GitHub Action
|
de280482c4
|
TemplateMan Update [Thu Oct 19 10:38:58 UTC 2023] 🤖
|
2023-10-19 10:39:00 +00:00 |
GitHub Action
|
e8ab162fd4
|
TemplateMan Update [Wed Oct 18 16:26:29 UTC 2023] 🤖
|
2023-10-18 16:26:31 +00:00 |
GitHub Action
|
2dc1bd140c
|
TemplateMan Update [Tue Oct 17 17:52:25 UTC 2023] 🤖
|
2023-10-17 17:52:27 +00:00 |
sandeep
|
161b90353a
|
templateman update
|
2023-10-14 16:57:55 +05:30 |
J4vaovo
|
9de5684be8
|
Update shiro-deserialization-detection.yaml
|
2023-10-08 07:46:50 +08:00 |
J4vaovo
|
425565567a
|
Update shiro-deserialization-detection.yaml
|
2023-10-08 07:31:39 +08:00 |
GitHub Action
|
d9efa67522
|
TemplateMan Update [Mon Oct 2 16:03:47 UTC 2023] 🤖
|
2023-10-02 16:03:47 +00:00 |
Prince Chaddha
|
34a19dd885
|
fix trailing space
|
2023-09-25 23:21:28 +05:30 |
Prince Chaddha
|
c02fc785e0
|
Create shiro-deserialization-detection.yaml
|
2023-09-25 23:17:08 +05:30 |
Ritik Chaddha
|
f46e827d9b
|
Merge pull request #7065 from j4vaovo/patch-16
Create apache-solr-91-rce.yaml
|
2023-08-02 13:49:40 +05:30 |
Ritik Chaddha
|
4470bfbb29
|
Update apache-solr-rce.yaml
|
2023-08-02 13:45:54 +05:30 |
Dhiyaneshwaran
|
278e2ec6e2
|
Update and rename vulnerabilities/apache-solr-91-rce.yaml to http/vulnerabilities/apache/apache-solr-rce.yaml
|
2023-08-01 10:57:33 +05:30 |
sandeep
|
8381c3428e
|
vulnerabilities enrichment
|
2023-07-16 19:02:52 +05:30 |
Prince Chaddha
|
0a681ec0bb
|
removed empty lines
|
2023-07-07 16:56:27 +05:30 |
Prince Chaddha
|
75ed275328
|
removed enhanced by comments
|
2023-07-05 13:37:58 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
Ritik Chaddha
|
6ee69d03a1
|
Merge branch 'main' into update-log4j
|
2023-05-11 13:08:41 +05:30 |
Sandeep Singh
|
6addff3ac6
|
misc syntax fixes (#7201)
|
2023-05-09 18:13:13 +05:30 |
Ritik Chaddha
|
f96e98052e
|
payload update
|
2023-05-08 11:07:00 +05:30 |
Ritik Chaddha
|
05eb753985
|
Update apache-ofbiz-log4j-rce.yaml
|
2023-05-04 11:05:06 +05:30 |
Ritik Chaddha
|
82a8526978
|
updated templates
|
2023-05-03 23:51:23 +05:30 |
Ritik Chaddha
|
b50e22b7da
|
updated log4j
|
2023-05-03 23:21:44 +05:30 |
Ritik Chaddha
|
3cf8d0bd94
|
Update All Existing Log4j Templates
|
2023-05-03 17:21:48 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
Dhiyaneshwaran
|
bb63a4aeab
|
Merge pull request #7116 from j4vaovo/patch-28
Create apache-druid-kafka-connect-rce.yaml
|
2023-04-28 15:27:30 +05:30 |
Dhiyaneshwaran
|
5136c8f23c
|
Rename vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml to http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml
|
2023-04-28 15:25:03 +05:30 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |