023-07-06 16:04:40 +05:30 |
Dhiyaneshwaran
|
def35f6b48
|
re-wrote template
|
2023-07-06 16:00:31 +05:30 |
Prince Chaddha
|
75ed275328
|
removed enhanced by comments
|
2023-07-05 13:37:58 +05:30 |
Dhiyaneshwaran
|
2a2c309d6c
|
Create CVE-2023-2822.yaml
|
2023-07-05 12:21:44 +05:30 |
alert('0-0')
|
276497b314
|
CVE-2023-0297.yaml
|
2023-07-04 18:28:32 +05:30 |
alert('0-0')
|
ac84955ae6
|
CVE-2023-0297.yaml
|
2023-07-04 18:21:35 +05:30 |
Ritik Chaddha
|
ff1fcc7735
|
Update CVE-2023-28432.yaml
|
2023-07-04 15:11:55 +05:30 |
Prince Chaddha
|
8f529c8ca7
|
Update CVE-2023-28432.yaml
|
2023-07-04 14:46:26 +05:30 |
GitHub Action
|
61343fba51
|
TemplateMan Update [Tue Jul 4 09:06:45 UTC 2023] 🤖
|
2023-07-04 09:06:46 +00:00 |
Prince Chaddha
|
6ac87ba526
|
Update CVE-2023-24488.yaml
|
2023-07-04 14:24:43 +05:30 |
Dhiyaneshwaran
|
a3702ab23c
|
fix lint
|
2023-07-04 11:00:39 +05:30 |
Dhiyaneshwaran
|
29984cf2de
|
Update CVE-2023-24488.yaml
|
2023-07-04 09:59:56 +05:30 |
Dhiyaneshwaran
|
ac390d4f9a
|
Create CVE-2023-28121.yaml (#7605)
* Create CVE-2023-28121.yaml
* misc updates
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-03 23:45:00 +05:30 |
Vikas
|
30df6e6ad7
|
Modified http/cves/2023/CVE-2023-32243.yaml for better detection
|
2023-07-03 15:09:42 +05:30 |
GitHub Action
|
f25faffb88
|
TemplateMan Update [Sat Jul 1 13:40:54 UTC 2023] 🤖
|
2023-07-01 13:40:55 +00:00 |
Dhiyaneshwaran
|
ea5a03d3cc
|
Merge pull request #7553 from harsh2403/patch-11
Create CVE-2023-0527.yaml
|
2023-07-01 19:09:12 +05:30 |
GitHub Action
|
7edd63064f
|
TemplateMan Update [Sat Jul 1 13:35:16 UTC 2023] 🤖
|
2023-07-01 13:35:17 +00:00 |
GitHub Action
|
512a6dca5b
|
TemplateMan Update [Sat Jul 1 13:34:21 UTC 2023] 🤖
|
2023-07-01 13:34:22 +00:00 |
Dhiyaneshwaran
|
05ab11dd89
|
Merge pull request #7528 from harsh2403/patch-1
Create CVE-2023-34537.yaml
|
2023-07-01 19:03:05 +05:30 |
Dhiyaneshwaran
|
0b88bd0410
|
Merge pull request #7519 from projectdiscovery/CVE-2023-34659
Create CVE-2023-34659.yaml
|
2023-07-01 19:02:23 +05:30 |
Dhiyaneshwaran
|
f6dca2de16
|
added metrics
|
2023-07-01 18:58:25 +05:30 |
Sandeep Singh
|
022b5d9754
|
Added CVE-2023-1496 (#7589)
* Create CVE-2023-1496.yaml
Added Imgproxy < 3.14.0 - Cross-site Scripting (XSS) - CVE-2023-1496
* added xss payload
---------
Co-authored-by: Dhiyaneshwaran <leedhiyanesh@gmail.com>
|
2023-07-01 18:45:49 +05:30 |
sandeep
|
d371883e2c
|
misc updates
|
2023-07-01 15:45:22 +05:30 |
Dhiyaneshwaran
|
47c431d855
|
Create CVE-2023-30019.yaml
|
2023-07-01 14:57:30 +05:30 |
johnk3r
|
64a18eaa16
|
Create CVE-2023-24488.yaml (#7581)
* Create CVE-2023-24488.yaml
* Update CVE-2023-24488.yaml
* Update CVE-2023-24488.yaml
* added metadata
* fix matcher
* added fixed and strict matchers + classification
---------
Co-authored-by: Dhiyaneshwaran <leedhiyanesh@gmail.com>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-06-30 23:28:56 +05:30 |
Ritik Chaddha
|
64fcb1cf11
|
updated payload,matchers
|
2023-06-30 17:06:19 +05:30 |
Ritik Chaddha
|
b741fabca7
|
updated req,matchers
|
2023-06-30 16:56:36 +05:30 |
Ritik Chaddha
|
955d244f99
|
Create CVE-2023-2982.yaml
|
2023-06-29 18:28:22 +05:30 |
Harsh Yadav
|
6d2b6f13c9
|
Create CVE-2023-33338.yaml
|
2023-06-29 12:47:34 +05:30 |
Ritik Chaddha
|
fbbaaaf10f
|
Merge pull request #7548 from projectdiscovery/CVE-2023-34598
Create CVE-2023-34598.yaml
|
2023-06-29 11:14:14 +05:30 |
GitHub Action
|
be0a237fe0
|
TemplateMan Update [Thu Jun 29 04:57:55 UTC 2023] 🤖
|
2023-06-29 04:57:55 +00:00 |
Ritik Chaddha
|
cbf2e574e2
|
updated info and matcher
|
2023-06-29 10:27:30 +05:30 |
pussycat0x
|
962404af73
|
Merge pull request #7559 from projectdiscovery/CVE-2023-0126
Create CVE-2023-0126.yaml
|
2023-06-29 10:26:11 +05:30 |
Dhiyaneshwaran
|
057407ca4a
|
Create CVE-2023-34843.yaml
|
2023-06-28 22:47:53 +05:30 |
Dhiyaneshwaran
|
4ebbf04e3e
|
Merge pull request #7554 from projectdiscovery/CVE-2023-20888
Create CVE-2023-20888.yaml
|
2023-06-28 10:34:54 +05:30 |
Dhiyaneshwaran
|
5d6d23434c
|
Merge pull request #7565 from projectdiscovery/CVE-2023-34599
Create CVE-2023-34599.yaml
|
2023-06-28 10:33:15 +05:30 |
Dhiyaneshwaran
|
795f66904b
|
Merge pull request #7555 from projectdiscovery/CVE-2023-20889
Create CVE-2023-20889.yaml
|
2023-06-28 10:30:58 +05:30 |
Dhiyaneshwaran
|
33d94100c6
|
added metadata
|
2023-06-28 10:30:04 +05:30 |
Dhiyaneshwaran
|
cd0ae0d86d
|
oast added
|
2023-06-28 10:28:10 +05:30 |
Dhiyaneshwaran
|
451fc9c44a
|
added metadata
|
2023-06-28 10:27:47 +05:30 |
Ritik Chaddha
|
e83cbffaae
|
updated matcher'\
|
2023-06-28 10:26:23 +05:30 |
Ritik Chaddha
|
7e25238b74
|
Create CVE-2023-34599.yaml
|
2023-06-28 10:16:05 +05:30 |
GitHub Action
|
44a04af132
|
TemplateMan Update [Wed Jun 28 04:35:45 UTC 2023] 🤖
|
2023-06-28 04:35:46 +00:00 |
GitHub Action
|
f9ef153603
|
TemplateMan Update [Wed Jun 28 04:35:22 UTC 2023] 🤖
|
2023-06-28 04:35:22 +00:00 |
GitHub Action
|
e6abc5c4af
|
TemplateMan Update [Wed Jun 28 04:34:45 UTC 2023] 🤖
|
2023-06-28 04:34:46 +00:00 |
Dhiyaneshwaran
|
db88d651c0
|
Merge pull request #7533 from harsh2403/patch-5
Create CVE-2023-31548.yaml
|
2023-06-28 10:03:57 +05:30 |
Dhiyaneshwaran
|
3663fe3700
|
Merge pull request #7541 from harsh2403/patch-8
Create CVE-2023-0563.yaml
|
2023-06-28 10:03:26 +05:30 |
Dhiyaneshwaran
|
eaf5f9e975
|
Merge pull request #7542 from harsh2403/patch-9
Create CVE-2023-0562.yaml
|
2023-06-28 10:02:50 +05:30 |
GitHub Action
|
c6544c87d8
|
TemplateMan Update [Wed Jun 28 04:29:34 UTC 2023] 🤖
|
2023-06-28 04:29:35 +00:00 |
Dhiyaneshwaran
|
8412bcb993
|
Merge pull request #7532 from harsh2403/patch-4
Create CVE-2023-26843.yaml
|
2023-06-28 09:57:31 +05:30 |
GitHub Action
|
da1f89ec28
|
TemplateMan Update [Wed Jun 28 04:26:22 UTC 2023] 🤖
|
2023-06-28 04:26:23 +00:00 |
GitHub Action
|
f52204f259
|
TemplateMan Update [Wed Jun 28 04:24:29 UTC 2023] 🤖
|
2023-06-28 04:24:29 +00:00 |
Dhiyaneshwaran
|
1895971312
|
Merge pull request #7531 from harsh2403/patch-3
Create CVE-2023-26842.yaml
|
2023-06-28 09:54:19 +05:30 |
Ritik Chaddha
|
b3113576b6
|
updated name & refer
|
2023-06-28 09:20:57 +05:30 |
Dhiyaneshwaran
|
f145f75d65
|
Create CVE-2023-0126.yaml
|
2023-06-28 01:45:29 +05:30 |
Ritik Chaddha
|
a41665d948
|
updated matcher
|
2023-06-27 14:16:24 +05:30 |
Ritik Chaddha
|
83f7260c11
|
Create CVE-2023-20889.yaml
|
2023-06-27 14:11:53 +05:30 |
Ritik Chaddha
|
cd4bcb8802
|
Create CVE-2023-20888.yaml
|
2023-06-27 14:07:06 +05:30 |
Ritik Chaddha
|
5e95fc9c0f
|
lint fix
|
2023-06-26 23:00:50 +05:30 |
Harsh Yadav
|
cc6d721634
|
Create CVE-2023-0527.yaml
|
2023-06-26 21:36:27 +05:30 |
Harsh Yadav
|
a59080c824
|
Create CVE-2023-33439.yaml
|
2023-06-26 18:15:23 +05:30 |
Ritik Chaddha
|
995c1cfa92
|
updated path,info,matcher
|
2023-06-26 11:10:43 +05:30 |
Ritik Chaddha
|
c8a71e932f
|
lint fix
|
2023-06-26 11:07:41 +05:30 |
Ritik Chaddha
|
5ffcba81f7
|
updated path,info
|
2023-06-26 11:02:18 +05:30 |
Ritik Chaddha
|
7baa30d4ff
|
updated info,path
|
2023-06-26 10:45:22 +05:30 |
Ritik Chaddha
|
b74e909d82
|
updated info
|
2023-06-26 10:40:51 +05:30 |
Ritik Chaddha
|
0ad552d98f
|
updated info
|
2023-06-26 10:10:47 +05:30 |
Dhiyaneshwaran
|
e2a672bfec
|
Create CVE-2023-34598.yaml
|
2023-06-26 10:08:27 +05:30 |
Ritik Chaddha
|
3120af7266
|
updated info
|
2023-06-26 09:58:49 +05:30 |
Harsh Yadav
|
2b27a2c635
|
Create CVE-2023-0562.yaml
|
2023-06-26 00:36:25 +05:30 |
Harsh Yadav
|
9368dd8383
|
Create CVE-2023-0563.yaml
|
2023-06-26 00:19:10 +05:30 |
Harsh Yadav
|
c7bd0427df
|
Create CVE-2023-33440.yaml
|
2023-06-25 22:28:59 +05:30 |
Harsh Yadav
|
2cc6c7d99f
|
Create CVE-2023-31548.yaml
|
2023-06-25 02:10:57 +05:30 |
Harsh Yadav
|
2fd0eb8145
|
Create CVE-2023-26843.yaml
|
2023-06-25 01:51:22 +05:30 |
Harsh Yadav
|
dad8a4d86c
|
Create CVE-2023-26842.yaml
|
2023-06-25 01:32:26 +05:30 |
Harsh Yadav
|
d4a2b2d514
|
Create CVE-2023-25346.yaml
|
2023-06-25 00:44:38 +05:30 |
Ritik Chaddha
|
4a09a65e58
|
Update CVE-2023-34537.yaml
|
2023-06-24 23:44:43 +05:30 |
sandeep
|
81c8b51ea2
|
misc update
|
2023-06-24 20:05:55 +05:30 |
Harsh Yadav
|
1cca7c3bb3
|
Create CVE-2023-34537.yaml
|
2023-06-24 19:46:18 +05:30 |
Ritik Chaddha
|
4cdc08f25b
|
Create CVE-2023-34659.yaml
|
2023-06-22 23:12:57 +05:30 |
GitHub Action
|
4b955483e6
|
TemplateMan Update [Thu Jun 22 07:32:03 UTC 2023] 🤖
|
2023-06-22 07:32:04 +00:00 |
pussycat0x
|
cefe7c40f5
|
Merge pull request #7510 from projectdiscovery/CVE-2023-27372
Create CVE-2023-27372.yaml
|
2023-06-22 13:00:21 +05:30 |
pussycat0x
|
d9a787a6ed
|
Merge pull request #7502 from projectdiscovery/CVE-2023-1454
Create CVE-2023-1454.yaml
|
2023-06-22 12:44:59 +05:30 |
pussycat0x
|
a1840d640b
|
Update CVE-2023-1454.yaml
|
2023-06-22 12:40:18 +05:30 |
pussycat0x
|
72ab5780d7
|
Update CVE-2023-1454.yaml
|
2023-06-22 12:36:37 +05:30 |
Dhiyaneshwaran
|
77b86dfc49
|
payload updation to detect both windows and linux
|
2023-06-22 12:32:57 +05:30 |
pussycat0x
|
3d55f1fb1a
|
Merge pull request #7483 from projectdiscovery/CVE-2023-33510
Create CVE-2023-33510.yaml
|
2023-06-22 12:30:07 +05:30 |
pussycat0x
|
7efd5ad08d
|
tag -update
|
2023-06-22 12:22:07 +05:30 |
Ritik Chaddha
|
dec47356d1
|
Merge pull request #7512 from projectdiscovery/updated-metadata
Update CVE-2023-35843.yaml
|
2023-06-22 10:24:14 +05:30 |
GitHub Action
|
316a306afd
|
TemplateMan Update [Thu Jun 22 04:51:54 UTC 2023] 🤖
|
2023-06-22 04:51:55 +00:00 |
Ritik Chaddha
|
924fd44f73
|
Update CVE-2023-35843.yaml
|
2023-06-22 10:21:41 +05:30 |
Dhiyaneshwaran
|
5266fee162
|
Merge pull request #7491 from dwisiswant0/add/DW1-59-60
add(http/cves): CVE-2023-35843 & CVE-2023-35844
|
2023-06-22 10:19:51 +05:30 |
Ritik Chaddha
|
b13d332366
|
Update CVE-2023-34362.yaml
|
2023-06-22 09:47:32 +05:30 |
GitHub Action
|
41277637c0
|
TemplateMan Update [Wed Jun 21 21:03:53 UTC 2023] 🤖
|
2023-06-21 21:03:54 +00:00 |
Dhiyaneshwaran
|
07905a3aeb
|
Create CVE-2023-27372.yaml
|
2023-06-22 02:22:22 +05:30 |
Dhiyaneshwaran
|
21b48a89bd
|
extract database names
|
2023-06-21 00:18:52 +05:30 |
Dhiyaneshwaran
|
1e85ca79d8
|
fix trail space
|
2023-06-20 23:55:20 +05:30 |
Dhiyaneshwaran
|
82530ca7f7
|
Create CVE-2023-1454.yaml
|
2023-06-20 23:52:13 +05:30 |
Ritik Chaddha
|
2ff1596969
|
updated matcher
|
2023-06-20 21:35:59 +05:30 |
Ritik Chaddha
|
c7652083fc
|
Update CVE-2023-34362.yaml
|
2023-06-20 18:39:12 +05:30 |
Dhiyaneshwaran
|
cfd73bf55d
|
fix trail space and shodan query
|
2023-06-20 18:19:34 +05:30 |
Ritik Chaddha
|
9504700c97
|
Create CVE-2023-34362.yaml
|
2023-06-20 18:12:23 +05:30 |
Dwi Siswanto
|
0be3f0be0e
|
fix(CVE-2023-35844): add shodan query metadata
|
2023-06-20 18:07:23 +07:00 |
Dwi Siswanto
|
839d1e1af0
|
fix(CVE-2023-35843): remove unnecessary matcher
|
2023-06-20 18:06:36 +07:00 |
Prince Chaddha
|
63ef35f05c
|
Merge pull request #7492 from projectdiscovery/header_update
removed deprecated header syntax with latest one
|
2023-06-20 15:03:23 +05:30 |
pussycat0x
|
5155d0d905
|
Update CVE-2023-33568.yaml
|
2023-06-20 14:39:55 +05:30 |
Dwi Siswanto
|
8df19650d3
|
fix(CVE-2023-35843): update title & desc
|
2023-06-20 12:52:37 +07:00 |
Dwi Siswanto
|
0133afffc1
|
add(http/cves): CVE-2023-35843 & CVE-2023-35844
|
2023-06-20 12:51:46 +07:00 |
sandeep
|
c90fa30096
|
removed deprecated header syntax with latest one
|
2023-06-20 02:40:30 +05:30 |
pussycat0x
|
7f2c378668
|
minor -update
|
2023-06-20 00:14:40 +05:30 |
Dhiyaneshwaran
|
2788a55253
|
Create CVE-2023-33568.yaml
|
2023-06-19 18:40:24 +05:30 |
Dhiyaneshwaran
|
825336d843
|
Create CVE-2023-33510.yaml
|
2023-06-19 15:26:15 +05:30 |
Dhiyaneshwaran
|
c9803c3114
|
Merge pull request #7474 from projectdiscovery/CVE-2023-24243
Create CVE-2023-24243.yaml
|
2023-06-18 01:41:15 +05:30 |
Ritik Chaddha
|
7bbd550c1a
|
updated severity
|
2023-06-17 23:35:57 +05:30 |
pussycat0x
|
f0e5e2eb42
|
Merge pull request #7472 from projectdiscovery/CVE-2023-34960
Create CVE-2023-34960.yaml
|
2023-06-17 22:57:12 +05:30 |
Ritik Chaddha
|
f76973bc8a
|
Create CVE-2023-24243.yaml
|
2023-06-17 10:37:41 +05:30 |
Ritik Chaddha
|
db3812722d
|
Update CVE-2023-23333.yaml
|
2023-06-16 23:35:39 +05:30 |
Ritik Chaddha
|
46216ecb38
|
updated payload and matcher
|
2023-06-16 23:34:10 +05:30 |
Dhiyaneshwaran
|
b3049352d7
|
added os command
|
2023-06-16 23:04:40 +05:30 |
Dhiyaneshwaran
|
a68f1ce11d
|
Create CVE-2023-34960.yaml
|
2023-06-16 22:42:10 +05:30 |
Dhiyaneshwaran
|
c4a8a6bd84
|
fix formatting
|
2023-06-16 21:44:16 +05:30 |
东方有鱼名为咸
|
33ebc314b7
|
Create CVE-2023-23333.yaml
|
2023-06-16 07:40:37 -07:00 |
Prince Chaddha
|
5fbc7d5b0a
|
Update CVE-2023-32315.yaml
|
2023-06-16 19:44:13 +05:30 |
Ritik Chaddha
|
455358cbf3
|
Update CVE-2023-0630.yaml
|
2023-06-16 10:02:48 +05:30 |
Dhiyaneshwaran
|
99771c5b5b
|
Create CVE-2023-0630.yaml
|
2023-06-16 05:52:58 +05:30 |
Prince Chaddha
|
083fe1b839
|
added variable
|
2023-06-14 09:28:59 +05:30 |
Prince Chaddha
|
f8e645ae41
|
Updated CVE-2023-20887
|
2023-06-13 23:32:04 +05:30 |
Prince Chaddha
|
d84386101e
|
Updated description
|
2023-06-13 22:08:59 +05:30 |
sandeep
|
0fea720652
|
misc update
|
2023-06-13 21:37:28 +05:30 |
Dhiyaneshwaran
|
4434b9ea15
|
Update CVE-2023-20887.yaml
|
2023-06-13 21:08:36 +05:30 |
SinSinology
|
2963a94e91
|
VMWare vRealize Network Insight pre-authenticated RCE CVE-2023-20887
Technical Details at:
https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/
|
2023-06-13 15:24:50 +01:00 |
pussycat0x
|
68d776d90a
|
Merge pull request #7389 from ruben-condor/improve_cve-2023-1434-template
Updated CVE-2023-1434.yaml template
|
2023-06-12 19:28:04 +05:30 |
pussycat0x
|
457febde96
|
Update CVE-2023-1434.yaml
|
2023-06-12 16:01:17 +05:30 |
Ruben Condor
|
1d0d1edc65
|
Updated CVE-2023-1434.yaml template
|
2023-06-12 12:51:29 +03:00 |
pussycat0x
|
d62e939929
|
Merge pull request #7364 from projectdiscovery/CVE-2023-25157
Create CVE-2023-25157.yaml
|
2023-06-10 00:39:01 +05:30 |
Ritik Chaddha
|
f4cd0f5f84
|
added timeout
|
2023-06-09 18:45:43 +05:30 |
Ritik Chaddha
|
093e3a5ace
|
Update CVE-2023-1671.yaml
|
2023-06-09 17:54:34 +05:30 |
J4vaovo
|
f5c84f0756
|
Update CVE-2023-1671.yaml
|
2023-06-09 18:56:06 +08:00 |
Ritik Chaddha
|
27e9cf2e56
|
updated matcher
|
2023-06-07 11:56:24 +05:30 |
Dhiyaneshwaran
|
2892115497
|
minor update
|
2023-06-07 11:42:54 +05:30 |
Ritik Chaddha
|
1be29c9df3
|
Create CVE-2023-25157.yaml
|
2023-06-07 11:28:03 +05:30 |
Dhiyaneshwaran
|
e1f9a21da7
|
Merge pull request #7320 from ruben-condor/add-reference-and-classification-and-fix-param
Updated CVE-2023-1434
|
2023-06-05 15:37:05 +05:30 |
Ritik Chaddha
|
bd9ed6c939
|
updated metadata & matchers
|
2023-06-05 13:06:58 +05:30 |
Prince Chaddha
|
ffc66c4bd8
|
templates added
|
2023-06-05 12:33:16 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
sandeep
|
8b8b17abad
|
proto update
|
2023-06-03 21:54:59 +05:30 |
Ritik Chaddha
|
50c1b85db4
|
lint fix
|
2023-06-02 23:48:50 +05:30 |
Ritik Chaddha
|
c95a64a9e0
|
update metadata
|
2023-06-02 23:47:11 +05:30 |
Ritik Chaddha
|
dd68f47ae2
|
Create CVE-2023-1362.yaml
|
2023-06-02 23:45:08 +05:30 |
pussycat0x
|
cc0a79a58a
|
Merge pull request #7334 from projectdiscovery/CVE-2023-32315
CVE-2023-32315 [Administration Console authentication bypass in Openf…
|
2023-06-01 14:51:00 +05:30 |
Prince Chaddha
|
c4480b5817
|
updated name
|
2023-06-01 14:19:59 +05:30 |
Dhiyaneshwaran
|
495a5a2ebc
|
CVE-2023-32315 [Administration Console authentication bypass in Openfire]
|
2023-06-01 09:58:48 +05:30 |
Dhiyaneshwaran
|
9ef7e9adb3
|
CVE-2023-27482: Authentication Bypass in Home Assistant
|
2023-06-01 08:41:00 +05:30 |
Ruben Condor
|
d74b4974ff
|
Updated CVE-2023-1434
|
2023-05-30 15:41:56 +03:00 |
Dhiyaneshwaran
|
9c885b5aa9
|
Merge branch 'main' into add-description-and-classification-to-CVE-2023-29489
|
2023-05-30 15:27:57 +05:30 |
Dhiyaneshwaran
|
6e7fd66a1d
|
minor update
|
2023-05-30 15:27:27 +05:30 |
Ruben Condor
|
d51aaf2cbc
|
Updated CVE-2023-29489.yaml
|
2023-05-30 12:14:58 +03:00 |
Ritik Chaddha
|
a052de6ad8
|
updated info
|
2023-05-29 23:31:22 +05:30 |
Dhiyaneshwaran
|
6743175d2a
|
Create CVE-2023-2825.yaml
|
2023-05-29 14:06:11 +05:30 |
Dhiyaneshwaran
|
3fe76969b9
|
Merge pull request #7177 from Co5mos/CVE-2023-2356
Added CVE-2023-2356 Template
|
2023-05-26 18:57:33 +05:30 |
pussycat0x
|
1822b88c6c
|
Merge pull request #7259 from For3stCo1d/CVE-2023-29919
Create CVE-2023-29919.yaml
|
2023-05-26 18:48:23 +05:30 |
Ritik Chaddha
|
0e920947fe
|
Merge pull request #7298 from projectdiscovery/CVE-2023-2732
Create CVE-2023-2732.yaml [MStore API <= 3.9.2 - Authentication Bypass] 🔥
|
2023-05-26 18:10:37 +05:30 |
Ritik Chaddha
|
c59cf8fdcd
|
updated info
|
2023-05-26 18:08:02 +05:30 |
Ritik Chaddha
|
ac5643eaa8
|
updated info
|
2023-05-26 18:06:10 +05:30 |
Dhiyaneshwaran
|
891c8603e3
|
trail space fix
|
2023-05-26 15:07:05 +05:30 |
Dhiyaneshwaran
|
d26375a3b9
|
print password
|
2023-05-26 15:04:36 +05:30 |
Dhiyaneshwaran
|
8be63f6c2b
|
using single password variable
|
2023-05-26 13:18:20 +05:30 |
Dhiyaneshwaran
|
7cec666668
|
Create CVE-2023-32243.yaml [WordPress Elementor Lite 5.7.1 Arbitrary Password Reset]
|
2023-05-26 13:04:37 +05:30 |
Dhiyaneshwaran
|
b65534983f
|
Create CVE-2023-2732.yaml [MStore API <= 3.9.2 - Authentication Bypass]
|
2023-05-26 12:05:31 +05:30 |
Ritik Chaddha
|
83a7341f0a
|
lint fix
|
2023-05-24 23:42:07 +05:30 |
Ritik Chaddha
|
355f7a74b8
|
Create CVE-2023-29887.yaml
|
2023-05-24 23:38:59 +05:30 |
pussycat0x
|
717a7410d9
|
severity & name -updated
|
2023-05-23 12:02:34 +05:30 |
pussycat0x
|
591d8e8417
|
payload - update
|
2023-05-23 11:37:05 +05:30 |
pussycat0x
|
afe04d410f
|
minor - update
|
2023-05-23 11:23:52 +05:30 |
Prince Chaddha
|
3a39ab47a4
|
Create CVE-2023-2780.yaml
|
2023-05-22 15:56:58 +05:30 |
Ritik Chaddha
|
b0423d9742
|
updated matcher
|
2023-05-19 23:23:25 +05:30 |
Ritik Chaddha
|
c73d1953d3
|
updated matchers & info
|
2023-05-19 20:01:16 +05:30 |
For3stCo1d
|
602e6fc707
|
Create CVE-2023-29919.yaml
|
2023-05-19 19:50:08 +08:00 |