MostInterestingBotInTheWorld
2af991eaac
Enhancement: cves/2021/CVE-2021-1497.yaml by cs ( #3716 )
2022-02-16 11:11:34 -05:00
MostInterestingBotInTheWorld
96c39def37
Dashboard updates ( #3714 )
...
Text cleanup
2022-02-16 10:24:56 -05:00
Prince Chaddha
627ef6412e
Update mongodb-unauth.yaml ( #3712 )
...
* Update mongodb-unauth.yaml
* Update CVE-2020-11110.yaml
* Update CVE-2020-11110.yaml
2022-02-16 18:03:09 +05:30
MostInterestingBotInTheWorld
e5e0e1ebf4
Dashboard Content Enhancements ( #3711 )
...
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1340.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1315.yaml by mp
* Enhancement: cves/2010/CVE-2010-1314.yaml by mp
* Enhancement: cves/2010/CVE-2010-1313.yaml by mp
* Enhancement: cves/2010/CVE-2010-1312.yaml by mp
* Enhancement: cves/2010/CVE-2010-1308.yaml by mp
* Enhancement: cves/2010/CVE-2010-1307.yaml by mp
* Enhancement: cves/2010/CVE-2010-1306.yaml by mp
* Enhancement: cves/2010/CVE-2010-1305.yaml by mp
* Enhancement: cves/2010/CVE-2010-1304.yaml by mp
* Enhancement: cves/2010/CVE-2010-1302.yaml by mp
* Enhancement: cves/2010/CVE-2010-1219.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1354.yaml by mp
* Enhancement: cves/2010/CVE-2010-1461.yaml by mp
* Enhancement: cves/2010/CVE-2010-1469.yaml by mp
* Enhancement: cves/2010/CVE-2010-1470.yaml by mp
* Enhancement: cves/2010/CVE-2010-1471.yaml by mp
* Enhancement: cves/2010/CVE-2010-1472.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1476.yaml by mp
* Enhancement: cves/2010/CVE-2010-1478.yaml by mp
* Enhancement: cves/2010/CVE-2010-1491.yaml by mp
* Enhancement: cves/2010/CVE-2010-1494.yaml by mp
* Enhancement: cves/2010/CVE-2010-1495.yaml by mp
* Enhancement: cves/2010/CVE-2010-1531.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: cves/2016/CVE-2016-4975.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-digitalocean.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-hetzner.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-aws.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-google.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-azure.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-localhost.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-internal.yaml by cs
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Spacing fixes and enhancement to CNVD-2019-01348.yaml
* Spacing fixes, and enhancement to CNVD-2019-01348.yaml
* Merge artifact
* Spacing
* Minor tags cleanup
* Enhancement: cves/2010/CVE-2010-1532.yaml by mp
* Enhancement: cves/2010/CVE-2010-1533.yaml by mp
* Enhancement: cves/2010/CVE-2010-1534.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: cves/2010/CVE-2010-1540.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1603.yaml by mp
* Enhancement: cves/2010/CVE-2010-1607.yaml by mp
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2010/CVE-2010-1657.yaml by mp
* Enhancement: cves/2010/CVE-2010-1657.yaml by mp
* Enhancement: cves/2010/CVE-2010-1658.yaml by mp
* Enhancement: cves/2010/CVE-2010-1659.yaml by mp
* Enhancement: cves/2010/CVE-2010-1714.yaml by mp
* Enhancement: cves/2010/CVE-2010-1715.yaml by mp
* Enhancement: cves/2010/CVE-2010-1532.yaml by mp
* Enhancement: cves/2010/CVE-2010-1533.yaml by mp
* Enhancement: cves/2010/CVE-2010-1534.yaml by mp
* Enhancement: cves/2010/CVE-2010-1534.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: cves/2010/CVE-2010-1540.yaml by mp
* Enhancement: cves/2010/CVE-2010-1540.yaml by mp
* Enhancement: cves/2010/CVE-2010-1717.yaml by mp
* Enhancement: cves/2010/CVE-2010-1718.yaml by mp
* Enhancement: cves/2010/CVE-2010-1719.yaml by mp
* Enhancement: cves/2010/CVE-2010-1722.yaml by mp
* Enhancement: cves/2010/CVE-2010-1723.yaml by mp
* Enhancement: cves/2010/CVE-2010-1858.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Enhancement: cves/2010/CVE-2010-1952.yaml by mp
* Enhancement: cves/2010/CVE-2010-1953.yaml by mp
* Enhancement: cves/2010/CVE-2010-1954.yaml by mp
* Enhancement: cves/2010/CVE-2010-1955.yaml by mp
* Enhancement: cves/2010/CVE-2010-1956.yaml by mp
* Information Enhancements
Co-authored-by: sullo <sullo@cirt.net>
2022-02-16 04:17:54 +05:30
MostInterestingBotInTheWorld
25938bc625
Dashboard ( #3706 )
...
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1340.yaml by mp
* Enhancement: cves/2010/CVE-2010-1345.yaml by mp
* Enhancement: cves/2010/CVE-2010-1315.yaml by mp
* Enhancement: cves/2010/CVE-2010-1314.yaml by mp
* Enhancement: cves/2010/CVE-2010-1313.yaml by mp
* Enhancement: cves/2010/CVE-2010-1312.yaml by mp
* Enhancement: cves/2010/CVE-2010-1308.yaml by mp
* Enhancement: cves/2010/CVE-2010-1307.yaml by mp
* Enhancement: cves/2010/CVE-2010-1306.yaml by mp
* Enhancement: cves/2010/CVE-2010-1305.yaml by mp
* Enhancement: cves/2010/CVE-2010-1304.yaml by mp
* Enhancement: cves/2010/CVE-2010-1302.yaml by mp
* Enhancement: cves/2010/CVE-2010-1219.yaml by mp
* Enhancement: cves/2010/CVE-2010-1352.yaml by mp
* Enhancement: cves/2010/CVE-2010-1354.yaml by mp
* Enhancement: cves/2010/CVE-2010-1461.yaml by mp
* Enhancement: cves/2010/CVE-2010-1469.yaml by mp
* Enhancement: cves/2010/CVE-2010-1470.yaml by mp
* Enhancement: cves/2010/CVE-2010-1471.yaml by mp
* Enhancement: cves/2010/CVE-2010-1472.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1476.yaml by mp
* Enhancement: cves/2010/CVE-2010-1478.yaml by mp
* Enhancement: cves/2010/CVE-2010-1491.yaml by mp
* Enhancement: cves/2010/CVE-2010-1494.yaml by mp
* Enhancement: cves/2010/CVE-2010-1495.yaml by mp
* Enhancement: cves/2010/CVE-2010-1531.yaml by mp
* Enhancement: cves/2010/CVE-2010-1473.yaml by mp
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: cves/2016/CVE-2016-4975.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-digitalocean.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-hetzner.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-aws.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-google.yaml by cs
* Enhancement: misconfiguration/proxy/metadata-azure.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-localhost.yaml by cs
* Enhancement: misconfiguration/proxy/open-proxy-internal.yaml by cs
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs
* Spacing fixes and enhancement to CNVD-2019-01348.yaml
* Spacing fixes, and enhancement to CNVD-2019-01348.yaml
* Merge artifact
* Spacing
Co-authored-by: sullo <sullo@cirt.net>
2022-02-15 11:39:56 +05:30
Prince Chaddha
553f5ca066
Create CVE-2019-3911.yaml
2022-02-15 02:26:46 +05:30
Prince Chaddha
bb8a7f72c2
Update and rename CVE-2019-3912.yaml to cves/2019/CVE-2019-3912.yaml
2022-02-15 02:23:56 +05:30
Sandeep Singh
99c131b1a6
Added Cobbler provisioning server Templates ( #3698 )
...
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>
Co-authored-by: csh <25989137+c-sh0@users.noreply.github.com>
2022-02-14 22:50:32 +05:30
sullo
8a41b2089d
Merge pull request #3702 from MostInterestingBotInTheWorld/dashboard
...
Dashboard Enhancements
2022-02-14 09:45:52 -05:00
MostInterestingBotInTheWorld
cba90f9708
Enhancement: cves/2009/CVE-2009-5114.yaml by mp
2022-02-14 09:36:39 -05:00
cckuailong
5e5d294656
add CVE-2022-23808 ( #3697 )
...
* add CVE-2022-23808
* Update CVE-2022-23808.yaml
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-14 17:13:04 +05:30
MostInterestingBotInTheWorld
c9df09e2a3
Enhancement: cves/2010/CVE-2010-0157.yaml by mp
2022-02-13 14:21:30 -05:00
MostInterestingBotInTheWorld
f491d02c42
Enhancement: cves/2010/CVE-2010-0696.yaml by mp
2022-02-13 14:19:55 -05:00
MostInterestingBotInTheWorld
c7bce4d2d3
Enhancement: cves/2010/CVE-2010-0759.yaml by mp
2022-02-13 14:18:26 -05:00
MostInterestingBotInTheWorld
6d6cbc1216
Enhancement: cves/2010/CVE-2010-0943.yaml by mp
2022-02-13 14:15:26 -05:00
MostInterestingBotInTheWorld
a583330479
Enhancement: cves/2010/CVE-2010-0944.yaml by mp
2022-02-13 14:15:03 -05:00
MostInterestingBotInTheWorld
26c451c134
Enhancement: cves/2010/CVE-2010-0972.yaml by mp
2022-02-13 14:14:38 -05:00
MostInterestingBotInTheWorld
d1f6e4eb4f
Enhancement: cves/2010/CVE-2010-0982.yaml by mp
2022-02-13 14:14:15 -05:00
MostInterestingBotInTheWorld
164441c7da
Enhancement: cves/2010/CVE-2010-0985.yaml by mp
2022-02-13 14:13:54 -05:00
MostInterestingBotInTheWorld
13bf169c97
Enhancement: cves/2010/CVE-2010-1056.yaml by mp
2022-02-13 14:13:27 -05:00
MostInterestingBotInTheWorld
6e01cbd897
Enhancement: cves/2010/CVE-2010-1081.yaml by mp
2022-02-13 14:12:38 -05:00
MostInterestingBotInTheWorld
26224a7225
Enhancement: cves/2009/CVE-2009-5020.yaml by mp
2022-02-13 14:11:52 -05:00
MostInterestingBotInTheWorld
b87cee2c93
Enhancement: cves/2010/CVE-2010-1217.yaml by mp
2022-02-13 14:11:30 -05:00
MostInterestingBotInTheWorld
d7eba0c0ca
Enhancement: cves/2010/CVE-2010-0942.yaml by mp
2022-02-13 14:10:18 -05:00
MostInterestingBotInTheWorld
bcac161f98
Enhancement: cves/2010/CVE-2010-0943.yaml by mp
2022-02-13 14:08:26 -05:00
MostInterestingBotInTheWorld
dfb8cb5a84
Enhancement: cves/2010/CVE-2010-0944.yaml by mp
2022-02-13 14:07:21 -05:00
MostInterestingBotInTheWorld
92dfa1db78
Enhancement: cves/2010/CVE-2010-0972.yaml by mp
2022-02-13 14:06:12 -05:00
MostInterestingBotInTheWorld
88011b84f6
Enhancement: cves/2010/CVE-2010-0982.yaml by mp
2022-02-13 14:02:49 -05:00
MostInterestingBotInTheWorld
985eaa965f
Enhancement: cves/2010/CVE-2010-0985.yaml by mp
2022-02-13 14:00:50 -05:00
MostInterestingBotInTheWorld
47f04d2dbb
Enhancement: cves/2010/CVE-2010-0467.yaml by mp
2022-02-13 14:00:17 -05:00
MostInterestingBotInTheWorld
b0279dec53
Enhancement: cves/2010/CVE-2010-1217.yaml by mp
2022-02-13 13:59:50 -05:00
MostInterestingBotInTheWorld
dad3e7fdb0
Enhancement: cves/2010/CVE-2010-1056.yaml by mp
2022-02-13 13:59:14 -05:00
MostInterestingBotInTheWorld
c14ce846f6
Enhancement: cves/2010/CVE-2010-0985.yaml by mp
2022-02-13 13:58:29 -05:00
MostInterestingBotInTheWorld
09bee5b5c0
Enhancement: cves/2010/CVE-2010-1056.yaml by mp
2022-02-13 13:52:07 -05:00
MostInterestingBotInTheWorld
5f7bddc723
Enhancement: cves/2010/CVE-2010-1081.yaml by mp
2022-02-13 13:44:39 -05:00
MostInterestingBotInTheWorld
0e270b6056
Enhancement: cves/2010/CVE-2010-1217.yaml by mp
2022-02-13 13:39:45 -05:00
MostInterestingBotInTheWorld
9c34ef53ee
Enhancement: cves/2009/CVE-2009-5020.yaml by mp
2022-02-13 13:32:21 -05:00
MostInterestingBotInTheWorld
e7a139a643
Enhancement: cves/2010/CVE-2010-0467.yaml by mp
2022-02-13 13:29:25 -05:00
MostInterestingBotInTheWorld
dad31054f7
Enhancement: cves/2010/CVE-2010-0759.yaml by mp
2022-02-13 13:27:39 -05:00
GitHub Action
3b86b8839e
Auto Generated CVE annotations [Sat Feb 12 11:46:39 UTC 2022] 🤖
2022-02-12 11:46:39 +00:00
Prince Chaddha
b377c3e653
Create CVE-2019-10758.yaml
2022-02-11 03:01:25 +05:30
GitHub Action
d17459293f
Auto Generated CVE annotations [Thu Feb 10 16:36:08 UTC 2022] 🤖
2022-02-10 16:36:08 +00:00
Prince Chaddha
1ede3e0c36
Update CVE-2018-18925.yaml
2022-02-10 12:20:55 +05:30
Prince Chaddha
eecdd52b8c
Create CVE-2018-18925.yaml
2022-02-10 02:10:54 +05:30
GitHub Action
c548ca9f59
Auto Generated CVE annotations [Wed Feb 9 19:42:28 UTC 2022] 🤖
2022-02-09 19:42:28 +00:00
Prince Chaddha
c065716a94
Merge pull request #3672 from pikpikcu/patch-321
...
Create CVE-2022-0432
2022-02-10 01:10:52 +05:30
Prince Chaddha
f8a31448f9
Update CVE-2022-0432.yaml
2022-02-10 01:06:59 +05:30
Prince Chaddha
9e26df67b3
Update CVE-2022-0432.yaml
2022-02-10 00:58:51 +05:30
sullo
4cf3791eb3
Merge pull request #3686 from MostInterestingBotInTheWorld/dashboard
...
Dashboard Updates: Multiple content enhancements
2022-02-08 17:07:01 -05:00
sullo
a459b22355
Duplicate comment
2022-02-08 17:03:36 -05:00
Prince Chaddha
c19dcd5c2a
Merge pull request #3683 from cckuailong/master
...
add some wp plugins cves
2022-02-09 01:39:00 +05:30
sullo
db88cd41e9
Remove duplicate enchanced tag
2022-02-08 14:39:21 -05:00
Prince Chaddha
ba7c71e081
Update CVE-2021-24488.yaml
2022-02-09 00:57:33 +05:30
Prince Chaddha
ce903c73f2
Update CVE-2021-24947.yaml
2022-02-09 00:55:00 +05:30
Prince Chaddha
b64401ab02
Update CVE-2021-25052.yaml
2022-02-09 00:53:44 +05:30
Prince Chaddha
4fe9243d9d
Update CVE-2021-25008.yaml
2022-02-09 00:49:53 +05:30
Prince Chaddha
4fea6b14f4
Update CVE-2021-24991.yaml
2022-02-09 00:42:32 +05:30
Prince Chaddha
81a4316d2e
Update CVE-2021-24947.yaml
2022-02-09 00:38:33 +05:30
Prince Chaddha
2d3240a98f
Update CVE-2021-24926.yaml
2022-02-09 00:36:16 +05:30
Prince Chaddha
a167a69be6
Update CVE-2021-24488.yaml
2022-02-09 00:32:39 +05:30
Prince Chaddha
1dc5ff098a
Update CVE-2021-24300.yaml
2022-02-09 00:19:44 +05:30
Prince Chaddha
8664885b45
Update CVE-2020-35749.yaml
2022-02-09 00:13:40 +05:30
Prince Chaddha
a657179cf2
Merge pull request #3667 from projectdiscovery/wp-templates
...
Moving authenticated wp templates from issues
2022-02-09 00:07:52 +05:30
Prince Chaddha
ce2d45b355
Update CVE-2021-24510.yaml
2022-02-08 23:59:45 +05:30
Prince Chaddha
49c2f2816a
Update CVE-2021-34640.yaml
2022-02-08 23:59:30 +05:30
Prince Chaddha
495ca9dc6c
Update CVE-2021-20792.yaml
2022-02-08 23:56:17 +05:30
Prince Chaddha
5519bd7d67
Update CVE-2021-34643.yaml
2022-02-08 23:50:44 +05:30
Prince Chaddha
eb324d24f4
Update CVE-2021-39322.yaml
2022-02-08 23:46:35 +05:30
MostInterestingBotInTheWorld
9f550a29ef
Enhancement: cves/2021/CVE-2021-37538.yaml by mp
2022-02-08 11:46:14 -05:00
MostInterestingBotInTheWorld
be25d5139e
Enhancement: cves/2018/CVE-2018-17254.yaml by mp
2022-02-08 11:43:22 -05:00
MostInterestingBotInTheWorld
35bcf2e361
Enhancement: cves/2021/CVE-2021-42237.yaml by mp
2022-02-08 11:40:30 -05:00
MostInterestingBotInTheWorld
2ab1c4cacc
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-08 11:36:43 -05:00
cckuailong
f29d2b20df
add some wp plugins cves
2022-02-08 09:07:19 +08:00
Prince Chaddha
389089d63c
Merge pull request #3668 from Akokonunes/patch-113
...
Create CVE-2020-12447.yaml
2022-02-08 00:37:11 +05:30
Prince Chaddha
4e00ba83f3
Update and rename CVE-2020-12447.yaml to cves/2020/CVE-2020-12447.yaml
2022-02-08 00:35:52 +05:30
GitHub Action
5ac042a7e5
Auto Generated CVE annotations [Mon Feb 7 18:59:32 UTC 2022] 🤖
2022-02-07 18:59:32 +00:00
Prince Chaddha
c7c1b73838
Merge pull request #3666 from projectdiscovery/CVE-2018-7602
...
Create CVE-2018-7602.yaml
2022-02-08 00:28:09 +05:30
Prince Chaddha
9d08d34ccc
Merge pull request #3653 from cckuailong/master
...
add CVE-2016-10940 (The zm-gallery plugin 1.0 for WordPress SQLI)
2022-02-08 00:27:48 +05:30
sullo
ee235ad8e6
Extraneous comment
2022-02-07 09:01:46 -05:00
sullo
9a48be8608
Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard
2022-02-07 09:00:59 -05:00
sullo
929f8e0f64
Merge pull request #3665 from MostInterestingBotInTheWorld/dashboard
...
Enhancements: Various text cleanups
2022-02-07 09:00:27 -05:00
GitHub Action
94ac089ed7
Auto Generated CVE annotations [Sun Feb 6 18:32:16 UTC 2022] 🤖
2022-02-06 18:32:16 +00:00
sandeep
574acfaddc
minor template update
2022-02-06 23:59:47 +05:30
PikPikcU
0d5e0e891d
Update CVE-2022-0378.yaml
2022-02-06 05:18:24 -05:00
PikPikcU
0d311a72c3
Update CVE-2022-0281.yaml
2022-02-06 05:17:40 -05:00
cckuailong
4ab6524b2b
Merge branch 'projectdiscovery:master' into master
2022-02-06 17:28:15 +08:00
PikPikcU
9e641734a3
Create CVE-2022-0432.yaml
2022-02-06 01:04:17 -05:00
PikPikcU
4f8a0ac62c
Create CVE-2022-0378.yaml
2022-02-06 00:41:20 -05:00
PikPikcU
a12753c7fe
Create CVE-2022-0281.yaml
2022-02-06 00:28:32 -05:00
sullo
45cd5fe80d
Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard
2022-02-04 16:02:58 -05:00
MostInterestingBotInTheWorld
4f497cbd17
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:02:22 -05:00
MostInterestingBotInTheWorld
e124b4333b
Enhancement: cves/2020/CVE-2020-9402.yaml by mp
2022-02-04 16:01:13 -05:00
MostInterestingBotInTheWorld
d7ac754156
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 15:55:59 -05:00
sullo
ef4f6db363
Fix regular expression after bot change
2022-02-04 15:22:52 -05:00
Prince Chaddha
fa45badbeb
Update CVE-2016-10940.yaml
2022-02-05 01:24:10 +05:30
Prince Chaddha
bbd80d10d4
Update CVE-2016-10940.yaml
2022-02-05 01:20:21 +05:30
MostInterestingBotInTheWorld
50d9f0b4f1
Enhancement: cves/2019/CVE-2019-13462.yaml by mp
2022-02-04 14:39:08 -05:00
Prince Chaddha
71abfd0939
Update CVE-2021-24510.yaml
2022-02-05 01:05:57 +05:30
MostInterestingBotInTheWorld
a3d83420ac
Enhancement: cves/2020/CVE-2020-14882.yaml by mp
2022-02-04 14:29:39 -05:00
Prince Chaddha
1be67200cb
Create CVE-2021-39322.yaml
2022-02-05 00:51:50 +05:30
Prince Chaddha
96b7380c80
Create CVE-2021-34643.yaml
2022-02-05 00:50:43 +05:30
Prince Chaddha
9a702c2c16
Create CVE-2021-34640.yaml
2022-02-05 00:49:25 +05:30
Prince Chaddha
d4b4e69752
Create CVE-2021-24510.yaml
2022-02-05 00:48:10 +05:30
Prince Chaddha
dbfa7efae0
Create CVE-2021-20792.yaml
2022-02-05 00:46:00 +05:30
Prince Chaddha
0832f09ea7
Create CVE-2018-7602.yaml
2022-02-05 00:39:58 +05:30
sullo
8461d21658
Remove trailing spaces
2022-02-04 14:09:21 -05:00
sullo
111f7d9a88
Cleanup some dashboard artifacts
2022-02-04 14:02:53 -05:00
sullo
e7bd6a2129
Remove space before EOL in CVE-2019-12725.yaml
2022-02-04 13:59:21 -05:00
Prince Chaddha
685495df91
Update CVE-2021-20158.yaml
2022-02-04 23:31:10 +05:30
GwanYeong Kim
fcc39f52ee
Create CVE-2021-20158.yaml
...
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicous actor to force the change of the admin password due to a hidden administrative command.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-02-05 01:29:16 +09:00
MostInterestingBotInTheWorld
d13fbad151
Enhancement: cves/2019/CVE-2019-12725.yaml by mp
2022-02-04 11:27:18 -05:00
MostInterestingBotInTheWorld
421460c87e
Enhancement: cves/2019/CVE-2019-12725.yaml by mp
2022-02-04 11:25:37 -05:00
MostInterestingBotInTheWorld
811dc2d70e
Enhancement: cves/2021/CVE-2021-26855.yaml by mp
2022-02-04 11:13:25 -05:00
sullo
b25b0448a5
Remove blank lines
2022-02-04 10:27:24 -05:00
MostInterestingBotInTheWorld
ac6002f149
Enhancement: cves/2014/CVE-2014-8682.yaml by mp
2022-02-04 10:18:35 -05:00
MostInterestingBotInTheWorld
bea2ce4d24
Enhancement: cves/2017/CVE-2017-9805.yaml by mp
2022-02-04 10:15:15 -05:00
MostInterestingBotInTheWorld
163ae2f24e
Merge branch 'projectdiscovery:master' into dashboard
2022-02-04 09:19:12 -05:00
cckuailong
3bc20d0d12
Merge branch 'projectdiscovery:master' into master
2022-02-04 10:50:34 +08:00
Prince Chaddha
480dea094b
Update CVE-2021-20150.yaml
2022-02-04 01:20:39 +05:30
Prince Chaddha
f846faa127
Update CVE-2021-20150.yaml
2022-02-04 01:13:30 +05:30
Prince Chaddha
d2e4be88e6
Update CVE-2021-20150.yaml
2022-02-04 01:13:00 +05:30
GwanYeong Kim
bc87c82d9b
Create CVE-2021-20150.yaml
...
Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. Authentication can be bypassed and a user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-02-03 18:06:04 +09:00
Prince Chaddha
ac371405bd
Merge pull request #3650 from Akokonunes/patch-112
...
Create CVE-2020-36365.yaml
2022-02-03 02:45:07 +05:30
Prince Chaddha
42bc941827
Update and rename CVE-2020-36365.yaml to cves/2020/CVE-2020-36365.yaml
2022-02-03 02:39:33 +05:30
Prince Chaddha
99931f2e0b
Merge pull request #3651 from dwisiswant0/add/CVE-2021-32853
...
Add CVE-2021-32853
2022-02-03 02:16:08 +05:30
Prince Chaddha
b023c8206e
Update CVE-2021-32853.yaml
2022-02-03 02:14:21 +05:30
Prince Chaddha
9f63a2f4fb
Update CVE-2021-32853.yaml
2022-02-03 02:06:26 +05:30
Prince Chaddha
110704dd3e
Update CVE-2021-32853.yaml
2022-02-03 02:01:24 +05:30
Prince Chaddha
61ba3a55e4
Update CVE-2016-10940.yaml
2022-02-03 01:24:10 +05:30
Prince Chaddha
9d1782ab06
Merge pull request #3645 from DhiyaneshGeek/master
...
CVE-2021-32818 , CVE-2021-26247
2022-02-03 01:16:38 +05:30
Prince Chaddha
6c39177ddc
Delete CVE-2021-32818.yaml
2022-02-03 01:11:45 +05:30
MostInterestingBotInTheWorld
fb84327f3c
Enhancement: cves/2005/CVE-2005-2428.yaml by mp
2022-02-02 13:15:44 -05:00
MostInterestingBotInTheWorld
8c22a7f11a
Enhancement: cves/2005/CVE-2005-2428.yaml by cs
2022-02-02 13:08:10 -05:00
6d616461
0c1fb1e697
Updated CVE-2016-10956 Template
2022-02-02 18:36:24 +01:00
MostInterestingBotInTheWorld
0d1f876866
Enhancement: cves/2021/CVE-2021-37538.yaml by mp
2022-02-02 12:15:24 -05:00
6d616461
83bb5912fe
Updated CVE-2019-9618 Template
2022-02-02 17:47:13 +01:00
cckuailong
7c9b7017d2
Merge branch 'master' of github.com:cckuailong/nuclei-templates
2022-02-02 23:28:26 +08:00
cckuailong
58282f56f1
add CVE-2016-10940
2022-02-02 23:27:47 +08:00
Sandeep Singh
633205a001
Update CVE-2021-32853.yaml
2022-02-02 13:56:12 +05:30
Dwi Siswanto
940db2f928
Add CVE-2021-32853
2022-02-02 13:27:36 +07:00
sullo
09558de213
Adding classification
2022-02-01 16:52:18 -05:00
MostInterestingBotInTheWorld
141392e683
Enhancement: cves/2018/CVE-2018-17254.yaml by cs
2022-02-01 16:47:16 -05:00
Prince Chaddha
cf9821e3b1
Update CVE-2021-26247.yaml
2022-02-02 00:48:29 +05:30
MostInterestingBotInTheWorld
c052b84ffc
Enhancement: cves/2014/CVE-2014-8682.yaml by mp
2022-02-01 13:09:32 -05:00
GitHub Action
8868b0f56b
Auto Generated CVE annotations [Tue Feb 1 06:10:46 UTC 2022] 🤖
2022-02-01 06:10:46 +00:00
Dhiyaneshwaran
a5bd8630c8
Create CVE-2021-32818.yaml
2022-02-01 11:39:12 +05:30
GitHub Action
a18a19ff3c
Auto Generated CVE annotations [Tue Feb 1 06:06:15 UTC 2022] 🤖
2022-02-01 06:06:15 +00:00
Dhiyaneshwaran
bcc7113677
Create CVE-2021-26247.yaml
2022-02-01 11:34:51 +05:30
Prince Chaddha
dca4cdc12f
Update CVE-2020-35489.yaml
2022-02-01 01:28:32 +05:30
Prince Chaddha
ee95110be4
Merge pull request #3614 from Akokonunes/patch-109
...
Create CVE-2020-18268.yaml
2022-02-01 00:45:53 +05:30
Prince Chaddha
fdddc48c2f
Update CVE-2020-18268.yaml
2022-02-01 00:42:58 +05:30
Prince Chaddha
992687329c
Update CVE-2020-18268.yaml
2022-02-01 00:41:58 +05:30
GitHub Action
606e9b09e5
Auto Generated CVE annotations [Mon Jan 31 18:38:32 UTC 2022] 🤖
2022-01-31 18:38:32 +00:00
Prince Chaddha
961873521f
Merge pull request #3630 from Akokonunes/patch-110
...
Added CVE-2016-3978
2022-02-01 00:07:07 +05:30
Prince Chaddha
812d76a1b8
Merge pull request #3514 from Akokonunes/patch-103
...
Create CVE-2019-13396.yaml
2022-02-01 00:06:48 +05:30
Prince Chaddha
a9734d712b
Update CVE-2019-13396.yaml
2022-02-01 00:05:35 +05:30
Prince Chaddha
cc40d47cf7
Update CVE-2016-3978.yaml
2022-01-31 23:41:51 +05:30
Prince Chaddha
8efaa0754e
Merge pull request #3633 from cckuailong/master
...
add CVE-2021-46005 (Sourcecodester Car Rental Management System 1.0 - Stored XSS)
2022-01-31 23:38:53 +05:30
Prince Chaddha
cd221355ee
Update CVE-2021-46005.yaml
2022-01-31 23:34:34 +05:30
Prince Chaddha
fb48b67f39
Update CVE-2021-46005.yaml
2022-01-31 23:29:36 +05:30
Roberto Nunes
9c4df9e91a
Create CVE-2021-25864.yaml ( #3631 )
...
* Create CVE-2021-25864.yaml
* moving template to cves folder
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-31 14:36:37 +05:30
Sandeep Singh
cfb6fff36d
removing trailing spaces
2022-01-29 19:24:58 +05:30
cckuailong
80b60ef829
add CVE-2021-46005
2022-01-29 21:22:44 +08:00
sandeep
39e41ce464
template name and ID update
2022-01-29 17:15:08 +05:30
sandeep
d34ca992d3
Added CVE-2022-21371
2022-01-28 16:59:22 +05:30
sandeep
57d742bfb4
Removing temporarily due to limited information
2022-01-28 16:58:30 +05:30
sandeep
9fa97d4221
path update
2022-01-28 16:55:45 +05:30
Aaron Chen
cb2f2a8721
Update CVE-2018-13380.yaml ( #3623 )
...
* Update CVE-2018-13380.yaml
* Fix payload and matcher
* Add reference
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-28 15:46:21 +05:30
GitHub Action
7ce2191287
Auto Generated CVE annotations [Fri Jan 28 09:01:49 UTC 2022] 🤖
2022-01-28 09:01:49 +00:00
Sandeep Singh
d4136282cc
Merge pull request #3621 from MostInterestingBotInTheWorld/dashboard
...
Enhancement: Template Enhancements from Dashboard
2022-01-28 11:20:43 +05:30
Prince Chaddha
dfdfc369d1
Merge pull request #3597 from paradessia/master
...
CVE-2022-21371
2022-01-28 11:14:44 +05:30
sandeep
6ee7b7c83b
syntax update
2022-01-28 11:12:09 +05:30
sandeep
72f14d4d2e
fix spaces
2022-01-28 11:08:17 +05:30
Prince Chaddha
850ae90f55
Update CVE-2021-45380.yaml
2022-01-28 10:59:21 +05:30
Sullo
f3f320dc29
Spacing matters
2022-01-27 14:31:57 -05:00
Sullo
81bf8288b5
Syntax fixes
2022-01-27 14:23:33 -05:00
MostInterestingBotInTheWorld
4ed9d6221b
Merge branch 'projectdiscovery:master' into dashboard
2022-01-27 13:55:22 -05:00
MostInterestingBotInTheWorld
318c7a46c2
Enhancement: cves/2008/CVE-2008-6172.yaml by mp
2022-01-27 13:55:00 -05:00
MostInterestingBotInTheWorld
57d4afde0a
Enhancement: cves/2004/CVE-2004-0519.yaml by mp
2022-01-27 13:48:06 -05:00
MostInterestingBotInTheWorld
6a6d272fdf
Enhancement: cves/2004/CVE-2004-0519.yaml by mp
2022-01-27 13:45:09 -05:00
PikPikcU
4beabd88f9
Create CVE-2021-45380.yaml
2022-01-27 13:40:43 -05:00
MostInterestingBotInTheWorld
794febebef
Enhancement: cves/2000/CVE-2000-0114.yaml by mp
2022-01-27 13:36:56 -05:00
MostInterestingBotInTheWorld
1d12645904
Enhancement: cves/2000/CVE-2000-0114.yaml by mp
2022-01-27 13:30:23 -05:00
cckuailong
5b424fafe1
add CVE-2022-23944 ( #3605 )
...
* add CVE-2022-23944
* fix CVE-2021-23944 matcher type
* Update CVE-2022-23944.yaml
* minor updates
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-27 15:59:26 +05:30
GitHub Action
4bd8b86a3e
Auto Generated CVE annotations [Thu Jan 27 10:22:20 UTC 2022] 🤖
2022-01-27 10:22:20 +00:00
Sandeep Singh
53da8a8206
Added CVE-2021-21973 ( #3615 )
...
* Added CVE-2021-21973
* minor update
2022-01-27 15:50:44 +05:30
Prince Chaddha
fd777fd0b6
Update and rename CVE-2020-18268.yaml to cves/2020/CVE-2020-18268.yaml
2022-01-27 14:18:01 +05:30
GitHub Action
3a1d847b57
Auto Generated CVE annotations [Wed Jan 26 17:59:10 UTC 2022] 🤖
2022-01-26 17:59:10 +00:00
Smaran Chand
0babc27b75
Added elFinder filemanger exposed ( #3602 )
...
* Added elFinder filemanger exposed
* Template name / id update + more reference
* template name update
* matcher update
* Modified the matcher.
* minor updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-26 23:27:45 +05:30
Sandeep Singh
21b7bd1547
Update CVE-2017-7391.yaml
2022-01-26 17:37:19 +05:30
Sullo
9a8482172d
Remove:
...
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
- spaces after : in some files
2022-01-25 14:38:53 -05:00
GitHub Action
173f0ef2d3
Auto Generated CVE annotations [Tue Jan 25 16:51:00 UTC 2022] 🤖
2022-01-25 16:51:00 +00:00
Sandeep Singh
4401b9ebe9
Merge pull request #3599 from projectdiscovery/CVE-2021-24838
...
Added CVE-2021-24838
2022-01-25 22:19:30 +05:30
Sandeep Singh
494a80799c
Merge pull request #3600 from MostInterestingBotInTheWorld/dashboard
...
Enhancement: cves/2021/CVE-2021-29156.yaml by cs
2022-01-25 22:09:27 +05:30
sandeep
8c7ec49185
lint fix
2022-01-25 22:08:01 +05:30
Prince Chaddha
97b38b98b4
Update CVE-2022-21371.yaml
2022-01-25 21:06:14 +05:30
Prince Chaddha
91d9b71864
Merge pull request #3596 from gy741/rule-add-v93
...
Create CVE-2021-39350.yaml
2022-01-25 17:16:12 +05:30
sandeep
47e34dba46
Added CVE-2021-24838
2022-01-25 17:14:00 +05:30
Prince Chaddha
6a2ff6f09e
Update CVE-2021-39350.yaml
2022-01-25 17:08:01 +05:30
GitHub Action
48add9c36b
Auto Generated CVE annotations [Tue Jan 25 11:06:39 UTC 2022] 🤖
2022-01-25 11:06:39 +00:00
Prince Chaddha
2460dceff3
Update CVE-2022-21371.yaml
2022-01-25 16:36:10 +05:30
GitHub Action
5f2efaf5df
Auto Generated CVE annotations [Tue Jan 25 09:56:37 UTC 2022] 🤖
2022-01-25 09:56:37 +00:00
on
abfbfe29ae
CVE-2022-21371.yaml
2022-01-25 12:48:56 +03:00
GitHub Action
e035a797c6
Auto Generated CVE annotations [Tue Jan 25 09:41:31 UTC 2022] 🤖
2022-01-25 09:41:31 +00:00
GwanYeong Kim
67b2955d98
Create CVE-2021-39350.yaml
...
The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-25 17:31:13 +09:00
Prince Chaddha
25e3537212
Update CVE-2021-43810.yaml
2022-01-25 12:34:20 +05:30
GwanYeong Kim
c368e33117
Create CVE-2021-43810.yaml
...
Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-25 13:55:34 +09:00
MostInterestingBotInTheWorld
44d23ef3eb
Enhancement: cves/2021/CVE-2021-29156.yaml by cs
2022-01-24 13:45:03 -05:00
Prince Chaddha
5511ff1efd
Merge pull request #3578 from hexcat/add-wp-html-mail-xss
...
Added wp-html-mail-xss template
2022-01-24 14:21:06 +05:30
Prince Chaddha
6dd35d6491
Update and rename vulnerabilities/wordpress/wp-html-mail-xss.yaml to cves/2022/CVE-2022-0218.yaml
2022-01-24 14:17:01 +05:30
GitHub Action
f882764c9b
Auto Generated CVE annotations [Mon Jan 24 07:12:56 UTC 2022] 🤖
2022-01-24 07:12:56 +00:00
Prince Chaddha
fa30e05f61
Merge pull request #3586 from V35HR4J/master
...
Create CVE-2021-39433.yaml
2022-01-24 12:40:15 +05:30
Prince Chaddha
018ae134c0
Merge pull request #3585 from gy741/rule-add-v90
...
Create CVE-2022-23178.yaml
2022-01-24 12:39:17 +05:30
Prince Chaddha
e9897bddaa
Update CVE-2022-23178.yaml
2022-01-24 12:37:55 +05:30
Prince Chaddha
03697ed21a
Update CVE-2021-39433.yaml
2022-01-24 12:28:03 +05:30
Veshraj Ghimire
df907cc2e3
Create CVE-2021-39433.yaml
2022-01-23 21:00:30 +05:45
GwanYeong Kim
2d53221aea
Create CVE-2022-23178.yaml
...
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-23 20:28:25 +09:00
Prince Chaddha
1d15a5464a
Update CVE-2021-24750.yaml
2022-01-23 14:51:25 +05:30
Prince Chaddha
3c9e02150d
Update CVE-2021-24750.yaml
2022-01-23 14:39:38 +05:30
Prince Chaddha
75184ca383
Update CVE-2021-24750.yaml
2022-01-23 14:38:12 +05:30
cckuailong
dad34d012c
add CVE-2021-24750
2022-01-23 13:17:20 +08:00
sandeep
2a8d8e1095
more updates
2022-01-22 23:27:52 +05:30
sandeep
6b14c6c6fc
CVE-2021-40438 update
2022-01-22 23:18:07 +05:30
sullo
3b7bcda337
Enhancement: cves/2001/CVE-2001-1473.yaml by Chris
2022-01-21 13:58:26 -05:00
sullo
0fcaacfb8c
Enhancement: cves/2001/CVE-2001-1473.yaml by Chris
2022-01-21 13:57:17 -05:00
Sandeep Singh
8a3e575e9f
Added CVE-2012-4547 / CVE-2009-5020 ( #3575 )
...
* Added CVE-2012-4547 / CVE-2009-5020
* Update CVE-2009-5020.yaml
2022-01-21 16:37:41 +05:30
Houziaux Mike
3564e64027
[Add] - Zimbra unauthenticated LFI ( #3571 )
...
* add zimbra lfi
* template updates
- CVE update
- Matchers update
- Additional LFI payload + matchers
* Update CVE-2013-7091.yaml
* Revert "Update CVE-2013-7091.yaml"
This reverts commit fdffa3944f29754d8971a2697754011d29677c42.
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-01-21 13:02:08 +05:30
Leovalcante
bac26e1669
Create check for cve-2020-24391 mongo-express RCE ( #3566 )
...
* Create check for cve-2020-24391 mongo-express RCE
* random file to write + matcher updates + extractor
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-20 14:55:01 +05:30
Sandeep Singh
1b0c7f1b7f
CVE-2021-22205 update ( #3568 )
...
*moved cves/2021/CVE-2021-22205.yaml to vulnerabilities/gitlab/gitlab-rce.yaml
*template extension update + added missing severity + misc updates
2022-01-20 14:25:57 +05:30
Greg Johnson
e0a2d35a8d
add passive fingerprinting template for CVE-2021-22205 ( #3565 )
...
Co-authored-by: Greg Johnson (codeEmitter) <gjohnson@gitlab.com>
2022-01-20 14:12:37 +05:30
sandeep
f6e3df8b33
CVE-2020-13483 Update
2022-01-19 13:44:01 +05:30
pussycat0x
650a38ffde
Qualcomm 4G LTE WiFi VoIP-Router ( #3555 )
...
* Add files via upload
* Auto Generated CVE annotations [Mon Jan 17 16:05:35 UTC 2022] 🤖
* Update CVE-2021-44528.yaml
* Update CVE-2021-45232.yaml
* Add files via upload
* removing duplicate template
* moving template around
* template fix
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-19 13:33:34 +05:30
sandeep
e51d401214
template fix
2022-01-19 13:32:16 +05:30
sandeep
fd023b42a8
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into pr/3550
2022-01-19 13:25:06 +05:30
Roberto Nunes
f8013457b6
Create CVE-2020-23575.yaml ( #3547 )
...
* Create CVE-2020-23575.yaml
* Update and rename CVE-2020-23575.yaml to cves/2020/CVE-2020-23575.yaml
* minor update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 13:12:16 +05:30
Roberto Nunes
2cadf76241
Create CVE-2021-32618.yaml ( #3546 )
...
* Create CVE-2021-32618.yaml
* Update and rename CVE-2021-32618.yaml to cves/2021/CVE-2021-32618.yaml
* matcher update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 12:51:00 +05:30
GitHub Action
2c250d66c7
Auto Generated CVE annotations [Tue Jan 18 05:22:01 UTC 2022] 🤖
2022-01-18 05:22:01 +00:00
Dwi Siswanto
b8dabfbcbb
Add CVE-2021-20038 ( #3542 )
...
* Add CVE-2021-20038
* misc: Update author
2022-01-18 10:50:14 +05:30
Prince Chaddha
bc5fba6fbf
Update CVE-2021-45232.yaml
2022-01-17 22:20:44 +05:30
Prince Chaddha
f988ad8ff4
Update CVE-2021-44528.yaml
2022-01-17 22:19:22 +05:30
GitHub Action
4f81203546
Auto Generated CVE annotations [Mon Jan 17 16:05:35 UTC 2022] 🤖
2022-01-17 16:05:35 +00:00
GitHub Action
8244d08f57
Auto Generated CVE annotations [Sun Jan 16 16:40:51 UTC 2022] 🤖
2022-01-16 16:40:51 +00:00
Sandeep Singh
f6377b09ec
Added Apache APISIX's Admin API Default Access Token (RCE) ( #3544 )
2022-01-16 22:08:55 +05:30
Patrick
1086ca1a30
added template for CVE-2021-42551 ( #3541 )
...
* added template for CVE-2021-42551
* Update CVE-2021-42551.yaml
* Update CVE-2021-42551.yaml
* unbricked CVE-2021-42551
* additional page specific matcher
Co-authored-by: Patrick <patrick.schmid@redguard.ch>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-16 19:01:29 +05:30
gy741
e5958c1364
Update tags ( #3538 )
2022-01-16 02:08:21 +05:30
GitHub Action
93337032a0
Auto Generated CVE annotations [Sat Jan 15 20:36:52 UTC 2022] 🤖
2022-01-15 20:36:52 +00:00
PikPikcU
7e0a3acf44
Create dreambox-xss ( #3535 )
...
* Create dreambox-xss.yaml
* Create dreambox-detect.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-16 02:05:33 +05:30
GitHub Action
ca79e7a81f
Auto Generated CVE annotations [Sat Jan 15 20:28:18 UTC 2022] 🤖
2022-01-15 20:28:18 +00:00
alph4byt3
2d28cebfee
Create CVE-2017-14135 ( #3534 )
...
* Create opendreambox-plugin-webadmin-rce.yaml
* Update opendreambox-plugin-webadmin-rce.yaml
* Update opendreambox-plugin-webadmin-rce.yaml
* Update opendreambox-plugin-webadmin-rce.yaml
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-16 01:56:51 +05:30
GitHub Action
d5e2eb7d41
Auto Generated CVE annotations [Sat Jan 15 19:05:39 UTC 2022] 🤖
2022-01-15 19:05:39 +00:00
GitHub Action
bc3fa19859
Auto Generated CVE annotations [Thu Jan 13 05:21:21 UTC 2022] 🤖
2022-01-13 05:21:21 +00:00
Muhammad Daffa
64cf0fa4ba
Rename maian cart rce ( #3532 )
...
* Update and rename vulnerabilities/other/maian-cart-preauth-rce.yaml to cves/2021/CVE-2021-32172.yaml
* Update CVE-2021-32172.yaml
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-01-13 10:48:51 +05:30
Muhammad Daffa
0e39fd0103
Add some workflow templates ( #3521 )
...
* Add 27 workflow templates
* fixed Artifactory workflow
* Fixed Jetty workflow
* Fixed Moodle workflow
* Fixed Zabbix workflow
* Fixed DedeCMS workflow
* Fixed OFBiz workflow
* Fixed rConfig workflow
* Tag update for R-SeeNet workflow
* Add 3 token-spray templates
* format fixes
* Add workflow templates
* More workflows templates
* multiple workflow fixes
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-01-12 18:19:54 +05:30
sandeep
5c471a6168
removing duplicate template
2022-01-12 17:28:47 +05:30
Prince Chaddha
4af56f0b06
Merge pull request #3512 from gy741/rule-add-v84
...
Create CVE-2014-3206.yaml
2022-01-11 14:59:23 +05:30
Prince Chaddha
e089bd841a
Update CVE-2014-3206.yaml
2022-01-11 14:57:24 +05:30
Prince Chaddha
a53ae7b694
Merge pull request #3518 from gy741/rule-add-v85
...
Create CVE-2021-20167.yaml
2022-01-11 14:54:05 +05:30
Prince Chaddha
74e8442c74
Update and rename CVE-2019-13396.yaml to cves/2019/CVE-2019-13396.yaml
2022-01-11 14:43:58 +05:30
Prince Chaddha
aa8fd16018
Merge pull request #3515 from Akokonunes/patch-104
...
Create CVE-2020-11529.yaml
2022-01-11 14:37:32 +05:30
Prince Chaddha
7f26b9e895
Update and rename CVE-2020-11529.yaml to cves/2020/CVE-2020-11529.yaml
2022-01-11 14:35:53 +05:30
GitHub Action
c40624e7d9
Auto Generated CVE annotations [Tue Jan 11 08:57:41 UTC 2022] 🤖
2022-01-11 08:57:41 +00:00
Prince Chaddha
5657bdb557
Merge pull request #3516 from pikpikcu/patch-315
...
Create CVE-2021–20837
2022-01-11 14:24:26 +05:30
Prince Chaddha
70677b3b5a
Update CVE-2021–20837.yaml
2022-01-11 14:12:04 +05:30
Prince Chaddha
9afd4bcfd8
Update CVE-2021-20167.yaml
2022-01-11 13:57:07 +05:30
Prince Chaddha
6ea0a7f492
Update CVE-2020-7136.yaml
2022-01-11 13:43:30 +05:30
GwanYeong Kim
351dc3e460
Create CVE-2020-7136.yaml
...
A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:39:41 +09:00
GwanYeong Kim
d772fd884b
Create CVE-2021-20167.yaml
...
This vulnerability uses a combination of CVE-2021-20166 and CVE-2021-20167. Netgear RAX43 version 1.0.3.96 contains a command injection and authbypass vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter. and The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:00:56 +09:00
PikPikcU
83e431802e
Create CVE-2021–20837.yaml
2022-01-10 21:44:31 -05:00
Sandeep Singh
9e4d5f0d23
lint fixes
2022-01-10 21:20:16 +05:30
GwanYeong Kim
9435362025
Create CVE-2014-3206.yaml
...
Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the session parameter to localhost/backupmgt/localJob.php or the auth_name parameter to localhost/backupmgmt/pre_connect_check.php.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-10 21:44:45 +09:00
Muhammad Daffa
068d576d22
Update CVE-2020-8641.yaml ( #3505 )
2022-01-08 20:23:53 +05:30
Roberto Nunes
484d77de7c
Create CVE-2021-39501.yaml ( #3501 )
...
* Create CVE-2021-39501.yaml
* moving template to cves directory
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 17:00:19 +05:30
Roberto Nunes
691688fb66
Create CVE-2020-23015.yaml ( #3502 )
...
* Create CVE-2020-23015.yaml
* moving template to cves directory
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 16:52:50 +05:30
GitHub Action
451313a0af
Auto Generated CVE annotations [Sat Jan 8 10:57:43 UTC 2022] 🤖
2022-01-08 10:57:43 +00:00
JAS-37
0c7d13d152
add CVE-2021-31862 template ( #3491 )
...
* add CVE-2021-31862 template
* updated matchers
* Added SysAid panel + workflow
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-07 13:28:38 +05:30
Sandeep Singh
844c3b4a02
Network template updates & fixes ( #3497 )
...
* Fixed template syntax
* network template update and fixes
2022-01-07 12:58:37 +05:30
sandeep
945b4b1456
name update
2022-01-06 15:36:28 +05:30
Prince Chaddha
65703f0cc6
Merge pull request #3469 from ImNightmaree/patch-1
...
Update CVE-2017-11610.yaml
2022-01-06 14:00:23 +05:30
Prince Chaddha
2fa0619b65
Update CVE-2017-11610.yaml
2022-01-06 13:54:40 +05:30
GitHub Action
fbb9f36310
Auto Generated CVE annotations [Thu Jan 6 08:06:01 UTC 2022] 🤖
2022-01-06 08:06:01 +00:00
Prince Chaddha
e144116352
Merge pull request #3485 from projectdiscovery/CVE-2016-4977
...
Create CVE-2016-4977.yaml
2022-01-06 13:34:23 +05:30
Aaron Chen
d0f71c6d1b
Update CVE-2021-31589.yaml ( #3489 )
2022-01-06 12:05:23 +05:30
Ahmed Aboul-Ela
f279bd78d1
Add CVE-2021-31589 ( #3486 )
...
* Add CVE-2021-31589
Committer: Ahmed Aboul-Ela <ahmed.aboul3la@gmail.com>
* lint fixes
* updated matchers
* Added metadata
* Added Bomgar Login Panel detection
* Added Bomgar workflow
* Added favicon detection
Co-authored-by: Ahmed Aboul-Ela <ahmed@secgeek.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 18:39:53 +05:30
Prince Chaddha
7be7e8392a
Create CVE-2016-4977.yaml
2022-01-05 14:07:28 +05:30
Prince Chaddha
031b16b633
Merge pull request #3476 from projectdiscovery/CVE-2015-5531
...
Create CVE-2015-5531.yaml
2022-01-05 13:08:19 +05:30
GitHub Action
9305549db5
Auto Generated CVE annotations [Wed Jan 5 07:37:34 UTC 2022] 🤖
2022-01-05 07:37:34 +00:00
Prince Chaddha
3cb0c08288
Merge pull request #3474 from projectdiscovery/CVE-2016-10134
...
Create CVE-2016-10134.yaml
2022-01-05 13:05:50 +05:30
Prince Chaddha
a9ef4d2612
Merge pull request #3480 from gy741/rule-add-v81
...
Create CVE-2021-21881.yaml
2022-01-05 13:01:57 +05:30
Prince Chaddha
bf21395cb7
Update CVE-2015-5531.yaml
2022-01-05 13:01:50 +05:30
Prince Chaddha
fefd3343eb
Update CVE-2021-21881.yaml
2022-01-05 13:00:40 +05:30
Prince Chaddha
616bea3a88
Update CVE-2021-21881.yaml
2022-01-05 12:59:27 +05:30
Pathtaga
e281e5bf88
Updated all templates tags with technologies ( #3478 )
...
* Updated tags for template sonicwall-email-security-detect.yaml
* Updated tags for template detect-sentry.yaml
* Updated tags for template kong-detect.yaml
* Updated tags for template openam-detect.yaml
* Updated tags for template shiro-detect.yaml
* Updated tags for template iplanet-web-server.yaml
* Updated tags for template graylog-api-browser.yaml
* Updated tags for template prtg-detect.yaml
* Updated tags for template node-red-detect.yaml
* Updated tags for template abyss-web-server.yaml
* Updated tags for template geo-webserver.yaml
* Updated tags for template autobahn-python-detect.yaml
* Updated tags for template default-lighttpd-page.yaml
* Updated tags for template microsoft-iis-8.yaml
* Updated tags for template lucee-detect.yaml
* Updated tags for template php-proxy-detect.yaml
* Updated tags for template jenkins-detect.yaml
* Updated tags for template cockpit-detect.yaml
* Updated tags for template csrfguard-detect.yaml
* Updated tags for template dwr-index-detect.yaml
* Updated tags for template netsweeper-webadmin-detect.yaml
* Updated tags for template weblogic-detect.yaml
* Updated tags for template s3-detect.yaml
* Updated tags for template tileserver-gl.yaml
* Updated tags for template springboot-actuator.yaml
* Updated tags for template terraform-detect.yaml
* Updated tags for template redmine-cli-detect.yaml
* Updated tags for template mrtg-detect.yaml
* Updated tags for template tableau-server-detect.yaml
* Updated tags for template magmi-detect.yaml
* Updated tags for template oidc-detect.yaml
* Updated tags for template tor-socks-proxy.yaml
* Updated tags for template synology-web-station.yaml
* Updated tags for template herokuapp-detect.yaml
* Updated tags for template gunicorn-detect.yaml
* Updated tags for template sql-server-reporting.yaml
* Updated tags for template google-bucket-service.yaml
* Updated tags for template kubernetes-mirantis.yaml
* Updated tags for template kubernetes-enterprise-manager.yaml
* Updated tags for template oracle-iplanet-web-server.yaml
* Updated tags for template dell-idrac7-detect.yaml
* Updated tags for template dell-idrac6-detect.yaml
* Updated tags for template dell-idrac9-detect.yaml
* Updated tags for template dell-idrac8-detect.yaml
* Updated tags for template apache-guacamole.yaml
* Updated tags for template aws-cloudfront-service.yaml
* Updated tags for template aws-bucket-service.yaml
* Updated tags for template nginx-linux-page.yaml
* Updated tags for template telerik-fileupload-detect.yaml
* Updated tags for template telerik-dialoghandler-detect.yaml
* Updated tags for template htaccess-config.yaml
* Updated tags for template microsoft-azure-error.yaml
* Updated tags for template detect-options-method.yaml
* Updated tags for template unpatched-coldfusion.yaml
* Updated tags for template moodle-changelog.yaml
* Updated tags for template detect-dns-over-https.yaml
* Updated tags for template CVE-2019-19134.yaml
* Updated tags for template CVE-2019-3929.yaml
* Updated tags for template CVE-2019-19908.yaml
* Updated tags for template CVE-2019-10475.yaml
* Updated tags for template CVE-2019-17382.yaml
* Updated tags for template CVE-2019-16332.yaml
* Updated tags for template CVE-2019-14974.yaml
* Updated tags for template CVE-2019-19368.yaml
* Updated tags for template CVE-2019-12725.yaml
* Updated tags for template CVE-2019-15501.yaml
* Updated tags for template CVE-2019-9733.yaml
* Updated tags for template CVE-2019-14322.yaml
* Updated tags for template CVE-2019-9955.yaml
* Updated tags for template CVE-2019-0230.yaml
* Updated tags for template CVE-2019-10232.yaml
* Updated tags for template CVE-2019-17506.yaml
* Updated tags for template CVE-2019-8449.yaml
* Updated tags for template CVE-2019-12593.yaml
* Updated tags for template CVE-2019-10092.yaml
* Updated tags for template CVE-2019-1821.yaml
* Updated tags for template CVE-2019-3401.yaml
* Updated tags for template CVE-2019-16662.yaml
* Updated tags for template CVE-2019-5418.yaml
* Updated tags for template CVE-2016-4975.yaml
* Updated tags for template CVE-2016-1000137.yaml
* Updated tags for template CVE-2016-7552.yaml
* Updated tags for template CVE-2016-10956.yaml
* Updated tags for template CVE-2016-1000146.yaml
* Updated tags for template CVE-2013-2251.yaml
* Updated tags for template CVE-2013-1965.yaml
* Updated tags for template CVE-2014-2323.yaml
* Updated tags for template CVE-2014-5111.yaml
* Updated tags for template CVE-2014-2962.yaml
* Updated tags for template CVE-2014-4561.yaml
* Updated tags for template CVE-2014-4558.yaml
* Updated tags for template CVE-2014-3120.yaml
* Updated tags for template CVE-2007-5728.yaml
* Updated tags for template CVE-2009-4679.yaml
* Updated tags for template CVE-2009-1558.yaml
* Updated tags for template CVE-2009-4202.yaml
* Updated tags for template CVE-2009-0932.yaml
* Updated tags for template CVE-2015-2068.yaml
* Updated tags for template CVE-2015-8813.yaml
* Updated tags for template CVE-2015-7450.yaml
* Updated tags for template CVE-2015-2067.yaml
* Updated tags for template CVE-2015-3306.yaml
* Updated tags for template CVE-2015-3337.yaml
* Updated tags for template CVE-2015-1427.yaml
* Updated tags for template CVE-2015-1503.yaml
* Updated tags for template CVE-2015-1880.yaml
* Updated tags for template CVE-2018-3810.yaml
* Updated tags for template CVE-2018-18069.yaml
* Updated tags for template CVE-2018-17246.yaml
* Updated tags for template CVE-2018-10141.yaml
* Updated tags for template CVE-2018-16341.yaml
* Updated tags for template CVE-2018-18777.yaml
* Updated tags for template CVE-2018-15138.yaml
* Updated tags for template CVE-2018-11784.yaml
* Updated tags for template CVE-2018-16299.yaml
* Updated tags for template CVE-2018-7251.yaml
* Updated tags for template CVE-2018-1273.yaml
* Updated tags for template CVE-2018-1271.yaml
* Updated tags for template CVE-2018-11759.yaml
* Updated tags for template CVE-2018-3167.yaml
* Updated tags for template CVE-2018-7490.yaml
* Updated tags for template CVE-2018-2628.yaml
* Updated tags for template CVE-2018-13380.yaml
* Updated tags for template CVE-2018-2893.yaml
* Updated tags for template CVE-2018-5316.yaml
* Updated tags for template CVE-2018-20985.yaml
* Updated tags for template CVE-2018-10818.yaml
* Updated tags for template CVE-2018-1000861.yaml
* Updated tags for template CVE-2018-0296.yaml
* Updated tags for template CVE-2018-19458.yaml
* Updated tags for template CVE-2018-3760.yaml
* Updated tags for template CVE-2018-12998.yaml
* Updated tags for template CVE-2018-9118.yaml
* Updated tags for template CVE-2018-1000130.yaml
* Updated tags for template CVE-2008-6668.yaml
* Updated tags for template CVE-2017-7269.yaml
* Updated tags for template CVE-2017-1000170.yaml
* Updated tags for template CVE-2017-16877.yaml
* Updated tags for template CVE-2017-1000486.yaml
* Updated tags for template CVE-2017-9822.yaml
* Updated tags for template CVE-2017-0929.yaml
* Updated tags for template CVE-2017-7921.yaml
* Updated tags for template CVE-2017-14535.yaml
* Updated tags for template CVE-2017-5521.yaml
* Updated tags for template CVE-2017-12637.yaml
* Updated tags for template CVE-2017-12635.yaml
* Updated tags for template CVE-2017-11610.yaml
* Updated tags for template CVE-2021-20114.yaml
* Updated tags for template CVE-2021-40856.yaml
* Updated tags for template CVE-2021-21972.yaml
* Updated tags for template CVE-2021-31602.yaml
* Updated tags for template CVE-2021-41773.yaml
* Updated tags for template CVE-2021-37704.yaml
* Updated tags for template CVE-2021-45046.yaml
* Updated tags for template CVE-2021-26084.yaml
* Updated tags for template CVE-2021-27931.yaml
* Updated tags for template CVE-2021-24291.yaml
* Updated tags for template CVE-2021-41648.yaml
* Updated tags for template CVE-2021-37216.yaml
* Updated tags for template CVE-2021-22005.yaml
* Updated tags for template CVE-2021-37573.yaml
* Updated tags for template CVE-2021-31755.yaml
* Updated tags for template CVE-2021-43287.yaml
* Updated tags for template CVE-2021-24274.yaml
* Updated tags for template CVE-2021-33564.yaml
* Updated tags for template CVE-2021-22145.yaml
* Updated tags for template CVE-2021-24237.yaml
* Updated tags for template CVE-2021-44848.yaml
* Updated tags for template CVE-2021-25646.yaml
* Updated tags for template CVE-2021-21816.yaml
* Updated tags for template CVE-2021-41649.yaml
* Updated tags for template CVE-2021-41291.yaml
* Updated tags for template CVE-2021-41293.yaml
* Updated tags for template CVE-2021-21801.yaml
* Updated tags for template CVE-2021-29156.yaml
* Updated tags for template CVE-2021-34370.yaml
* Updated tags for template CVE-2021-27132.yaml
* Updated tags for template CVE-2021-28151.yaml
* Updated tags for template CVE-2021-26812.yaml
* Updated tags for template CVE-2021-21985.yaml
* Updated tags for template CVE-2021-43778.yaml
* Updated tags for template CVE-2021-25281.yaml
* Updated tags for template CVE-2021-40539.yaml
* Updated tags for template CVE-2021-36749.yaml
* Updated tags for template CVE-2021-21234.yaml
* Updated tags for template CVE-2021-33221.yaml
* Updated tags for template CVE-2021-42013.yaml
* Updated tags for template CVE-2021-33807.yaml
* Updated tags for template CVE-2021-44228.yaml
* Updated tags for template CVE-2012-0896.yaml
* Updated tags for template CVE-2012-0991.yaml
* Updated tags for template CVE-2012-0392.yaml
* Updated tags for template CVE-2012-4940.yaml
* Updated tags for template CVE-2012-1226.yaml
* Updated tags for template CVE-2012-4878.yaml
* Updated tags for template CVE-2010-1304.yaml
* Updated tags for template CVE-2010-1217.yaml
* Updated tags for template CVE-2010-0759.yaml
* Updated tags for template CVE-2010-2307.yaml
* Updated tags for template CVE-2010-4231.yaml
* Updated tags for template CVE-2010-2861.yaml
* Updated tags for template CVE-2010-4282.yaml
* Updated tags for template CVE-2010-1302.yaml
* Updated tags for template CVE-2010-1461.yaml
* Updated tags for template CVE-2020-4463.yaml
* Updated tags for template CVE-2020-1943.yaml
* Updated tags for template CVE-2020-36289.yaml
* Updated tags for template CVE-2020-17518.yaml
* Updated tags for template CVE-2020-12800.yaml
* Updated tags for template CVE-2020-10770.yaml
* Updated tags for template CVE-2020-17506.yaml
* Updated tags for template CVE-2020-11547.yaml
* Updated tags for template CVE-2020-11034.yaml
* Updated tags for template CVE-2020-24589.yaml
* Updated tags for template CVE-2020-9054.yaml
* Updated tags for template CVE-2020-28976.yaml
* Updated tags for template CVE-2020-16952.yaml
* Updated tags for template CVE-2020-24312.yaml
* Updated tags for template CVE-2020-8512.yaml
* Updated tags for template CVE-2020-14179.yaml
* Updated tags for template CVE-2020-6308.yaml
* Updated tags for template CVE-2020-35846.yaml
* Updated tags for template CVE-2020-7318.yaml
* Updated tags for template CVE-2020-2140.yaml
* Updated tags for template CVE-2020-5410.yaml
* Updated tags for template CVE-2020-5777.yaml
* Updated tags for template CVE-2020-13700.yaml
* Updated tags for template CVE-2020-5775.yaml
* Updated tags for template CVE-2020-13167.yaml
* Updated tags for template CVE-2020-35848.yaml
* Updated tags for template CVE-2020-9484.yaml
* Updated tags for template CVE-2020-15505.yaml
* Updated tags for template CVE-2020-9047.yaml
* Updated tags for template CVE-2020-17519.yaml
* Updated tags for template CVE-2020-17505.yaml
* Updated tags for template CVE-2020-9376.yaml
* Updated tags for template CVE-2020-8497.yaml
* Updated tags for template CVE-2020-14092.yaml
* Updated tags for template CVE-2020-10148.yaml
* Updated tags for template CVE-2020-35847.yaml
* Updated tags for template CVE-2020-12116.yaml
* Updated tags for template CVE-2020-11930.yaml
* Updated tags for template CVE-2020-24186.yaml
* Updated tags for template CVE-2020-9496.yaml
* Updated tags for template CVE-2020-35489.yaml
* Updated tags for template CVE-2020-26413.yaml
* Updated tags for template CVE-2020-2096.yaml
* misc updates
* misc update
* more updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 01:04:16 +05:30
Sandeep Singh
4acf3ece75
Template syntax fixes ( #3484 )
...
* syntax fix
* more fixes
2022-01-05 00:22:08 +05:30
GwanYeong Kim
d572716df0
Create CVE-2021-21881.yaml
...
An OS command injection vulnerability exists in the Web Manager Wireless Network Scanner functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-04 23:14:12 +09:00
GitHub Action
86c11d1b40
Auto Generated CVE annotations [Tue Jan 4 11:55:25 UTC 2022] 🤖
2022-01-04 11:55:25 +00:00
pajoda
c45934891f
Create CVE-2021-36748.yaml ( #2446 )
...
* Create CVE-2021-36748.yaml
* Update indentation
* minor update
* Update CVE-2021-36748.yaml
* Additional unique matchers + easily readable syntax
* misc updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-04 17:23:56 +05:30
Prince Chaddha
08de914d33
Create CVE-2015-5531.yaml
2022-01-04 16:51:00 +05:30
Prince Chaddha
8615d9d9c8
Create CVE-2016-10134.yaml
2022-01-04 15:51:37 +05:30
ImNightmaree
760432c8e7
Update CVE-2017-11610.yaml
...
Not all machines have HTTP connectivity, DNS is more reliable.
2022-01-03 10:33:08 +00:00
sandeep
6f3591f920
rseenet tags update
2022-01-01 12:28:32 +05:30
sandeep
7eba1c5a0a
added reference for rce
2021-12-31 17:53:27 +05:30
GitHub Action
e238128b1c
Auto Generated CVE annotations [Thu Dec 30 11:40:55 UTC 2021] 🤖
2021-12-30 11:40:55 +00:00
Sandeep Singh
de7bef1300
Added CVE-2021-42567 (Apereo CAS Reflected XSS) ( #3450 )
...
* Added CVE-2021-42567 (Apereo CAS Reflected XSS)
* Added login panel detection
2021-12-30 17:09:29 +05:30
Prince Chaddha
a94c5d62a1
Update CVE-2021-40859.yaml
2021-12-30 12:15:22 +05:30
Prince Chaddha
f3deec4325
Update CVE-2021-40859.yaml
2021-12-30 12:15:02 +05:30
Sandeep Singh
a10aff06e5
Merge branch 'master' into master
2021-12-29 21:28:30 +05:30
Sandeep Singh
de9c4d605c
Apache Tomcat Template improvements ( #3446 )
...
* Improved Tomcat matchers / extractors / paths
* removed duplicate detections / matchers
* removed duplicate template
* Added missing tomcat tags
2021-12-29 19:10:59 +05:30
sandeep
8744282d5b
removing matcher to avoid false negative result.
2021-12-29 12:10:51 +05:30
东方有鱼名为咸
7a05f1b538
add CVE-2021-45232.yaml ( #3437 )
...
* Create CVE-2021-45232.yaml
* matcher fixes
* more reference
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-28 19:43:00 +05:30
sandeep
85956018f8
Added metadata
2021-12-28 18:16:23 +05:30
Sandeep Singh
5d7d4409a0
Added CVE-2020-11546 ( #3436 )
...
Co-Authored-By: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
Co-authored-by: 0fficial_BlackHat13 <58517369+Official-BlackHat13@users.noreply.github.com>
2021-12-28 18:13:04 +05:30
Muhammad Daffa
5c800a4ef7
Seperate technologies and exposed-panels templates ( #3424 )
...
* Edit magmi workflow
* Add some workflow template + edit some template
* Changing some templates
* minor update
* workflow matcher fixes
* tech update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-27 10:31:53 +05:30
Prince Chaddha
ea0966877a
Merge pull request #3406 from Akokonunes/patch-95
...
Create CVE-2018-14912.yaml
2021-12-24 19:31:51 +05:30
Prince Chaddha
ce4abd14ba
Update and rename CVE-2018-14912.yaml to cves/2018/CVE-2018-14912.yaml
2021-12-24 19:24:16 +05:30
GitHub Action
c33766a93f
Auto Generated CVE annotations [Fri Dec 24 13:38:52 UTC 2021] 🤖
2021-12-24 13:38:52 +00:00
Prince Chaddha
415f37a7a6
Update CVE-2021-27358.yaml
2021-12-24 19:02:18 +05:30
sandeep
f892a053a2
Added Grafana unauthenticated snapshot creation
2021-12-24 17:47:55 +05:30
sandeep
54e064767d
Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates
2021-12-23 21:46:10 +05:30
sandeep
99f5a47202
minor update
2021-12-23 21:40:28 +05:30
GitHub Action
132108f849
Auto Generated CVE annotations [Thu Dec 23 15:43:46 UTC 2021] 🤖
2021-12-23 15:43:46 +00:00
ImNightmaree
a76a9baaf4
Create CVE-2021-45046 ( #3378 )
...
* Create CVE-2021-45046
* Update and rename CVE-2021-45046 to CVE-2021-45046.yaml
* minor update
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-23 21:11:50 +05:30
Mohamed Elbadry
d2d47bfcb0
Update CVE-2021-44228.yaml - Extract DNS interaction IP ( #3396 )
...
* Update CVE-2021-44228.yaml
* lint fix
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-22 18:17:30 +05:30
GitHub Action
d253ff84ef
Auto Generated CVE annotations [Wed Dec 22 06:47:35 UTC 2021] 🤖
2021-12-22 06:47:35 +00:00
pussycat0x
8a77db7919
unauthorized Puppet Node Manager ( #3388 )
...
* Add files via upload
* Update unauthorized-puppet-node-manager-detect.yaml
* Add files via upload
* Add files via upload
* Update CVE-2021-40859.yaml
* misc updates
* minor updates
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-22 12:16:05 +05:30
sandeep
df2418ce18
misc updates
2021-12-22 12:10:38 +05:30
pussycat0x
08d097a751
Update CVE-2021-40859.yaml
2021-12-22 09:33:06 +05:30
pussycat0x
4b6a46f06f
Add files via upload
2021-12-22 09:30:36 +05:30
GitHub Action
10ba4de0d7
Auto Generated CVE annotations [Tue Dec 21 12:32:40 UTC 2021] 🤖
2021-12-21 12:32:40 +00:00
Prince Chaddha
b622f5145d
Merge pull request #3383 from projectdiscovery/princechaddha-patch-2
...
Create CVE-2021-26085.yaml
2021-12-21 18:00:47 +05:30
Prince Chaddha
0c1a5e2c23
Merge pull request #3386 from Akokonunes/patch-93
...
Create CVE-2018-15138.yaml
2021-12-21 17:32:38 +05:30
Prince Chaddha
97b4a8a0e8
Update and rename CVE-2018-15138.yaml to cves/2018/CVE-2018-15138.yaml
2021-12-21 17:25:16 +05:30
GitHub Action
19bfb84638
Auto Generated CVE annotations [Tue Dec 21 11:06:14 UTC 2021] 🤖
2021-12-21 11:06:14 +00:00
GitHub Action
7fe5c23627
Auto Generated CVE annotations [Mon Dec 20 14:33:22 UTC 2021] 🤖
2021-12-20 14:33:22 +00:00
Prince Chaddha
b8ee43e27a
Create CVE-2021-26085.yaml
2021-12-20 15:20:14 +05:30
Prince Chaddha
d40c6cbaa3
Merge pull request #3377 from daffainfo/patch-284
...
Create CVE-2015-2166.yaml
2021-12-20 13:04:30 +05:30
Prince Chaddha
d5c43bb502
Update CVE-2015-2166.yaml
2021-12-20 13:02:41 +05:30
Prince Chaddha
9461383161
Update CVE-2015-0554.yaml
2021-12-20 13:01:11 +05:30
Prince Chaddha
2c279c7388
Update CVE-2015-2166.yaml
2021-12-20 12:56:36 +05:30
Muhammad Daffa
bee031da45
Create CVE-2015-2166.yaml
2021-12-19 20:33:58 +07:00
Muhammad Daffa
e3c0539174
Create CVE-2015-0554.yaml
2021-12-19 20:23:13 +07:00
Prince Chaddha
ca6146a4af
Update CVE-2021-44228.yaml
2021-12-19 14:52:29 +05:30
Ganoes
5f271045d1
CVE-2016-6210 - Fix typo in the regex ( #3365 )
...
* CVE-2016-6210 - Fix typo in the regex
* minor variable update
Co-authored-by: ganoes <karel.rozhon@etnetera.cz>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-18 14:58:35 +05:30
Prince Chaddha
fc566d27a8
Create CVE-2021-45092.yaml ( #3372 )
...
* Create CVE-2021-45092.yaml
* Added Thinfinity Iframe Injection
Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
* Added Thinfinity VirtualUI User Enumeration
Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
* added missing tag
Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
2021-12-18 14:32:44 +05:30
Abhiram V
dd40419ea5
Updated CVE-2021-44228 with most common vulnerable headers ( #3334 )
...
* Updated with common headers which can be exploited
Reference : https://blog.qualys.com/vulnerabilities-threat-research/2021/12/10/apache-log4j2-zero-day-exploited-in-the-wild-log4shell
These headers are collected from above blog in Detecting the Vulnerability part
* fix: lint update
* Update CVE-2021-44228.yaml
* Update CVE-2021-44228.yaml
* Updated changed matchers and extractors regex according to v8.7.3 update
* payload updates for CVE-2021-44228
- more injection points
- a fixed regex to extract uppercase hostnames
- standardized payloads
- printed injection points
Source - https://twitter.com/0xceba/status/1471664540542648322
Co-Authored-By: 0xceba <44234156+0xceba@users.noreply.github.com>
Co-Authored-By: Abhiram V <61599526+Anon-Artist@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: 0xceba <44234156+0xceba@users.noreply.github.com>
2021-12-18 10:51:45 +05:30
sandeep
b8fa0d5857
update: added more reference
2021-12-15 21:26:35 +05:30
Geeknik Labs
9c169bd682
Create CVE-2021-44528.yaml ( #3342 )
2021-12-15 20:43:07 +05:30
sandeep
c9ddd7a0ae
update: id + reference update
2021-12-14 21:07:46 +05:30
sandeep
34d4557dad
update: making it compatible with self-hosted interactsh server
2021-12-14 03:21:47 +05:30
Evan Rubinstein
dddb0bbb82
Added CVE-2021-24997 ( #3298 )
...
* Added CVE-39226
* Added CVE-39226
* Delete CVE-39226.yaml
* Renamed CVE-39226 to CVE-2021-39226
Fixed naming error
* Added Wp-Guppy-Information-Disclosure template
* Removed File
Found better descriptor
* Added CVE-2021-24997
Added WordPress Guppy Information Disclosure CVE
* Fixed CVE-2021-24997
Fixed YAML formatting
* Fixed Typo
URL Path had an extra double quote
* Auto Generated Templates Stats [Wed Dec 8 23:07:24 UTC 2021] 🤖
* Deleted Blank Space
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Update CVE-2021-24997.yaml
* Added CVE-2021-43496
* Update CVE-2021-43496.yaml
* fix: syntax update
* Added New Vuln
* Update CVE-2021-24997.yaml
* Update CVE-2021-43496.yaml
* Update and rename hd-netowrk-realtime-monitor-system-LFI.yaml to hdnetwork-realtime-lfi.yaml
* fix: lints update
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2021-12-14 02:22:26 +05:30
Nicolas
1411edf332
Updated CVE-2021-44228.yaml ( #3335 )
...
Co-authored-by: olacin <olacin@users.noreply.github.com>
2021-12-13 20:24:06 +05:30