GitHub Action
f35f1faddf
Auto Generated CVE annotations [Wed Jun 1 14:05:28 UTC 2022] 🤖
2022-06-01 14:05:28 +00:00
Prince Chaddha
77ef2ebd49
Update CVE-2021-27519.yaml
2022-06-01 19:08:57 +05:30
Prince Chaddha
6be0d90a50
Update CVE-2021-27519.yaml
2022-06-01 19:03:12 +05:30
Mohsen khashei
b436cdc9e9
trim
2022-06-01 15:16:23 +04:30
Mohsen khashei
7270d7eff1
update-tags
2022-06-01 15:08:02 +04:30
Mohsen khashei
0d627a8b91
update CVE-2021-27519.yaml
2022-06-01 15:00:27 +04:30
Mohsen khashei
605967c2cb
Create CVE-2021-27519.yaml
2022-05-31 13:46:01 +04:30
GitHub Action
2a3fe8086f
Auto Generated CVE annotations [Fri May 27 05:36:58 UTC 2022] 🤖
2022-05-27 05:36:58 +00:00
Prince Chaddha
5519a879ac
Update CVE-2021-46422.yaml
2022-05-27 10:52:24 +05:30
xiaostrong
02f04376b7
Fixed CVE-2021-41349 Template
2022-05-26 11:05:36 +08:00
GitHub Action
226c78a313
Auto Generated CVE annotations [Mon May 23 10:54:57 UTC 2022] 🤖
2022-05-23 10:54:57 +00:00
Prince Chaddha
c5b8da568f
Merge pull request #4362 from ritikchaddha/patch-49
...
Update CVE-2021-3223.yaml
2022-05-23 16:15:15 +05:30
Prince Chaddha
1955f01b6a
Update CVE-2021-21745.yaml
2022-05-23 15:56:16 +05:30
GwanYeong Kim
2222ca9605
Create CVE-2021-21745.yaml
...
ZTE MF971R product has a Referer authentication bypass vulnerability. Without CSRF verification, an attackercould use this vulnerability to perform illegal authorization operations by sending a request to the user to click.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-21 14:59:00 +09:00
GitHub Action
cb9991092a
Auto Generated CVE annotations [Thu May 19 19:35:49 UTC 2022] 🤖
2022-05-19 19:35:49 +00:00
Prince Chaddha
be5b6338bf
Merge pull request #4446 from gy741/rule-add-v111
...
Create CVE-2021-45428.yaml
2022-05-20 00:54:46 +05:30
Prince Chaddha
8cc82f868e
Update CVE-2021-45428.yaml
2022-05-20 00:44:47 +05:30
GitHub Action
4f819d9656
Auto Generated CVE annotations [Thu May 19 19:05:56 UTC 2022] 🤖
2022-05-19 19:05:56 +00:00
Prince Chaddha
e2af35b5ac
Update CVE-2021-46422.yaml
2022-05-20 00:05:27 +05:30
Prince Chaddha
c29a8699bf
Update CVE-2021-46422.yaml
2022-05-19 23:51:49 +05:30
GwanYeong Kim
7e811151b5
Create CVE-2021-45428.yaml
...
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-19 08:38:13 +09:00
GitHub Action
3115bd2f3a
Auto Generated CVE annotations [Wed May 18 21:10:42 UTC 2022] 🤖
2022-05-18 21:10:42 +00:00
MostInterestingBotInTheWorld
5eb6b79331
Dashboard Content Enhancements ( #4426 )
...
Dashboard Content Enhancements
2022-05-18 16:58:07 -04:00
GitHub Action
844f04e029
Auto Generated CVE annotations [Wed May 18 17:19:05 UTC 2022] 🤖
2022-05-18 17:19:05 +00:00
Prince Chaddha
7d0507ecb3
Merge pull request #4440 from For3stCo1d/CVE-2021-40822
...
Create CVE-2021-40822.yaml
2022-05-18 22:34:53 +05:30
Prince Chaddha
e741d8ba00
Update CVE-2021-40822.yaml
2022-05-18 22:30:54 +05:30
Prince Chaddha
e9800153bb
Update CVE-2021-46422.yaml
2022-05-18 19:31:36 +05:30
林寒
2e85ec8bb8
Create CVE-2021-40822.yaml
2022-05-18 21:04:39 +08:00
GitHub Action
cf1a9724f4
Auto Generated CVE annotations [Wed May 18 08:55:27 UTC 2022] 🤖
2022-05-18 08:55:27 +00:00
Prince Chaddha
b240abad90
Merge pull request #4430 from projectdiscovery/CVE-2021-46422
...
Create CVE-2021-46422.yaml
2022-05-18 14:12:50 +05:30
Prince Chaddha
96a05ccd1e
Update CVE-2021-46422.yaml
2022-05-18 14:10:28 +05:30
GitHub Action
afa33e5431
Auto Generated CVE annotations [Wed May 18 08:14:19 UTC 2022] 🤖
2022-05-18 08:14:19 +00:00
Prince Chaddha
f263e723c2
Create CVE-2021-46422.yaml
2022-05-18 13:31:57 +05:30
Prince Chaddha
7d3456031b
Update and rename CVE-2021-46379.yaml to cves/2021/CVE-2021-46379.yaml
2022-05-18 13:29:23 +05:30
GitHub Action
d0832c679e
Auto Generated CVE annotations [Tue May 17 20:46:49 UTC 2022] 🤖
2022-05-17 20:46:49 +00:00
Sandeep Singh
6644d6aecb
Added dynamic payload instead of hardcoded one using native deserialization helpers ( #4379 )
2022-05-18 02:03:23 +05:30
Sandeep Singh
b59ff42aaf
additional reference to cves templates ( #4395 )
...
* additional reference to cves templates
* Update CVE-2006-1681.yaml
* Update CVE-2009-3318.yaml
* Update CVE-2009-4223.yaml
* Update CVE-2010-0942.yaml
* Update CVE-2010-0944.yaml
* Update CVE-2010-0972.yaml
* Update CVE-2010-1304.yaml
* Update CVE-2010-1308.yaml
* Update CVE-2010-1313.yaml
* Update CVE-2010-1461.yaml
* Update CVE-2010-1470.yaml
* Update CVE-2010-1471.yaml
* Update CVE-2010-1472.yaml
* Update CVE-2010-1474.yaml
* removed duplicate references
* misc fix
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
MostInterestingBotInTheWorld
83cc50ce3e
Dashboard Content Enhancements ( #4411 )
...
* standardizing enhanced by tag
* Fix spacing. Add classification->cve
* Enhancement: cves/2021/CVE-2021-20158.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Typo
* Enhancement: cves/2021/CVE-2021-20837.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21479.yaml by mp
* Enhancement: cves/2021/CVE-2021-21881.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-22005.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Enhancement: cves/2021/CVE-2021-24472.yaml by mp
* Enhancement: cves/2021/CVE-2021-20090.yaml by mp
* Enhancement: cves/2021/CVE-2021-20167.yaml by mp
* Enhancement: cves/2021/CVE-2021-21307.yaml by mp
* Enhancement: cves/2021/CVE-2021-21978.yaml by mp
* Enhancement: cves/2021/CVE-2021-21985.yaml by mp
* Enhancement: cves/2021/CVE-2021-21972.yaml by mp
* Enhancement: cves/2021/CVE-2021-22205.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2021/CVE-2021-24285.yaml by mp
* Restore empty lines
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Remove unnecessary file
* Restore content after bad dashboard edit
* Enhancement: undefined by cs
* Spacing issues
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: undefined by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Delete null file created by dashboard
* Remove improper Enhanced tag
* Spacing issues
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Remove test dashboard commits
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs
* Not really enhanced
* Add classification->cve-id
* Restore content from dashboard mess up
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Restore newlines
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2007/CVE-2007-4556.yaml by mp
* Enhancement: cves/2014/CVE-2014-9618.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2015/CVE-2015-3224.yaml by mp
* Enhancement: cves/2015/CVE-2015-7450.yaml by mp
* Enhancement: cves/2016/CVE-2016-10134.yaml by mp
* Enhancement: cves/2016/CVE-2016-1555.yaml by mp
* Enhancement: cves/2016/CVE-2016-2004.yaml by mp
* Enhancement: cves/2016/CVE-2016-5649.yaml by mp
* Enhancement: cves/2016/CVE-2016-7552.yaml by mp
* Enhancement: cves/2017/CVE-2017-1000486.yaml by mp
* Enhancement: cves/2017/CVE-2017-11444.yaml by mp
* Spacing issues
* Added better reference
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-12611.yaml by mp
* Enhancement: cves/2017/CVE-2017-12635.yaml by mp
* Enhancement: cves/2017/CVE-2017-14135.yaml by mp
* Enhancement: cves/2017/CVE-2017-3881.yaml by mp
* Enhancement: cves/2017/CVE-2017-7269.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Enhancement: cves/2017/CVE-2017-9791.yaml by mp
* Enhancement: cves/2015/CVE-2015-1427.yaml by mp
* Enhancement: cves/2017/CVE-2017-12149.yaml by mp
* Enhancement: cves/2017/CVE-2017-12542.yaml by mp
* Enhancement: cves/2017/CVE-2017-8917.yaml by mp
* Spacing and other minor issues
* Update CVE-2015-1427.yaml
* Update CVE-2017-12149.yaml
* Update CVE-2017-12542.yaml
* Update CVE-2017-12635.yaml
* Update CVE-2017-14135.yaml
* Update CVE-2017-3881.yaml
* Update CVE-2017-7269.yaml
* Update CVE-2017-8917.yaml
* Update CVE-2017-9791.yaml
* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by mp
* Enhancement: cnvd/2019/CNVD-2019-32204.yaml by mp
* Enhancement: cnvd/2020/CNVD-2020-68596.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-09650.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-26422.yaml by mp
* Enhancement: cnvd/2022/CNVD-2022-03672.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-0127.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000226.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-1273.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-14064.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2017/CVE-2017-9841.yaml by mp
* Enhancement: cves/2018/CVE-2018-1000861.yaml by mp
* Enhancement: cves/2018/CVE-2018-10562.yaml by mp
* Enhancement: cves/2018/CVE-2018-12031.yaml by mp
* Enhancement: cves/2018/CVE-2018-1207.yaml by mp
* Enhancement: cves/2018/CVE-2018-12634.yaml by mp
* Enhancement: cves/2018/CVE-2018-13379.yaml by mp
* Enhancement: cves/2018/CVE-2018-14916.yaml by mp
* Enhancement: cves/2018/CVE-2018-16167.yaml by mp
* Enhancement: cves/2018/CVE-2018-16763.yaml by mp
* Cleanup and spacing
* Remove blank cve-id lines
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17246.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Enhancement: cves/2018/CVE-2018-18925.yaml by mp
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-2894.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7600.yaml by mp
* Enhancement: cves/2018/CVE-2018-7602.yaml by mp
* Enhancement: cves/2018/CVE-2018-9161.yaml by mp
* Enhancement: cves/2018/CVE-2018-16836.yaml by mp
* Enhancement: cves/2018/CVE-2018-17431.yaml by mp
* Many title clean-ups for more standardization.
Some vendor name clean-up
* Enhancement: cves/2018/CVE-2018-20985.yaml by mp
* Enhancement: cves/2018/CVE-2018-3810.yaml by mp
* Spacing issues
* Remove 2 blank newlines
* Enhancement: vulnerabilities/other/tamronos-rce.yaml by cs
* Enhancement: cves/2018/CVE-2018-9845.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-16920.yaml by mp
* Enhancement: cves/2019/CVE-2019-17270.yaml by mp
* Enhancement: cves/2019/CVE-2019-17382.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2019/CVE-2019-17506.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11710.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-12800.yaml by mp
* Enhancement: cves/2020/CVE-2020-13117.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-13942.yaml by mp
* Spacing, syntax error
* Spacing, correct this time.
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2020/CVE-2020-29227.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Enhancement: cves/2021/CVE-2021-24762.yaml by mp
* Enhancement: cves/2018/CVE-2018-9995.yaml by mp
* Enhancement: cves/2019/CVE-2019-0230.yaml by mp
* Enhancement: cves/2019/CVE-2019-17444.yaml by mp
* Enhancement: cves/2020/CVE-2020-10148.yaml by mp
* Enhancement: cves/2020/CVE-2020-11854.yaml by mp
* Enhancement: cves/2020/CVE-2020-13167.yaml by mp
* Enhancement: cves/2020/CVE-2020-13927.yaml by mp
* Enhancement: cves/2020/CVE-2020-15920.yaml by mp
* Enhancement: cves/2021/CVE-2021-24499.yaml by mp
* Extra newlines and one sp;acing issue
* Update CVE-2018-9995.yaml
* Update CVE-2019-0230.yaml
* Update CVE-2019-16920.yaml
* Update CVE-2019-17270.yaml
* Update CVE-2019-17382.yaml
* Update CVE-2019-17444.yaml
* Update CVE-2019-17506.yaml
* Update CVE-2020-10148.yaml
* Update CVE-2020-11710.yaml
* Update CVE-2020-11854.yaml
* Update CVE-2020-12800.yaml
* Update CVE-2020-13167.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2020-13942.yaml
* Update CVE-2020-15920.yaml
* Update CVE-2020-29227.yaml
* Update CVE-2021-24499.yaml
* Update CVE-2021-24762.yaml
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-17 14:41:26 +05:30
Prince Chaddha
565b183905
false negative
...
The current template will result in false negatives for this CVE, so we need to create a headless template
2022-05-17 13:26:59 +05:30
Prince Chaddha
0deea2ce88
Merge pull request #4408 from daffainfo/patch-23
...
Update CVE-2021-27330
2022-05-17 12:34:56 +05:30
Prince Chaddha
e5ef699566
Update CVE-2021-27330.yaml
2022-05-17 12:31:28 +05:30
Prince Chaddha
2010c97355
Update CVE-2021-46424.yaml
2022-05-17 11:47:22 +05:30
GwanYeong Kim
f06f02b0c1
Create CVE-2021-46424.yaml
...
Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion vulnerability that allows a remote attacker to delete any file, even system internal files, via a DELETE request.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-05-17 14:35:45 +09:00
Muhammad Daffa
262d638222
Adding google dork, fix path, adding some matchers
2022-05-17 00:16:14 +07:00
sandeep
22ab0f9d53
minor matcher update
2022-05-15 04:48:52 +05:30
GitHub Action
3f66b769c1
Auto Generated CVE annotations [Sat May 14 23:03:15 UTC 2022] 🤖
2022-05-14 23:03:15 +00:00
Dhiyaneshwaran
a3ce25a5a6
Authenticated Wordpress XSS Templates ( #4398 )
...
* Create CVE-2021-25075.yaml
* Create seo-redirection-xss.yaml
2022-05-15 04:32:53 +05:30
MostInterestingBotInTheWorld
581b7a627b
Dashboard Content Enhancements ( #4381 )
...
Dashboard Content Enhancements
2022-05-13 16:26:43 -04:00
Prince Chaddha
5e38345931
Merge pull request #4386 from Akokonunes/patch-146
...
Create CVE-2021-20124.yaml
2022-05-13 18:34:48 +05:30
Prince Chaddha
0481125ecb
Update and rename CVE-2021-20124.yaml to cves/2021/CVE-2021-20124.yaml
2022-05-13 15:35:36 +05:30
Prince Chaddha
c6f34b351b
Update and rename CVE-2021-20123.yaml to cves/2021/CVE-2021-20123.yaml
2022-05-13 15:25:01 +05:30
Ritik Chaddha
27a039a70c
Update metadata query ( #4350 )
...
* Update adobe-component-login.yaml
* Update cold-fusion-cfcache-map.yaml
* Update unpatched-coldfusion.yaml
* Update coldfusion-debug-xss.yaml
* Update CVE-2020-11978.yaml
* Update CVE-2020-13927.yaml
* Update CVE-2021-38540.yaml
* Update CVE-2021-44451.yaml
* Update CVE-2022-24288.yaml
* Update airflow-debug.yaml
* Update airflow-detect.yaml
* Update CVE-2010-0219.yaml
* Update apache-axis-detect.yaml
* Update CVE-2020-11991.yaml
* Update apache-cocoon-detect.yaml
* Update CVE-2021-21402.yaml
* Update jellyfin-detect.yaml
* Update CVE-2021-21402.yaml
* Update CVE-2021-21402.yaml
* Update ecology-arbitrary-file-upload.yaml
* Update ecology-v8-sqli.yaml
* Update ecology-syncuserinfo-sqli.yaml
* Update ecology-filedownload-directory-traversal.yaml
* Update CNVD-2021-15822.yaml
* Update dedecms-carbuyaction-fileinclude.yaml
* Update dedecms-openredirect.yaml
* Update tamronos-rce.yaml
* Update natshell-path-traversal.yaml
2022-05-12 19:48:36 +05:30
Ritik Chaddha
f9120595d2
Update CVE-2021-3223.yaml
2022-05-11 18:39:39 +05:30
Ritik Chaddha
b5cd4d5129
Update CVE-2021-21402.yaml
2022-05-11 18:33:42 +05:30
Ritik Chaddha
2068a8cacf
Update CVE-2021-3223.yaml
2022-05-11 18:32:11 +05:30
Ritik Chaddha
2774aac3de
Update CVE-2021-21402.yaml
2022-05-11 14:40:16 +05:30
Ritik Chaddha
252160437e
Update CVE-2021-21402.yaml
2022-05-11 12:07:40 +05:30
Ritik Chaddha
8e630baecd
Update CVE-2021-44451.yaml
2022-05-10 18:15:11 +05:30
Ritik Chaddha
53d1ef5348
Update CVE-2021-38540.yaml
2022-05-10 18:15:09 +05:30
MostInterestingBotInTheWorld
73e289527d
Dashboard Content Enhancements ( #4339 )
...
* Spacing issues
2022-05-09 12:16:12 -04:00
MostInterestingBotInTheWorld
9ff9285916
Dashboard Content Enhancements ( #4338 )
...
Dashboard Content Enhancements
2022-05-09 12:12:52 -04:00
vrenzolaverace
f0a431bcc8
Add CVE-2021-37416 ( #4235 )
...
* Add CVE-2022-0208
* misc updates
* Add CVE-2021-37416
* Added metadata + additional page specific matcher
* additional metadata
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-09 15:21:53 +05:30
pussycat0x
a8f5c98f2c
FortiGate config-audit ( #4275 )
...
* Add files via upload
* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖
* moving templates into jolokia directory
* duplicate of jolokia-unauthenticated-lfi
* merged similar templates into one with updated matchers
* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖
* Delete .new-additions
* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖
* conflict update
* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖
* Add files via upload
* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖
* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖
* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml
* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖
* mise update
* Create config-audit
* Delete config-audit
* Add files via upload
* matcher fixes / ext update / typos update
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-07 12:19:43 +05:30
sandeep
e4760f13bf
Removed duplicate CVE template
2022-05-07 11:01:47 +05:30
sandeep
c3ca28246b
misc updates
2022-05-07 10:57:44 +05:30
sandeep
1fdb124853
fixed line break between header and body
2022-05-06 15:55:50 +05:30
sandeep
54501558c2
template fix
2022-05-06 00:02:41 +05:30
GitHub Action
fbc2ba38ee
Auto Generated CVE annotations [Thu May 5 12:13:55 UTC 2022] 🤖
2022-05-05 12:13:55 +00:00
MostInterestingBotInTheWorld
03b7a5f0fe
Dashboard Content Enhancements ( #4289 )
...
Dashboard content enhancements.
2022-05-02 17:50:47 -04:00
GitHub Action
58de44b9d4
Auto Generated CVE annotations [Mon May 2 19:44:49 UTC 2022] 🤖
2022-05-02 19:44:49 +00:00
Prince Chaddha
e279027adc
Update CVE-2021-39312.yaml
2022-05-03 01:05:45 +05:30
Dhiyaneshwaran
101f0e4607
Update CVE-2021-39312.yaml
2022-05-01 16:10:55 +05:30
Dhiyaneshwaran
7ee380cb9e
Create CVE-2021-39312.yaml
2022-05-01 16:08:22 +05:30
GitHub Action
cc3e2ba7fa
Auto Generated CVE annotations [Sat Apr 30 20:57:29 UTC 2022] 🤖
2022-04-30 20:57:29 +00:00
Prince Chaddha
b6c8d874d1
Update CVE-2021-25118.yaml
2022-05-01 02:20:08 +05:30
Prince Chaddha
0154892ec8
Create CVE-2021-25118.yaml
2022-05-01 02:10:38 +05:30
GitHub Action
9d9c66412d
Auto Generated CVE annotations [Sat Apr 30 20:29:38 UTC 2022] 🤖
2022-04-30 20:29:38 +00:00
Prince Chaddha
29d40af49f
Update and rename vulnerabilities/other/viaware-rce.yaml to cves/2021/CVE-2021-36356.yaml
2022-05-01 01:57:39 +05:30
Prince Chaddha
a11f95b8bf
Create CVE-2021-25111.yaml
2022-04-30 01:49:48 +05:30
MostInterestingBotInTheWorld
44520223c1
Dashboard Content Enhancements ( #4268 )
...
Dashboard Content Enhancements
2022-04-29 15:58:07 -04:00
Muhammad Daffa
a424cf57ae
Update CVE-2021-39350.yaml
2022-04-29 22:09:54 +07:00
Prince Chaddha
bfa0105bf3
Update CVE-2021-20158.yaml
2022-04-29 16:03:18 +05:30
Dwi Siswanto
631f56bae7
fix(linter): De-dupe meta ( #4264 )
2022-04-29 14:40:18 +05:30
pussycat0x
ccc7835baf
Sucuri Website Firewall - Not Configured Default page ( #4254 )
...
* Add files via upload
* Auto Generated CVE annotations [Wed Mar 16 11:29:14 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 16 13:48:01 UTC 2022] 🤖
* moving templates into jolokia directory
* duplicate of jolokia-unauthenticated-lfi
* merged similar templates into one with updated matchers
* Auto Generated New Template Addition List [Wed Mar 23 10:21:57 UTC 2022] 🤖
* Delete .new-additions
* Auto Generated New Template Addition List [Wed Mar 23 10:22:29 UTC 2022] 🤖
* conflict update
* Auto Generated New Template Addition List [Wed Mar 23 10:23:39 UTC 2022] 🤖
* Auto Generated New Template Addition List [Wed Mar 23 10:26:51 UTC 2022] 🤖
* Add files via upload
* Auto Generated New Template Addition List [Thu Apr 28 11:25:25 UTC 2022] 🤖
* Auto Generated CVE annotations [Thu Apr 28 11:25:55 UTC 2022] 🤖
* Update and rename sucuri-webs-firewall-default-page-detect.yaml to sucuri-notconfigured-page-detect.yaml
* Auto Generated New Template Addition List [Thu Apr 28 20:25:56 UTC 2022] 🤖
* mise update
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-29 12:14:52 +05:30
sullo
c3d4dfd6ae
Tenda Template Enhancementleanup ( #4257 )
...
* Replace § markers with {{ }} pairs
* Clean up new Tenda admin panel template
* Update tenda-11n-wireless-router-login.yaml
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
xiaoheihei1107
75cb4e3297
Add CVE-2021-22054.yaml ( #4251 )
...
* Create CVE-2021-22054.yaml
* Update CVE-2021-22054.yaml
* Update CVE-2021-22054.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-28 13:18:32 +05:30
Prince Chaddha
aaf32a716a
Merge pull request #4249 from For3stCo1d/CVE-2021-46417.yaml
...
Create CVE-2021-46417.yaml
2022-04-28 01:38:59 +05:30
Prince Chaddha
208f676590
Update CVE-2021-46417.yaml
2022-04-28 01:36:11 +05:30
林寒
006c2e71e0
update CWE-ID
2022-04-27 23:45:58 +08:00
林寒
1525af197c
Create CVE-2021-46417.yaml
2022-04-27 23:43:24 +08:00
MostInterestingBotInTheWorld
aa888bca8d
Dashboard Content Enhancements ( #4238 )
...
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Adam Crosser
fd3a7c8fc5
Zoho Desktop Central Authentication Bypass Vulnerability (CVE-2021-44515) ( #4142 )
...
* Added Template for CVE-2021-44515
* Update bigip-config-utility-detect.yaml
* Update bigip-config-utility-detect.yaml
* Update bigip-config-utility-detect.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:42:25 +05:30
Adam Crosser
031720fc5f
Created Template for CVE-2021-44077 ( #4129 )
...
* Created Template for CVE-2021-44077
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:15:34 +05:30
sandeep
9e505d4609
added missing tags
2022-04-22 22:13:51 +05:30
forgedhallpass
5451673368
Moved and renamed templates containing a CVE under their correct location
2022-04-22 19:25:23 +03:00
forgedhallpass
9f8650b0b8
Classification CVE id fix in CVE-2021-40542.yaml
2022-04-22 19:21:28 +03:00
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld
31312b1c19
Dashboard Content Enhancements ( #4191 )
...
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action
8c19fffb6a
Auto Generated CVE annotations [Thu Apr 21 09:35:20 UTC 2022] 🤖
2022-04-21 09:35:20 +00:00
MostInterestingBotInTheWorld
3e2e842d0e
Dashboard Content Ehnancements ( #4183 )
...
* Spacing and other template cleanups
* duplicate yaml tags
Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Prince Chaddha
927a2f68e2
Update CVE-2021-31805.yaml
2022-04-18 15:12:27 +04:00
Prince Chaddha
5467e632dc
Create CVE-2021-31805.yaml
2022-04-18 15:08:19 +04:00
GitHub Action
4e6338a4a0
Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖
2022-04-16 13:18:49 +00:00
MostInterestingBotInTheWorld
5730781afa
Dashboard Content Enhancements ( #4157 )
...
* Enhancement: exposures/files/joomla-file-listing.yaml by cs
* Enhancement: cves/2019/CVE-2019-5418.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2021/CVE-2021-20091.yaml by mp
* Enhancement: cves/2021/CVE-2021-20092.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: cves/2017/CVE-2017-9833.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: misconfiguration/symfony-debugmode.yaml by mp
* Enhancement: cves/2016/CVE-2016-10940.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: cves/2016/CVE-2016-10960.yaml by mp
* Enhancement: cves/2015/CVE-2015-4694.yaml by mp
* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp
* Enhancement: cves/2017/CVE-2017-10075.yaml by mp
* Enhancement: cves/2021/CVE-2021-27358.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: cves/2021/CVE-2021-31682.yaml by mp
* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-25055.yaml by mp
* Enhancement: cves/2021/CVE-2021-25028.yaml by mp
* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp
* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp
* Enhancement: cves/2021/CVE-2021-24947.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Enhancement: cves/2021/CVE-2021-22986.yaml by mp
* Enhancement: cves/2016/CVE-2016-10033.yaml by mp
* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp
* Enhancement: cves/2021/CVE-2021-24406.yaml by mp
* Relocating to CVE folder
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-2628.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2019/CVE-2019-2588.yaml by mp
* Enhancement: cves/2021/CVE-2021-31755.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp
* Enhancement: cves/2017/CVE-2017-14651.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp
* Enhancement: cves/2019/CVE-2019-2729.yaml by mp
* Enhancement: cves/2018/CVE-2018-2893.yaml by mp
* Enhancement: cves/2018/CVE-2018-3238.yaml by mp
* Enhancement: cves/2017/CVE-2017-3528.yaml by mp
* Enhancement: cves/2021/CVE-2021-42071.yaml by mp
* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments
* Tag typo
Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha
ba3f842314
Update CVE-2021-24987.yaml
2022-04-15 18:40:28 +04:00
Prince Chaddha
ce757d0581
Create CVE-2021-24987.yaml
2022-04-15 17:50:49 +04:00
Muhammad Daffa
f8240809bd
Update CVE-2021-24340.yaml ( #4134 )
2022-04-13 14:21:49 +05:30
sandeep
4b395a60d1
template location fix
2022-04-11 18:43:12 +05:30
MostInterestingBotInTheWorld
a24ef794b7
Dashboard Content Enhancements ( #4031 )
...
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
GitHub Action
83dae0cac1
Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖
2022-04-06 04:33:20 +00:00
Prince Chaddha
a0e7094664
Update CVE-2021-24746.yaml
2022-04-06 09:55:48 +05:30
Prince Chaddha
68f4159393
Create CVE-2021-24746.yaml
2022-04-06 09:36:53 +05:30
Prince Chaddha
21a73f490c
Update CVE-2021-24746.yaml
2022-04-06 09:35:04 +05:30
GitHub Action
9045a7bd9c
Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖
2022-04-06 04:01:51 +00:00
Prince Chaddha
90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
...
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha
f0af9a04b6
Update CVE-2021-24746.yaml
2022-04-05 23:28:52 +05:30
GitHub Action
15575ec82e
Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖
2022-04-05 13:17:39 +00:00
Prince Chaddha
77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
...
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha
3586ec841c
Update CVE-2021-26598.yaml
2022-04-05 00:13:18 +05:30
Prince Chaddha
c9e108c7db
Update CVE-2021-26598.yaml
2022-04-04 23:57:11 +05:30
Rodrigo Schio
4d690358ae
fix match and extractors regexes ( #4040 )
2022-04-04 18:08:25 +05:30
GwanYeong Kim
1e374c7482
Create CVE-2021-26598.yaml
...
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
Prince Chaddha
c1a7f2398c
Create CVE-2021-24746.yaml
2022-04-02 16:15:26 +05:30
Prince Chaddha
a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
...
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
Prince Chaddha
14d40fdb50
Update CVE-2021-44103.yaml
2022-04-02 14:47:22 +05:30
Prince Chaddha
d3c4313f64
Update CVE-2021-44103.yaml
2022-04-02 14:39:25 +05:30
GitHub Action
5e128f2c52
Auto Generated CVE annotations [Sat Apr 2 07:59:47 UTC 2022] 🤖
2022-04-02 07:59:47 +00:00
rschio
da4c4dde5d
remove trailing spaces
2022-04-01 12:53:54 -04:00
Sandeep Singh
a6a4d78065
Added CVE-2021-46387 ( #4022 )
2022-04-01 15:13:57 +05:30
MostInterestingBotInTheWorld
6ddfbac2b4
Dashboard Content Enhancement ( #4020 )
...
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
* Syntax restore some characters
* Spacing
* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp
* Enhancement: cves/2019/CVE-2019-10068.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-11580.yaml by mp
* Enhancement: cves/2019/CVE-2019-11581.yaml by mp
* Enhancement: cves/2019/CVE-2019-12314.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Link wrapping issue
* Enhancement: cves/2019/CVE-2019-13462.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16759.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cves/2019/CVE-2019-16278.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-12725.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs
* Enhancement: cves/2021/CVE-2021-33807.yaml by mp
* Enhancement: cves/2010/CVE-2010-0943.yaml by mp
* Enhancement: cves/2008/CVE-2008-6172.yaml by mp
* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: network/cisco-smi-exposure.yaml by mp
* Enhancement: cves/2021/CVE-2021-37704.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2019/CVE-2019-16313.yaml by mp
* Enhancement: cves/2021/CVE-2021-3017.yaml by mp
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2021/CVE-2021-37573.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2018/CVE-2018-11709.yaml by mp
* Enhancement: cves/2014/CVE-2014-2321.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Manual enhancement
* Manual enhancement push due to dashboard failure
* Testing of dashboard accidentally commited to dashboard branch
* Spacing
Put some CVEs in the classification
* Add missing cve-id fields to templates in cve/
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
rschio
32d9039f6b
add CVE-2021-44103
...
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
2022-04-01 03:39:18 -04:00
GitHub Action
074936d227
Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖
2022-03-31 19:40:33 +00:00
Adam Crosser
235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) ( #4019 )
...
* Updated CVE-2022-22963
* Added CVE-2021-21311 Template
* Added Shodan Query
* Updated Title
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30
MostInterestingBotInTheWorld
13bfc8ff57
Dashboard Content Enhancements ( #3998 )
...
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
Prince Chaddha
b6dd43c0c9
Merge pull request #3984 from Akokonunes/patch-132
...
Create CVE-2021-46381.yaml
2022-03-29 12:14:05 +05:30
Prince Chaddha
708921b3e5
Update and rename CVE-2021-46381.yaml to cves/2021/CVE-2021-46381.yaml
2022-03-29 12:09:40 +05:30
Sandeep Singh
5f28041069
Added Spring Boot Log4j Remote Code Injection ( #3993 )
...
* Added Spring Boot Log4j Remote Code Injection
* minor improvements to CVE-2021-44228
* URI based payload update to catch injection point
2022-03-28 01:46:50 +05:30
sandeep
7b83c9990a
minor updates to template names
2022-03-27 22:13:08 +05:30
GitHub Action
c8380b3bf8
Auto Generated CVE annotations [Sun Mar 27 14:25:50 UTC 2022] 🤖
2022-03-27 14:25:50 +00:00
Dhiyaneshwaran
014a8c9192
4 New Wordpress Authenticated Templates ( #3990 )
...
* Create xss-childlist-selector.yaml
* Update xss-childlist-selector.yaml
* Rename xss-childlist-selector.yaml to aem-xss-childlist-selector.yaml
* adding metadata
* Create CVE-2021-25112.yaml
* Create CVE-2022-0189.yaml
* Create CVE-2021-25055.yaml
* Create CVE-2022-0148.yaml
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-27 19:55:03 +05:30
GitHub Action
ac87976a84
Auto Generated CVE annotations [Sat Mar 26 09:11:31 UTC 2022] 🤖
2022-03-26 09:11:31 +00:00
MostInterestingBotInTheWorld
814d07fb7d
Dashboard Content Enhancements ( #3961 )
...
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp
* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp
* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp
* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp
* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp
* Enhancement: dns/azure-takeover-detection.yaml by mp
* Enhancement: dns/cname-fingerprint.yaml by mp
* Enhancement: dns/cname-service-detection.yaml by mp
* Enhancement: dns/detect-dangling-cname.yaml by mp
* Enhancement: dns/dns-waf-detect.yaml by mp
* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp
* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp
* Enhancement: dns/dnssec-detection.yaml by mp
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
GitHub Action
83ecf7060b
Auto Generated CVE annotations [Wed Mar 23 10:44:27 UTC 2022] 🤖
2022-03-23 10:44:27 +00:00
Sandeep Singh
8c12450b09
Added CVE-2021-42063 ( #3956 )
2022-03-23 16:13:38 +05:30
Prince Chaddha
ca54dd0026
Merge pull request #3946 from bartutku/CVE-2021-41691
...
CVE-2021-41691
2022-03-23 13:17:18 +05:30
sandeep
ec99241f0e
Updated "/etc/passwd" regex to avoid possible false positive results.
2022-03-22 13:31:31 +05:30
Sandeep Singh
21c2c0cd2c
lint update
2022-03-22 13:04:29 +05:30
Prince Chaddha
bc30daa9fb
Update CVE-2021-41691.yaml
2022-03-22 12:38:45 +05:30
Prince Chaddha
75845a7b6e
Merge pull request #3951 from z3dc0ps/master
...
changed 'burpcollaborator.net' to "{{interactsh-url}}"
2022-03-22 11:35:52 +05:30
MostInterestingBotInTheWorld
9663595dd1
Dashboard Text Enhancements ( #3948 )
...
Dashboard content enhancements
2022-03-21 23:48:47 -04:00