Commit Graph

817 Commits (673f7a1701b6eee36868b78844729d23d12bd102)

Author SHA1 Message Date
PD-Team f6ccec48ed Update CNVD-2020-62422.yaml 2021-01-30 18:33:26 +05:30
PikPikcU 64209dca7d
Create CNVD-2020-62422.yaml 2021-01-30 10:45:17 +00:00
PD-Team a887ebe289 few updates 2021-01-26 20:01:01 +05:30
PR3R00T 7f1abf1e4b
Update sonicwall-sslvpn-shellshock.yml 2021-01-26 10:45:15 +00:00
PR3R00T 1712d10086
Update sonicwall-sslvpn-shellshock.yml 2021-01-26 10:44:17 +00:00
PR3R00T 4782898579
Update sonicwall-sslvpn-shellshock.yml 2021-01-26 10:40:48 +00:00
PR3R00T f4529d02c5
Update sonicwall-sslvpn-shellshock.yml 2021-01-26 10:37:18 +00:00
PR3R00T abe3f04402
Update sonicwall-sslvpn-shellshock.yml 2021-01-26 10:34:17 +00:00
PR3R00T 45d26b875e
New Sonicwall 0day Exploit test 2021-01-26 10:20:46 +00:00
PD-Team c762044d29 updating incorrect file permissions 2021-01-21 23:28:32 +05:30
Khaled Mohamed 5c2eabbebc
Create openam-ldap-injection.yaml
reference: https://blog.cybercastle.io/ldap-injection-in-openam/

The vulnerability was found in the password reset feature that OpenAM provides. When a user tries to reset his password, he is asked to enter his username then the backend validates whether the user exists or not through an LDAP query before the password reset token is sent to the user’s email.
2021-01-13 23:36:19 +02:00
team-projectdiscovery 106da77fc3 Preparing for request clustering 2021-01-13 13:01:46 +05:30
team-projectdiscovery c62dfd2b53 adding few from masters 2021-01-11 12:28:56 +05:30
team-projectdiscovery b80ca7732d linting errors 2021-01-11 03:31:24 +05:30
team-projectdiscovery a52ffe5c4e fixes and updates 2021-01-10 19:45:36 +05:30
team-projectdiscovery a90d047991 Massive template checks addition 🎉 🎉 2021-01-10 18:41:25 +05:30
team-projectdiscovery 187e4a5feb moving more files around 2021-01-09 18:32:04 +05:30