Ritik Chaddha
|
ddcaee81a0
|
lint fix
|
2023-06-14 22:56:36 +05:30 |
Ritik Chaddha
|
6ad9b94d76
|
lint fix
|
2023-06-14 22:55:58 +05:30 |
ctflearner
|
fec649f551
|
Create CVE-2019-10098.yaml
Added a New Nuclei Template as CVE-2019-10098
|
2023-06-14 22:44:42 +05:30 |
ctflearner
|
51855711eb
|
Create CVE-2004-1965.yaml
Added a New Nuclei Template as CVE-2004-1965
|
2023-06-14 22:19:48 +05:30 |
ctflearner
|
3de70640b7
|
Create CVE-2005-3634.yaml
Added a New Nuclei Template as CVE-2005-3634
|
2023-06-14 22:00:42 +05:30 |
Ritik Chaddha
|
7102d5297f
|
Update CVE-2022-24627.yaml
|
2023-06-14 21:58:05 +05:30 |
Ritik Chaddha
|
b8f0af63f7
|
lint fix
|
2023-06-14 21:56:04 +05:30 |
ctflearner
|
726bc45e8f
|
Create CVE-2012-4032.yaml
Added a New Nuclei Template as CVE-2012-4032
|
2023-06-14 21:50:20 +05:30 |
Ritik Chaddha
|
b176e33fc5
|
lint fix
|
2023-06-14 21:49:41 +05:30 |
Ritik Chaddha
|
3fea066dff
|
lint fix
|
2023-06-14 21:48:29 +05:30 |
Ritik Chaddha
|
6b631f227d
|
lint fix
|
2023-06-14 21:47:34 +05:30 |
ctflearner
|
672a20bffb
|
Create CVE-2012-5321.yaml
Added a New Nuclei Template as CVE-2012-5321
|
2023-06-14 21:42:05 +05:30 |
ctflearner
|
bb654ac729
|
Create CVE-2012-6499.yaml
Added a New Nuclei Template as CVE-2012-6499
|
2023-06-14 21:34:13 +05:30 |
ctflearner
|
1efe11f250
|
Create CVE-2009-0347.yaml
|
2023-06-14 21:27:46 +05:30 |
Dhiyaneshwaran
|
8a2b4d39ae
|
Merge pull request #7383 from ctflearner/CVE-2013-2621
Create CVE-2013-2621.yaml
|
2023-06-14 12:57:11 +05:30 |
Dhiyaneshwaran
|
6ae7b65e36
|
Merge pull request #7385 from ctflearner/CVE-2008-7269
Create CVE-2008-7269.yaml
|
2023-06-14 12:56:49 +05:30 |
Dhiyaneshwaran
|
02b6118ed1
|
Merge pull request #7382 from ctflearner/CVE-2011-5252
Create CVE-2011-5252.yaml
|
2023-06-14 12:46:53 +05:30 |
Prince Chaddha
|
083fe1b839
|
added variable
|
2023-06-14 09:28:59 +05:30 |
Prince Chaddha
|
f8e645ae41
|
Updated CVE-2023-20887
|
2023-06-13 23:32:04 +05:30 |
Prince Chaddha
|
d84386101e
|
Updated description
|
2023-06-13 22:08:59 +05:30 |
sandeep
|
0fea720652
|
misc update
|
2023-06-13 21:37:28 +05:30 |
Dhiyaneshwaran
|
4434b9ea15
|
Update CVE-2023-20887.yaml
|
2023-06-13 21:08:36 +05:30 |
SinSinology
|
2963a94e91
|
VMWare vRealize Network Insight pre-authenticated RCE CVE-2023-20887
Technical Details at:
https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/
|
2023-06-13 15:24:50 +01:00 |
pussycat0x
|
5c8a0d627b
|
Merge pull request #7384 from ctflearner/CVE-2010-1586
Create CVE-2010-1586.yaml
|
2023-06-13 11:03:40 +05:30 |
pussycat0x
|
9bb3498017
|
Merge pull request #7369 from carr0t2/main
Create CVE-2021-44138.yaml
|
2023-06-12 23:01:46 +05:30 |
pussycat0x
|
02e57aaf32
|
metadata format -fix
|
2023-06-12 22:41:47 +05:30 |
J4vaovo
|
ab82e95fbd
|
Update CVE-2021-24340.yaml
|
2023-06-13 00:49:15 +08:00 |
J4vaovo
|
bc8335a82c
|
Update CVE-2021-24340.yaml
|
2023-06-13 00:49:01 +08:00 |
J4vaovo
|
524db1b532
|
Update CVE-2021-24340.yaml
|
2023-06-13 00:48:27 +08:00 |
J4vaovo
|
31142ad048
|
Update CVE-2021-24340.yaml
|
2023-06-13 00:41:40 +08:00 |
pussycat0x
|
68d776d90a
|
Merge pull request #7389 from ruben-condor/improve_cve-2023-1434-template
Updated CVE-2023-1434.yaml template
|
2023-06-12 19:28:04 +05:30 |
Prince Chaddha
|
f9fd870fbb
|
misc changes
|
2023-06-12 18:54:55 +05:30 |
Dhiyaneshwaran
|
058dd4a976
|
change severity and verified
|
2023-06-12 18:08:46 +05:30 |
Dhiyaneshwaran
|
d337b7494e
|
Create CVE-2001-0537.yaml
|
2023-06-12 18:06:50 +05:30 |
pussycat0x
|
39e9387edf
|
Merge pull request #7386 from ctflearner/CVE-2008-1547
Create CVE-2008-1547.yaml
|
2023-06-12 17:59:32 +05:30 |
Prince Chaddha
|
0c48177cc3
|
Update CVE-2015-1880.yaml
|
2023-06-12 17:27:05 +05:30 |
Dhiyaneshwaran
|
5d3c5b7e42
|
fix lint
|
2023-06-12 16:31:59 +05:30 |
Dhiyaneshwaran
|
26f3753bba
|
fix matcher and added metadata
|
2023-06-12 16:29:09 +05:30 |
Dhiyaneshwaran
|
d8e78edc70
|
fix matcher and added metadata
|
2023-06-12 16:22:36 +05:30 |
Dhiyaneshwaran
|
65a186f48d
|
fix matcher and metadata
|
2023-06-12 16:14:49 +05:30 |
pussycat0x
|
e155a2718a
|
condition -update
|
2023-06-12 16:07:52 +05:30 |
pussycat0x
|
457febde96
|
Update CVE-2023-1434.yaml
|
2023-06-12 16:01:17 +05:30 |
pussycat0x
|
44695ff802
|
minor -update
|
2023-06-12 15:45:51 +05:30 |
Dhiyaneshwaran
|
7820f9bab1
|
fix template
|
2023-06-12 15:23:08 +05:30 |
Ruben Condor
|
1d0d1edc65
|
Updated CVE-2023-1434.yaml template
|
2023-06-12 12:51:29 +03:00 |
Dhiyaneshwaran
|
b5726fac4a
|
fix lint
|
2023-06-12 15:18:19 +05:30 |
Dhiyaneshwaran
|
34a1c498f6
|
fix matcher and added metadata
|
2023-06-12 15:13:39 +05:30 |
geeknik
|
3a20768330
|
Create CVE-2022-24627.yaml
|
2023-06-12 00:40:38 +00:00 |
ctflearner
|
f9798187b8
|
Create CVE-2008-1547.yaml
Added a new Nuclei-Template as CVE-2008-1547
|
2023-06-11 11:56:34 +05:30 |
ctflearner
|
1a5a1cecd1
|
Create CVE-2008-7269.yaml
Added a New Nuclei-Template as CVE-2008-7269.yaml
|
2023-06-11 11:37:22 +05:30 |
ctflearner
|
5f8d295347
|
Create CVE-2010-1586.yaml
Added a New Nuclei-Template as CVE-2010-1586.yaml
|
2023-06-11 11:26:26 +05:30 |
ctflearner
|
4b03a558db
|
Create CVE-2013-2621.yaml
Added a New Nuclei-Template CVE-2013-2621.yaml
|
2023-06-11 11:17:02 +05:30 |
ctflearner
|
171082cf0e
|
Create CVE-2011-5252.yaml
Added a New Nuclei-Template CVE-2011-5252
|
2023-06-11 11:07:20 +05:30 |
ctflearner
|
9bee96f64d
|
Create CVE-2012-4982.yaml
Added a New Nuclei Template CVE-2012-4982.yaml
|
2023-06-11 10:48:56 +05:30 |
Dhiyaneshwaran
|
231c99d995
|
added application/xml
|
2023-06-10 23:16:30 +05:30 |
J4vaovo
|
9f3116bf02
|
Update CVE-2022-25481.yaml
|
2023-06-10 21:33:20 +08:00 |
J4vaovo
|
1109267734
|
Update CVE-2021-24340.yaml
|
2023-06-10 21:00:26 +08:00 |
J4vaovo
|
0616c86ed1
|
Fix CVE-2021-24340-False Positive
|
2023-06-10 20:54:46 +08:00 |
Dhiyaneshwaran
|
512590f98d
|
fix template
|
2023-06-10 09:06:28 +05:30 |
pussycat0x
|
d62e939929
|
Merge pull request #7364 from projectdiscovery/CVE-2023-25157
Create CVE-2023-25157.yaml
|
2023-06-10 00:39:01 +05:30 |
pussycat0x
|
63ccc172ae
|
Merge pull request #7371 from j4vaovo/patch-51
Update CVE-2023-1671.yaml
|
2023-06-09 20:46:43 +05:30 |
Ritik Chaddha
|
f4cd0f5f84
|
added timeout
|
2023-06-09 18:45:43 +05:30 |
Ritik Chaddha
|
093e3a5ace
|
Update CVE-2023-1671.yaml
|
2023-06-09 17:54:34 +05:30 |
J4vaovo
|
124a982be8
|
Update CVE-2020-14750.yaml (#7370)
|
2023-06-09 16:26:52 +05:30 |
J4vaovo
|
f5c84f0756
|
Update CVE-2023-1671.yaml
|
2023-06-09 18:56:06 +08:00 |
pussycat0x
|
771aab655a
|
Merge pull request #7299 from kazet/fixing-fp-http/cves/2020/CVE-2020-35847.yaml
Fixing false-positive in cves/2020/CVE-2020-35847.yaml
|
2023-06-09 00:30:20 +05:30 |
Ritik Chaddha
|
a4699f5b9f
|
Merge pull request #7335 from j4vaovo/patch-48
fix CVE-2022-1595-false positive
|
2023-06-08 23:47:52 +05:30 |
Ritik Chaddha
|
6f874d5d47
|
Update CVE-2022-1595.yaml
|
2023-06-08 23:40:56 +05:30 |
Carrot2
|
1a1f05f4f2
|
Create CVE-2021-44138.yaml
|
2023-06-09 02:03:36 +08:00 |
Ritik Chaddha
|
2b8f5b3c7e
|
updated the req and matcher
|
2023-06-08 23:15:41 +05:30 |
Ritik Chaddha
|
27e9cf2e56
|
updated matcher
|
2023-06-07 11:56:24 +05:30 |
Dhiyaneshwaran
|
2892115497
|
minor update
|
2023-06-07 11:42:54 +05:30 |
Ritik Chaddha
|
1be29c9df3
|
Create CVE-2023-25157.yaml
|
2023-06-07 11:28:03 +05:30 |
Ritik Chaddha
|
596260ba25
|
Merge pull request #7281 from bhutch/CVE-2019-1943
Added http/cves/2019/CVE-2019-1943.yaml Template
|
2023-06-06 10:15:07 +05:30 |
Ritik Chaddha
|
5e36eecb18
|
updated matcher and info
|
2023-06-06 10:12:24 +05:30 |
Dhiyaneshwaran
|
e1f9a21da7
|
Merge pull request #7320 from ruben-condor/add-reference-and-classification-and-fix-param
Updated CVE-2023-1434
|
2023-06-05 15:37:05 +05:30 |
Ritik Chaddha
|
99a571e64d
|
Merge branch 'main' into patch-49
|
2023-06-05 13:51:38 +05:30 |
Ritik Chaddha
|
6d071c0414
|
updated /etc/passwd matcher
there were few FNs because of the number
|
2023-06-05 13:51:07 +05:30 |
Ritik Chaddha
|
bd9ed6c939
|
updated metadata & matchers
|
2023-06-05 13:06:58 +05:30 |
Ritik Chaddha
|
50b5047265
|
update
|
2023-06-05 13:06:24 +05:30 |
Ritik Chaddha
|
bbdceb3b4a
|
updated metadata and matchers
|
2023-06-05 12:57:06 +05:30 |
Prince Chaddha
|
ffc66c4bd8
|
templates added
|
2023-06-05 12:33:16 +05:30 |
J4vaovo
|
640d2b0adf
|
Update CVE-2021-43798.yaml
|
2023-06-05 10:36:36 +08:00 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
sandeep
|
8b8b17abad
|
proto update
|
2023-06-03 21:54:59 +05:30 |
Ritik Chaddha
|
50c1b85db4
|
lint fix
|
2023-06-02 23:48:50 +05:30 |
Ritik Chaddha
|
c95a64a9e0
|
update metadata
|
2023-06-02 23:47:11 +05:30 |
Ritik Chaddha
|
dd68f47ae2
|
Create CVE-2023-1362.yaml
|
2023-06-02 23:45:08 +05:30 |
Ritik Chaddha
|
5606478cc2
|
update max-req=> max-request
|
2023-06-01 23:08:50 +05:30 |
Ritik Chaddha
|
d17eba00d6
|
Revert "Revert "Update CVE-2021-37304.yaml""
This reverts commit f6bd679208 .
|
2023-06-01 23:05:55 +05:30 |
Ritik Chaddha
|
f6bd679208
|
Revert "Update CVE-2021-37304.yaml"
This reverts commit f7962f2953 .
|
2023-06-01 23:04:48 +05:30 |
Ritik Chaddha
|
f7962f2953
|
Update CVE-2021-37304.yaml
|
2023-06-01 23:03:06 +05:30 |
Ritik Chaddha
|
d6bc852482
|
Revert "update metadata"
This reverts commit 7393a6e107 .
|
2023-06-01 22:48:28 +05:30 |
Ritik Chaddha
|
7393a6e107
|
update metadata
|
2023-06-01 22:45:35 +05:30 |
pussycat0x
|
cc0a79a58a
|
Merge pull request #7334 from projectdiscovery/CVE-2023-32315
CVE-2023-32315 [Administration Console authentication bypass in Openf…
|
2023-06-01 14:51:00 +05:30 |
Prince Chaddha
|
c4480b5817
|
updated name
|
2023-06-01 14:19:59 +05:30 |
J4vaovo
|
92d7192ed3
|
Update CVE-2022-1595.yaml
|
2023-06-01 13:01:39 +08:00 |
Dhiyaneshwaran
|
495a5a2ebc
|
CVE-2023-32315 [Administration Console authentication bypass in Openfire]
|
2023-06-01 09:58:48 +05:30 |
Dhiyaneshwaran
|
9ef7e9adb3
|
CVE-2023-27482: Authentication Bypass in Home Assistant
|
2023-06-01 08:41:00 +05:30 |
Ritik Chaddha
|
ae6adf8ec4
|
Merge pull request #7324 from j4vaovo/patch-43
add CVE-2018-11759.yaml tags
|
2023-05-31 13:18:15 +05:30 |
Ritik Chaddha
|
b5f69565e2
|
Merge pull request #7327 from j4vaovo/patch-44
fix CVE-2022-1595-false positive
|
2023-05-31 13:16:13 +05:30 |
Ritik Chaddha
|
d1fde1ac19
|
Update CVE-2018-11759.yaml
|
2023-05-31 13:15:01 +05:30 |
Ritik Chaddha
|
e7ce7295b5
|
Update CVE-2022-1595.yaml
|
2023-05-31 13:13:33 +05:30 |
pussycat0x
|
a117c77d23
|
Merge pull request #7322 from j4vaovo/patch-42
fix CVE-2019-0193-false positive
|
2023-05-31 11:27:15 +05:30 |
Dhiyaneshwaran
|
351fa87812
|
Merge pull request #7214 from projectdiscovery/princechaddha-patch-4
Added CVE-2020-1956
|
2023-05-31 11:04:30 +05:30 |
Dhiyaneshwaran
|
14f099fc68
|
minor update
|
2023-05-31 11:02:07 +05:30 |
J4vaovo
|
5b9ab2065a
|
Update CVE-2022-1595.yaml
|
2023-05-31 11:14:06 +08:00 |
J4vaovo
|
30e051b4bb
|
Update CVE-2018-11759.yaml
|
2023-05-31 10:34:54 +08:00 |
pussycat0x
|
86dcd6c7ba
|
Merge pull request #7302 from j4vaovo/patch-38
fix CVE-2014-6287.yaml
|
2023-05-31 07:30:57 +05:30 |
pussycat0x
|
8e0c99bf5f
|
matcher -update
|
2023-05-31 07:23:36 +05:30 |
mastercho
|
d871befa6b
|
fixed yaml
|
2023-05-31 04:03:01 +03:00 |
mastercho
|
50ecdba43f
|
Added CVE-2016-6195
|
2023-05-31 03:46:57 +03:00 |
mastercho
|
f81f50654f
|
Added/Fixed/Updated XXX Template
|
2023-05-31 03:41:32 +03:00 |
J4vaovo
|
42bf3c99f4
|
Update CVE-2019-0193.yaml
|
2023-05-31 07:51:18 +08:00 |
Ruben Condor
|
d74b4974ff
|
Updated CVE-2023-1434
|
2023-05-30 15:41:56 +03:00 |
Dhiyaneshwaran
|
9c885b5aa9
|
Merge branch 'main' into add-description-and-classification-to-CVE-2023-29489
|
2023-05-30 15:27:57 +05:30 |
Dhiyaneshwaran
|
6e7fd66a1d
|
minor update
|
2023-05-30 15:27:27 +05:30 |
Ruben Condor
|
d51aaf2cbc
|
Updated CVE-2023-29489.yaml
|
2023-05-30 12:14:58 +03:00 |
Dhiyaneshwaran
|
e93076238d
|
Merge branch 'main' into patch-41
|
2023-05-30 14:13:03 +05:30 |
Ritik Chaddha
|
ee667d2574
|
Update CVE-2018-11784.yaml
|
2023-05-30 11:16:58 +05:30 |
J4vaovo
|
41cde69dbc
|
Update CVE-2018-11784.yaml
|
2023-05-30 13:21:49 +08:00 |
Ritik Chaddha
|
a052de6ad8
|
updated info
|
2023-05-29 23:31:22 +05:30 |
Dhiyaneshwaran
|
6743175d2a
|
Create CVE-2023-2825.yaml
|
2023-05-29 14:06:11 +05:30 |
J4vaovo
|
f460077b9a
|
fix CVE-2014-6287.yaml
|
2023-05-28 23:41:09 +08:00 |
Dhiyaneshwaran
|
3fe76969b9
|
Merge pull request #7177 from Co5mos/CVE-2023-2356
Added CVE-2023-2356 Template
|
2023-05-26 18:57:33 +05:30 |
pussycat0x
|
1822b88c6c
|
Merge pull request #7259 from For3stCo1d/CVE-2023-29919
Create CVE-2023-29919.yaml
|
2023-05-26 18:48:23 +05:30 |
Ritik Chaddha
|
0e920947fe
|
Merge pull request #7298 from projectdiscovery/CVE-2023-2732
Create CVE-2023-2732.yaml [MStore API <= 3.9.2 - Authentication Bypass] 🔥
|
2023-05-26 18:10:37 +05:30 |
Ritik Chaddha
|
b4762c0e58
|
Merge pull request #7300 from projectdiscovery/CVE-2023-32243
CVE-2023-32243 [WordPress Elementor Lite 5.7.1 Arbitrary Password Reset]🔥
|
2023-05-26 18:09:16 +05:30 |
Ritik Chaddha
|
c59cf8fdcd
|
updated info
|
2023-05-26 18:08:02 +05:30 |
Ritik Chaddha
|
ac5643eaa8
|
updated info
|
2023-05-26 18:06:10 +05:30 |
Dhiyaneshwaran
|
891c8603e3
|
trail space fix
|
2023-05-26 15:07:05 +05:30 |
Dhiyaneshwaran
|
d26375a3b9
|
print password
|
2023-05-26 15:04:36 +05:30 |
Dhiyaneshwaran
|
8be63f6c2b
|
using single password variable
|
2023-05-26 13:18:20 +05:30 |
Dhiyaneshwaran
|
7cec666668
|
Create CVE-2023-32243.yaml [WordPress Elementor Lite 5.7.1 Arbitrary Password Reset]
|
2023-05-26 13:04:37 +05:30 |
Prince Chaddha
|
ef4d20f920
|
Merge pull request #7213 from projectdiscovery/princechaddha-patch-2
Added CVE-2016-4437
|
2023-05-26 13:04:13 +05:30 |
Prince Chaddha
|
973c06b6c4
|
fixed matcher
|
2023-05-26 13:00:47 +05:30 |
Krzysztof Zając
|
24c236b05e
|
Fixing false-positive in cves/2020/CVE-2020-35847.yaml
|
2023-05-26 09:04:17 +02:00 |
pussycat0x
|
f9763244e1
|
Merge pull request #7124 from mastercho/dev
Fix CVE-2020-35847 false positive
|
2023-05-26 12:20:52 +05:30 |
Dhiyaneshwaran
|
b65534983f
|
Create CVE-2023-2732.yaml [MStore API <= 3.9.2 - Authentication Bypass]
|
2023-05-26 12:05:31 +05:30 |
pussycat0x
|
d6ee087215
|
lint -fix
|
2023-05-26 11:44:42 +05:30 |
pussycat0x
|
2f8f09b697
|
matcher - update
|
2023-05-26 11:42:12 +05:30 |
pussycat0x
|
3e03dc2a97
|
matcher - update
|
2023-05-26 11:37:27 +05:30 |
Ritik Chaddha
|
e96507a650
|
Merge pull request #5585 from tess-ss/patch-20
Create CVE-2021-39165.yaml
|
2023-05-26 11:01:21 +05:30 |
Ritik Chaddha
|
e6ca543080
|
updated matcher & info
|
2023-05-26 10:57:49 +05:30 |
Dhiyaneshwaran
|
f3ab888164
|
Merge pull request #5615 from xcapri/master
Added CVE-2021-24435.yaml
|
2023-05-26 10:45:35 +05:30 |
Dhiyaneshwaran
|
3ac1074cd2
|
added content-type
|
2023-05-26 10:36:15 +05:30 |
Dhiyaneshwaran
|
8f9bab9f78
|
fix lint issue
|
2023-05-26 10:35:00 +05:30 |
Dhiyaneshwaran
|
84eda5e055
|
Rename cves/2021/CVE-2021-39165.yaml to http/cves/2021/CVE-2021-39165.yaml
|
2023-05-26 10:28:54 +05:30 |
Dhiyaneshwaran
|
11c6c44ade
|
Merge pull request #7291 from projectdiscovery/CVE-2023-29887
Create CVE-2023-29887.yaml
|
2023-05-26 10:14:59 +05:30 |
Dhiyaneshwaran
|
dd7423ea8e
|
Merge pull request #5518 from Jna1/patch-3
Create CVE-2020-29583.yaml
|
2023-05-26 10:14:18 +05:30 |
Ritik Chaddha
|
648390cc19
|
updated path
|
2023-05-26 00:44:43 +05:30 |
Ritik Chaddha
|
8b1cdeaf9c
|
Merge pull request #7184 from ViCrack/CVE-2017-9791
Updated CVE-2017-9791
|
2023-05-25 23:52:49 +05:30 |
Ritik Chaddha
|
85c2642e84
|
Merge branch 'main' into patch-3
|
2023-05-25 23:50:28 +05:30 |
Ritik Chaddha
|
e448122e34
|
updated matchers,path,info
|
2023-05-25 23:48:57 +05:30 |
Ritik Chaddha
|
8ea82a7e75
|
updated matchers and metadata
|
2023-05-25 18:25:27 +05:30 |
Ritik Chaddha
|
5ebdd59e1d
|
updated info
|
2023-05-25 15:06:24 +05:30 |
Ritik Chaddha
|
83a7341f0a
|
lint fix
|
2023-05-24 23:42:07 +05:30 |
Ritik Chaddha
|
355f7a74b8
|
Create CVE-2023-29887.yaml
|
2023-05-24 23:38:59 +05:30 |
Prince Chaddha
|
86cb6fddd2
|
Merge branch 'main' into fix-CVE-2018-1273
|
2023-05-24 10:56:09 +05:30 |
Prince Chaddha
|
9092752e51
|
Rename cves/2018/CVE-2018-1273.yaml to http/cves/2018/CVE-2018-1273.yaml
|
2023-05-24 10:51:06 +05:30 |
Dhiyaneshwaran
|
153659aa3a
|
Merge pull request #7280 from projectdiscovery/CVE-2023-2780
Added CVE-2023-2780
|
2023-05-23 12:03:54 +05:30 |
pussycat0x
|
717a7410d9
|
severity & name -updated
|
2023-05-23 12:02:34 +05:30 |
pussycat0x
|
591d8e8417
|
payload - update
|
2023-05-23 11:37:05 +05:30 |
pussycat0x
|
afe04d410f
|
minor - update
|
2023-05-23 11:23:52 +05:30 |
Dhiyaneshwaran
|
081b0252f1
|
verified and fix template
|
2023-05-23 10:36:58 +05:30 |
Brandon Hutchinson
|
6083fd22d6
|
Added http/cves/2019/CVE-2019-1943.yaml Template
|
2023-05-22 18:08:46 +00:00 |
Prince Chaddha
|
3a39ab47a4
|
Create CVE-2023-2780.yaml
|
2023-05-22 15:56:58 +05:30 |
Dhiyaneshwaran
|
67859eff2c
|
Create CVE-2022-2733.yaml
|
2023-05-22 15:49:45 +05:30 |
pussycat0x
|
726d826284
|
Merge pull request #7212 from Zeyad-Azima/patch-1
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI p…
|
2023-05-20 23:42:33 +05:30 |
Ritik Chaddha
|
b0423d9742
|
updated matcher
|
2023-05-19 23:23:25 +05:30 |
Ritik Chaddha
|
c73d1953d3
|
updated matchers & info
|
2023-05-19 20:01:16 +05:30 |
For3stCo1d
|
602e6fc707
|
Create CVE-2023-29919.yaml
|
2023-05-19 19:50:08 +08:00 |
Ritik Chaddha
|
21386e045c
|
Update CVE-2019-7256.yaml
|
2023-05-18 21:22:33 +05:30 |
Dhiyaneshwaran
|
ce1a476baf
|
trailspace fix
|
2023-05-18 21:05:15 +05:30 |
Dhiyaneshwaran
|
4939442773
|
re-wrote-template
|
2023-05-18 20:59:40 +05:30 |
Ritik Chaddha
|
b2ea8de4ab
|
Merge pull request #7245 from projectdiscovery/CVE-2023-1434
Create CVE-2023-1434.yaml
|
2023-05-18 19:25:15 +05:30 |
Ritik Chaddha
|
b5d13559ad
|
updated weak matcher
|
2023-05-18 19:22:06 +05:30 |
Dhiyaneshwaran
|
d8b8d90451
|
Merge pull request #7248 from projectdiscovery/CVE-2021-37304
Create CVE-2021-37304.yaml
|
2023-05-18 15:44:47 +05:30 |
Dhiyaneshwaran
|
024b570df5
|
fix comments
|
2023-05-18 15:33:57 +05:30 |
Ritik Chaddha
|
79f9d506d0
|
error fix
|
2023-05-18 01:05:27 +05:30 |
Ritik Chaddha
|
32d22ac48a
|
Create CVE-2021-37304.yaml
|
2023-05-18 01:00:13 +05:30 |
Ritik Chaddha
|
7f76b703b5
|
Create CVE-2021-37305.yaml
|
2023-05-18 00:58:05 +05:30 |
Dhiyaneshwaran
|
c46ceae0c9
|
Create CVE-2023-1434.yaml
|
2023-05-17 10:55:25 +05:30 |
Dhiyaneshwaran
|
1d7fcc0835
|
Merge pull request #7229 from For3stCo1d/main
Create CVE-2023-29923.yaml
|
2023-05-17 02:02:02 +05:30 |
Dhiyaneshwaran
|
ac582dee31
|
minor update
|
2023-05-17 01:59:24 +05:30 |
pussycat0x
|
f8bc85cf54
|
metadata -update
|
2023-05-16 00:12:48 +05:30 |
For3stCo1d
|
952574402d
|
Create CVE-2023-29923.yaml
|
2023-05-14 11:14:15 +08:00 |
Ritik Chaddha
|
bffcfa759b
|
Merge branch 'main' into cve
|
2023-05-13 20:07:47 +05:30 |
Ritik Chaddha
|
992cc24928
|
updated matchers & info
|
2023-05-12 23:59:05 +05:30 |
Ritik Chaddha
|
7ba454c962
|
updated matcher & info
|
2023-05-12 23:13:42 +05:30 |
j4vaovo
|
a53ee9a122
|
Update CVE-2021-45046.yaml
|
2023-05-12 08:23:25 +08:00 |
GitHub Action
|
1c5197c6f7
|
Auto Generated CVE annotations [Thu May 11 13:27:36 UTC 2023] 🤖
|
2023-05-11 13:27:36 +00:00 |
Prince Chaddha
|
b95c43b7ce
|
updated reference
|
2023-05-11 17:47:48 +05:30 |
Prince Chaddha
|
4bf57ffdd2
|
Merge branch 'main' into dev
|
2023-05-11 15:25:17 +05:30 |
Prince Chaddha
|
c317a06dd4
|
fixing conflict
|
2023-05-11 15:24:10 +05:30 |
Prince Chaddha
|
4390b5554d
|
updated protocol name
|
2023-05-11 14:34:45 +05:30 |
Prince Chaddha
|
0d8aa48c87
|
Create CVE-2020-1956.yaml
|
2023-05-11 14:33:44 +05:30 |
Prince Chaddha
|
c4410d5f23
|
Create CVE-2016-4437.yaml
|
2023-05-11 14:25:04 +05:30 |
Prince Chaddha
|
355d9ff724
|
Merge branch 'main' into princechaddha-patch-2
|
2023-05-11 14:04:17 +05:30 |
Ritik Chaddha
|
6ee69d03a1
|
Merge branch 'main' into update-log4j
|
2023-05-11 13:08:41 +05:30 |
Zer0verflow
|
7b035ab1eb
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:54:49 +08:00 |
Zer0verflow
|
749f2b5aa3
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:50:07 +08:00 |
Zer0verflow
|
80d33d7741
|
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI privilege escalation
|
2023-05-11 10:57:33 +08:00 |
Dhiyaneshwaran
|
0dcedab251
|
Merge pull request #7203 from david-bla/add-sophos-mobile-xxe_cve-2022-3980
add template for sophos mobile xxe ssrf (cve-2022-3980)
|
2023-05-11 07:36:04 +05:30 |
Dhiyaneshwaran
|
333b861ffc
|
shodan query update
|
2023-05-11 07:31:07 +05:30 |
Dhiyaneshwaran
|
00c8c71457
|
Merge pull request #7204 from projectdiscovery/parthmalhotra-cve
Create CVE-2023-31059.yaml
|
2023-05-11 07:28:37 +05:30 |
pussycat0x
|
1cbcce382d
|
Merge pull request #7196 from projectdiscovery/CVE-2022-24716
CVE 2022 24716
|
2023-05-11 00:42:58 +05:30 |
Dhiyaneshwaran
|
2f84af20e0
|
Update CVE-2022-24716.yaml
|
2023-05-11 00:30:35 +05:30 |
pussycat0x
|
b4413bd369
|
Merge pull request #7205 from projectdiscovery/CVE-2023-25135
Create CVE-2023-25135.yaml
|
2023-05-10 20:47:40 +05:30 |
pussycat0x
|
34cbb997e0
|
Update CVE-2023-25135.yaml
|
2023-05-10 20:46:40 +05:30 |
pussycat0x
|
8de6c0cb81
|
Update CVE-2023-25135.yaml
|
2023-05-10 20:45:19 +05:30 |
pussycat0x
|
36819b63eb
|
minor -update
|
2023-05-10 20:43:56 +05:30 |
pussycat0x
|
dc3180fd24
|
protocol -update
|
2023-05-10 19:14:55 +05:30 |
Dhiyaneshwaran
|
cba7f8b5e5
|
changing from system to var_dump
|
2023-05-10 17:51:16 +05:30 |
Ritik Chaddha
|
2696334222
|
updated matcher
|
2023-05-10 17:42:58 +05:30 |
Dhiyaneshwaran
|
68828dd492
|
Merge pull request #7183 from projectdiscovery/cve-templates1
CVE templates added
|
2023-05-10 01:09:21 +05:30 |
pussycat0x
|
58f7db754f
|
protocol-update
|
2023-05-10 01:00:43 +05:30 |
sandeep
|
aa90fc9036
|
added additional matcher to make it strict
|
2023-05-09 22:50:55 +05:30 |
Dhiyaneshwaran
|
b3dc6cf70a
|
change in query
|
2023-05-09 22:42:10 +05:30 |
Dhiyaneshwaran
|
f2890ae2fa
|
Create CVE-2023-25135.yaml
|
2023-05-09 22:10:11 +05:30 |
pussycat0x
|
e27cde97f6
|
protocol update
|
2023-05-09 21:46:34 +05:30 |
Ritik Chaddha
|
b79431ad43
|
updated path and matchers
|
2023-05-09 21:45:10 +05:30 |
Parth Malhotra
|
777f1efbc1
|
Update CVE-2023-31059.yaml
|
2023-05-09 21:42:39 +05:30 |
Parth Malhotra
|
1baf108a3f
|
Update CVE-2023-31059.yaml
|
2023-05-09 21:38:13 +05:30 |
Parth Malhotra
|
cdfe62741d
|
Create CVE-2023-31059.yaml
|
2023-05-09 21:35:10 +05:30 |
Parth Malhotra
|
6ef29cb29e
|
Create CVE-2023-31059.yaml
|
2023-05-09 21:30:06 +05:30 |
Ritik Chaddha
|
68b0734657
|
removed matcher condition
|
2023-05-09 19:36:13 +05:30 |
sandeep
|
c59974226f
|
strict dsl matcher with addition check
|
2023-05-09 18:40:00 +05:30 |
Sandeep Singh
|
6addff3ac6
|
misc syntax fixes (#7201)
|
2023-05-09 18:13:13 +05:30 |
Parth Malhotra
|
0450d1224f
|
Create CVE-2023-25717.yaml
|
2023-05-09 18:05:28 +05:30 |
pussycat0x
|
68a1ea89e0
|
Update CVE-2023-26360.yaml
|
2023-05-09 16:51:33 +05:30 |
Dhiyaneshwaran
|
5c3ef6fa06
|
fix trail space
|
2023-05-09 15:07:07 +05:30 |
Dhiyaneshwaran
|
cb9fce3f99
|
Create CVE-2023-26360.yaml
|
2023-05-09 15:03:18 +05:30 |
Dhiyaneshwaran
|
70a4c7180c
|
description added
|
2023-05-08 22:56:05 +05:30 |
Dhiyaneshwaran
|
badb9b7945
|
Create CVE-2022-24716.yaml
|
2023-05-08 22:54:19 +05:30 |
Ritik Chaddha
|
a4f51aca8f
|
updated info
|
2023-05-08 13:08:31 +05:30 |
sandeep
|
dd953b4706
|
Added spm + shodan query
|
2023-05-08 12:58:19 +05:30 |
Co5mos
|
ed206e5c27
|
Update CVE-2023-2356 Template
|
2023-05-08 15:12:08 +08:00 |
j3ssie
|
b89dee6aae
|
Path Traversal in Ghost CMS < 5.42.1
|
2023-05-08 13:27:57 +07:00 |
Ritik Chaddha
|
f96e98052e
|
payload update
|
2023-05-08 11:07:00 +05:30 |
Dhiyaneshwaran
|
5875abf833
|
Merge pull request #7182 from ViCrack/CVE-2020-14883
Updated CVE-2020-14883
|
2023-05-08 11:03:41 +05:30 |
Arm!tage
|
9dbcf5b78a
|
change to default password
|
2023-05-08 00:19:29 +08:00 |
ViCrack
|
5b88116b2e
|
fix xstream
|
2023-05-07 00:36:32 +08:00 |
ViCrack
|
4e638c079f
|
replace cat command with rand_int
|
2023-05-06 23:08:06 +08:00 |
Prince Chaddha
|
124b2230cf
|
templates added
|
2023-05-06 17:42:20 +05:30 |
Ritik Chaddha
|
1732a81929
|
added shodan
|
2023-05-06 12:38:20 +05:30 |
Ritik Chaddha
|
cb6ebb417b
|
updated variable and matcher
|
2023-05-06 12:29:32 +05:30 |
ViCrack
|
df22dcc281
|
add support for Windows
|
2023-05-06 14:21:07 +08:00 |
pussycat0x
|
0e09e7c289
|
Merge pull request #7179 from dogasantos/CVE-2021-43798.yaml
fixed false positive produce by the old win.ini regex
|
2023-05-05 23:02:26 +05:30 |
pussycat0x
|
906a0a65e3
|
Update CVE-2021-43798.yaml
|
2023-05-05 22:56:15 +05:30 |
Dhiyaneshwaran
|
511a601dd6
|
Merge pull request #7175 from Co5mos/CVE-2022-40879
Updated CVE-2022-40879 Template
|
2023-05-05 22:52:41 +05:30 |
Dhiyaneshwaran
|
c585da0abe
|
Merge pull request #7176 from Co5mos/CVE-2022-0678
Updated CVE-2022-0678 Template
|
2023-05-05 22:52:23 +05:30 |
pussycat0x
|
8bafd0510d
|
Merge branch 'main' into CVE-2021-43798.yaml
|
2023-05-05 22:51:45 +05:30 |
pussycat0x
|
a82301ad7b
|
Merge pull request #7171 from Mys7ic/fix_CVE-2021-43798
fix regex for win.ini
|
2023-05-05 22:36:01 +05:30 |
pussycat0x
|
983915d4bc
|
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml
|
2023-05-05 19:02:53 +05:30 |
Dhiyaneshwaran
|
6ea44267d5
|
Merge branch 'main' into main
|
2023-05-05 18:35:06 +05:30 |
pussycat0x
|
4660c9abf3
|
lint -fix
|
2023-05-05 16:48:47 +05:30 |
Prince Chaddha
|
9a11ae394b
|
Merge pull request #7046 from projectdiscovery/add-cpe-epss
Added CPE and EPSS Score to CVE Templates
|
2023-05-05 15:33:15 +05:30 |
mlec
|
a6c3f4f9c1
|
fix(false-positive): Remove trailing space 🩹
|
2023-05-05 08:27:56 +02:00 |
mlec
|
8c792b2911
|
fix(false-positive): Add removed part after rebased 🩹
Refs:
- https://github.com/projectdiscovery/nuclei-templates/issues/5934
- https://github.com/projectdiscovery/nuclei-templates/pull/5939
|
2023-05-05 08:17:35 +02:00 |
pussycat0x
|
576c0d64d4
|
Merge pull request #7154 from j4vaovo/patch-33
Create CVE-2017-17731.yaml
|
2023-05-05 11:47:15 +05:30 |
pussycat0x
|
0649a8eec8
|
Update and rename http/cves/CVE-2017-17731.yaml to http/cves/2017/CVE-2017-17731.yaml
|
2023-05-05 11:43:29 +05:30 |
pussycat0x
|
a7b52d98a9
|
Merge branch 'main' into main
|
2023-05-05 10:38:42 +05:30 |
pussycat0x
|
9e7fa915d9
|
protocol update
|
2023-05-05 10:35:38 +05:30 |
pussycat0x
|
9159fde669
|
Update and rename cves/2021/CVE-2021-40870.yaml to http/cves/2021/CVE-2021-40870.yaml
|
2023-05-05 10:35:10 +05:30 |
pussycat0x
|
8458967376
|
Rename cves/2020/CVE-2020-5847.yaml to http/cves/2020/CVE-2020-5847.yaml
|
2023-05-05 10:33:34 +05:30 |
Ritik Chaddha
|
c6c2a0d413
|
Update CVE-2018-13379.yaml
|
2023-05-05 00:05:34 +05:30 |
Ritik Chaddha
|
9f85fbc113
|
Update CVE-2019-19908.yaml
|
2023-05-05 00:04:56 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
dogasantos
|
dfadeb5774
|
fixed false positive produce by the old win.ini regex
|
2023-05-04 14:28:33 -03:00 |
Co5mos
|
c6e1cabcfe
|
Added CVE-2023-2356 Template
|
2023-05-04 20:59:25 +08:00 |
Co5mos
|
c76b0a862a
|
Updated CVE-2022-0678 Template
|
2023-05-04 20:37:18 +08:00 |
Co5mos
|
4565b0a6fe
|
Updated CVE-2022-40879 Template
|
2023-05-04 20:34:45 +08:00 |
myztique
|
e5c97d8319
|
fix regex for win.ini
|
2023-05-03 15:00:00 +02:00 |
sandeep
|
2175d81329
|
removed duplicate key
|
2023-05-02 18:29:30 +05:30 |
sandeep
|
ea116bde6b
|
moving file around
|
2023-05-02 18:24:56 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
sandeep
|
a470c2a150
|
Merge remote-tracking branch 'origin' into add-max-request
|
2023-05-02 17:52:27 +05:30 |
Dhiyaneshwaran
|
5d204637bd
|
Update CVE-2017-17731.yaml
|
2023-05-02 16:39:12 +05:30 |
Dhiyaneshwaran
|
3a0ceae738
|
fix
|
2023-05-02 16:29:15 +05:30 |
Prince Chaddha
|
59ac982c42
|
Create CVE-2019-3398.yaml
|
2023-05-01 17:54:05 +05:30 |
Prince Chaddha
|
d6d8d9f4ae
|
Merge branch 'main' into patch-23
|
2023-05-01 09:07:54 +05:30 |
Prince Chaddha
|
966d37b02e
|
updated template path and protocol name
|
2023-05-01 09:07:12 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
MostInterestingBotInTheWorld
|
a34153eb9c
|
Dashboard Content Enhancements (#7149)
Dashboard Content Enhancements
|
2023-04-28 09:11:35 -04:00 |
Ritik Chaddha
|
392187b67e
|
Merge branch 'main' into CVE-2023-20864
|
2023-04-28 16:17:54 +05:30 |
Dhiyaneshwaran
|
27f30265bd
|
Merge pull request #7126 from projectdiscovery/CVE-2023-27350
PaperCut - Unauthenticated Remote Code Execution CVE-2023-27350
|
2023-04-28 16:01:47 +05:30 |
Dhiyaneshwaran
|
77ee8acc56
|
change to http
|
2023-04-28 15:32:24 +05:30 |
Dhiyaneshwaran
|
00ef22599c
|
Rename cves/2023/CVE-2023-27350.yaml to http/cves/2023/CVE-2023-27350.yaml
|
2023-04-28 15:32:02 +05:30 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
pussycat0x
|
dd2b93a095
|
Merge pull request #7145 from projectdiscovery/CVE-2023-29489
Create CVE-2023-29489.yaml
|
2023-04-28 13:18:18 +05:30 |
pussycat0x
|
474f99f7c4
|
Rename CVE-2023-29489.yaml to CVE-2023-29489.yaml
|
2023-04-28 13:15:11 +05:30 |
pussycat0x
|
f04bd2658b
|
Merge pull request #7150 from Co5mos/CVE-2023-1671
Added CVE-2023-1671 Template
|
2023-04-28 10:40:31 +05:30 |
j4vaovo
|
ca0b9665cd
|
Create CVE-2017-17731.yaml
|
2023-04-28 08:53:23 +08:00 |
Dhiyaneshwaran
|
658575fb02
|
Merge pull request #5520 from edoardottt/CVE-2020-27481
Add CVE-2020-27481
|
2023-04-27 23:10:11 +05:30 |
Dhiyaneshwaran
|
38514e4bd1
|
Update and rename cves/2020/CVE-2020-27481.yaml to http/cves/2020/CVE-2020-27481.yaml
|
2023-04-27 23:06:26 +05:30 |
Dhiyaneshwaran
|
2a363a80a2
|
Update and rename cves/2023/CVE-2023-1671.yaml to http/cves/2023/CVE-2023-1671.yaml
|
2023-04-27 22:45:45 +05:30 |
Ritik Chaddha
|
793b661255
|
Update and rename cves/2023/CVE-2023-20864.yaml to http/cves/2023/CVE-2023-20864.yaml
|
2023-04-27 21:14:42 +05:30 |
pussycat0x
|
795999751e
|
Refactoring the directory structure based on protocols (#7146)
* Refactoring the directory structure based on protocols
* Update CVE-2021-30175.yaml
* lint fix
---------
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
|
2023-04-27 17:01:53 +05:30 |
pussycat0x
|
ada36e744f
|
Refactoring the directory structure based on protocols (#7147)
* @pussycat0x Refactoring the directory structure based on protocols
* Update CVE-2023-29922.yaml
|
2023-04-27 17:01:18 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |