MostInterestingBotInTheWorld
a24ef794b7
Dashboard Content Enhancements ( #4031 )
...
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
sullo
becdd7810b
Cleanup Joomla! Jvehicles template ( #3983 )
...
* Cleanup Joomla! Jvehicles template since it was labeled as SQLi but had a test for LFI
Create new template for the Jvehicles LFI
* Fix id
* path update
* Delete CVE-2010-1873.yaml
temporarily removing as it doesn't contain the exact matchers.
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-06 17:21:08 +05:30
GitHub Action
83dae0cac1
Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖
2022-04-06 04:33:20 +00:00
Prince Chaddha
a0e7094664
Update CVE-2021-24746.yaml
2022-04-06 09:55:48 +05:30
Prince Chaddha
68f4159393
Create CVE-2021-24746.yaml
2022-04-06 09:36:53 +05:30
Prince Chaddha
21a73f490c
Update CVE-2021-24746.yaml
2022-04-06 09:35:04 +05:30
GitHub Action
9045a7bd9c
Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖
2022-04-06 04:01:51 +00:00
Prince Chaddha
90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
...
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha
d834c6aef3
Merge pull request #4052 from Akokonunes/patch-135
...
Create CVE-2017-1000029.yaml
2022-04-05 23:29:09 +05:30
Prince Chaddha
f0af9a04b6
Update CVE-2021-24746.yaml
2022-04-05 23:28:52 +05:30
Prince Chaddha
0f8598a14c
Update and rename CVE-2017-1000029.yaml to cves/2017/CVE-2017-1000029.yaml
2022-04-05 22:54:06 +05:30
sandeep
7d195c9984
Added POST method support to CVE-2022-22965 detection
2022-04-05 22:38:34 +05:30
GitHub Action
15575ec82e
Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖
2022-04-05 13:17:39 +00:00
Ritik Chaddha
34a2dca9e6
Update CVE-2019-11248.yaml ( #4056 )
...
* Update CVE-2019-11248.yaml
* misc fixes
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-05 18:47:15 +05:30
Prince Chaddha
18cfd2f11b
Merge pull request #4039 from gy741/rule-add-v104
...
Create CVE-2018-10562.yaml
2022-04-05 12:40:58 +05:30
Prince Chaddha
66a27e4da0
Update CVE-2018-10562.yaml
2022-04-05 12:18:20 +05:30
Prince Chaddha
02a1d0ce06
Update CVE-2018-10562.yaml
2022-04-05 12:13:12 +05:30
Prince Chaddha
77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
...
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha
3586ec841c
Update CVE-2021-26598.yaml
2022-04-05 00:13:18 +05:30
Prince Chaddha
c9e108c7db
Update CVE-2021-26598.yaml
2022-04-04 23:57:11 +05:30
Sandeep Singh
d633c2db45
Updated intrusive detection with HTTP OOB interaction ( #4028 )
2022-04-04 19:58:38 +05:30
Prince Chaddha
1890296f31
Merge pull request #4046 from Akokonunes/patch-134
...
Create CVE-2020-27191.yaml
2022-04-04 18:13:11 +05:30
Prince Chaddha
963742768a
Update and rename CVE-2020-27191.yaml to cves/2020/CVE-2020-27191.yaml
2022-04-04 18:08:30 +05:30
Rodrigo Schio
4d690358ae
fix match and extractors regexes ( #4040 )
2022-04-04 18:08:25 +05:30
GwanYeong Kim
1e374c7482
Create CVE-2021-26598.yaml
...
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
GwanYeong Kim
21a3ce4f12
Create CVE-2018-10562.yaml
...
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-02 23:56:35 +09:00
Prince Chaddha
c1a7f2398c
Create CVE-2021-24746.yaml
2022-04-02 16:15:26 +05:30
Prince Chaddha
a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
...
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
GitHub Action
9a769040d7
Auto Generated CVE annotations [Sat Apr 2 10:37:27 UTC 2022] 🤖
2022-04-02 10:37:27 +00:00
Prince Chaddha
ef88c6b170
Merge pull request #4007 from pikpikcu/patch-328
...
Create CVE-2022-23881
2022-04-02 15:58:08 +05:30
Prince Chaddha
58cb6dfdcf
Update CVE-2022-23881.yaml
2022-04-02 15:55:31 +05:30
Prince Chaddha
14d40fdb50
Update CVE-2021-44103.yaml
2022-04-02 14:47:22 +05:30
Prince Chaddha
d3c4313f64
Update CVE-2021-44103.yaml
2022-04-02 14:39:25 +05:30
GitHub Action
5e128f2c52
Auto Generated CVE annotations [Sat Apr 2 07:59:47 UTC 2022] 🤖
2022-04-02 07:59:47 +00:00
Prince Chaddha
1e011d6442
Merge pull request #4023 from Akokonunes/patch-133
...
Create CVE-2021-28377.yaml
2022-04-02 13:29:30 +05:30
Prince Chaddha
930ed5e321
Update and rename CVE-2021-28377.yaml to cves/2017/CVE-2021-28377.yaml
2022-04-02 13:23:16 +05:30
rschio
da4c4dde5d
remove trailing spaces
2022-04-01 12:53:54 -04:00
Sandeep Singh
dd0cdb1385
Added CVE-2022-22965 - Spring Framework RCE via Data Binding on JDK 9+ (Spring4Shell) ( #4024 )
2022-04-01 17:13:45 +05:30
Sandeep Singh
a6a4d78065
Added CVE-2021-46387 ( #4022 )
2022-04-01 15:13:57 +05:30
MostInterestingBotInTheWorld
6ddfbac2b4
Dashboard Content Enhancement ( #4020 )
...
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
* Syntax restore some characters
* Spacing
* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp
* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp
* Enhancement: cves/2019/CVE-2019-10068.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-11580.yaml by mp
* Enhancement: cves/2019/CVE-2019-11581.yaml by mp
* Enhancement: cves/2019/CVE-2019-12314.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Link wrapping issue
* Enhancement: cves/2019/CVE-2019-13462.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16759.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cves/2019/CVE-2019-16278.yaml by mp
* Enhancement: cves/2019/CVE-2019-10232.yaml by mp
* Enhancement: cves/2019/CVE-2019-10758.yaml by mp
* Enhancement: cves/2019/CVE-2019-11510.yaml by mp
* Enhancement: cves/2019/CVE-2019-12725.yaml by mp
* Enhancement: cves/2019/CVE-2019-13101.yaml by mp
* Enhancement: cves/2019/CVE-2019-15107.yaml by mp
* Enhancement: cves/2019/CVE-2019-15859.yaml by mp
* Enhancement: cves/2019/CVE-2019-16662.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs
* Enhancement: cves/2021/CVE-2021-33807.yaml by mp
* Enhancement: cves/2010/CVE-2010-0943.yaml by mp
* Enhancement: cves/2008/CVE-2008-6172.yaml by mp
* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: network/cisco-smi-exposure.yaml by mp
* Enhancement: cves/2021/CVE-2021-37704.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2019/CVE-2019-16313.yaml by mp
* Enhancement: cves/2021/CVE-2021-3017.yaml by mp
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp
* Enhancement: cves/2010/CVE-2010-5278.yaml by mp
* Enhancement: cves/2021/CVE-2021-37573.yaml by mp
* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp
* Enhancement: cves/2010/CVE-2010-1602.yaml by mp
* Enhancement: cves/2010/CVE-2010-1474.yaml by mp
* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp
* Enhancement: cves/2018/CVE-2018-11709.yaml by mp
* Enhancement: cves/2014/CVE-2014-2321.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp
* Manual enhancement
* Manual enhancement push due to dashboard failure
* Testing of dashboard accidentally commited to dashboard branch
* Spacing
Put some CVEs in the classification
* Add missing cve-id fields to templates in cve/
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
rschio
32d9039f6b
add CVE-2021-44103
...
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
2022-04-01 03:39:18 -04:00
xvnpw
001c10644f
Update CVE-2022-24990.yaml ( #4016 )
...
* Update CVE-2022-24990.yaml
Removed https://nvd.nist.gov/vuln/detail/CVE-2022-23990 . CVE-2022-23990 is not related to this template.
* Update CVE-2022-24990.yaml
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 02:09:11 +05:30
GitHub Action
074936d227
Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖
2022-03-31 19:40:33 +00:00
Adam Crosser
235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) ( #4019 )
...
* Updated CVE-2022-22963
* Added CVE-2021-21311 Template
* Added Shodan Query
* Updated Title
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30
Adam Crosser
2686307a64
Updated CVE-2022-22963 ( #4011 )
2022-03-31 00:39:28 +05:30
sandeep
754ba8574e
Added stop-at-first-match
2022-03-30 15:19:04 +05:30
sandeep
b06d02b2fe
template id update
2022-03-30 15:16:52 +05:30
Geekby
bec0912a2a
Create CVE-2022-26148.yaml ( #4008 )
...
* Create CVE-2022-26148.yaml
Add CVE-2022-26188
* updated matchers + extractors
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-30 13:49:34 +05:30
PikPikcU
ae32c73ffa
Create CVE-2022-23881.yaml
2022-03-29 19:41:01 -04:00
MostInterestingBotInTheWorld
13bfc8ff57
Dashboard Content Enhancements ( #3998 )
...
* Enhancement: dns/ec2-detection.yaml by mp
* Add CVSS/CWE
* Trailing space
* Linting error on comment indentation
* Typo
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: cves/2020/CVE-2020-23517.yaml by mp
* Enhancement: dns/elasticbeantalk-takeover.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/nameserver-fingerprint.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: dns/txt-fingerprint.yaml by mp
* Enhancement: dns/worksites-detection.yaml by mp
* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp
* Enhancement: exposed-panels/acemanager-login.yaml by mp
* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp
* Enhancement: dns/mx-fingerprint.yaml by mp
* Enhancement: dns/mx-service-detector.yaml by mp
* Enhancement: dns/ptr-fingerprint.yaml by mp
* Enhancement: dns/servfail-refused-hosts.yaml by mp
* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp
* Enhancement: cves/2021/CVE-2021-39501.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: cves/2021/CVE-2021-40856.yaml by mp
* Enhancement: cves/2021/CVE-2021-40859.yaml by mp
* Enhancement: cves/2021/CVE-2021-40323.yaml by mp
* Enhancement: cves/2021/CVE-2021-40539.yaml by mp
* Enhancement: cves/2010/CVE-2010-1875.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp
* Enhancement: exposed-panels/alfresco-detect.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: exposed-panels/amcrest-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: exposed-panels/alienvault-usm.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/ambari-exposure.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp
* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp
* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp
* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp
* Enhancement: exposed-panels/ampps-panel.yaml by mp
* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp
* Enhancement: exposed-panels/ametys-admin-login.yaml by mp
* Enhancement: cves/2010/CVE-2010-1878.yaml by mp
* Fix encoded chars
* trailing space
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp
* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp
* Enhancement: cves/2021/CVE-2021-40542.yaml by mp
* Enhancement: exposed-panels/apiman-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1873.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp
* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp
* Enhancement: exposed-panels/argocd-login.yaml by mp
* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp
* Enhancement: exposed-panels/atvise-login.yaml by mp
* Enhancement: exposed-panels/avantfax-panel.yaml by mp
* Enhancement: exposed-panels/avatier-password-management.yaml by mp
* Enhancement: exposed-panels/axigen-webadmin.yaml by mp
* Enhancement: exposed-panels/axigen-webmail.yaml by mp
* Enhancement: exposed-panels/azkaban-web-client.yaml by mp
* Enhancement: exposed-panels/acunetix-panel.yaml by mp
* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp
* Enhancement: exposed-panels/adminer-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1870.yaml by mp
* Enhancement: exposed-panels/adminset-panel.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp
* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp
* Enhancement: exposed-panels/advance-setup.yaml by mp
* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp
* Enhancement: exposed-panels/aims-password-portal.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* Enhancement: exposed-panels/airflow-panel.yaml by mp
* spacing issues
* Spacing
* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml
* Enhancement: technologies/waf-detect.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp
* Enhancement: network/sap-router-info-leak.yaml by mp
* Enhancement: network/exposed-adb.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp
* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp
* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp
* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp
* indentation issue
* Character encoding issue fix
* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp
* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Enhancement: default-logins/apache/airflow-default-login.yaml by mp
* Enhancement: default-logins/apache/apisix-default-login.yaml by mp
* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp
* Enhancement: default-logins/arl/arl-default-login.yaml by mp
* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp
* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp
* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp
* Enhancement: dns/caa-fingerprint.yaml by mp
* Enhancement: exposed-panels/active-admin-exposure.yaml by mp
* Enhancement: exposed-panels/activemq-panel.yaml by mp
* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp
* Restore & stomped by dashboard
* Enhancement: cves/2010/CVE-2010-1653.yaml by mp
* Enhancement: cves/2021/CVE-2021-38751.yaml by mp
* Enhancement: cves/2021/CVE-2021-39320.yaml by mp
* Enhancement: cves/2021/CVE-2021-39322.yaml by mp
* Enhancement: cves/2021/CVE-2021-39327.yaml by mp
* Enhancement: cves/2021/CVE-2021-39350.yaml by mp
* Enhancement: cves/2021/CVE-2021-39433.yaml by mp
* Enhancement: cves/2021/CVE-2021-41192.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp
* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp
* Enhancement: exposed-panels/aviatrix-panel.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Enhancement: exposed-panels/blue-iris-login.yaml by mp
* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp
* Enhancement: cves/2022/CVE-2022-24288.yaml by mp
* Enhancement: cves/2022/CVE-2022-24990.yaml by mp
* Enhancement: cves/2022/CVE-2022-26159.yaml by mp
* Enhancement: default-logins/aem/aem-default-login.yaml by mp
* Spacing issues
Add cve-id field
* fix & stomping
* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp
* Enhancement: cves/2020/CVE-2020-24912.yaml by mp
* Enhancement: cves/2021/CVE-2021-35265.yaml by mp
* Enhancement: cves/2022/CVE-2022-0437.yaml by mp
* Enhancement: cves/2010/CVE-2010-1601.yaml by mp
* Enhancement: technologies/teradici-pcoip.yaml by mp
* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp
* Enhancement: cves/2010/CVE-2010-1475.yaml by mp
* Enhancement: cves/2010/CVE-2010-1535.yaml by mp
* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp
* Enhancement: exposed-panels/epson-access-detect.yaml by mp
* Enhancement: cves/2020/CVE-2020-29453.yaml by mp
* Fix spacing
* Remove empty cve lines and relocate tags
* Remove blank cve lines & move tags
* Fix merge errors
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-2551.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-21224.yaml by mp
* Enhancement: cves/2020/CVE-2020-24148.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24186.yaml by mp
* Enhancement: cves/2020/CVE-2020-24391.yaml by mp
* Enhancement: cves/2020/CVE-2020-24589.yaml by mp
* Enhancement: cves/2020/CVE-2020-25213.yaml by mp
* Enhancement: cves/2020/CVE-2020-25223.yaml by mp
* Enhancement: cves/2020/CVE-2020-25506.yaml by mp
* Enhancement: cves/2020/CVE-2020-28871.yaml by mp
* Enhancement: cves/2020/CVE-2020-28188.yaml by mp
* Enhancement: cves/2020/CVE-2020-26948.yaml by mp
* Enhancement: cves/2020/CVE-2020-26919.yaml by mp
* Enhancement: cves/2020/CVE-2020-26214.yaml by mp
* Syntax cleanup
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Syntax and a title change
* Enhancement: cves/2021/CVE-2021-38702.yaml by mp
* Fix references
* Enhancement: cves/2021/CVE-2021-38704.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-44529.yaml by mp
* Conflicts resolved
* Fix quoting
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cves/2022/CVE-2022-23779.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp
* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Enhancement: cves/2021/CVE-2021-38647.yaml by mp
* Enhancement: cves/2021/CVE-2021-41691.yaml by mp
* Enhancement: cves/2021/CVE-2021-45967.yaml by mp
* Enhancement: cves/2022/CVE-2022-0189.yaml by mp
* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp
* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp
* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp
* Update CVE-2020-25223.yaml
* Update CVE-2020-26214.yaml
* Update CVE-2020-25506.yaml
* Update CVE-2020-2551.yaml
* Update CVE-2020-26919.yaml
* Update CVE-2021-44529.yaml
* Update CVE-2020-28871.yaml
* Update CVE-2020-28188.yaml
* Update CVE-2021-45967.yaml
* Update hue-default-credential.yaml
* Update CVE-2021-44529.yaml
* misc syntax update
Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30