Commit Graph

608 Commits (bd2e8561743120fc75f9636051d92782dcf99b26)

Author SHA1 Message Date
sandeep a7fbdb10ae misc update - WIP 2021-09-15 22:00:09 +05:30
Muhammad Daffa f168c83b44
Update CVE-2021-38647.yaml 2021-09-15 23:16:39 +07:00
Muhammad Daffa 03aa89e4de
Create CVE-2021-38647.yaml 2021-09-15 23:10:58 +07:00
GitHub Action 40b630e5cd Auto Generated CVE annotations [Wed Sep 15 10:50:34 UTC 2021] 🤖 2021-09-15 10:50:34 +00:00
Prince Chaddha d89b82f810
Update CVE-2021-24342.yaml 2021-09-15 14:35:51 +05:30
PikPikcU 88c319a148
Update CVE-2021-24342.yaml 2021-09-15 12:04:51 +07:00
PikPikcU 7a88129ee8
Update CVE-2021-24407.yaml 2021-09-15 12:03:37 +07:00
PikPikcU 9cf31a5078
Update CVE-2021-24364.yaml 2021-09-15 12:03:20 +07:00
PikPikcU 643623211c
Create CVE-2021-24342.yaml 2021-09-15 12:02:38 +07:00
PikPikcU 936ec94e23
Create CVE-2021-24407.yaml 2021-09-15 11:51:50 +07:00
PikPikcU 04ab1bb769
Create CVE-2021-24364.yaml 2021-09-15 11:45:52 +07:00
PikPikcU 3ca80153b3
Create CVE-2021-35265.yaml 2021-09-15 11:36:38 +07:00
PikPikcU fde477de48
Update CVE-2021-37833.yaml 2021-09-15 11:32:11 +07:00
PikPikcU 796093ae5d
Create CVE-2021-37833.yaml 2021-09-15 11:26:23 +07:00
GitHub Action d39ba8391e Auto Generated CVE annotations [Tue Sep 14 15:20:20 UTC 2021] 🤖 2021-09-14 15:20:20 +00:00
sandeep 6e5255514d misc update 2021-09-14 20:47:58 +05:30
sandeep 5b09b9ca11 misc update 2021-09-14 20:15:44 +05:30
Prince Chaddha ede2e49751
Update CVE-2021-21287.yaml 2021-09-14 16:52:28 +05:30
PikPikcU 4b1bca299d
Create CVE-2021-21287.yaml 2021-09-14 17:31:27 +07:00
sandeep acbb038e01 misc update 2021-09-14 01:22:44 +05:30
sandeep 162928ed27 Update CVE-2021-26295.yaml 2021-09-12 17:16:47 +05:30
sandeep 34bba4e794 misc update 2021-09-12 17:10:52 +05:30
Ice3man543 e9f728c321 Added cve annotations + severity adjustments 2021-09-10 16:56:40 +05:30
Sandeep Singh cf4ef2ac5a
Merge pull request #2622 from projectdiscovery/missing-tags 2021-09-10 12:32:47 +05:30
Philippe Delteil bcc55f6a3f
Update CVE-2021-26084.yaml
Some targets worked without the ?SpaceKey=x
2021-09-09 17:38:22 -03:00
sandeep bd24dc198e Coverage for all templates using tags 2021-09-09 19:08:13 +05:30
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
Prince Chaddha c87a4b2022
Merge pull request #2594 from push4d/CVE-2021-20114
Add files via upload
2021-09-06 17:52:37 +05:30
Prince Chaddha 54e5eea581
Update CVE-2021-20114.yaml 2021-09-06 17:48:01 +05:30
Prince Chaddha e1ab21616f
Update CVE-2021-20114.yaml 2021-09-06 17:30:51 +05:30
Prince Chaddha 0f5c79bc6e
Merge pull request #2582 from daffainfo/patch-198
Create CVE-2021-29625.yaml
2021-09-06 16:56:43 +05:30
push4d 47a892d375
Add files via upload 2021-09-06 13:21:29 +02:00
Prince Chaddha 21a7fc63a5
Update CVE-2021-29625.yaml 2021-09-06 15:16:12 +05:30
sullo ef1f7c5e92 Updates across many templates for clarity, spelling, and grammar. 2021-09-05 17:13:45 -04:00
Muhammad Daffa 062487f9e8
Create CVE-2021-29625.yaml 2021-09-05 17:12:40 +07:00
Sandeep Singh f168615b37
Merge pull request #2554 from projectdiscovery/CVE-2021-22145
Added CVE-2021-22145
2021-09-03 14:47:13 +05:30
Sandeep Singh 6daa8a3d3e
Merge pull request #1883 from johnjhacking/patch-3
Create Netmask SSRF Template
2021-09-03 13:17:08 +05:30
sandeep eea43b6304 Update CVE-2021-28918.yaml 2021-09-03 13:14:24 +05:30
sandeep f81851b53b few fixes 2021-09-03 13:10:35 +05:30
Sandeep Singh c78d1bae92
Merge pull request #2555 from pdelteil/patch-46
Update CVE-2021-26084.yaml
2021-09-03 12:42:18 +05:30
sandeep 2d104a0053 Added multiple endpoint support 2021-09-03 12:40:20 +05:30
John Jackson 56af312e25
Added an additional check
Hello, when you get the change, please check the changes. I removed some of the methods and cleaned it up + made a matcher for /etc/passwd. Thanks!
2021-09-02 22:48:24 -06:00
Prince Chaddha c38cb4a7b2
Update and rename CVE-2021-34370.yaml to cves/2021/CVE-2021-34370.yaml 2021-09-03 09:16:36 +05:30
Sandeep Singh cdd022c29d
Merge pull request #2550 from projectdiscovery/adding-sfm
Added stop-at-first-match in applicable templates
2021-09-02 23:09:21 +05:30
Philippe Delteil fb0aabfe96
Update CVE-2021-26084.yaml
Extra paths were I did found vulnerable assets
2021-09-02 13:35:07 -04:00
sandeep c2048eb6b5 Added CVE-2021-22145
Co-Authored-By: Dhiyaneshwaran <leedhiyanesh@gmail.com>
2021-09-02 22:07:29 +05:30
sandeep c266084621 Added stop-at-first-match in applicable templates 2021-09-02 17:29:10 +05:30
Prince Chaddha 0832288afb
Merge pull request #2536 from projectdiscovery/CVE-2021-31856
Create CVE-2021-31856.yaml
2021-09-02 17:03:42 +05:30
Sandeep Singh 71531d8467
Merge pull request #2444 from pikpikcu/patch-257
Added CVE-2021-32819
2021-09-02 00:35:45 +05:30
sandeep 6c1dc4de74 avoiding lint warnings 2021-09-02 00:28:41 +05:30
sandeep 38b456eb34 safe payload + reference 2021-09-02 00:04:06 +05:30
Prince Chaddha ff05dfd60b
Create CVE-2021-31856.yaml 2021-09-01 17:45:54 +05:30
sandeep 8d5172ed62 Removed unused headers
Co-Authored-By: Dhiyaneshwaran <leedhiyanesh@gmail.com>
2021-09-01 02:11:40 +05:30
sandeep f1f5add797 Added CVE-2021-26084
Co-Authored-By: Dhiyaneshwaran <leedhiyanesh@gmail.com>
2021-09-01 02:10:27 +05:30
Prince Chaddha eb820fe1f2
Update CVE-2021-24288.yaml 2021-08-31 11:07:38 +05:30
Prince Chaddha 886c06b53e
Rename CVE-2021-24288.yaml to cves/2021/CVE-2021-24288.yaml 2021-08-31 10:57:44 +05:30
Noam Rathaus 0e9ce643db Updated 2021-08-30 12:51:47 +03:00
sandeep ac68ef0e9a misc updates 2021-08-29 14:44:12 +05:30
Noam Rathaus 5f446d4553 Updated description 2021-08-29 09:47:35 +03:00
Noam Rathaus 5526895971 Fix description 2021-08-29 09:45:32 +03:00
Noam Rathaus f6e9fea5c4 Update the description 2021-08-29 09:43:37 +03:00
forgedhallpass a4250b8f2f Merge remote-tracking branch 'origin' into dynamic_attributes 2021-08-26 15:04:14 +03:00
sandeep 7a2138a8c8 few updates 2021-08-26 15:27:01 +05:30
sandeep 9ada252cdb misc update 2021-08-26 15:25:05 +05:30
Bùi Đại Gia 7a468632dc
Create CVE-2021-26086.yaml 2021-08-26 10:45:56 +07:00
sandeep 05305904ef more strict matchers 2021-08-26 02:43:53 +05:30
forgedhallpass 110f9c9ddd Merge remote-tracking branch 'origin' into dynamic_attributes 2021-08-24 20:38:11 +03:00
Sandeep Singh 9e4b63b669
Merge pull request #2475 from pajoda/CVE-2021-37538
Create CVE-2021-37538.yaml
2021-08-24 18:35:53 +05:30
sandeep 5410d9ab85 minor update 2021-08-24 18:35:13 +05:30
Prince Chaddha 8361cbe8c3
Update CVE-2021-21234.yaml 2021-08-24 15:19:47 +05:30
Prince Chaddha bdd2f700be
Update CVE-2021-21234.yaml 2021-08-24 14:16:14 +05:30
PikPikcU 63e208e3d7
Update CVE-2021-21234.yaml 2021-08-24 14:47:25 +07:00
pajoda 11b6899c9e
Create CVE-2021-37538.yaml 2021-08-24 01:42:35 +00:00
sandeep 91a429c5d1 minor update 2021-08-21 01:12:52 +05:30
PikPikcU 611d5f76dd
Create CVE-2021-32819.yaml 2021-08-20 20:19:00 +07:00
forgedhallpass dc4cc62629 Merge remote-tracking branch 'origin/master' into dynamic_attributes 2021-08-20 15:35:17 +03:00
sandeep 3f803deb28 more updates 2021-08-20 02:14:42 +05:30
forgedhallpass 77103bc629 Satisfying the linter (all errors and warnings)
* whitespace modifications only
2021-08-19 17:44:46 +03:00
Sandeep Singh 2510c01fac
Merge pull request #2419 from dwisiswant0/add/CVE-2021-38751
Add CVE-2021-38751
2021-08-19 20:09:48 +05:30
forgedhallpass 97d4f8705b Fixed mistakes/typos
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:55 +03:00
forgedhallpass f55d6b75e1 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:59:12 +03:00
forgedhallpass 7b29be739e Merge branch 'master' into dynamic_attributes 2021-08-19 16:23:26 +03:00
forgedhallpass ffaff64565 Changes fixes/around dynamic attributes ("additional-fields")
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:17:27 +03:00
forgedhallpass 0b432b341b Added comments with URLs under the "references" field
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-19 16:15:35 +03:00
Dwi Siswanto 33ec4eddbf Update regEx matcher 2021-08-19 06:39:09 +07:00
Dwi Siswanto 09cf9f35eb Update matcher using regex instead 2021-08-18 20:54:49 +07:00
forgedhallpass cdf9451158 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
forgedhallpass 4c920b2552 Rename "references" to "reference" to match the expected template info structure
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:29:20 +03:00
Prince Chaddha f021817d65
Update CVE-2021-38702.yaml 2021-08-17 22:06:37 +05:30
Geeknik Labs 888c9a4573
Create CVE-2021-38702.yaml 2021-08-17 08:11:02 -05:00
Prince Chaddha 7bb40042a3
Update CVE-2021-38751.yaml 2021-08-17 17:13:45 +05:30
Prince Chaddha ec9b83bd1f
Update CVE-2021-38751.yaml 2021-08-17 17:12:51 +05:30
Prince Chaddha beb11d77e3
Update CVE-2021-32030.yaml 2021-08-17 17:05:12 +05:30
Dwi Siswanto 8fa76f68f6 Add CVE-2021-38751 2021-08-17 02:18:49 +07:00
GwanYeong Kim c11328da0b Create CVE-2021-32030.yaml
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-16 20:13:22 +09:00
Prince Chaddha 272dec095d
Update CVE-2021-33807.yaml 2021-08-16 13:55:31 +05:30
Muhammad Daffa b426441cf4
Update CVE-2021-33807.yaml 2021-08-16 06:47:56 +07:00
Muhammad Daffa fa8c120f90
Create CVE-2021-33807.yaml 2021-08-16 06:47:24 +07:00
sandeep e9e84a4b36 minor update 2021-08-15 00:57:33 +05:30
pajoda b15ed3324c
Include path for unpatched old versions 2021-08-14 19:18:15 +00:00
pajoda 5d3d6ca911
Maintain matcher and extractor consistency 2021-08-14 18:56:37 +00:00
pajoda c9fa891245
Improve template metadata 2021-08-14 16:34:59 +00:00
pajoda 180219cc63
Add CVE-2021-37704 template 2021-08-14 16:22:35 +00:00
Prince Chaddha 09e48ac8b4
Merge pull request #2396 from geeknik/patch-18
Create CVE-2021-37573.yaml
2021-08-14 14:43:11 +05:30
Prince Chaddha b5123f5abe
Update CVE-2021-37573.yaml 2021-08-14 14:40:52 +05:30
Prince Chaddha 4c811a4dc2
Update CVE-2021-3017.yaml 2021-08-14 14:03:43 +05:30
Prince Chaddha 09284afb09
Update CVE-2021-3017.yaml 2021-08-14 13:58:04 +05:30
Prince Chaddha 916d421b98
Update CVE-2021-3017.yaml 2021-08-14 13:56:56 +05:30
PikPikcU 29e8c790fc
Create CVE-2021-3017.yaml 2021-08-14 13:32:59 +07:00
Geeknik Labs 344fba3089
Update CVE-2021-37573.yaml 2021-08-13 17:17:35 -05:00
Geeknik Labs eed8e2e573
Update CVE-2021-37573.yaml 2021-08-13 17:17:18 -05:00
Geeknik Labs 1ea3dfe3b7
Create CVE-2021-37573.yaml 2021-08-13 17:14:13 -05:00
SaN ThosH 035ee06740
Update CVE-2021-35464.yaml 2021-08-13 16:22:36 +05:30
sandeep c537e2ccd4 minor update 2021-08-12 22:09:42 +05:30
Sandeep Singh a0275a9aeb
Merge pull request #2370 from evait-security/master
add ProxyShell detection template
2021-08-12 22:08:59 +05:30
sandeep b69cd23cf4 minor updates 2021-08-12 21:24:09 +05:30
sandeep a69a8718c7 removing extra headers 2021-08-12 14:11:49 +05:30
sandeep 7c076d7e0e Added CVE-2021-20092 2021-08-11 18:28:37 +05:30
sandeep b64f472b91 Added CVE-2021-20091 2021-08-11 17:58:20 +05:30
sandeep 76d184331c minor update 2021-08-11 17:57:58 +05:30
sandeep 74a17976a8 Update CVE-2021-20090.yaml 2021-08-10 22:23:57 +05:30
sandeep d84eb0fd7e Added CVE-2021-20090 2021-08-10 22:21:46 +05:30
Paul Werther 36e43b66ec follow redirect, compare body instead of status code, eliminate false positives 2021-08-10 10:53:58 +02:00
Paul Werther ff558bd94e add second url for more stable detection 2021-08-10 10:17:37 +02:00
Paul Werther 99d41391e7 add ProxyShell detection template 2021-08-10 09:59:06 +02:00
sandeep 8c48ca97d2 matcher + payload + regex updates 2021-08-09 21:58:28 +05:30
sandeep 28f1036194 minor update 2021-08-08 22:57:07 +05:30
sandeep b59341b273 minor update 2021-08-06 21:23:46 +05:30
sandeep 34f905286a moving files around 2021-08-05 12:52:50 +05:30
sandeep 40f3693456 Added page specific matcher 2021-08-04 21:32:50 +05:30
Prince Chaddha c7871dc7a6
Merge pull request #2021 from daffainfo/patch-59
Create CVE-2021-24235.yaml
2021-08-04 20:02:01 +05:30
Prince Chaddha 98e5c69560
Update CVE-2021-24235.yaml 2021-08-04 20:00:11 +05:30
sandeep 515d469506 strict matchers 2021-08-04 12:10:24 +05:30
Sandeep Singh 5965a3e44c
Merge pull request #2319 from dwisiswant0/add/CVE-2021-37216
Add CVE-2021-37216
2021-08-03 20:40:52 +05:30
sandeep a3347504fe minor update 2021-08-03 20:18:40 +05:30
sandeep 1b5420bc4b updated matcher 2021-08-03 20:14:14 +05:30
Prince Chaddha 62bcd6932d
Merge pull request #2198 from gy741/rule-add-v43
Create CVE-2021-32305.yaml
2021-08-03 20:02:32 +05:30
Dwi Siswanto f59905ced2 Add CVE-2021-37216 2021-08-03 21:31:33 +07:00
Muhammad Daffa 63cda4e1ef
Update CVE-2021-24235.yaml 2021-08-03 14:58:19 +07:00
sandeep e2b20b8f01 Adding metadata 2021-08-02 23:16:05 +05:30
Sandeep Singh 249c39af51
Merge pull request #2299 from httpvoid/master
Add CVE-2021-29484 - Ghost CMS DOM XSS
2021-08-02 23:13:22 +05:30
Harsh Jaiswal 3f8e3ce2d0
Update cves/2021/CVE-2021-29484.yaml
Co-authored-by: Toufik Airane <toufik.airane@appsectribe.com>
2021-08-02 23:05:35 +05:30
Prince Chaddha 7aa7401f3a
Merge pull request #2278 from gy741/rule-add-v44
Create CVE-2021-21816.yaml
2021-08-02 21:17:00 +05:30
sandeep a1d73379aa Added CVE-2021-27561 2021-08-02 18:25:13 +05:30
Prince Chaddha c670df2925
Update CVE-2021-21816.yaml 2021-08-02 17:57:09 +05:30
Prince Chaddha 5c7a745e04
Merge pull request #2298 from gy741/rule-add-v47
Create CVE-2021-3297.yaml
2021-08-02 17:18:29 +05:30
Prince Chaddha 27f96f96c4
Update CVE-2021-3297.yaml 2021-08-02 17:12:42 +05:30
Prince Chaddha 2c0ecb01b3
Update CVE-2021-3297.yaml 2021-08-02 17:09:52 +05:30
Prince Chaddha bae8422cfb
Update CVE-2021-3297.yaml 2021-08-02 17:06:07 +05:30
Noam Rathaus 37608a954c Description 2021-08-02 12:56:17 +03:00
Noam Rathaus 6950d325e6 Update description 2021-08-02 12:55:21 +03:00
rootxharsh 6f2d74337e Add CVE-2021-29484.yaml 2021-08-02 13:28:24 +05:30
GwanYeong Kim bfa043e51f Create CVE-2021-3297.yaml
On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-02 16:35:38 +09:00
Sandeep Singh 81572ce596
Merge pull request #2292 from geeknik/patch-4
Update CVE-2021-31581.yaml
2021-08-02 02:09:32 +05:30
Sandeep Singh b04dc13dcd
Update CVE-2021-31581.yaml 2021-08-02 02:08:28 +05:30
Sandeep Singh d416aea142
Merge pull request #2279 from gy741/rule-add-v45
Create CVE-2021-36380.yaml
2021-08-02 01:36:56 +05:30
sandeep ebf1653d65 Update CVE-2021-36380.yaml 2021-08-02 01:33:10 +05:30
Sandeep Singh 76fb40314a
Merge pull request #2277 from pikpikcu/patch-241
Update CVE-2021-3223
2021-08-02 01:15:39 +05:30
sandeep 5c22441bac Update CVE-2021-3223.yaml 2021-08-02 01:11:43 +05:30
Geeknik Labs 9cbb151600
Update CVE-2021-31581.yaml
Fixes https://github.com/projectdiscovery/nuclei-templates/issues/2285. 👍🏻
2021-08-01 10:59:39 -05:00
Noam Rathaus 03dfb4bff6 More references 2021-08-01 09:16:33 +03:00
Noam Rathaus 3de7af6018 Better reference 2021-08-01 09:14:14 +03:00
GwanYeong Kim 0678e7d233 Create CVE-2021-36380.yaml
The /cgi/networkDiag.cgi script directly incorporated user-controllable parameters within a shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. The following POST request injects a new command that instructs the server to establish a reverse TCP connection to another system, allowing the establishment of an interactive remote shell session.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-01 03:10:49 +09:00
GwanYeong Kim 5b3529bad5 Create CVE-2021-21816.yaml
An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-08-01 02:42:48 +09:00
PikPikcU ae672521d9
Update CVE-2021-3223.yaml 2021-07-31 16:12:48 +07:00
GwanYeong Kim 12b832cc36 Create CVE-2021-32305.yaml
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-27 09:24:35 +09:00
sandeep 9c66387f0f More CVEs Template 2021-07-26 22:48:45 +05:30
sandeep b990243906 uniform tags 2021-07-26 14:25:43 +05:30
sandeep 6ccc5f8792 matcher update to handle edge cases 2021-07-25 03:05:55 +05:30
Muhammad Daffa 3d90fd1047
Fix wrong regex matcher 2021-07-24 17:10:02 +07:00
sandeep e97e2a4f2a Template update 2021-07-24 06:22:48 +05:30
Sandeep Singh 4b444af3c4
Merge pull request #2125 from DhiyaneshGeek/master
17 New Templates Added
2021-07-24 03:26:09 +05:30
sandeep 7d72783090 WIP improvements 2021-07-22 16:32:37 +05:30
sandeep 938fdeec8f Added CVE-2021-34429 and fixed related templates 2021-07-22 15:23:19 +05:30
Dhiyaneshwaran 8d8f39c26f
Create CVE-2021-32820.yaml 2021-07-21 10:40:13 +05:30
Prince Chaddha 7020d17f13
Merge pull request #2107 from daffainfo/patch-90
Create CVE-2021-23241.yaml
2021-07-20 17:26:37 +05:30
sandeep 8f8105bb99 Update CVE-2021-23241.yaml 2021-07-20 16:00:00 +05:30
Prince Chaddha 41c9c3e3f9
Update CVE-2021-23241.yaml 2021-07-20 14:25:37 +05:30
Prince Chaddha 86a7fad73a
Update CVE-2021-23241.yaml 2021-07-20 14:23:39 +05:30
Prince Chaddha 1fc173982d
Update CVE-2021-21479.yaml 2021-07-20 14:22:31 +05:30
Muhammad Daffa c63bb91bdb
Create CVE-2021-23241.yaml 2021-07-20 15:52:10 +07:00
Prince Chaddha 94511129f6
Merge pull request #2076 from dwisiswant0/GHSL-2020-227
Server-Side Template Injection leading to unauthenticated Remote Code Execution in SCIMono - CVE-2021-21479
2021-07-20 14:20:31 +05:30
Prince Chaddha d738d2c9a3
Update CVE-2021-21479.yaml 2021-07-20 14:18:21 +05:30
Prince Chaddha b10b8a61b8
Update CVE-2021-21479.yaml 2021-07-20 14:16:30 +05:30
Prince Chaddha 0af69ac0fd
Update CVE-2021-21479.yaml 2021-07-20 14:15:45 +05:30
Muhammad Daffa 21809132da
Renamed to CVE-2021-24340.yaml 2021-07-20 13:36:04 +07:00
Prince Chaddha eb15971f16
Merge pull request #2096 from geeknik/patch-4
Create CVE-2021-26475.yaml
2021-07-20 11:53:45 +05:30
Sandeep Singh 6eee57115c
Merge pull request #2083 from projectdiscovery/fixing-xss-matchers
fixing-xss-matchers
2021-07-20 00:28:01 +05:30
sandeep 9d19d5fb5b description update 2021-07-20 00:12:01 +05:30
sandeep 13d26d8c6d moving files around 2021-07-20 00:10:30 +05:30
Geeknik Labs 39acc90454
Create CVE-2021-26475.yaml
CVE-2021-26475 -- EPrints 3.4.2 exposes a reflected XSS opportunity in the via a cgi/cal URI.
2021-07-19 08:34:21 -05:00
sandeep eec253fdd8 minor update 2021-07-19 16:53:47 +05:30
Prince Chaddha 707083438e
Update CVE-2021-24389.yaml 2021-07-19 11:37:51 +05:30
Prince Chaddha 751f4e099c
Update CVE-2021-24335.yaml 2021-07-19 11:37:18 +05:30
Prince Chaddha c8ee50bd9b
Update CVE-2021-24320.yaml 2021-07-19 11:36:45 +05:30
Prince Chaddha 06a82e2c78
Update CVE-2021-24298.yaml 2021-07-19 11:36:11 +05:30
Suman Kar 77fd227376
Update CVE-2021-24498.yaml 2021-07-19 10:45:58 +05:30
Suman Kar 556a94136b Calendar Event Multi View < 1.4.01 - Unauthenticated Reflected Cross-Site Scripting (XSS) 2021-07-19 10:40:50 +05:30
Sandeep Singh f9c8314092
Merge pull request #2077 from gy741/rule-add-v27
Create Advantech R-SeeNet Multiple Reflected XSS vulnerabilities
2021-07-18 23:17:40 +05:30
sandeep c56680cef3 Additional matcher 2021-07-18 23:14:19 +05:30