Commit Graph

11877 Commits (6e5afae8ce2736d2b1437dc9d8d40707f708aedd)

Author SHA1 Message Date
GwanYeong Kim 4fdb934da0 Create oliver-library-server-lfi.yaml
An arbitrary file download vulnerability in Oliver v5 Library Server Versions < 8.00.008.053 via the FileServlet function allows for arbitrary file download by an attacker using unsanitized user supplied input.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-18 10:55:28 +09:00
meme-lord 09324d1be7
Added MobileIron log4j template (#3355)
* Added MobileIron log4j

* misc updates

Co-authored-by: meme-lord <17912559+meme-lord@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-16 22:37:32 +05:30
Roberto Nunes d4e38b00e3
Create asanhamayesh-cms-lfi.yaml 2021-12-16 21:56:43 +09:00
Roberto Nunes 6eda7233d6
Create global-domains-lfi.yaml 2021-12-16 21:54:56 +09:00
Roberto Nunes 3688b5d434
Create groupoffice-lfi.yaml 2021-12-16 21:49:30 +09:00
sandeep fdeb2b8500 Merge branch 'master' of https://github.com/DhiyaneshGeek/nuclei-templates into pr/3354 2021-12-16 14:32:14 +05:30
Dhiyaneshwaran 7670d1d6b8
Update wordpress-ssrf-oembed.yaml 2021-12-16 14:28:12 +05:30
sandeep 1cfc899a27 update: lint fix 2021-12-16 14:25:00 +05:30
Dhiyaneshwaran 77441c0d81
Update wordpress-ssrf-oembed.yaml 2021-12-16 14:24:56 +05:30
Dhiyaneshwaran 0047b611cf
Update wordpress-ssrf-oembed.yaml 2021-12-16 14:21:53 +05:30
Dhiyaneshwaran 499fe055bf
Create wordpress-ssrf-oembed.yaml 2021-12-16 13:48:34 +05:30
Prince Chaddha 85c8b47b62
Create emerson-power-panel.yaml 2021-12-16 11:48:07 +05:30
Muhammad Daffa c642f24d51
Create api-bitrise.yaml 2021-12-15 23:48:17 +07:00
Prince Chaddha fbf0b448be
Merge pull request #3350 from projectdiscovery/princechaddha-patch-2
Create casemanager-panel.yaml
2021-12-15 22:16:13 +05:30
Prince Chaddha 8176e88aa2
Create casemanager-panel.yaml 2021-12-15 22:14:37 +05:30
Prince Chaddha 4b6897576d Revert "Create casemanager-panel.yaml"
This reverts commit 5c2b2bce23.
2021-12-15 22:13:10 +05:30
Prince Chaddha 5c2b2bce23
Create casemanager-panel.yaml 2021-12-15 22:12:37 +05:30
Prince Chaddha 86d6051ee9
Merge pull request #3345 from daffainfo/patch-280
Create api-quip.yaml
2021-12-15 22:03:10 +05:30
Prince Chaddha 5629406b9c
Update api-quip.yaml 2021-12-15 22:00:22 +05:30
Prince Chaddha 18f8877fdd
Merge pull request #3343 from daffainfo/patch-278
Create api-pastebin.yaml
2021-12-15 21:56:10 +05:30
Prince Chaddha 6fa183338a
Merge pull request #3344 from daffainfo/patch-279
Create api-pinata.yaml
2021-12-15 21:55:58 +05:30
Muhammad Daffa e5a139960a
Rename api-web3storage to api-web3storage.yaml 2021-12-15 23:01:06 +07:00
Muhammad Daffa cadfba73be
Create api-web3storage 2021-12-15 22:59:48 +07:00
sandeep b8fa0d5857 update: added more reference 2021-12-15 21:26:35 +05:30
sandeep 39a71c641a update: added more reference 2021-12-15 21:20:18 +05:30
Prince Chaddha f1a27bdf47
Update api-pastebin.yaml 2021-12-15 21:18:12 +05:30
Evan Rubinstein 11fe2fdfee
Added apache-solr-log4j RCE (#3336)
* update: added apache-solr-log4j-rce

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
2021-12-15 21:15:43 +05:30
Sandeep Singh 5be1bc1ae7
Added Initial SSL Templates (#3339) 2021-12-15 20:43:36 +05:30
Geeknik Labs 9c169bd682
Create CVE-2021-44528.yaml (#3342) 2021-12-15 20:43:07 +05:30
Adam Crosser 937205ec38
Added Templates for DefectDojo and Yopass (#3346)
* Added Templates for DefectDojo and Yopass

* Update defectdojo-exposure.yaml

* Update yopass-exposure.yaml

* update: added metadata

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-15 13:16:08 +05:30
Muhammad Daffa f0198a5b84
Create api-quip.yaml 2021-12-15 09:26:16 +07:00
Muhammad Daffa ec5b005506
Create api-pinata.yaml 2021-12-15 08:36:17 +07:00
Muhammad Daffa 76d6aa3570
Create api-pastebin.yaml 2021-12-15 08:30:21 +07:00
Sandeep Singh d9ed21458f
Added VMware VCenter Log4j JNDI RCE (#3340)
* Added VMware VCenter Log4j JNDI RCE

Co-Authored-By: FQ Hsu <fanqxu@gmail.com>

* update: removed static UA

Co-Authored-By: FQ Hsu <fanqxu@gmail.com>

Co-authored-by: FQ Hsu <fanqxu@gmail.com>
2021-12-14 21:27:30 +05:30
sandeep c9ddd7a0ae update: id + reference update 2021-12-14 21:07:46 +05:30
sandeep 82e553895a fix: branch update 2021-12-14 03:27:53 +05:30
sandeep 34d4557dad update: making it compatible with self-hosted interactsh server 2021-12-14 03:21:47 +05:30
Evan Rubinstein dddb0bbb82
Added CVE-2021-24997 (#3298)
* Added CVE-39226

* Added CVE-39226

* Delete CVE-39226.yaml

* Renamed CVE-39226 to CVE-2021-39226

Fixed naming error

* Added Wp-Guppy-Information-Disclosure template

* Removed File

Found better descriptor

* Added CVE-2021-24997

Added WordPress Guppy Information Disclosure CVE

* Fixed CVE-2021-24997

Fixed YAML formatting

* Fixed Typo

URL Path had an extra double quote

* Auto Generated Templates Stats [Wed Dec  8 23:07:24 UTC 2021] 🤖

* Deleted Blank Space

* Update CVE-2021-24997.yaml

* Update CVE-2021-24997.yaml

* Update CVE-2021-24997.yaml

* Update CVE-2021-24997.yaml

* Added CVE-2021-43496

* Update CVE-2021-43496.yaml

* fix: syntax update

* Added New Vuln

* Update CVE-2021-24997.yaml

* Update CVE-2021-43496.yaml

* Update and rename hd-netowrk-realtime-monitor-system-LFI.yaml to hdnetwork-realtime-lfi.yaml

* fix: lints update

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2021-12-14 02:22:26 +05:30
Prince Chaddha 8df745ec31
Merge pull request #3320 from projectdiscovery/princechaddha-patch-2
Create thruk-detect.yaml
2021-12-14 00:05:22 +05:30
Prince Chaddha e3bbe8f1cd
Update and rename thruk-detect.yaml to thruk-login.yaml 2021-12-14 00:03:10 +05:30
Prince Chaddha d436b1d615
Merge pull request #3332 from projectdiscovery/princechaddha-patch-3
Create formalms-install.yaml
2021-12-13 22:57:56 +05:30
GitHub Action a81967920c Auto README Update [Mon Dec 13 15:25:50 UTC 2021] 🤖 2021-12-13 15:25:50 +00:00
GitHub Action 20b96baa75 Auto Generated Templates Stats [Mon Dec 13 15:25:26 UTC 2021] 🤖 2021-12-13 15:25:26 +00:00
pudsec 8cac8b5a36
Update open-redirect.yaml (#3333) 2021-12-13 20:42:06 +05:30
S Bani b76dbf91c6
Add Another Redirect Payload and Extend the Regex to Recognize it (#3299)
* Fix Open Redirect Header Regex

The regex was missing the correct escaping for special char `/`

* Add New General Open Redirect

There's another option for open redirects. I tested it in FF and Chrome.

* Update Location Redirect Regex

* update: mix changes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-13 20:38:21 +05:30
Nicolas 1411edf332
Updated CVE-2021-44228.yaml (#3335)
Co-authored-by: olacin <olacin@users.noreply.github.com>
2021-12-13 20:24:06 +05:30
Prince Chaddha 7aafd1741a
Create formalms-install.yaml 2021-12-13 14:22:46 +05:30
Prince Chaddha a514552bdf
Merge pull request #3323 from pussycat0x/master
New templates added
2021-12-12 23:06:41 +05:30
Prince Chaddha bf0da0e68c
Update xds-amr-status.yaml 2021-12-12 23:03:01 +05:30
Prince Chaddha 907b3f3c50
Update and rename technologies/extreme netconfig-ui.yaml to exposed-panels/extreme-netconfig-ui.yaml 2021-12-12 23:01:09 +05:30