Ritik Chaddha
|
46216ecb38
|
updated payload and matcher
|
2023-06-16 23:34:10 +05:30 |
Dhiyaneshwaran
|
b3049352d7
|
added os command
|
2023-06-16 23:04:40 +05:30 |
Dhiyaneshwaran
|
a68f1ce11d
|
Create CVE-2023-34960.yaml
|
2023-06-16 22:42:10 +05:30 |
Dhiyaneshwaran
|
c4a8a6bd84
|
fix formatting
|
2023-06-16 21:44:16 +05:30 |
东方有鱼名为咸
|
33ebc314b7
|
Create CVE-2023-23333.yaml
|
2023-06-16 07:40:37 -07:00 |
Prince Chaddha
|
5fbc7d5b0a
|
Update CVE-2023-32315.yaml
|
2023-06-16 19:44:13 +05:30 |
Ritik Chaddha
|
455358cbf3
|
Update CVE-2023-0630.yaml
|
2023-06-16 10:02:48 +05:30 |
Dhiyaneshwaran
|
99771c5b5b
|
Create CVE-2023-0630.yaml
|
2023-06-16 05:52:58 +05:30 |
Prince Chaddha
|
083fe1b839
|
added variable
|
2023-06-14 09:28:59 +05:30 |
Prince Chaddha
|
f8e645ae41
|
Updated CVE-2023-20887
|
2023-06-13 23:32:04 +05:30 |
Prince Chaddha
|
d84386101e
|
Updated description
|
2023-06-13 22:08:59 +05:30 |
sandeep
|
0fea720652
|
misc update
|
2023-06-13 21:37:28 +05:30 |
Dhiyaneshwaran
|
4434b9ea15
|
Update CVE-2023-20887.yaml
|
2023-06-13 21:08:36 +05:30 |
SinSinology
|
2963a94e91
|
VMWare vRealize Network Insight pre-authenticated RCE CVE-2023-20887
Technical Details at:
https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/
|
2023-06-13 15:24:50 +01:00 |
pussycat0x
|
68d776d90a
|
Merge pull request #7389 from ruben-condor/improve_cve-2023-1434-template
Updated CVE-2023-1434.yaml template
|
2023-06-12 19:28:04 +05:30 |
pussycat0x
|
457febde96
|
Update CVE-2023-1434.yaml
|
2023-06-12 16:01:17 +05:30 |
Ruben Condor
|
1d0d1edc65
|
Updated CVE-2023-1434.yaml template
|
2023-06-12 12:51:29 +03:00 |
pussycat0x
|
d62e939929
|
Merge pull request #7364 from projectdiscovery/CVE-2023-25157
Create CVE-2023-25157.yaml
|
2023-06-10 00:39:01 +05:30 |
Ritik Chaddha
|
f4cd0f5f84
|
added timeout
|
2023-06-09 18:45:43 +05:30 |
Ritik Chaddha
|
093e3a5ace
|
Update CVE-2023-1671.yaml
|
2023-06-09 17:54:34 +05:30 |
J4vaovo
|
f5c84f0756
|
Update CVE-2023-1671.yaml
|
2023-06-09 18:56:06 +08:00 |
Ritik Chaddha
|
27e9cf2e56
|
updated matcher
|
2023-06-07 11:56:24 +05:30 |
Dhiyaneshwaran
|
2892115497
|
minor update
|
2023-06-07 11:42:54 +05:30 |
Ritik Chaddha
|
1be29c9df3
|
Create CVE-2023-25157.yaml
|
2023-06-07 11:28:03 +05:30 |
Dhiyaneshwaran
|
e1f9a21da7
|
Merge pull request #7320 from ruben-condor/add-reference-and-classification-and-fix-param
Updated CVE-2023-1434
|
2023-06-05 15:37:05 +05:30 |
Ritik Chaddha
|
bd9ed6c939
|
updated metadata & matchers
|
2023-06-05 13:06:58 +05:30 |
Prince Chaddha
|
ffc66c4bd8
|
templates added
|
2023-06-05 12:33:16 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
sandeep
|
8b8b17abad
|
proto update
|
2023-06-03 21:54:59 +05:30 |
Ritik Chaddha
|
50c1b85db4
|
lint fix
|
2023-06-02 23:48:50 +05:30 |
Ritik Chaddha
|
c95a64a9e0
|
update metadata
|
2023-06-02 23:47:11 +05:30 |
Ritik Chaddha
|
dd68f47ae2
|
Create CVE-2023-1362.yaml
|
2023-06-02 23:45:08 +05:30 |
pussycat0x
|
cc0a79a58a
|
Merge pull request #7334 from projectdiscovery/CVE-2023-32315
CVE-2023-32315 [Administration Console authentication bypass in Openf…
|
2023-06-01 14:51:00 +05:30 |
Prince Chaddha
|
c4480b5817
|
updated name
|
2023-06-01 14:19:59 +05:30 |
Dhiyaneshwaran
|
495a5a2ebc
|
CVE-2023-32315 [Administration Console authentication bypass in Openfire]
|
2023-06-01 09:58:48 +05:30 |
Dhiyaneshwaran
|
9ef7e9adb3
|
CVE-2023-27482: Authentication Bypass in Home Assistant
|
2023-06-01 08:41:00 +05:30 |
Ruben Condor
|
d74b4974ff
|
Updated CVE-2023-1434
|
2023-05-30 15:41:56 +03:00 |
Dhiyaneshwaran
|
9c885b5aa9
|
Merge branch 'main' into add-description-and-classification-to-CVE-2023-29489
|
2023-05-30 15:27:57 +05:30 |
Dhiyaneshwaran
|
6e7fd66a1d
|
minor update
|
2023-05-30 15:27:27 +05:30 |
Ruben Condor
|
d51aaf2cbc
|
Updated CVE-2023-29489.yaml
|
2023-05-30 12:14:58 +03:00 |
Ritik Chaddha
|
a052de6ad8
|
updated info
|
2023-05-29 23:31:22 +05:30 |
Dhiyaneshwaran
|
6743175d2a
|
Create CVE-2023-2825.yaml
|
2023-05-29 14:06:11 +05:30 |
Dhiyaneshwaran
|
3fe76969b9
|
Merge pull request #7177 from Co5mos/CVE-2023-2356
Added CVE-2023-2356 Template
|
2023-05-26 18:57:33 +05:30 |
pussycat0x
|
1822b88c6c
|
Merge pull request #7259 from For3stCo1d/CVE-2023-29919
Create CVE-2023-29919.yaml
|
2023-05-26 18:48:23 +05:30 |
Ritik Chaddha
|
0e920947fe
|
Merge pull request #7298 from projectdiscovery/CVE-2023-2732
Create CVE-2023-2732.yaml [MStore API <= 3.9.2 - Authentication Bypass] 🔥
|
2023-05-26 18:10:37 +05:30 |
Ritik Chaddha
|
c59cf8fdcd
|
updated info
|
2023-05-26 18:08:02 +05:30 |
Ritik Chaddha
|
ac5643eaa8
|
updated info
|
2023-05-26 18:06:10 +05:30 |
Dhiyaneshwaran
|
891c8603e3
|
trail space fix
|
2023-05-26 15:07:05 +05:30 |
Dhiyaneshwaran
|
d26375a3b9
|
print password
|
2023-05-26 15:04:36 +05:30 |
Dhiyaneshwaran
|
8be63f6c2b
|
using single password variable
|
2023-05-26 13:18:20 +05:30 |
Dhiyaneshwaran
|
7cec666668
|
Create CVE-2023-32243.yaml [WordPress Elementor Lite 5.7.1 Arbitrary Password Reset]
|
2023-05-26 13:04:37 +05:30 |
Dhiyaneshwaran
|
b65534983f
|
Create CVE-2023-2732.yaml [MStore API <= 3.9.2 - Authentication Bypass]
|
2023-05-26 12:05:31 +05:30 |
Ritik Chaddha
|
83a7341f0a
|
lint fix
|
2023-05-24 23:42:07 +05:30 |
Ritik Chaddha
|
355f7a74b8
|
Create CVE-2023-29887.yaml
|
2023-05-24 23:38:59 +05:30 |
pussycat0x
|
717a7410d9
|
severity & name -updated
|
2023-05-23 12:02:34 +05:30 |
pussycat0x
|
591d8e8417
|
payload - update
|
2023-05-23 11:37:05 +05:30 |
pussycat0x
|
afe04d410f
|
minor - update
|
2023-05-23 11:23:52 +05:30 |
Prince Chaddha
|
3a39ab47a4
|
Create CVE-2023-2780.yaml
|
2023-05-22 15:56:58 +05:30 |
Ritik Chaddha
|
b0423d9742
|
updated matcher
|
2023-05-19 23:23:25 +05:30 |
Ritik Chaddha
|
c73d1953d3
|
updated matchers & info
|
2023-05-19 20:01:16 +05:30 |
For3stCo1d
|
602e6fc707
|
Create CVE-2023-29919.yaml
|
2023-05-19 19:50:08 +08:00 |
Ritik Chaddha
|
b5d13559ad
|
updated weak matcher
|
2023-05-18 19:22:06 +05:30 |
Dhiyaneshwaran
|
c46ceae0c9
|
Create CVE-2023-1434.yaml
|
2023-05-17 10:55:25 +05:30 |
Dhiyaneshwaran
|
1d7fcc0835
|
Merge pull request #7229 from For3stCo1d/main
Create CVE-2023-29923.yaml
|
2023-05-17 02:02:02 +05:30 |
Dhiyaneshwaran
|
ac582dee31
|
minor update
|
2023-05-17 01:59:24 +05:30 |
pussycat0x
|
f8bc85cf54
|
metadata -update
|
2023-05-16 00:12:48 +05:30 |
For3stCo1d
|
952574402d
|
Create CVE-2023-29923.yaml
|
2023-05-14 11:14:15 +08:00 |
Ritik Chaddha
|
bffcfa759b
|
Merge branch 'main' into cve
|
2023-05-13 20:07:47 +05:30 |
Ritik Chaddha
|
992cc24928
|
updated matchers & info
|
2023-05-12 23:59:05 +05:30 |
Ritik Chaddha
|
7ba454c962
|
updated matcher & info
|
2023-05-12 23:13:42 +05:30 |
GitHub Action
|
1c5197c6f7
|
Auto Generated CVE annotations [Thu May 11 13:27:36 UTC 2023] 🤖
|
2023-05-11 13:27:36 +00:00 |
Dhiyaneshwaran
|
00c8c71457
|
Merge pull request #7204 from projectdiscovery/parthmalhotra-cve
Create CVE-2023-31059.yaml
|
2023-05-11 07:28:37 +05:30 |
pussycat0x
|
b4413bd369
|
Merge pull request #7205 from projectdiscovery/CVE-2023-25135
Create CVE-2023-25135.yaml
|
2023-05-10 20:47:40 +05:30 |
pussycat0x
|
34cbb997e0
|
Update CVE-2023-25135.yaml
|
2023-05-10 20:46:40 +05:30 |
pussycat0x
|
8de6c0cb81
|
Update CVE-2023-25135.yaml
|
2023-05-10 20:45:19 +05:30 |
pussycat0x
|
36819b63eb
|
minor -update
|
2023-05-10 20:43:56 +05:30 |
pussycat0x
|
dc3180fd24
|
protocol -update
|
2023-05-10 19:14:55 +05:30 |
Dhiyaneshwaran
|
cba7f8b5e5
|
changing from system to var_dump
|
2023-05-10 17:51:16 +05:30 |
Dhiyaneshwaran
|
68828dd492
|
Merge pull request #7183 from projectdiscovery/cve-templates1
CVE templates added
|
2023-05-10 01:09:21 +05:30 |
pussycat0x
|
58f7db754f
|
protocol-update
|
2023-05-10 01:00:43 +05:30 |
Dhiyaneshwaran
|
b3dc6cf70a
|
change in query
|
2023-05-09 22:42:10 +05:30 |
Dhiyaneshwaran
|
f2890ae2fa
|
Create CVE-2023-25135.yaml
|
2023-05-09 22:10:11 +05:30 |
pussycat0x
|
e27cde97f6
|
protocol update
|
2023-05-09 21:46:34 +05:30 |
Parth Malhotra
|
777f1efbc1
|
Update CVE-2023-31059.yaml
|
2023-05-09 21:42:39 +05:30 |
Parth Malhotra
|
1baf108a3f
|
Update CVE-2023-31059.yaml
|
2023-05-09 21:38:13 +05:30 |
Parth Malhotra
|
cdfe62741d
|
Create CVE-2023-31059.yaml
|
2023-05-09 21:35:10 +05:30 |
Parth Malhotra
|
6ef29cb29e
|
Create CVE-2023-31059.yaml
|
2023-05-09 21:30:06 +05:30 |
sandeep
|
c59974226f
|
strict dsl matcher with addition check
|
2023-05-09 18:40:00 +05:30 |
Sandeep Singh
|
6addff3ac6
|
misc syntax fixes (#7201)
|
2023-05-09 18:13:13 +05:30 |
Parth Malhotra
|
0450d1224f
|
Create CVE-2023-25717.yaml
|
2023-05-09 18:05:28 +05:30 |
pussycat0x
|
68a1ea89e0
|
Update CVE-2023-26360.yaml
|
2023-05-09 16:51:33 +05:30 |
Dhiyaneshwaran
|
5c3ef6fa06
|
fix trail space
|
2023-05-09 15:07:07 +05:30 |
Dhiyaneshwaran
|
cb9fce3f99
|
Create CVE-2023-26360.yaml
|
2023-05-09 15:03:18 +05:30 |
Ritik Chaddha
|
a4f51aca8f
|
updated info
|
2023-05-08 13:08:31 +05:30 |
sandeep
|
dd953b4706
|
Added spm + shodan query
|
2023-05-08 12:58:19 +05:30 |
Co5mos
|
ed206e5c27
|
Update CVE-2023-2356 Template
|
2023-05-08 15:12:08 +08:00 |
j3ssie
|
b89dee6aae
|
Path Traversal in Ghost CMS < 5.42.1
|
2023-05-08 13:27:57 +07:00 |
Prince Chaddha
|
124b2230cf
|
templates added
|
2023-05-06 17:42:20 +05:30 |
pussycat0x
|
4660c9abf3
|
lint -fix
|
2023-05-05 16:48:47 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
Co5mos
|
c6e1cabcfe
|
Added CVE-2023-2356 Template
|
2023-05-04 20:59:25 +08:00 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
MostInterestingBotInTheWorld
|
a34153eb9c
|
Dashboard Content Enhancements (#7149)
Dashboard Content Enhancements
|
2023-04-28 09:11:35 -04:00 |
Ritik Chaddha
|
392187b67e
|
Merge branch 'main' into CVE-2023-20864
|
2023-04-28 16:17:54 +05:30 |
Dhiyaneshwaran
|
27f30265bd
|
Merge pull request #7126 from projectdiscovery/CVE-2023-27350
PaperCut - Unauthenticated Remote Code Execution CVE-2023-27350
|
2023-04-28 16:01:47 +05:30 |
Dhiyaneshwaran
|
77ee8acc56
|
change to http
|
2023-04-28 15:32:24 +05:30 |
Dhiyaneshwaran
|
00ef22599c
|
Rename cves/2023/CVE-2023-27350.yaml to http/cves/2023/CVE-2023-27350.yaml
|
2023-04-28 15:32:02 +05:30 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
pussycat0x
|
dd2b93a095
|
Merge pull request #7145 from projectdiscovery/CVE-2023-29489
Create CVE-2023-29489.yaml
|
2023-04-28 13:18:18 +05:30 |
pussycat0x
|
474f99f7c4
|
Rename CVE-2023-29489.yaml to CVE-2023-29489.yaml
|
2023-04-28 13:15:11 +05:30 |
pussycat0x
|
f04bd2658b
|
Merge pull request #7150 from Co5mos/CVE-2023-1671
Added CVE-2023-1671 Template
|
2023-04-28 10:40:31 +05:30 |
Dhiyaneshwaran
|
2a363a80a2
|
Update and rename cves/2023/CVE-2023-1671.yaml to http/cves/2023/CVE-2023-1671.yaml
|
2023-04-27 22:45:45 +05:30 |
Ritik Chaddha
|
793b661255
|
Update and rename cves/2023/CVE-2023-20864.yaml to http/cves/2023/CVE-2023-20864.yaml
|
2023-04-27 21:14:42 +05:30 |
pussycat0x
|
ada36e744f
|
Refactoring the directory structure based on protocols (#7147)
* @pussycat0x Refactoring the directory structure based on protocols
* Update CVE-2023-29922.yaml
|
2023-04-27 17:01:18 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |