Commit Graph

577 Commits (62177ea041f3266d5e30d22f3cbc15b985bd0c8e)

Author SHA1 Message Date
Arafat Ansari e58a61c980
Added 10 CVEs. 2022-07-07 19:16:30 +05:30
Ritik Chaddha 893de309ff Update CVE-2018-7600.yaml 2022-07-07 12:15:53 +05:30
Ritik Chaddha d95c8f9352 Update CVE-2018-7602.yaml 2022-07-07 12:15:48 +05:30
Ritik Chaddha 11bc93eead Update CVE-2018-9205.yaml 2022-07-07 12:15:46 +05:30
MostInterestingBotInTheWorld b2d8370bc8 Enhancement: cves/2018/CVE-2018-12296.yaml by mp 2022-07-05 14:13:40 -04:00
Ritik Chaddha 8a91778fc3
Update CVE-2018-8006.yaml 2022-07-05 09:10:03 +05:30
Ritik Chaddha c7a2882bde Update CVE-2018-11759.yaml 2022-07-04 18:48:55 +05:30
Ritik Chaddha a87df86292 Update CVE-2018-11784.yaml 2022-07-04 18:48:53 +05:30
Ritik Chaddha f62e60a026 Update CVE-2018-20824.yaml 2022-07-04 18:48:51 +05:30
Sandeep Singh 9f8fc5ce00
Removed CVEs for OpenSSH + added basic detection (#4731) 2022-07-03 16:03:58 +05:30
sullo 0db06d6b15
Dead Site Removal (#4641)
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml

* Delete vulnerabilities/other/buffalo-config-injection.yaml

* Link cleanups

* Change links to Secunia to point to archive.org

* Additonal link cleanup

* replace securitytracker.com links with archive.org links
2022-07-01 15:32:07 +05:30
Ritik Chaddha cfa637c95c
Update CVE-2018-11231.yaml 2022-06-30 09:18:40 +05:30
tardc 2accc779eb
Update CVE-2018-18778.yaml (#4689) 2022-06-29 14:53:06 +05:30
Prince Chaddha c0d51a6efa
Update CVE-2018-13379.yaml 2022-06-25 13:18:45 +05:30
sandeep 9446625eea added missing matcher condition 2022-06-21 00:50:56 +05:30
GitHub Action ec58f83a13 Auto Generated CVE annotations [Mon Jun 20 17:58:28 UTC 2022] 🤖 2022-06-20 17:58:28 +00:00
Prince Chaddha 150c87c341
Update CVE-2018-8727.yaml 2022-06-20 23:06:20 +05:30
Prince Chaddha 6a8e758372
Update CVE-2018-9118.yaml 2022-06-20 23:06:02 +05:30
Prince Chaddha 0692e185b9
Update CVE-2018-8033.yaml 2022-06-20 21:55:31 +05:30
Prince Chaddha 60775ae290
Update CVE-2018-18323.yaml 2022-06-20 21:53:45 +05:30
Prince Chaddha c4c60fccfb
Update CVE-2018-19326.yaml 2022-06-20 21:53:25 +05:30
Prince Chaddha b199b62789
Update CVE-2018-19458.yaml 2022-06-20 21:53:09 +05:30
Prince Chaddha 1d149f7373
Update CVE-2018-19753.yaml 2022-06-20 21:51:22 +05:30
Prince Chaddha c85b89e059
Update CVE-2018-20470.yaml 2022-06-20 21:50:58 +05:30
Prince Chaddha c6503a105a
Update CVE-2018-7422.yaml 2022-06-20 21:50:16 +05:30
Prince Chaddha e14e52c4c4
Update CVE-2018-7700.yaml 2022-06-20 21:49:17 +05:30
Prince Chaddha a98020ff22
Update CVE-2018-7719.yaml 2022-06-20 21:48:44 +05:30
Prince Chaddha d7d1daf561
Update CVE-2018-10956.yaml 2022-06-20 21:47:43 +05:30
Prince Chaddha b5da67b434
Update CVE-2018-11231.yaml 2022-06-20 21:47:09 +05:30
Prince Chaddha 0b2b508cc8
Update CVE-2018-11759.yaml 2022-06-20 21:46:20 +05:30
Prince Chaddha 520a1c9973
Update CVE-2018-11776.yaml 2022-06-20 21:45:21 +05:30
Prince Chaddha 31925ae069
Update CVE-2018-15745.yaml 2022-06-20 21:44:55 +05:30
Prince Chaddha 131774340f
Update CVE-2018-16288.yaml 2022-06-20 21:44:08 +05:30
Prince Chaddha aa2369f6fe
Update CVE-2018-16299.yaml 2022-06-20 21:42:53 +05:30
Prince Chaddha 48fa6b5acb
Update CVE-2018-16341.yaml 2022-06-20 21:41:39 +05:30
Prince Chaddha 8e26871500
Update CVE-2018-18264.yaml 2022-06-20 21:40:57 +05:30
Prince Chaddha 7e7dd69d47
Update CVE-2018-0296.yaml 2022-06-20 21:27:20 +05:30
Prince Chaddha 65eb0fc1fe
Update CVE-2018-1000130.yaml 2022-06-20 21:25:26 +05:30
Prince Chaddha aa3e6b24a7
Update CVE-2018-1000600.yaml 2022-06-20 21:24:13 +05:30
Prince Chaddha e0f39583d2
Update CVE-2018-10093.yaml 2022-06-20 21:22:23 +05:30
Prince Chaddha b0e82f9181
Update CVE-2018-10823.yaml 2022-06-20 21:20:55 +05:30
sullo ae0f02f1df Merge master into dashboard 2022-06-20 09:18:50 -04:00
sullo 69ee2228f2 Minor syntax fixes 2022-06-20 09:04:44 -04:00
MostInterestingBotInTheWorld ff6c1446fd Enhancement: cves/2018/CVE-2018-11231.yaml by mp 2022-06-19 12:02:07 -04:00
MostInterestingBotInTheWorld 640ec0d6c6 Enhancement: cves/2018/CVE-2018-10093.yaml by mp 2022-06-19 12:01:04 -04:00
MostInterestingBotInTheWorld 2d84c67692 Enhancement: cves/2018/CVE-2018-0296.yaml by mp 2022-06-19 11:58:40 -04:00
MostInterestingBotInTheWorld 901fe7308b Enhancement: cves/2018/CVE-2018-11776.yaml by mp 2022-06-19 11:52:10 -04:00
MostInterestingBotInTheWorld 768ba6932d Enhancement: cves/2018/CVE-2018-11759.yaml by mp 2022-06-19 11:50:20 -04:00
MostInterestingBotInTheWorld 309ad2d60b Enhancement: cves/2018/CVE-2018-11231.yaml by mp 2022-06-19 11:47:52 -04:00
MostInterestingBotInTheWorld 581afc74c0 Enhancement: cves/2018/CVE-2018-10956.yaml by mp 2022-06-19 11:46:44 -04:00
MostInterestingBotInTheWorld 739e855d76 Enhancement: cves/2018/CVE-2018-10823.yaml by mp 2022-06-19 11:45:43 -04:00
MostInterestingBotInTheWorld 58be31636f Enhancement: cves/2018/CVE-2018-10822.yaml by mp 2022-06-19 11:34:04 -04:00
MostInterestingBotInTheWorld 3858eaba57 Enhancement: cves/2018/CVE-2018-10093.yaml by mp 2022-06-19 11:33:04 -04:00
MostInterestingBotInTheWorld b6320f442d Enhancement: cves/2018/CVE-2018-1000600.yaml by mp 2022-06-19 11:32:23 -04:00
MostInterestingBotInTheWorld 69d1e83c3c Enhancement: cves/2018/CVE-2018-1000130.yaml by mp 2022-06-19 11:28:13 -04:00
MostInterestingBotInTheWorld 4869575481 Enhancement: cves/2018/CVE-2018-0296.yaml by mp 2022-06-19 11:25:35 -04:00
MostInterestingBotInTheWorld 8fad6d3fe5 Enhancement: cves/2018/CVE-2018-20470.yaml by mp 2022-06-17 12:30:43 -04:00
MostInterestingBotInTheWorld ab3ddefe1b Enhancement: cves/2018/CVE-2018-18323.yaml by mp 2022-06-17 12:29:29 -04:00
MostInterestingBotInTheWorld f3876b41e4 Enhancement: cves/2018/CVE-2018-7422.yaml by mp 2022-06-17 12:27:54 -04:00
MostInterestingBotInTheWorld 90d3d8c1b8 Enhancement: cves/2018/CVE-2018-7719.yaml by mp 2022-06-17 12:26:01 -04:00
MostInterestingBotInTheWorld db6a7d48ca Enhancement: cves/2018/CVE-2018-8727.yaml by mp 2022-06-17 12:25:21 -04:00
MostInterestingBotInTheWorld ea0b2233bd Enhancement: cves/2018/CVE-2018-7467.yaml by mp 2022-06-16 14:39:30 -04:00
MostInterestingBotInTheWorld ba83bf8763 Enhancement: cves/2018/CVE-2018-7700.yaml by mp 2022-06-16 14:20:22 -04:00
MostInterestingBotInTheWorld d84a5e0c82 Enhancement: cves/2018/CVE-2018-7719.yaml by mp 2022-06-16 14:16:12 -04:00
MostInterestingBotInTheWorld 943d342c4c Enhancement: cves/2018/CVE-2018-8033.yaml by mp 2022-06-16 14:14:48 -04:00
MostInterestingBotInTheWorld adc0c8523b Enhancement: cves/2018/CVE-2018-8033.yaml by mp 2022-06-16 14:11:14 -04:00
MostInterestingBotInTheWorld aa9e24b48a Enhancement: cves/2018/CVE-2018-8727.yaml by mp 2022-06-15 09:30:18 -04:00
MostInterestingBotInTheWorld a9d9c4cb76 Enhancement: cves/2018/CVE-2018-9118.yaml by mp 2022-06-15 09:28:28 -04:00
MostInterestingBotInTheWorld 19c7c3f9e9 Enhancement: cves/2018/CVE-2018-20470.yaml by mp 2022-06-13 15:36:01 -04:00
MostInterestingBotInTheWorld 0197de1f9b Enhancement: cves/2018/CVE-2018-19753.yaml by mp 2022-06-13 15:29:02 -04:00
MostInterestingBotInTheWorld 26fb9294fa Enhancement: cves/2018/CVE-2018-19458.yaml by mp 2022-06-13 14:55:00 -04:00
MostInterestingBotInTheWorld 266cf675fd Enhancement: cves/2018/CVE-2018-19326.yaml by mp 2022-06-13 14:52:47 -04:00
MostInterestingBotInTheWorld 497118ab2f Enhancement: cves/2018/CVE-2018-18323.yaml by mp 2022-06-13 14:51:04 -04:00
MostInterestingBotInTheWorld 9197f60d15 Enhancement: cves/2018/CVE-2018-18264.yaml by mp 2022-06-13 14:49:01 -04:00
MostInterestingBotInTheWorld 4094a71c34 Enhancement: cves/2018/CVE-2018-16341.yaml by mp 2022-06-13 14:47:53 -04:00
MostInterestingBotInTheWorld 6b2cfbc79a Enhancement: cves/2018/CVE-2018-16299.yaml by mp 2022-06-13 14:45:06 -04:00
MostInterestingBotInTheWorld b908a06311 Enhancement: cves/2018/CVE-2018-16288.yaml by mp 2022-06-13 14:43:37 -04:00
MostInterestingBotInTheWorld 6663037f07 Enhancement: cves/2018/CVE-2018-15745.yaml by mp 2022-06-13 14:41:33 -04:00
GitHub Action 4cc13bb57f Auto Generated CVE annotations [Thu Jun 9 11:35:37 UTC 2022] 🤖 2022-06-09 11:35:37 +00:00
Prince Chaddha 64af7e7315
Update CVE-2018-10230.yaml 2022-06-09 16:52:15 +05:30
Prince Chaddha 2654cd023f
Update CVE-2018-10230.yaml 2022-06-08 19:23:35 +05:30
Prince Chaddha 2f4596a250
Create CVE-2018-10230.yaml 2022-06-08 18:48:46 +05:30
GitHub Action 3c5e130346 Auto Generated CVE annotations [Tue Jun 7 21:01:47 UTC 2022] 🤖 2022-06-07 21:01:47 +00:00
sullo 9bb6b91ba3
Remove Links for Dead sites (#4554)
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml

* Delete vulnerabilities/other/buffalo-config-injection.yaml

* Remove/replace links to dead sites:
* archives.neohapsis.com
* osvdb.org
* securityfocus.com
2022-06-08 02:20:59 +05:30
Prince Chaddha 7ada510859
Fixed possible FPs in open redirect templates (#4544)
* Fixed possible FPs in open redirect templates

We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.

* updated example domain

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
GitHub Action 92f442915f Auto Generated CVE annotations [Sun Jun 5 12:22:34 UTC 2022] 🤖 2022-06-05 12:22:34 +00:00
Prince Chaddha 394036a28c
Update CVE-2018-16761.yaml 2022-06-05 17:22:45 +05:30
Prince Chaddha 8f8bb7b5fc
Update and rename CVE-2018-16761.yaml to cves/2018/CVE-2018-16761.yaml 2022-06-05 17:13:48 +05:30
GitHub Action 9534df1c20 Auto Generated CVE annotations [Sat Jun 4 09:18:35 UTC 2022] 🤖 2022-06-04 09:18:35 +00:00
Prince Chaddha afb6e1ab2d
Update and rename CVE-2018-14474.yaml to cves/2018/CVE-2018-14474.yaml 2022-06-04 14:27:15 +05:30
Yuzhe-Zhang-0 9d8806582d
added cisa tags to appropriate templates (#4523) 2022-06-02 03:01:44 +05:30
Prince Chaddha ec054345ea
Update CVE-2018-12675.yaml 2022-05-28 22:49:52 +05:30
GitHub Action 98b87a7f63 Auto Generated CVE annotations [Sat May 28 17:07:20 UTC 2022] 🤖 2022-05-28 17:07:20 +00:00
Prince Chaddha 760d5a1fcd
Update and rename CVE-2018-12675.yaml to cves/2018/CVE-2018-12675.yaml 2022-05-28 22:21:54 +05:30
Prince Chaddha 82a36e4e56
Update CVE-2018-6200.yaml 2022-05-23 15:41:10 +05:30
GitHub Action 5293a9319d Auto Generated CVE annotations [Mon May 23 08:58:50 UTC 2022] 🤖 2022-05-23 08:58:50 +00:00
Prince Chaddha 4df7ff9762
Update and rename CVE-2018-6200.yaml to cves/2018/CVE-2018-6200.yaml 2022-05-23 14:15:44 +05:30
GitHub Action 49886b8c63 Auto Generated CVE annotations [Thu May 19 19:19:07 UTC 2022] 🤖 2022-05-19 19:19:07 +00:00
Prince Chaddha 55ffddee9e
Update CVE-2018-18608.yaml 2022-05-20 00:32:06 +05:30
Prince Chaddha 5035a4e2f6
Update CVE-2018-18608.yaml 2022-05-20 00:26:42 +05:30
Prince Chaddha a846f209eb
Update CVE-2018-18608.yaml 2022-05-20 00:21:59 +05:30
Ritik Chaddha 716ff4ebef
Create CVE-2018-18608.yaml 2022-05-19 18:49:24 +05:30
MostInterestingBotInTheWorld 5eb6b79331
Dashboard Content Enhancements (#4426)
Dashboard Content Enhancements
2022-05-18 16:58:07 -04:00
GitHub Action d0832c679e Auto Generated CVE annotations [Tue May 17 20:46:49 UTC 2022] 🤖 2022-05-17 20:46:49 +00:00
Sandeep Singh b59ff42aaf
additional reference to cves templates (#4395)
* additional reference to cves templates

* Update CVE-2006-1681.yaml

* Update CVE-2009-3318.yaml

* Update CVE-2009-4223.yaml

* Update CVE-2010-0942.yaml

* Update CVE-2010-0944.yaml

* Update CVE-2010-0972.yaml

* Update CVE-2010-1304.yaml

* Update CVE-2010-1308.yaml

* Update CVE-2010-1313.yaml

* Update CVE-2010-1461.yaml

* Update CVE-2010-1470.yaml

* Update CVE-2010-1471.yaml

* Update CVE-2010-1472.yaml

* Update CVE-2010-1474.yaml

* removed duplicate references

* misc fix

Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
MostInterestingBotInTheWorld 83cc50ce3e
Dashboard Content Enhancements (#4411)
* standardizing enhanced by tag

* Fix spacing. Add classification->cve

* Enhancement: cves/2021/CVE-2021-20158.yaml by mp

* Enhancement: cves/2021/CVE-2021-20167.yaml by mp

* Typo

* Enhancement: cves/2021/CVE-2021-20837.yaml by mp

* Enhancement: cves/2021/CVE-2021-21307.yaml by mp

* Enhancement: cves/2021/CVE-2021-21479.yaml by mp

* Enhancement: cves/2021/CVE-2021-21881.yaml by mp

* Enhancement: cves/2021/CVE-2021-21972.yaml by mp

* Enhancement: cves/2021/CVE-2021-21978.yaml by mp

* Enhancement: cves/2021/CVE-2021-22005.yaml by mp

* Enhancement: cves/2021/CVE-2021-22205.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2021/CVE-2021-24285.yaml by mp

* Enhancement: cves/2021/CVE-2021-24472.yaml by mp

* Enhancement: cves/2021/CVE-2021-20090.yaml by mp

* Enhancement: cves/2021/CVE-2021-20167.yaml by mp

* Enhancement: cves/2021/CVE-2021-21307.yaml by mp

* Enhancement: cves/2021/CVE-2021-21978.yaml by mp

* Enhancement: cves/2021/CVE-2021-21985.yaml by mp

* Enhancement: cves/2021/CVE-2021-21972.yaml by mp

* Enhancement: cves/2021/CVE-2021-22205.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2021/CVE-2021-24285.yaml by mp

* Restore empty lines

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Remove unnecessary file

* Restore content after bad dashboard edit

* Enhancement: undefined by cs

* Spacing issues

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Delete null file created by dashboard

* Remove improper Enhanced tag

* Spacing issues

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Remove test dashboard commits

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Not really enhanced

* Add classification->cve-id

* Restore content from dashboard mess up

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Restore newlines

* Enhancement: cves/2007/CVE-2007-4556.yaml by mp

* Enhancement: cves/2007/CVE-2007-4556.yaml by mp

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cves/2015/CVE-2015-1427.yaml by mp

* Enhancement: cves/2015/CVE-2015-3224.yaml by mp

* Enhancement: cves/2015/CVE-2015-7450.yaml by mp

* Enhancement: cves/2016/CVE-2016-10134.yaml by mp

* Enhancement: cves/2016/CVE-2016-1555.yaml by mp

* Enhancement: cves/2016/CVE-2016-2004.yaml by mp

* Enhancement: cves/2016/CVE-2016-5649.yaml by mp

* Enhancement: cves/2016/CVE-2016-7552.yaml by mp

* Enhancement: cves/2017/CVE-2017-1000486.yaml by mp

* Enhancement: cves/2017/CVE-2017-11444.yaml by mp

* Spacing issues

* Added better reference

* Enhancement: cves/2017/CVE-2017-12149.yaml by mp

* Enhancement: cves/2017/CVE-2017-12542.yaml by mp

* Enhancement: cves/2017/CVE-2017-12611.yaml by mp

* Enhancement: cves/2017/CVE-2017-12635.yaml by mp

* Enhancement: cves/2017/CVE-2017-14135.yaml by mp

* Enhancement: cves/2017/CVE-2017-3881.yaml by mp

* Enhancement: cves/2017/CVE-2017-7269.yaml by mp

* Enhancement: cves/2017/CVE-2017-8917.yaml by mp

* Enhancement: cves/2017/CVE-2017-9791.yaml by mp

* Enhancement: cves/2015/CVE-2015-1427.yaml by mp

* Enhancement: cves/2017/CVE-2017-12149.yaml by mp

* Enhancement: cves/2017/CVE-2017-12542.yaml by mp

* Enhancement: cves/2017/CVE-2017-8917.yaml by mp

* Spacing and other minor issues

* Update CVE-2015-1427.yaml

* Update CVE-2017-12149.yaml

* Update CVE-2017-12542.yaml

* Update CVE-2017-12635.yaml

* Update CVE-2017-14135.yaml

* Update CVE-2017-3881.yaml

* Update CVE-2017-7269.yaml

* Update CVE-2017-8917.yaml

* Update CVE-2017-9791.yaml

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by mp

* Enhancement: cnvd/2019/CNVD-2019-32204.yaml by mp

* Enhancement: cnvd/2020/CNVD-2020-68596.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-09650.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-26422.yaml by mp

* Enhancement: cnvd/2022/CNVD-2022-03672.yaml by mp

* Enhancement: cves/2017/CVE-2017-9841.yaml by mp

* Enhancement: cves/2018/CVE-2018-0127.yaml by mp

* Enhancement: cves/2018/CVE-2018-1000226.yaml by mp

* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp

* Enhancement: cves/2018/CVE-2018-10562.yaml by mp

* Enhancement: cves/2018/CVE-2018-12031.yaml by mp

* Enhancement: cves/2018/CVE-2018-1207.yaml by mp

* Enhancement: cves/2018/CVE-2018-12634.yaml by mp

* Enhancement: cves/2018/CVE-2018-1273.yaml by mp

* Enhancement: cves/2018/CVE-2018-16763.yaml by mp

* Enhancement: cves/2018/CVE-2018-16167.yaml by mp

* Enhancement: cves/2018/CVE-2018-14916.yaml by mp

* Enhancement: cves/2018/CVE-2018-14064.yaml by mp

* Enhancement: cves/2018/CVE-2018-13379.yaml by mp

* Enhancement: cves/2017/CVE-2017-9841.yaml by mp

* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp

* Enhancement: cves/2018/CVE-2018-10562.yaml by mp

* Enhancement: cves/2018/CVE-2018-12031.yaml by mp

* Enhancement: cves/2018/CVE-2018-1207.yaml by mp

* Enhancement: cves/2018/CVE-2018-12634.yaml by mp

* Enhancement: cves/2018/CVE-2018-13379.yaml by mp

* Enhancement: cves/2018/CVE-2018-14916.yaml by mp

* Enhancement: cves/2018/CVE-2018-16167.yaml by mp

* Enhancement: cves/2018/CVE-2018-16763.yaml by mp

* Cleanup and spacing

* Remove blank cve-id lines

* Enhancement: cves/2018/CVE-2018-16836.yaml by mp

* Enhancement: cves/2018/CVE-2018-17246.yaml by mp

* Enhancement: cves/2018/CVE-2018-17431.yaml by mp

* Enhancement: cves/2018/CVE-2018-18925.yaml by mp

* Enhancement: cves/2018/CVE-2018-20985.yaml by mp

* Enhancement: cves/2018/CVE-2018-2894.yaml by mp

* Enhancement: cves/2018/CVE-2018-3810.yaml by mp

* Enhancement: cves/2018/CVE-2018-7600.yaml by mp

* Enhancement: cves/2018/CVE-2018-7600.yaml by mp

* Enhancement: cves/2018/CVE-2018-7602.yaml by mp

* Enhancement: cves/2018/CVE-2018-9161.yaml by mp

* Enhancement: cves/2018/CVE-2018-16836.yaml by mp

* Enhancement: cves/2018/CVE-2018-17431.yaml by mp

* Many title clean-ups for more standardization.
Some vendor name clean-up

* Enhancement: cves/2018/CVE-2018-20985.yaml by mp

* Enhancement: cves/2018/CVE-2018-3810.yaml by mp

* Spacing issues

* Remove 2 blank newlines

* Enhancement: vulnerabilities/other/tamronos-rce.yaml by cs

* Enhancement: cves/2018/CVE-2018-9845.yaml by mp

* Enhancement: cves/2018/CVE-2018-9995.yaml by mp

* Enhancement: cves/2019/CVE-2019-0230.yaml by mp

* Enhancement: cves/2019/CVE-2019-16920.yaml by mp

* Enhancement: cves/2019/CVE-2019-17270.yaml by mp

* Enhancement: cves/2019/CVE-2019-17382.yaml by mp

* Enhancement: cves/2019/CVE-2019-17444.yaml by mp

* Enhancement: cves/2019/CVE-2019-17506.yaml by mp

* Enhancement: cves/2020/CVE-2020-10148.yaml by mp

* Enhancement: cves/2020/CVE-2020-11710.yaml by mp

* Enhancement: cves/2020/CVE-2020-11854.yaml by mp

* Enhancement: cves/2020/CVE-2020-12800.yaml by mp

* Enhancement: cves/2020/CVE-2020-13117.yaml by mp

* Enhancement: cves/2020/CVE-2020-13167.yaml by mp

* Enhancement: cves/2020/CVE-2020-13927.yaml by mp

* Enhancement: cves/2020/CVE-2020-13942.yaml by mp

* Spacing, syntax error

* Spacing, correct this time.

* Enhancement: cves/2020/CVE-2020-15920.yaml by mp

* Enhancement: cves/2020/CVE-2020-29227.yaml by mp

* Enhancement: cves/2021/CVE-2021-24499.yaml by mp

* Enhancement: cves/2021/CVE-2021-24762.yaml by mp

* Enhancement: cves/2018/CVE-2018-9995.yaml by mp

* Enhancement: cves/2019/CVE-2019-0230.yaml by mp

* Enhancement: cves/2019/CVE-2019-17444.yaml by mp

* Enhancement: cves/2020/CVE-2020-10148.yaml by mp

* Enhancement: cves/2020/CVE-2020-11854.yaml by mp

* Enhancement: cves/2020/CVE-2020-13167.yaml by mp

* Enhancement: cves/2020/CVE-2020-13927.yaml by mp

* Enhancement: cves/2020/CVE-2020-15920.yaml by mp

* Enhancement: cves/2021/CVE-2021-24499.yaml by mp

* Extra newlines and one sp;acing issue

* Update CVE-2018-9995.yaml

* Update CVE-2019-0230.yaml

* Update CVE-2019-16920.yaml

* Update CVE-2019-17270.yaml

* Update CVE-2019-17382.yaml

* Update CVE-2019-17444.yaml

* Update CVE-2019-17506.yaml

* Update CVE-2020-10148.yaml

* Update CVE-2020-11710.yaml

* Update CVE-2020-11854.yaml

* Update CVE-2020-12800.yaml

* Update CVE-2020-13167.yaml

* Update CVE-2020-13927.yaml

* Update CVE-2020-13942.yaml

* Update CVE-2020-15920.yaml

* Update CVE-2020-29227.yaml

* Update CVE-2021-24499.yaml

* Update CVE-2021-24762.yaml

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-17 14:41:26 +05:30
Prince Chaddha dc21cfa947
Update CVE-2018-17422.yaml 2022-05-17 13:24:44 +05:30
Prince Chaddha 470e9fd6ff
Update CVE-2018-17422.yaml 2022-05-17 13:24:20 +05:30
Muhammad Daffa 9a3ad1f320
Create CVE-2018-17422.yaml 2022-05-17 14:45:41 +07:00
Prince Chaddha deb51c0d22
Update CVE-2018-1000129.yaml 2022-05-17 12:26:18 +05:30
Prince Chaddha 143262021a
Update CVE-2018-1000129.yaml 2022-05-17 12:25:30 +05:30
Muhammad Daffa 023ef3a17f
Update CVE-2018-1000129.yaml 2022-05-17 06:31:59 +07:00
MostInterestingBotInTheWorld 4ad2b7be7b
Dashboard Content Enhancements (#4390)
Dashboard Content Enhancements
2022-05-13 16:39:44 -04:00
MostInterestingBotInTheWorld 581b7a627b
Dashboard Content Enhancements (#4381)
Dashboard Content Enhancements
2022-05-13 16:26:43 -04:00
Prince Chaddha 767d9b53ad
Merge pull request #4349 from ritikchaddha/master
Update metadata query
2022-05-12 17:03:45 +05:30
Prince Chaddha 4a0671fe7c
Update and rename CVE-2018-19326.yaml to cves/2018/CVE-2018-19326.yaml 2022-05-12 15:52:11 +05:30
Ritik Chaddha 3c63ca9b42 Update CVE-2018-15961.yaml 2022-05-10 14:51:30 +05:30
GitHub Action c998313910 Auto Generated CVE annotations [Sun May 8 06:43:58 UTC 2022] 🤖 2022-05-08 06:43:58 +00:00
Sandeep Singh 958b15663c
Strict matchers / f/p fix (#4320)
* more strict matcher + matcher fix

* misc updates
2022-05-08 12:13:38 +05:30
Prince Chaddha fffea79792
Update CVE-2018-11231.yaml 2022-05-07 16:39:37 +05:30
Ritik Chaddha f92df92886
Create CVE-2018-11231.yaml 2022-05-04 01:38:00 +05:30
MostInterestingBotInTheWorld 44520223c1
Dashboard Content Enhancements (#4268)
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
sullo c3d4dfd6ae
Tenda Template Enhancementleanup (#4257)
* Replace § markers with {{ }} pairs

* Clean up new Tenda admin panel template

* Update tenda-11n-wireless-router-login.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
MostInterestingBotInTheWorld aa888bca8d
Dashboard Content Enhancements (#4238)
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Prince Chaddha 1a80d332da
Update CVE-2018-5715.yaml 2022-04-25 03:13:37 +04:00
edoardottt 4f5ffa60ee Add CVE-2018-5715 2022-04-24 15:41:02 +02:00
edoardottt 3225c1cb94 Add CVE-2018-5715 2022-04-24 15:40:22 +02:00
edoardottt 9645f4fbc6 Add CVE-2018-5715 2022-04-24 15:39:12 +02:00
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld 31312b1c19
Dashboard Content Enhancements (#4191)
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
sandeep 338d4622bf parts update to use response instead of all 2022-04-20 20:08:07 +05:30
MostInterestingBotInTheWorld 3e2e842d0e
Dashboard Content Ehnancements (#4183)
* Spacing and other template cleanups
* duplicate yaml tags

Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Prince Chaddha 6f30f445ad
Update and rename CVE-2018-14931.yaml to cves/2018/CVE-2018-14931.yaml 2022-04-18 13:34:00 +04:00
MostInterestingBotInTheWorld 5730781afa
Dashboard Content Enhancements (#4157)
* Enhancement: exposures/files/joomla-file-listing.yaml by cs

* Enhancement: cves/2019/CVE-2019-5418.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2021/CVE-2021-20091.yaml by mp

* Enhancement: cves/2021/CVE-2021-20092.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: cves/2017/CVE-2017-9833.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: misconfiguration/symfony-debugmode.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: cves/2021/CVE-2021-31682.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Relocating to CVE folder

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-2628.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2019/CVE-2019-2588.yaml by mp

* Enhancement: cves/2021/CVE-2021-31755.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments

* Tag typo

Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha 3cdf2ae29f
Merge pull request #4099 from Akokonunes/patch-137
Create CVE-2018-10956.yaml
2022-04-12 19:37:02 +05:30
Prince Chaddha 2dc2f6ba3f
Update and rename CVE-2018-10956.yaml to cves/2018/CVE-2018-10956.yaml 2022-04-12 19:35:26 +05:30
GitHub Action f26f5f050c Auto Generated CVE annotations [Mon Apr 11 20:08:33 UTC 2022] 🤖 2022-04-11 20:08:33 +00:00
Prince Chaddha be4a05a855
Merge pull request #4103 from ritikchaddha/patch-24
Create CVE-2018-7662.yaml
2022-04-12 01:24:09 +05:30
Prince Chaddha 784ef6f25e
Update CVE-2018-7662.yaml 2022-04-12 01:22:14 +05:30
MostInterestingBotInTheWorld 45174dee16
Dashboard Content Enhancements (#4111)
Dashboard Content Enhancements
2022-04-11 10:42:35 -04:00
Prince Chaddha e8f971c70b
Update CVE-2018-7662.yaml 2022-04-11 16:03:57 +05:30
Ritik Chaddha 3d173d5925
Create CVE-2018-7662.yaml 2022-04-11 12:14:02 +05:30
MostInterestingBotInTheWorld a24ef794b7
Dashboard Content Enhancements (#4031)
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
Prince Chaddha 66a27e4da0
Update CVE-2018-10562.yaml 2022-04-05 12:18:20 +05:30
Prince Chaddha 02a1d0ce06
Update CVE-2018-10562.yaml 2022-04-05 12:13:12 +05:30
GwanYeong Kim 21a3ce4f12 Create CVE-2018-10562.yaml
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-02 23:56:35 +09:00
MostInterestingBotInTheWorld 6ddfbac2b4
Dashboard Content Enhancement (#4020)
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

* Syntax  restore some characters

* Spacing

* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp

* Enhancement: cves/2019/CVE-2019-10068.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-11580.yaml by mp

* Enhancement: cves/2019/CVE-2019-11581.yaml by mp

* Enhancement: cves/2019/CVE-2019-12314.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Link wrapping issue

* Enhancement: cves/2019/CVE-2019-13462.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16759.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cves/2019/CVE-2019-16278.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-12725.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs

* Enhancement: cves/2021/CVE-2021-33807.yaml by mp

* Enhancement: cves/2010/CVE-2010-0943.yaml by mp

* Enhancement: cves/2008/CVE-2008-6172.yaml by mp

* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: network/cisco-smi-exposure.yaml by mp

* Enhancement: cves/2021/CVE-2021-37704.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2019/CVE-2019-16313.yaml by mp

* Enhancement: cves/2021/CVE-2021-3017.yaml by mp

* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2021/CVE-2021-37573.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2018/CVE-2018-11709.yaml by mp

* Enhancement: cves/2014/CVE-2014-2321.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Manual enhancement

* Manual enhancement push due to dashboard failure

* Testing of dashboard accidentally commited to dashboard branch

* Spacing
Put some CVEs in the classification

* Add missing cve-id fields to templates in cve/

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
sandeep ec99241f0e Updated "/etc/passwd" regex to avoid possible false positive results. 2022-03-22 13:31:31 +05:30
Sandeep Singh ec2246ee22
added confluence metadata and minor matcher updates (#3929) 2022-03-19 16:12:08 +05:30
Philippe Delteil be3d2d42f1
Update CVE-2018-5230.yaml (#3928)
* Update CVE-2018-5230.yaml

Solves a false positive when the requests triggers a file download 

nuclei -debug -t nuclei-templates/cves/2018/CVE-2018-5230.yaml -u https://get-jama.replicated.com

* matcher fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-18 12:55:28 +05:30