Commit Graph

9639 Commits (8492360296cb91b2c13d3827f7b42a5300e7305f)

Author SHA1 Message Date
Prince Chaddha ad17d283c9
Merge pull request #2771 from gy741/rule-add-v62
FatPipe with multiple vulnerabilities
2021-09-30 17:20:05 +05:30
Prince Chaddha f839f628b6
Update and rename fatpipe-networks-warp-backdoor.yaml to fatpipe-backdoor.yaml 2021-09-30 17:18:45 +05:30
Prince Chaddha b65719103f
Update and rename fatpipe-networks-warp-auth-bypass.yaml to fatpipe-auth-bypass.yaml 2021-09-30 17:18:21 +05:30
Prince Chaddha 9e25b4871e
Update fatpipe-networks-warp-backdoor.yaml 2021-09-30 16:13:19 +05:30
GitHub Action c139eab58f Auto Generated CVE annotations [Thu Sep 30 10:40:57 UTC 2021] 🤖 2021-09-30 10:40:57 +00:00
Prince Chaddha e432ffe3cf
Merge pull request #2772 from pikpikcu/patch-291
Create CVE-2021-41381.yaml
2021-09-30 16:09:11 +05:30
Prince Chaddha 1a4635eaff
Update CVE-2021-41381.yaml 2021-09-30 15:58:53 +05:30
GitHub Action 61e41f9997 Auto Generated CVE annotations [Thu Sep 30 10:24:26 UTC 2021] 🤖 2021-09-30 10:24:26 +00:00
Prince Chaddha aa3f7ddc36
Merge pull request #2773 from pikpikcu/patch-292
Added Aviatrix Controller  RCE
2021-09-30 15:52:36 +05:30
Prince Chaddha 5a94410f04
Update CVE-2021-40870.yaml 2021-09-30 15:50:41 +05:30
PikPikcU 54770c71d1
Create aviatrix-detect.yaml 2021-09-30 14:01:28 +07:00
PikPikcU 8060293ebe
Create CVE-2021-40870.yaml 2021-09-30 13:57:47 +07:00
PikPikcU 006d368aca
Create CVE-2021-41381.yaml 2021-09-30 13:30:48 +07:00
GwanYeong Kim 606d2b5ea4 Create fatpipe-networks-warp-backdoor.yaml
The application has a hidden administrative account cmuser that has no password and has write access permissions to the device. The user cmuser is not visible in Users menu list of the application.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-09-30 13:38:01 +09:00
PikPikcU b33cac8e1c
Create yzmcms-detected.yaml 2021-09-30 09:08:02 +07:00
GwanYeong Kim 263cadaacf Create fatpipe-networks-warp-auth-bypass.yaml
Improper access control occurs when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-09-30 11:07:24 +09:00
PikPikcU 6f202c72be
Create wazuh-detected.yaml 2021-09-30 08:55:09 +07:00
Sandeep Singh a565228acf
Merge pull request #2754 from daffainfo/master
Adding daffainfo templates
2021-09-30 04:21:45 +05:30
Sandeep Singh 815745a791
Merge pull request #2753 from projectdiscovery/fingerprinthub-web-fingerprints
Create fingerprinthub-web-fingerprints.yaml
2021-09-30 04:21:17 +05:30
sandeep 3fd11d500f Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into fingerprinthub-web-fingerprints 2021-09-30 04:20:24 +05:30
sandeep b4dec21231 misc update 2021-09-30 04:19:15 +05:30
Sandeep Singh e9f81943b6
Merge pull request #2759 from projectdiscovery/generic-ssrf
generic-ssrf
2021-09-30 03:31:52 +05:30
sandeep 553a7a2480 Update request-based-interaction.yaml 2021-09-30 03:31:03 +05:30
sandeep be297d732b misc update 2021-09-30 03:26:16 +05:30
GitHub Action 3cf123a9d7 Auto README Update [Wed Sep 29 21:50:24 UTC 2021] 🤖 2021-09-29 21:50:24 +00:00
GitHub Action 2e8bba24a5 Auto Generated Templates Stats [Wed Sep 29 21:50:01 UTC 2021] 🤖 2021-09-29 21:50:01 +00:00
sullo a4563e5909 Add check for CVE-2021-1497 2021-09-29 17:49:02 -04:00
Prince Chaddha 2748e78030
Merge pull request #2767 from elouhi/vcenter-version-detect
VMware version detect
2021-09-30 00:22:36 +05:30
Prince Chaddha 04fcd5b5e7
Update vmware-version-detect.yaml 2021-09-30 00:19:32 +05:30
Prince Chaddha 7de80aa554
Delete text.txt 2021-09-30 00:05:19 +05:30
Prince Chaddha d2bcb9b4da
Merge pull request #2760 from 1u4nx/master
Add TiDB unauthenticated check plugin
2021-09-30 00:04:46 +05:30
Prince Chaddha aab871fccb
Merge pull request #2761 from pussycat0x/master
New Templates
2021-09-30 00:04:28 +05:30
Prince Chaddha 1e088e2c8c
Update and rename hp-media-vault.yaml to hp-media-vault-detect.yaml 2021-09-30 00:02:01 +05:30
sullo 715c8de5c0 Changed CVE-2021-1497 to CVE-2021-1498 per original advisory. Added ref to original advisory. 2021-09-29 13:05:43 -04:00
sullo 6b5d52084d Update cvss/severity for CVE-2020-29453 2021-09-29 10:35:52 -04:00
eric-louhi 5af657ad03 Renamed yaml 2021-09-29 09:32:51 -04:00
eric-louhi c86d5e518d Added an additional matcher for vcenter-version-detect.yaml 2021-09-29 09:26:43 -04:00
sandeep d4690b5849 misc update 2021-09-29 18:14:28 +05:30
Prince Chaddha 1858d54cd8
Update ibm-http-server.yaml 2021-09-29 17:07:01 +05:30
Prince Chaddha b5eef6d441
Delete ibm-http-server-detect.yaml 2021-09-29 16:37:04 +05:30
Prince Chaddha 3b88f47042
Update and rename default-ibm-http-server.yaml to ibm-http-server.yaml 2021-09-29 16:36:51 +05:30
Prince Chaddha cf6e0a1c61
Update tidb-unauth.yaml 2021-09-29 16:33:26 +05:30
Sandeep Singh c6ae254b0f
Merge pull request #2766 from TheConciergeDev/patch-5
renamed file
2021-09-29 15:13:16 +05:30
TheConciergeDev 6011701507
renamed file
the second dash was a unicode value -> "\u2013" instead
2021-09-29 11:18:09 +02:00
sandeep a62d9176bc severity update 2021-09-29 02:40:45 +05:30
eric-louhi 5bfb54e757 Added vCenter version detection template 2021-09-28 16:02:26 -04:00
Prince Chaddha d4eea38bbc
Merge pull request #2764 from DhiyaneshGeek/master
4 New Wordpress CVE 2021
2021-09-29 00:26:16 +05:30
Prince Chaddha aac4c689b5
Update CVE-2021-24276.yaml 2021-09-29 00:24:48 +05:30
Prince Chaddha 58e6ee07a9
Update CVE-2021-24275.yaml 2021-09-29 00:22:52 +05:30
Prince Chaddha c0912f3a08
Update CVE-2021-24226.yaml 2021-09-29 00:21:25 +05:30