Commit Graph

221 Commits (aad9e6aeab9fc28dff390c258b5524b77ab203d9)

Author SHA1 Message Date
Prince Chaddha 631005ebaa
Update CVE-2018-12998.yaml 2021-09-16 23:03:45 +05:30
PikPikcU 3a2eacf6b9
Update CVE-2018-12998.yaml 2021-09-15 11:31:34 +07:00
PikPikcU 85c32c4cd2
Create CVE-2018-12998.yaml 2021-09-15 11:00:16 +07:00
sandeep e831dd4fe0 lint error fix 2021-09-12 20:45:49 +05:30
sandeep 35e8c3c1cf Added complete poc 2021-09-12 19:50:30 +05:30
Ice3man543 e9f728c321 Added cve annotations + severity adjustments 2021-09-10 16:56:40 +05:30
Prince Chaddha 13ec24c2e3
Update CVE-2018-15535.yaml 2021-09-10 12:01:01 +05:30
Muhammad Daffa 02e6ccfd7e
Create CVE-2018-15535.yaml 2021-09-09 19:48:08 +07:00
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
Sandeep Singh 0880b65284
Rename CVE-2018–14064.yaml to CVE-2018-14064.yaml 2021-09-08 13:11:41 +05:30
Prince Chaddha ef6350bfcc
Update and rename CVE-2018–14064.yaml to cves/2018/CVE-2018–14064.yaml 2021-09-07 18:14:38 +05:30
Prince Chaddha 960a568ef8
Merge pull request #2500 from LogicalHunter/temp-4
Added CVE-2018-8719.yaml Template
2021-08-31 16:30:09 +05:30
Prince Chaddha 64b25c359b
Update CVE-2018-8719.yaml 2021-08-31 12:07:28 +05:30
Noam Rathaus 5b344c944c Updated 2021-08-30 12:50:56 +03:00
Prince Chaddha 02b429fe89
Update CVE-2018-8719.yaml 2021-08-29 17:56:50 +05:30
sandeep ac68ef0e9a misc updates 2021-08-29 14:44:12 +05:30
Noam Rathaus 5e27e5d528 Add description 2021-08-29 09:42:18 +03:00
Noam Rathaus 3a1f7e0910 Remove | 2021-08-29 09:36:50 +03:00
Noam Rathaus 5b0a50d514 Add description and references 2021-08-29 09:24:41 +03:00
Noam Rathaus 9f9970c8e9 Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates 2021-08-29 09:15:40 +03:00
LogicalHunter 40371e83cc Added CVE-2018-8719.yaml Template 2021-08-27 11:40:18 -07:00
forgedhallpass 419a957409 Fixing errors in templates
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-27 10:43:24 +03:00
forgedhallpass a4250b8f2f Merge remote-tracking branch 'origin' into dynamic_attributes 2021-08-26 15:04:14 +03:00
Prince Chaddha 972ba7f4c2
Update CVE-2018-12095.yaml 2021-08-25 16:55:53 +05:30
Borna Nematzadeh 2a3b20de2c
Update CVE-2018-12095.yaml 2021-08-24 12:27:07 -07:00
LogicalHunter 60e2816815 Added CVE-2018-12095.yaml Template 2021-08-24 10:29:51 -07:00
forgedhallpass 296edfc37b Merge remote-tracking branch 'origin' into dynamic_attributes 2021-08-23 14:40:33 +03:00
Sandeep Singh 04b401a8ef
Merge pull request #2456 from projectdiscovery/payloads-update
Payloads positional update to keep the request format uniform
2021-08-23 15:26:35 +05:30
sandeep 1a34341c1e Update CVE-2018-6008.yaml 2021-08-23 15:20:53 +05:30
Muhammad Daffa 906d9fd5af
Create CVE-2018-6008.yaml 2021-08-23 07:03:54 +07:00
sandeep 2aa54304ee Payloads positional update to keep the request format uniform 2021-08-22 23:39:33 +05:30
Prince Chaddha 9cc8cd3353
Update CVE-2018-15473.yaml 2021-08-21 18:52:00 +05:30
Muhammad Daffa 1447a6d3d4
Update and rename network/openssh-username-enumeration.yaml to cves/2018/CVE-2018-15473.yaml 2021-08-21 18:55:11 +07:00
forgedhallpass 77103bc629 Satisfying the linter (all errors and warnings)
* whitespace modifications only
2021-08-19 17:44:46 +03:00
forgedhallpass f55d6b75e1 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:12 +03:00
forgedhallpass 7b29be739e Merge branch 'master' into dynamic_attributes 2021-08-19 16:23:26 +03:00
forgedhallpass ffaff64565 Changes fixes/around dynamic attributes ("additional-fields")
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:17:27 +03:00
forgedhallpass 0b432b341b Added comments with URLs under the "references" field
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:15:35 +03:00
forgedhallpass e68d15ab63 Fixed mistakes/typos in the templates.
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 15:30:14 +03:00
forgedhallpass cdf9451158 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
Muhammad Daffa 76e6fbcf8e
Create CVE-2018-16288.yaml 2021-08-12 09:41:00 +07:00
GwanYeong Kim 19517e8855 Create CVE-2018-16167.yaml
LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-10 14:30:22 +09:00
Noam Rathaus 14d2dcd26b reference 2021-08-09 16:35:43 +03:00
Prince Chaddha 0b3a307294
Update CVE-2018-15517.yaml 2021-08-04 13:44:42 +05:30
Prince Chaddha 8cc213cec1
Update CVE-2018-15745.yaml 2021-08-04 13:42:14 +05:30
GwanYeong Kim 812d4faca2 Create CVE-2018-15517.yaml
Using a web browser or script SSRF can be initiated against internal/external systems to conduct port scans by leveraging D LINKs MailConnect component. The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI. This can undermine accountability of where scan or connections actually came from and or bypass the FW etc. This can be automated via script or using Web Browser.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-04 14:25:54 +09:00
GwanYeong Kim adce7d2c39 Create CVE-2018-15745.yaml
Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-04 14:16:24 +09:00
Prince Chaddha 41b06a2ed7
Merge pull request #2216 from pikpikcu/patch-223
Add Zimbra XSS
2021-08-03 13:22:42 +05:30
Prince Chaddha c4acd62307
Update CVE-2018-14013.yaml 2021-08-03 13:13:57 +05:30
Prince Chaddha 1c83792023
Merge pull request #2314 from daffainfo/patch-126
Create CVE-2018-20470.yaml
2021-08-03 13:08:36 +05:30