Commit Graph

1158 Commits (bd5823ea54cd59ebb1b4d6cc6882b64121933f12)

Author SHA1 Message Date
MostInterestingBotInTheWorld 776b796ce9 Enhancement: cves/2021/CVE-2021-44228.yaml by cs 2022-02-28 14:52:32 -05:00
MostInterestingBotInTheWorld 75d91bdf95 Enhancement: cves/2021/CVE-2021-45092.yaml by mp 2022-02-28 14:50:44 -05:00
MostInterestingBotInTheWorld fd60d738d5 Enhancement: cves/2021/CVE-2021-45046.yaml by mp 2022-02-28 13:56:15 -05:00
MostInterestingBotInTheWorld 9ab6b54780 Enhancement: cves/2021/CVE-2021-45043.yaml by mp 2022-02-28 13:54:12 -05:00
MostInterestingBotInTheWorld e465219477 Enhancement: cves/2021/CVE-2021-44848.yaml by mp 2022-02-28 13:51:40 -05:00
MostInterestingBotInTheWorld 2abb82480f Enhancement: cves/2021/CVE-2021-44528.yaml by mp 2022-02-28 13:50:48 -05:00
MostInterestingBotInTheWorld e07f94c294 Enhancement: cves/2021/CVE-2021-44427.yaml by mp 2022-02-28 13:49:59 -05:00
MostInterestingBotInTheWorld ede14c11e7 Enhancement: cves/2021/CVE-2021-44228.yaml by mp 2022-02-28 13:48:26 -05:00
MostInterestingBotInTheWorld 6cb038b6ff Enhancement: cves/2021/CVE-2021-43810.yaml by mp 2022-02-28 13:45:33 -05:00
MostInterestingBotInTheWorld 5ababa0db3 Enhancement: cves/2021/CVE-2021-43798.yaml by mp 2022-02-28 13:44:10 -05:00
MostInterestingBotInTheWorld 5fd4d78f23 Enhancement: cves/2021/CVE-2021-43778.yaml by mp 2022-02-28 13:41:58 -05:00
MostInterestingBotInTheWorld 2b2bfd9d47 Enhancement: cves/2021/CVE-2021-43496.yaml by mp 2022-02-28 13:39:57 -05:00
MostInterestingBotInTheWorld 6ee197b56d Enhancement: cves/2021/CVE-2021-43495.yaml by mp 2022-02-28 13:37:19 -05:00
MostInterestingBotInTheWorld c40f12d4a7 Enhancement: cves/2021/CVE-2021-43287.yaml by mp 2022-02-28 13:36:02 -05:00
MostInterestingBotInTheWorld 7efa94a6b8 Enhancement: cves/2021/CVE-2021-43062.yaml by mp 2022-02-28 13:07:38 -05:00
MostInterestingBotInTheWorld e8abd2c811 Enhancement: cves/2021/CVE-2021-43062.yaml by mp 2022-02-28 13:06:34 -05:00
MostInterestingBotInTheWorld 855a848fd0 Enhancement: cves/2021/CVE-2021-42567.yaml by mp 2022-02-28 13:05:03 -05:00
MostInterestingBotInTheWorld f2909c7bb9 Enhancement: cves/2021/CVE-2021-42566.yaml by mp 2022-02-28 12:52:06 -05:00
pussycat0x 43d242e195
Delete CVE-2021-39316.yaml 2022-02-28 22:31:33 +05:30
sullo 8188cb1216 Syntax and language 2022-02-28 11:05:59 -05:00
MostInterestingBotInTheWorld f18404302a
Dashboard Text Enhancement (#3798)
Dashboard text enhancements
2022-02-28 09:09:26 -05:00
GitHub Action 5b154f6b93 Auto Generated CVE annotations [Sun Feb 27 15:44:38 UTC 2022] 🤖 2022-02-27 15:44:38 +00:00
pussycat0x 51231d0ea6
Add files via upload 2022-02-27 21:13:00 +05:30
Prince Chaddha 87b8f90358
Merge pull request #3771 from cckuailong/test1
add CVE-2021-24762
2022-02-27 19:48:49 +05:30
Prince Chaddha 23816a3181
Update CVE-2021-24762.yaml 2022-02-27 19:34:26 +05:30
Prince Chaddha c2a9428dd7
Update CVE-2021-24762.yaml 2022-02-27 19:29:50 +05:30
GitHub Action 01064ceeab Auto Generated CVE annotations [Sun Feb 27 10:32:13 UTC 2022] 🤖 2022-02-27 10:32:13 +00:00
Prince Chaddha f689c390d9
Merge pull request #3777 from bananabr/redash
Redash
2022-02-27 02:29:52 +05:30
Prince Chaddha 04ae5b2e4d
Update CVE-2021-41192.yaml 2022-02-27 02:27:18 +05:30
MostInterestingBotInTheWorld b631f45e1c
Dashboard Text Enhancements (#3778)
Dashboard text enhancements
2022-02-25 17:07:55 -05:00
Daniel Santos dde0b0f394 CVE-2021-41192: refactor 2022-02-25 13:19:01 -06:00
Daniel Santos 7a843ee405 CVE-2021-41192: refactor 2022-02-25 13:10:32 -06:00
Daniel Santos a8826a4e54 CVE-2021-41192 2022-02-25 10:17:47 -06:00
cckuailong b845cefc2b add CVE-2021-24762 2022-02-25 14:27:21 +08:00
xiaoheihei1107 c61a253f75
Create CVE-2021-3293.yaml (#3748)
* Create CVE-2021-3293.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-23 13:54:44 +05:30
MostInterestingBotInTheWorld 3e13f1cce6
Dashboard Template Enhancements (#3752)
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs

* Enhancement: cves/2010/CVE-2010-1957.yaml by mp

* Enhancement: cves/2010/CVE-2010-1977.yaml by mp

* Enhancement: cves/2010/CVE-2010-1979.yaml by mp

* Enhancement: cves/2010/CVE-2010-1980.yaml by mp

* Enhancement: cves/2010/CVE-2010-1981.yaml by mp

* Enhancement: cves/2010/CVE-2010-1982.yaml by mp

* Enhancement: cves/2010/CVE-2010-1983.yaml by mp

* Enhancement: cves/2010/CVE-2010-2033.yaml by mp

* Enhancement: cves/2010/CVE-2010-2034.yaml by mp

* Enhancement: cves/2010/CVE-2010-2035.yaml by mp

* Enhancement: cves/2010/CVE-2010-2036.yaml by mp

* Enhancement: cves/2010/CVE-2010-2037.yaml by mp

* Enhancement: cves/2010/CVE-2010-2045.yaml by mp

* Enhancement: cves/2010/CVE-2010-2050.yaml by mp

* Enhancement: cves/2010/CVE-2010-2122.yaml by mp

* Enhancement: cves/2010/CVE-2010-1980.yaml by mp

* Enhancement: cves/2010/CVE-2010-1981.yaml by mp

* Enhancement: cves/2010/CVE-2010-1982.yaml by mp

* Enhancement: cves/2010/CVE-2010-2035.yaml by mp

* Enhancement: cves/2010/CVE-2010-2128.yaml by mp

* Enhancement: cves/2010/CVE-2010-2259.yaml by mp

* Enhancement: cves/2010/CVE-2010-2307.yaml by mp

* Enhancement: cves/2010/CVE-2010-2507.yaml by mp

* Enhancement: cves/2010/CVE-2010-2680.yaml by mp

* Enhancement: cves/2010/CVE-2010-2682.yaml by mp

* Enhancement: cves/2010/CVE-2010-2857.yaml by mp

* Enhancement: cves/2010/CVE-2010-2861.yaml by mp

* Enhancement: cves/2010/CVE-2010-2918.yaml by mp

* Enhancement: cves/2010/CVE-2010-2920.yaml by mp

* Enhancement: cves/2010/CVE-2010-3203.yaml by mp

* Enhancement: cves/2010/CVE-2010-3426.yaml by mp

* Enhancement: cves/2010/CVE-2010-4617.yaml by mp

* Enhancement: cves/2010/CVE-2010-4231.yaml by mp

* Enhancement: cves/2010/CVE-2010-4282.yaml by mp

* Enhancement: cves/2010/CVE-2010-4282.yaml by mp

* Enhancement: cves/2010/CVE-2010-4617.yaml by mp

* Enhancement: cves/2010/CVE-2010-4719.yaml by mp

* Enhancement: cves/2010/CVE-2010-4769.yaml by mp

* Enhancement: cves/2010/CVE-2010-4977.yaml by mp

* Enhancement: cves/2010/CVE-2010-5028.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2010/CVE-2010-5286.yaml by mp

* Enhancement: cves/2011/CVE-2011-0049.yaml by mp

* Enhancement: cves/2011/CVE-2011-1669.yaml by mp

* Enhancement: cves/2011/CVE-2011-2744.yaml by mp

* Enhancement: cves/2000/CVE-2000-0114.yaml by mp

* Enhancement: cves/2011/CVE-2011-3315.yaml by mp

* Enhancement: cves/2011/CVE-2011-4336.yaml by mp

* Enhancement: cves/2011/CVE-2011-4618.yaml by mp

* Enhancement: cves/2011/CVE-2011-4624.yaml by mp

* Enhancement: cves/2011/CVE-2011-4804.yaml by mp

* Enhancement: cves/2011/CVE-2011-0049.yaml by mp

* Enhancement: cves/2011/CVE-2011-2780.yaml by mp

* Enhancement: cves/2011/CVE-2011-2780.yaml by mp

* Enhancement: cves/2012/CVE-2012-1823.yaml by mp

* Enhancement: cves/2012/CVE-2012-0392.yaml by mp

* Enhancement: cves/2012/CVE-2012-1226.yaml by mp

* Enhancement: cves/2012/CVE-2012-0996.yaml by mp

* Enhancement: cves/2021/CVE-2021-39226.yaml by cs

* Enhancement: cves/2021/CVE-2021-27358.yaml by cs

* Enhancement: cves/2021/CVE-2021-43798.yaml by cs

* Enhancement: cves/2021/CVE-2021-43798.yaml by cs

* Enhancement: cves/2021/CVE-2021-43798.yaml by cs

* Enhancement: cves/2012/CVE-2012-1835.yaml by mp

* Enhancement: cves/2012/CVE-2012-0901.yaml by mp

* Enhancement: cves/2011/CVE-2011-5265.yaml by mp

* Enhancement: cves/2011/CVE-2011-5181.yaml by mp

* Enhancement: cves/2011/CVE-2011-5179.yaml by mp

* Enhancement: cves/2011/CVE-2011-5107.yaml by mp

* Enhancement: cves/2011/CVE-2011-5106.yaml by mp

* Enhancement: cves/2011/CVE-2011-4926.yaml by mp

* Enhancement: cves/2012/CVE-2012-0991.yaml by mp

* Enhancement: cves/2012/CVE-2012-0981.yaml by mp

* Enhancement: cves/2012/CVE-2012-0896.yaml by mp

* Enhancement: cves/2012/CVE-2012-0392.yaml by mp

* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors

* Enhancement: cves/2011/CVE-2011-5106.yaml by mp

* Enhancement: cves/2011/CVE-2011-4926.yaml by mp

* Enhancement: cves/2013/CVE-2013-2287.yaml by mp

* Enhancement: cves/2012/CVE-2012-5913.yaml by mp

* Enhancement: cves/2012/CVE-2012-4889.yaml by mp

* Enhancement: cves/2012/CVE-2012-4768.yaml by mp

* Enhancement: cves/2012/CVE-2012-4547.yaml by mp

* Enhancement: cves/2012/CVE-2012-4273.yaml by mp

* Enhancement: cves/2012/CVE-2012-4242.yaml by mp

* Enhancement: cves/2012/CVE-2012-2371.yaml by mp

* Enhancement: cves/2013/CVE-2013-2248.yaml by mp

* Enhancement: cves/2012/CVE-2012-4940.yaml by mp

* Enhancement: cves/2012/CVE-2012-4878.yaml by mp

* Enhancement: cves/2012/CVE-2012-4253.yaml by mp

* Enhancement: cves/2012/CVE-2012-4253.yaml by mp
Trailing space

* Enhancement: cves/2013/CVE-2013-2251.yaml by mp

* Enhancement: cves/2013/CVE-2013-1965.yaml by mp

* Enhancement: cves/2012/CVE-2012-3153.yaml by mp

* Enhancement: cves/2012/CVE-2012-5913.yaml by mp

* Enhancement: cves/2012/CVE-2012-4242.yaml by mp

* Merge conflict

* Fix references syntax

* Fix syntax. Again.

* Update CVE-2011-4926.yaml

* Enhancement: cves/2021/CVE-2021-28073.yaml by cs

* Enhancement: cves/2021/CVE-2021-39226.yaml by cs

* Enhancement: cves/2021/CVE-2021-20167.yaml by cs

* Enhancement: cves/2021/CVE-2021-40438.yaml by cs

* Enhancement: cves/2021/CVE-2021-40438.yaml by cs

Co-authored-by: sullo <sullo@cirt.net>
2022-02-23 13:30:19 +05:30
sandeep 736e7427d6 added missing tags 2022-02-22 19:53:43 +05:30
GitHub Action 6411ca373f Auto Generated CVE annotations [Tue Feb 22 13:26:30 UTC 2022] 🤖 2022-02-22 13:26:30 +00:00
sandeep 12bcede1ac template id update 2022-02-22 18:53:25 +05:30
Prince Chaddha 22f35f3e23
Merge pull request #3730 from DhiyaneshGeek/master
10 New Wordpress Template
2022-02-22 14:47:20 +05:30
Prince Chaddha af6ef0d47f
Delete CVE-2021-25047.yaml 2022-02-22 14:33:45 +05:30
Prince Chaddha ca9a2339f3
Update CVE-2021-25047.yaml 2022-02-22 14:00:06 +05:30
Prince Chaddha db4028cd73
Update CVE-2021-25063.yaml 2022-02-22 13:19:04 +05:30
Prince Chaddha 0368a87af9
Update CVE-2021-25063.yaml 2022-02-22 13:15:25 +05:30
MostInterestingBotInTheWorld 9b82c296e1
Dashboard Enhancements (#3722)
* Enhancement: cves/2021/CVE-2021-1497.yaml by cs

* Enhancement: cves/2010/CVE-2010-1957.yaml by mp

* Enhancement: cves/2010/CVE-2010-1977.yaml by mp

* Enhancement: cves/2010/CVE-2010-1979.yaml by mp

* Enhancement: cves/2010/CVE-2010-1980.yaml by mp

* Enhancement: cves/2010/CVE-2010-1981.yaml by mp

* Enhancement: cves/2010/CVE-2010-1982.yaml by mp

* Enhancement: cves/2010/CVE-2010-1983.yaml by mp

* Enhancement: cves/2010/CVE-2010-2033.yaml by mp

* Enhancement: cves/2010/CVE-2010-2034.yaml by mp

* Enhancement: cves/2010/CVE-2010-2035.yaml by mp

* Enhancement: cves/2010/CVE-2010-2036.yaml by mp

* Enhancement: cves/2010/CVE-2010-2037.yaml by mp

* Enhancement: cves/2010/CVE-2010-2045.yaml by mp

* Enhancement: cves/2010/CVE-2010-2050.yaml by mp

* Enhancement: cves/2010/CVE-2010-2122.yaml by mp

* Enhancement: cves/2010/CVE-2010-1980.yaml by mp

* Enhancement: cves/2010/CVE-2010-1981.yaml by mp

* Enhancement: cves/2010/CVE-2010-1982.yaml by mp

* Enhancement: cves/2010/CVE-2010-2035.yaml by mp

* Enhancement: cves/2010/CVE-2010-2128.yaml by mp

* Enhancement: cves/2010/CVE-2010-2259.yaml by mp

* Enhancement: cves/2010/CVE-2010-2307.yaml by mp

* Enhancement: cves/2010/CVE-2010-2507.yaml by mp

* Enhancement: cves/2010/CVE-2010-2680.yaml by mp

* Enhancement: cves/2010/CVE-2010-2682.yaml by mp

* Enhancement: cves/2010/CVE-2010-2857.yaml by mp

* Enhancement: cves/2010/CVE-2010-2861.yaml by mp

* Enhancement: cves/2010/CVE-2010-2918.yaml by mp

* Enhancement: cves/2010/CVE-2010-2920.yaml by mp

* Enhancement: cves/2010/CVE-2010-3203.yaml by mp

* Enhancement: cves/2010/CVE-2010-3426.yaml by mp

* Enhancement: cves/2010/CVE-2010-4617.yaml by mp

* Enhancement: cves/2010/CVE-2010-4231.yaml by mp

* Enhancement: cves/2010/CVE-2010-4282.yaml by mp

* Enhancement: cves/2010/CVE-2010-4282.yaml by mp

* Enhancement: cves/2010/CVE-2010-4617.yaml by mp

* Enhancement: cves/2010/CVE-2010-4719.yaml by mp

* Enhancement: cves/2010/CVE-2010-4769.yaml by mp

* Enhancement: cves/2010/CVE-2010-4977.yaml by mp

* Enhancement: cves/2010/CVE-2010-5028.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2010/CVE-2010-5286.yaml by mp

* Enhancement: cves/2011/CVE-2011-0049.yaml by mp

* Enhancement: cves/2011/CVE-2011-1669.yaml by mp

* Enhancement: cves/2011/CVE-2011-2744.yaml by mp

* Enhancement: cves/2000/CVE-2000-0114.yaml by mp

* Enhancement: cves/2011/CVE-2011-3315.yaml by mp

* Enhancement: cves/2011/CVE-2011-4336.yaml by mp

* Enhancement: cves/2011/CVE-2011-4618.yaml by mp

* Enhancement: cves/2011/CVE-2011-4624.yaml by mp

* Enhancement: cves/2011/CVE-2011-4804.yaml by mp

* Enhancement: cves/2011/CVE-2011-0049.yaml by mp

* Enhancement: cves/2011/CVE-2011-2780.yaml by mp

* Enhancement: cves/2011/CVE-2011-2780.yaml by mp

* Enhancement: cves/2012/CVE-2012-1823.yaml by mp

* Enhancement: cves/2012/CVE-2012-0392.yaml by mp

* Enhancement: cves/2012/CVE-2012-1226.yaml by mp

* Enhancement: cves/2012/CVE-2012-0996.yaml by mp

* Enhancement: cves/2021/CVE-2021-39226.yaml by cs

* Enhancement: cves/2021/CVE-2021-27358.yaml by cs

* Enhancement: cves/2021/CVE-2021-43798.yaml by cs

* Enhancement: cves/2021/CVE-2021-43798.yaml by cs

* Enhancement: cves/2021/CVE-2021-43798.yaml by cs

* Enhancement: cves/2012/CVE-2012-1835.yaml by mp

* Enhancement: cves/2012/CVE-2012-0901.yaml by mp

* Enhancement: cves/2011/CVE-2011-5265.yaml by mp

* Enhancement: cves/2011/CVE-2011-5181.yaml by mp

* Enhancement: cves/2011/CVE-2011-5179.yaml by mp

* Enhancement: cves/2011/CVE-2011-5107.yaml by mp

* Enhancement: cves/2011/CVE-2011-5106.yaml by mp

* Enhancement: cves/2011/CVE-2011-4926.yaml by mp

* Enhancement: cves/2012/CVE-2012-0991.yaml by mp

* Enhancement: cves/2012/CVE-2012-0981.yaml by mp

* Enhancement: cves/2012/CVE-2012-0896.yaml by mp

* Enhancement: cves/2012/CVE-2012-0392.yaml by mp

* Enhancement: cves/2012/CVE-2012-0392.yaml by mp
Fix "too few spaces before comment" lint errors
Co-authored-by: sullo <sullo@cirt.net>
2022-02-21 13:33:16 -05:00
Ajaysen R 327cb49d54
Create CVE-2021-43062.yaml (#3741)
* Create CVE-2021-43062.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-21 18:28:24 +05:30
GitHub Action 185fe98b83 Auto Generated CVE annotations [Sat Feb 19 11:28:47 UTC 2022] 🤖 2022-02-19 11:28:47 +00:00
Dhiyaneshwaran 61ae4fa4b8
Create CVE-2021-25047.yaml 2022-02-19 16:57:34 +05:30
GitHub Action 55a470f07b Auto Generated CVE annotations [Sat Feb 19 11:25:57 UTC 2022] 🤖 2022-02-19 11:25:57 +00:00
Dhiyaneshwaran e065a7b7bb
Create CVE-2021-25063.yaml 2022-02-19 16:54:34 +05:30
MostInterestingBotInTheWorld 2af991eaac
Enhancement: cves/2021/CVE-2021-1497.yaml by cs (#3716) 2022-02-16 11:11:34 -05:00
MostInterestingBotInTheWorld e5e0e1ebf4
Dashboard Content Enhancements (#3711)
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-1352.yaml by mp

* Enhancement: cves/2010/CVE-2010-1345.yaml by mp

* Enhancement: cves/2010/CVE-2010-1340.yaml by mp

* Enhancement: cves/2010/CVE-2010-1345.yaml by mp

* Enhancement: cves/2010/CVE-2010-1315.yaml by mp

* Enhancement: cves/2010/CVE-2010-1314.yaml by mp

* Enhancement: cves/2010/CVE-2010-1313.yaml by mp

* Enhancement: cves/2010/CVE-2010-1312.yaml by mp

* Enhancement: cves/2010/CVE-2010-1308.yaml by mp

* Enhancement: cves/2010/CVE-2010-1307.yaml by mp

* Enhancement: cves/2010/CVE-2010-1306.yaml by mp

* Enhancement: cves/2010/CVE-2010-1305.yaml by mp

* Enhancement: cves/2010/CVE-2010-1304.yaml by mp

* Enhancement: cves/2010/CVE-2010-1302.yaml by mp

* Enhancement: cves/2010/CVE-2010-1219.yaml by mp

* Enhancement: cves/2010/CVE-2010-1352.yaml by mp

* Enhancement: cves/2010/CVE-2010-1354.yaml by mp

* Enhancement: cves/2010/CVE-2010-1461.yaml by mp

* Enhancement: cves/2010/CVE-2010-1469.yaml by mp

* Enhancement: cves/2010/CVE-2010-1470.yaml by mp

* Enhancement: cves/2010/CVE-2010-1471.yaml by mp

* Enhancement: cves/2010/CVE-2010-1472.yaml by mp

* Enhancement: cves/2010/CVE-2010-1473.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1476.yaml by mp

* Enhancement: cves/2010/CVE-2010-1478.yaml by mp

* Enhancement: cves/2010/CVE-2010-1491.yaml by mp

* Enhancement: cves/2010/CVE-2010-1494.yaml by mp

* Enhancement: cves/2010/CVE-2010-1495.yaml by mp

* Enhancement: cves/2010/CVE-2010-1531.yaml by mp

* Enhancement: cves/2010/CVE-2010-1473.yaml by mp

* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs

* Enhancement: cves/2016/CVE-2016-4975.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-digitalocean.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-hetzner.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-aws.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-google.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-azure.yaml by cs

* Enhancement: misconfiguration/proxy/open-proxy-localhost.yaml by cs

* Enhancement: misconfiguration/proxy/open-proxy-internal.yaml by cs

* Enhancement: cves/2021/CVE-2021-1497.yaml by cs

* Spacing fixes and enhancement to CNVD-2019-01348.yaml

* Spacing fixes, and enhancement to CNVD-2019-01348.yaml

* Merge artifact

* Spacing

* Minor tags cleanup

* Enhancement: cves/2010/CVE-2010-1532.yaml by mp

* Enhancement: cves/2010/CVE-2010-1533.yaml by mp

* Enhancement: cves/2010/CVE-2010-1534.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: cves/2010/CVE-2010-1540.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1603.yaml by mp

* Enhancement: cves/2010/CVE-2010-1607.yaml by mp

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2010/CVE-2010-1657.yaml by mp

* Enhancement: cves/2010/CVE-2010-1657.yaml by mp

* Enhancement: cves/2010/CVE-2010-1658.yaml by mp

* Enhancement: cves/2010/CVE-2010-1659.yaml by mp

* Enhancement: cves/2010/CVE-2010-1714.yaml by mp

* Enhancement: cves/2010/CVE-2010-1715.yaml by mp

* Enhancement: cves/2010/CVE-2010-1532.yaml by mp

* Enhancement: cves/2010/CVE-2010-1533.yaml by mp

* Enhancement: cves/2010/CVE-2010-1534.yaml by mp

* Enhancement: cves/2010/CVE-2010-1534.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: cves/2010/CVE-2010-1540.yaml by mp

* Enhancement: cves/2010/CVE-2010-1540.yaml by mp

* Enhancement: cves/2010/CVE-2010-1717.yaml by mp

* Enhancement: cves/2010/CVE-2010-1718.yaml by mp

* Enhancement: cves/2010/CVE-2010-1719.yaml by mp

* Enhancement: cves/2010/CVE-2010-1722.yaml by mp

* Enhancement: cves/2010/CVE-2010-1723.yaml by mp

* Enhancement: cves/2010/CVE-2010-1858.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Enhancement: cves/2010/CVE-2010-1952.yaml by mp

* Enhancement: cves/2010/CVE-2010-1953.yaml by mp

* Enhancement: cves/2010/CVE-2010-1954.yaml by mp

* Enhancement: cves/2010/CVE-2010-1955.yaml by mp

* Enhancement: cves/2010/CVE-2010-1956.yaml by mp

* Information Enhancements

Co-authored-by: sullo <sullo@cirt.net>
2022-02-16 04:17:54 +05:30
MostInterestingBotInTheWorld 25938bc625
Dashboard (#3706)
* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-1352.yaml by mp

* Enhancement: cves/2010/CVE-2010-1345.yaml by mp

* Enhancement: cves/2010/CVE-2010-1340.yaml by mp

* Enhancement: cves/2010/CVE-2010-1345.yaml by mp

* Enhancement: cves/2010/CVE-2010-1315.yaml by mp

* Enhancement: cves/2010/CVE-2010-1314.yaml by mp

* Enhancement: cves/2010/CVE-2010-1313.yaml by mp

* Enhancement: cves/2010/CVE-2010-1312.yaml by mp

* Enhancement: cves/2010/CVE-2010-1308.yaml by mp

* Enhancement: cves/2010/CVE-2010-1307.yaml by mp

* Enhancement: cves/2010/CVE-2010-1306.yaml by mp

* Enhancement: cves/2010/CVE-2010-1305.yaml by mp

* Enhancement: cves/2010/CVE-2010-1304.yaml by mp

* Enhancement: cves/2010/CVE-2010-1302.yaml by mp

* Enhancement: cves/2010/CVE-2010-1219.yaml by mp

* Enhancement: cves/2010/CVE-2010-1352.yaml by mp

* Enhancement: cves/2010/CVE-2010-1354.yaml by mp

* Enhancement: cves/2010/CVE-2010-1461.yaml by mp

* Enhancement: cves/2010/CVE-2010-1469.yaml by mp

* Enhancement: cves/2010/CVE-2010-1470.yaml by mp

* Enhancement: cves/2010/CVE-2010-1471.yaml by mp

* Enhancement: cves/2010/CVE-2010-1472.yaml by mp

* Enhancement: cves/2010/CVE-2010-1473.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1476.yaml by mp

* Enhancement: cves/2010/CVE-2010-1478.yaml by mp

* Enhancement: cves/2010/CVE-2010-1491.yaml by mp

* Enhancement: cves/2010/CVE-2010-1494.yaml by mp

* Enhancement: cves/2010/CVE-2010-1495.yaml by mp

* Enhancement: cves/2010/CVE-2010-1531.yaml by mp

* Enhancement: cves/2010/CVE-2010-1473.yaml by mp

* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs

* Enhancement: cves/2016/CVE-2016-4975.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-oracle.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-openstack.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-digitalocean.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-alibaba.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-hetzner.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-aws.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-google.yaml by cs

* Enhancement: misconfiguration/proxy/metadata-azure.yaml by cs

* Enhancement: misconfiguration/proxy/open-proxy-localhost.yaml by cs

* Enhancement: misconfiguration/proxy/open-proxy-internal.yaml by cs

* Enhancement: cves/2021/CVE-2021-1497.yaml by cs

* Spacing fixes and enhancement to CNVD-2019-01348.yaml

* Spacing fixes, and enhancement to CNVD-2019-01348.yaml

* Merge artifact

* Spacing

Co-authored-by: sullo <sullo@cirt.net>
2022-02-15 11:39:56 +05:30
Sandeep Singh 99c131b1a6
Added Cobbler provisioning server Templates (#3698)
Co-Authored-By: csh <25989137+c-sh0@users.noreply.github.com>

Co-authored-by: csh <25989137+c-sh0@users.noreply.github.com>
2022-02-14 22:50:32 +05:30
sullo 4cf3791eb3
Merge pull request #3686 from MostInterestingBotInTheWorld/dashboard
Dashboard Updates: Multiple content enhancements
2022-02-08 17:07:01 -05:00
sullo a459b22355 Duplicate comment 2022-02-08 17:03:36 -05:00
Prince Chaddha c19dcd5c2a
Merge pull request #3683 from cckuailong/master
add some wp plugins cves
2022-02-09 01:39:00 +05:30
Prince Chaddha ba7c71e081
Update CVE-2021-24488.yaml 2022-02-09 00:57:33 +05:30
Prince Chaddha ce903c73f2
Update CVE-2021-24947.yaml 2022-02-09 00:55:00 +05:30
Prince Chaddha b64401ab02
Update CVE-2021-25052.yaml 2022-02-09 00:53:44 +05:30
Prince Chaddha 4fe9243d9d
Update CVE-2021-25008.yaml 2022-02-09 00:49:53 +05:30
Prince Chaddha 4fea6b14f4
Update CVE-2021-24991.yaml 2022-02-09 00:42:32 +05:30
Prince Chaddha 81a4316d2e
Update CVE-2021-24947.yaml 2022-02-09 00:38:33 +05:30
Prince Chaddha 2d3240a98f
Update CVE-2021-24926.yaml 2022-02-09 00:36:16 +05:30
Prince Chaddha a167a69be6
Update CVE-2021-24488.yaml 2022-02-09 00:32:39 +05:30
Prince Chaddha 1dc5ff098a
Update CVE-2021-24300.yaml 2022-02-09 00:19:44 +05:30
Prince Chaddha a657179cf2
Merge pull request #3667 from projectdiscovery/wp-templates
Moving authenticated wp templates from issues
2022-02-09 00:07:52 +05:30
Prince Chaddha ce2d45b355
Update CVE-2021-24510.yaml 2022-02-08 23:59:45 +05:30
Prince Chaddha 49c2f2816a
Update CVE-2021-34640.yaml 2022-02-08 23:59:30 +05:30
Prince Chaddha 495ca9dc6c
Update CVE-2021-20792.yaml 2022-02-08 23:56:17 +05:30
Prince Chaddha 5519bd7d67
Update CVE-2021-34643.yaml 2022-02-08 23:50:44 +05:30
Prince Chaddha eb324d24f4
Update CVE-2021-39322.yaml 2022-02-08 23:46:35 +05:30
MostInterestingBotInTheWorld 9f550a29ef Enhancement: cves/2021/CVE-2021-37538.yaml by mp 2022-02-08 11:46:14 -05:00
MostInterestingBotInTheWorld 35bcf2e361 Enhancement: cves/2021/CVE-2021-42237.yaml by mp 2022-02-08 11:40:30 -05:00
cckuailong f29d2b20df add some wp plugins cves 2022-02-08 09:07:19 +08:00
sullo 929f8e0f64
Merge pull request #3665 from MostInterestingBotInTheWorld/dashboard
Enhancements: Various text cleanups
2022-02-07 09:00:27 -05:00
Prince Chaddha 71abfd0939
Update CVE-2021-24510.yaml 2022-02-05 01:05:57 +05:30
Prince Chaddha 1be67200cb
Create CVE-2021-39322.yaml 2022-02-05 00:51:50 +05:30
Prince Chaddha 96b7380c80
Create CVE-2021-34643.yaml 2022-02-05 00:50:43 +05:30
Prince Chaddha 9a702c2c16
Create CVE-2021-34640.yaml 2022-02-05 00:49:25 +05:30
Prince Chaddha d4b4e69752
Create CVE-2021-24510.yaml 2022-02-05 00:48:10 +05:30
Prince Chaddha dbfa7efae0
Create CVE-2021-20792.yaml 2022-02-05 00:46:00 +05:30
sullo 8461d21658 Remove trailing spaces 2022-02-04 14:09:21 -05:00
Prince Chaddha 685495df91
Update CVE-2021-20158.yaml 2022-02-04 23:31:10 +05:30
GwanYeong Kim fcc39f52ee Create CVE-2021-20158.yaml
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicous actor to force the change of the admin password due to a hidden administrative command.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-02-05 01:29:16 +09:00
MostInterestingBotInTheWorld 811dc2d70e Enhancement: cves/2021/CVE-2021-26855.yaml by mp 2022-02-04 11:13:25 -05:00
MostInterestingBotInTheWorld 163ae2f24e
Merge branch 'projectdiscovery:master' into dashboard 2022-02-04 09:19:12 -05:00
Prince Chaddha 480dea094b
Update CVE-2021-20150.yaml 2022-02-04 01:20:39 +05:30
Prince Chaddha f846faa127
Update CVE-2021-20150.yaml 2022-02-04 01:13:30 +05:30
Prince Chaddha d2e4be88e6
Update CVE-2021-20150.yaml 2022-02-04 01:13:00 +05:30
GwanYeong Kim bc87c82d9b Create CVE-2021-20150.yaml
Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. Authentication can be bypassed and a user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-02-03 18:06:04 +09:00
Prince Chaddha 99931f2e0b
Merge pull request #3651 from dwisiswant0/add/CVE-2021-32853
Add CVE-2021-32853
2022-02-03 02:16:08 +05:30
Prince Chaddha b023c8206e
Update CVE-2021-32853.yaml 2022-02-03 02:14:21 +05:30
Prince Chaddha 9f63a2f4fb
Update CVE-2021-32853.yaml 2022-02-03 02:06:26 +05:30
Prince Chaddha 110704dd3e
Update CVE-2021-32853.yaml 2022-02-03 02:01:24 +05:30
Prince Chaddha 6c39177ddc
Delete CVE-2021-32818.yaml 2022-02-03 01:11:45 +05:30
MostInterestingBotInTheWorld 0d1f876866 Enhancement: cves/2021/CVE-2021-37538.yaml by mp 2022-02-02 12:15:24 -05:00
Sandeep Singh 633205a001
Update CVE-2021-32853.yaml 2022-02-02 13:56:12 +05:30
Dwi Siswanto 940db2f928 Add CVE-2021-32853 2022-02-02 13:27:36 +07:00
Prince Chaddha cf9821e3b1
Update CVE-2021-26247.yaml 2022-02-02 00:48:29 +05:30
GitHub Action 8868b0f56b Auto Generated CVE annotations [Tue Feb 1 06:10:46 UTC 2022] 🤖 2022-02-01 06:10:46 +00:00
Dhiyaneshwaran a5bd8630c8
Create CVE-2021-32818.yaml 2022-02-01 11:39:12 +05:30
GitHub Action a18a19ff3c Auto Generated CVE annotations [Tue Feb 1 06:06:15 UTC 2022] 🤖 2022-02-01 06:06:15 +00:00
Dhiyaneshwaran bcc7113677
Create CVE-2021-26247.yaml 2022-02-01 11:34:51 +05:30
Prince Chaddha 8efaa0754e
Merge pull request #3633 from cckuailong/master
add CVE-2021-46005 (Sourcecodester Car Rental Management System 1.0 - Stored XSS)
2022-01-31 23:38:53 +05:30
Prince Chaddha cd221355ee
Update CVE-2021-46005.yaml 2022-01-31 23:34:34 +05:30
Prince Chaddha fb48b67f39
Update CVE-2021-46005.yaml 2022-01-31 23:29:36 +05:30
Roberto Nunes 9c4df9e91a
Create CVE-2021-25864.yaml (#3631)
* Create CVE-2021-25864.yaml

* moving template to cves folder

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-31 14:36:37 +05:30
Sandeep Singh cfb6fff36d
removing trailing spaces 2022-01-29 19:24:58 +05:30
cckuailong 80b60ef829 add CVE-2021-46005 2022-01-29 21:22:44 +08:00
GitHub Action 7ce2191287 Auto Generated CVE annotations [Fri Jan 28 09:01:49 UTC 2022] 🤖 2022-01-28 09:01:49 +00:00
Prince Chaddha 850ae90f55
Update CVE-2021-45380.yaml 2022-01-28 10:59:21 +05:30
PikPikcU 4beabd88f9
Create CVE-2021-45380.yaml 2022-01-27 13:40:43 -05:00
GitHub Action 4bd8b86a3e Auto Generated CVE annotations [Thu Jan 27 10:22:20 UTC 2022] 🤖 2022-01-27 10:22:20 +00:00
Sandeep Singh 53da8a8206
Added CVE-2021-21973 (#3615)
* Added CVE-2021-21973

* minor update
2022-01-27 15:50:44 +05:30
GitHub Action 3a1d847b57 Auto Generated CVE annotations [Wed Jan 26 17:59:10 UTC 2022] 🤖 2022-01-26 17:59:10 +00:00
Smaran Chand 0babc27b75
Added elFinder filemanger exposed (#3602)
* Added elFinder filemanger exposed

* Template name / id update + more reference

* template name update

* matcher update

* Modified the matcher.

* minor updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-26 23:27:45 +05:30
Sullo 9a8482172d Remove:
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
 - spaces after : in some files
2022-01-25 14:38:53 -05:00
GitHub Action 173f0ef2d3 Auto Generated CVE annotations [Tue Jan 25 16:51:00 UTC 2022] 🤖 2022-01-25 16:51:00 +00:00
Sandeep Singh 4401b9ebe9
Merge pull request #3599 from projectdiscovery/CVE-2021-24838
Added CVE-2021-24838
2022-01-25 22:19:30 +05:30
Sandeep Singh 494a80799c
Merge pull request #3600 from MostInterestingBotInTheWorld/dashboard
Enhancement: cves/2021/CVE-2021-29156.yaml by cs
2022-01-25 22:09:27 +05:30
sandeep 8c7ec49185 lint fix 2022-01-25 22:08:01 +05:30
sandeep 47e34dba46 Added CVE-2021-24838 2022-01-25 17:14:00 +05:30
Prince Chaddha 6a2ff6f09e
Update CVE-2021-39350.yaml 2022-01-25 17:08:01 +05:30
GwanYeong Kim 67b2955d98 Create CVE-2021-39350.yaml
The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-25 17:31:13 +09:00
Prince Chaddha 25e3537212
Update CVE-2021-43810.yaml 2022-01-25 12:34:20 +05:30
GwanYeong Kim c368e33117 Create CVE-2021-43810.yaml
Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-25 13:55:34 +09:00
MostInterestingBotInTheWorld 44d23ef3eb Enhancement: cves/2021/CVE-2021-29156.yaml by cs 2022-01-24 13:45:03 -05:00
GitHub Action f882764c9b Auto Generated CVE annotations [Mon Jan 24 07:12:56 UTC 2022] 🤖 2022-01-24 07:12:56 +00:00
Prince Chaddha fa30e05f61
Merge pull request #3586 from V35HR4J/master
Create CVE-2021-39433.yaml
2022-01-24 12:40:15 +05:30
Prince Chaddha 03697ed21a
Update CVE-2021-39433.yaml 2022-01-24 12:28:03 +05:30
Veshraj Ghimire df907cc2e3
Create CVE-2021-39433.yaml 2022-01-23 21:00:30 +05:45
Prince Chaddha 1d15a5464a
Update CVE-2021-24750.yaml 2022-01-23 14:51:25 +05:30
Prince Chaddha 3c9e02150d
Update CVE-2021-24750.yaml 2022-01-23 14:39:38 +05:30
Prince Chaddha 75184ca383
Update CVE-2021-24750.yaml 2022-01-23 14:38:12 +05:30
cckuailong dad34d012c add CVE-2021-24750 2022-01-23 13:17:20 +08:00
sandeep 2a8d8e1095 more updates 2022-01-22 23:27:52 +05:30
sandeep 6b14c6c6fc CVE-2021-40438 update 2022-01-22 23:18:07 +05:30
Sandeep Singh 1b0c7f1b7f
CVE-2021-22205 update (#3568)
*moved cves/2021/CVE-2021-22205.yaml to vulnerabilities/gitlab/gitlab-rce.yaml
*template extension update + added missing severity + misc updates
2022-01-20 14:25:57 +05:30
Greg Johnson e0a2d35a8d
add passive fingerprinting template for CVE-2021-22205 (#3565)
Co-authored-by: Greg Johnson (codeEmitter) <gjohnson@gitlab.com>
2022-01-20 14:12:37 +05:30
pussycat0x 650a38ffde
Qualcomm 4G LTE WiFi VoIP-Router (#3555)
* Add files via upload

* Auto Generated CVE annotations [Mon Jan 17 16:05:35 UTC 2022] 🤖

* Update CVE-2021-44528.yaml

* Update CVE-2021-45232.yaml

* Add files via upload

* removing duplicate template

* moving template around

* template fix

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-19 13:33:34 +05:30
sandeep e51d401214 template fix 2022-01-19 13:32:16 +05:30
sandeep fd023b42a8 Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates into pr/3550 2022-01-19 13:25:06 +05:30
Roberto Nunes 2cadf76241
Create CVE-2021-32618.yaml (#3546)
* Create CVE-2021-32618.yaml

* Update and rename CVE-2021-32618.yaml to cves/2021/CVE-2021-32618.yaml

* matcher update

Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-18 12:51:00 +05:30
GitHub Action 2c250d66c7 Auto Generated CVE annotations [Tue Jan 18 05:22:01 UTC 2022] 🤖 2022-01-18 05:22:01 +00:00
Dwi Siswanto b8dabfbcbb
Add CVE-2021-20038 (#3542)
* Add CVE-2021-20038

* misc: Update author
2022-01-18 10:50:14 +05:30
Prince Chaddha bc5fba6fbf
Update CVE-2021-45232.yaml 2022-01-17 22:20:44 +05:30
Prince Chaddha f988ad8ff4
Update CVE-2021-44528.yaml 2022-01-17 22:19:22 +05:30
GitHub Action 4f81203546 Auto Generated CVE annotations [Mon Jan 17 16:05:35 UTC 2022] 🤖 2022-01-17 16:05:35 +00:00
Patrick 1086ca1a30
added template for CVE-2021-42551 (#3541)
* added template for CVE-2021-42551

* Update CVE-2021-42551.yaml

* Update CVE-2021-42551.yaml

* unbricked CVE-2021-42551

* additional page specific matcher

Co-authored-by: Patrick <patrick.schmid@redguard.ch>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-16 19:01:29 +05:30
gy741 e5958c1364
Update tags (#3538) 2022-01-16 02:08:21 +05:30
GitHub Action d5e2eb7d41 Auto Generated CVE annotations [Sat Jan 15 19:05:39 UTC 2022] 🤖 2022-01-15 19:05:39 +00:00
GitHub Action bc3fa19859 Auto Generated CVE annotations [Thu Jan 13 05:21:21 UTC 2022] 🤖 2022-01-13 05:21:21 +00:00
Muhammad Daffa 64cf0fa4ba
Rename maian cart rce (#3532)
* Update and rename vulnerabilities/other/maian-cart-preauth-rce.yaml to cves/2021/CVE-2021-32172.yaml

* Update CVE-2021-32172.yaml

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-01-13 10:48:51 +05:30
sandeep 5c471a6168 removing duplicate template 2022-01-12 17:28:47 +05:30
Prince Chaddha a53ae7b694
Merge pull request #3518 from gy741/rule-add-v85
Create CVE-2021-20167.yaml
2022-01-11 14:54:05 +05:30
GitHub Action c40624e7d9 Auto Generated CVE annotations [Tue Jan 11 08:57:41 UTC 2022] 🤖 2022-01-11 08:57:41 +00:00
Prince Chaddha 70677b3b5a
Update CVE-2021–20837.yaml 2022-01-11 14:12:04 +05:30
Prince Chaddha 9afd4bcfd8
Update CVE-2021-20167.yaml 2022-01-11 13:57:07 +05:30
GwanYeong Kim d772fd884b Create CVE-2021-20167.yaml
This vulnerability uses a combination of CVE-2021-20166 and CVE-2021-20167. Netgear RAX43 version 1.0.3.96 contains a command injection and authbypass vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter. and The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-11 15:00:56 +09:00
PikPikcU 83e431802e
Create CVE-2021–20837.yaml 2022-01-10 21:44:31 -05:00
Roberto Nunes 484d77de7c
Create CVE-2021-39501.yaml (#3501)
* Create CVE-2021-39501.yaml

* moving template to cves directory

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-08 17:00:19 +05:30
GitHub Action 451313a0af Auto Generated CVE annotations [Sat Jan 8 10:57:43 UTC 2022] 🤖 2022-01-08 10:57:43 +00:00
JAS-37 0c7d13d152
add CVE-2021-31862 template (#3491)
* add CVE-2021-31862 template

* updated matchers

* Added SysAid panel + workflow

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-07 13:28:38 +05:30
Aaron Chen d0f71c6d1b
Update CVE-2021-31589.yaml (#3489) 2022-01-06 12:05:23 +05:30
Ahmed Aboul-Ela f279bd78d1
Add CVE-2021-31589 (#3486)
* Add CVE-2021-31589

Committer: Ahmed Aboul-Ela <ahmed.aboul3la@gmail.com>

* lint fixes

* updated matchers

* Added metadata

* Added Bomgar Login Panel detection

* Added Bomgar workflow

* Added favicon detection

Co-authored-by: Ahmed Aboul-Ela <ahmed@secgeek.local>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 18:39:53 +05:30
Prince Chaddha a9ef4d2612
Merge pull request #3480 from gy741/rule-add-v81
Create CVE-2021-21881.yaml
2022-01-05 13:01:57 +05:30
Prince Chaddha fefd3343eb
Update CVE-2021-21881.yaml 2022-01-05 13:00:40 +05:30
Prince Chaddha 616bea3a88
Update CVE-2021-21881.yaml 2022-01-05 12:59:27 +05:30
Pathtaga e281e5bf88
Updated all templates tags with technologies (#3478)
* Updated tags for template sonicwall-email-security-detect.yaml

* Updated tags for template detect-sentry.yaml

* Updated tags for template kong-detect.yaml

* Updated tags for template openam-detect.yaml

* Updated tags for template shiro-detect.yaml

* Updated tags for template iplanet-web-server.yaml

* Updated tags for template graylog-api-browser.yaml

* Updated tags for template prtg-detect.yaml

* Updated tags for template node-red-detect.yaml

* Updated tags for template abyss-web-server.yaml

* Updated tags for template geo-webserver.yaml

* Updated tags for template autobahn-python-detect.yaml

* Updated tags for template default-lighttpd-page.yaml

* Updated tags for template microsoft-iis-8.yaml

* Updated tags for template lucee-detect.yaml

* Updated tags for template php-proxy-detect.yaml

* Updated tags for template jenkins-detect.yaml

* Updated tags for template cockpit-detect.yaml

* Updated tags for template csrfguard-detect.yaml

* Updated tags for template dwr-index-detect.yaml

* Updated tags for template netsweeper-webadmin-detect.yaml

* Updated tags for template weblogic-detect.yaml

* Updated tags for template s3-detect.yaml

* Updated tags for template tileserver-gl.yaml

* Updated tags for template springboot-actuator.yaml

* Updated tags for template terraform-detect.yaml

* Updated tags for template redmine-cli-detect.yaml

* Updated tags for template mrtg-detect.yaml

* Updated tags for template tableau-server-detect.yaml

* Updated tags for template magmi-detect.yaml

* Updated tags for template oidc-detect.yaml

* Updated tags for template tor-socks-proxy.yaml

* Updated tags for template synology-web-station.yaml

* Updated tags for template herokuapp-detect.yaml

* Updated tags for template gunicorn-detect.yaml

* Updated tags for template sql-server-reporting.yaml

* Updated tags for template google-bucket-service.yaml

* Updated tags for template kubernetes-mirantis.yaml

* Updated tags for template kubernetes-enterprise-manager.yaml

* Updated tags for template oracle-iplanet-web-server.yaml

* Updated tags for template dell-idrac7-detect.yaml

* Updated tags for template dell-idrac6-detect.yaml

* Updated tags for template dell-idrac9-detect.yaml

* Updated tags for template dell-idrac8-detect.yaml

* Updated tags for template apache-guacamole.yaml

* Updated tags for template aws-cloudfront-service.yaml

* Updated tags for template aws-bucket-service.yaml

* Updated tags for template nginx-linux-page.yaml

* Updated tags for template telerik-fileupload-detect.yaml

* Updated tags for template telerik-dialoghandler-detect.yaml

* Updated tags for template htaccess-config.yaml

* Updated tags for template microsoft-azure-error.yaml

* Updated tags for template detect-options-method.yaml

* Updated tags for template unpatched-coldfusion.yaml

* Updated tags for template moodle-changelog.yaml

* Updated tags for template detect-dns-over-https.yaml

* Updated tags for template CVE-2019-19134.yaml

* Updated tags for template CVE-2019-3929.yaml

* Updated tags for template CVE-2019-19908.yaml

* Updated tags for template CVE-2019-10475.yaml

* Updated tags for template CVE-2019-17382.yaml

* Updated tags for template CVE-2019-16332.yaml

* Updated tags for template CVE-2019-14974.yaml

* Updated tags for template CVE-2019-19368.yaml

* Updated tags for template CVE-2019-12725.yaml

* Updated tags for template CVE-2019-15501.yaml

* Updated tags for template CVE-2019-9733.yaml

* Updated tags for template CVE-2019-14322.yaml

* Updated tags for template CVE-2019-9955.yaml

* Updated tags for template CVE-2019-0230.yaml

* Updated tags for template CVE-2019-10232.yaml

* Updated tags for template CVE-2019-17506.yaml

* Updated tags for template CVE-2019-8449.yaml

* Updated tags for template CVE-2019-12593.yaml

* Updated tags for template CVE-2019-10092.yaml

* Updated tags for template CVE-2019-1821.yaml

* Updated tags for template CVE-2019-3401.yaml

* Updated tags for template CVE-2019-16662.yaml

* Updated tags for template CVE-2019-5418.yaml

* Updated tags for template CVE-2016-4975.yaml

* Updated tags for template CVE-2016-1000137.yaml

* Updated tags for template CVE-2016-7552.yaml

* Updated tags for template CVE-2016-10956.yaml

* Updated tags for template CVE-2016-1000146.yaml

* Updated tags for template CVE-2013-2251.yaml

* Updated tags for template CVE-2013-1965.yaml

* Updated tags for template CVE-2014-2323.yaml

* Updated tags for template CVE-2014-5111.yaml

* Updated tags for template CVE-2014-2962.yaml

* Updated tags for template CVE-2014-4561.yaml

* Updated tags for template CVE-2014-4558.yaml

* Updated tags for template CVE-2014-3120.yaml

* Updated tags for template CVE-2007-5728.yaml

* Updated tags for template CVE-2009-4679.yaml

* Updated tags for template CVE-2009-1558.yaml

* Updated tags for template CVE-2009-4202.yaml

* Updated tags for template CVE-2009-0932.yaml

* Updated tags for template CVE-2015-2068.yaml

* Updated tags for template CVE-2015-8813.yaml

* Updated tags for template CVE-2015-7450.yaml

* Updated tags for template CVE-2015-2067.yaml

* Updated tags for template CVE-2015-3306.yaml

* Updated tags for template CVE-2015-3337.yaml

* Updated tags for template CVE-2015-1427.yaml

* Updated tags for template CVE-2015-1503.yaml

* Updated tags for template CVE-2015-1880.yaml

* Updated tags for template CVE-2018-3810.yaml

* Updated tags for template CVE-2018-18069.yaml

* Updated tags for template CVE-2018-17246.yaml

* Updated tags for template CVE-2018-10141.yaml

* Updated tags for template CVE-2018-16341.yaml

* Updated tags for template CVE-2018-18777.yaml

* Updated tags for template CVE-2018-15138.yaml

* Updated tags for template CVE-2018-11784.yaml

* Updated tags for template CVE-2018-16299.yaml

* Updated tags for template CVE-2018-7251.yaml

* Updated tags for template CVE-2018-1273.yaml

* Updated tags for template CVE-2018-1271.yaml

* Updated tags for template CVE-2018-11759.yaml

* Updated tags for template CVE-2018-3167.yaml

* Updated tags for template CVE-2018-7490.yaml

* Updated tags for template CVE-2018-2628.yaml

* Updated tags for template CVE-2018-13380.yaml

* Updated tags for template CVE-2018-2893.yaml

* Updated tags for template CVE-2018-5316.yaml

* Updated tags for template CVE-2018-20985.yaml

* Updated tags for template CVE-2018-10818.yaml

* Updated tags for template CVE-2018-1000861.yaml

* Updated tags for template CVE-2018-0296.yaml

* Updated tags for template CVE-2018-19458.yaml

* Updated tags for template CVE-2018-3760.yaml

* Updated tags for template CVE-2018-12998.yaml

* Updated tags for template CVE-2018-9118.yaml

* Updated tags for template CVE-2018-1000130.yaml

* Updated tags for template CVE-2008-6668.yaml

* Updated tags for template CVE-2017-7269.yaml

* Updated tags for template CVE-2017-1000170.yaml

* Updated tags for template CVE-2017-16877.yaml

* Updated tags for template CVE-2017-1000486.yaml

* Updated tags for template CVE-2017-9822.yaml

* Updated tags for template CVE-2017-0929.yaml

* Updated tags for template CVE-2017-7921.yaml

* Updated tags for template CVE-2017-14535.yaml

* Updated tags for template CVE-2017-5521.yaml

* Updated tags for template CVE-2017-12637.yaml

* Updated tags for template CVE-2017-12635.yaml

* Updated tags for template CVE-2017-11610.yaml

* Updated tags for template CVE-2021-20114.yaml

* Updated tags for template CVE-2021-40856.yaml

* Updated tags for template CVE-2021-21972.yaml

* Updated tags for template CVE-2021-31602.yaml

* Updated tags for template CVE-2021-41773.yaml

* Updated tags for template CVE-2021-37704.yaml

* Updated tags for template CVE-2021-45046.yaml

* Updated tags for template CVE-2021-26084.yaml

* Updated tags for template CVE-2021-27931.yaml

* Updated tags for template CVE-2021-24291.yaml

* Updated tags for template CVE-2021-41648.yaml

* Updated tags for template CVE-2021-37216.yaml

* Updated tags for template CVE-2021-22005.yaml

* Updated tags for template CVE-2021-37573.yaml

* Updated tags for template CVE-2021-31755.yaml

* Updated tags for template CVE-2021-43287.yaml

* Updated tags for template CVE-2021-24274.yaml

* Updated tags for template CVE-2021-33564.yaml

* Updated tags for template CVE-2021-22145.yaml

* Updated tags for template CVE-2021-24237.yaml

* Updated tags for template CVE-2021-44848.yaml

* Updated tags for template CVE-2021-25646.yaml

* Updated tags for template CVE-2021-21816.yaml

* Updated tags for template CVE-2021-41649.yaml

* Updated tags for template CVE-2021-41291.yaml

* Updated tags for template CVE-2021-41293.yaml

* Updated tags for template CVE-2021-21801.yaml

* Updated tags for template CVE-2021-29156.yaml

* Updated tags for template CVE-2021-34370.yaml

* Updated tags for template CVE-2021-27132.yaml

* Updated tags for template CVE-2021-28151.yaml

* Updated tags for template CVE-2021-26812.yaml

* Updated tags for template CVE-2021-21985.yaml

* Updated tags for template CVE-2021-43778.yaml

* Updated tags for template CVE-2021-25281.yaml

* Updated tags for template CVE-2021-40539.yaml

* Updated tags for template CVE-2021-36749.yaml

* Updated tags for template CVE-2021-21234.yaml

* Updated tags for template CVE-2021-33221.yaml

* Updated tags for template CVE-2021-42013.yaml

* Updated tags for template CVE-2021-33807.yaml

* Updated tags for template CVE-2021-44228.yaml

* Updated tags for template CVE-2012-0896.yaml

* Updated tags for template CVE-2012-0991.yaml

* Updated tags for template CVE-2012-0392.yaml

* Updated tags for template CVE-2012-4940.yaml

* Updated tags for template CVE-2012-1226.yaml

* Updated tags for template CVE-2012-4878.yaml

* Updated tags for template CVE-2010-1304.yaml

* Updated tags for template CVE-2010-1217.yaml

* Updated tags for template CVE-2010-0759.yaml

* Updated tags for template CVE-2010-2307.yaml

* Updated tags for template CVE-2010-4231.yaml

* Updated tags for template CVE-2010-2861.yaml

* Updated tags for template CVE-2010-4282.yaml

* Updated tags for template CVE-2010-1302.yaml

* Updated tags for template CVE-2010-1461.yaml

* Updated tags for template CVE-2020-4463.yaml

* Updated tags for template CVE-2020-1943.yaml

* Updated tags for template CVE-2020-36289.yaml

* Updated tags for template CVE-2020-17518.yaml

* Updated tags for template CVE-2020-12800.yaml

* Updated tags for template CVE-2020-10770.yaml

* Updated tags for template CVE-2020-17506.yaml

* Updated tags for template CVE-2020-11547.yaml

* Updated tags for template CVE-2020-11034.yaml

* Updated tags for template CVE-2020-24589.yaml

* Updated tags for template CVE-2020-9054.yaml

* Updated tags for template CVE-2020-28976.yaml

* Updated tags for template CVE-2020-16952.yaml

* Updated tags for template CVE-2020-24312.yaml

* Updated tags for template CVE-2020-8512.yaml

* Updated tags for template CVE-2020-14179.yaml

* Updated tags for template CVE-2020-6308.yaml

* Updated tags for template CVE-2020-35846.yaml

* Updated tags for template CVE-2020-7318.yaml

* Updated tags for template CVE-2020-2140.yaml

* Updated tags for template CVE-2020-5410.yaml

* Updated tags for template CVE-2020-5777.yaml

* Updated tags for template CVE-2020-13700.yaml

* Updated tags for template CVE-2020-5775.yaml

* Updated tags for template CVE-2020-13167.yaml

* Updated tags for template CVE-2020-35848.yaml

* Updated tags for template CVE-2020-9484.yaml

* Updated tags for template CVE-2020-15505.yaml

* Updated tags for template CVE-2020-9047.yaml

* Updated tags for template CVE-2020-17519.yaml

* Updated tags for template CVE-2020-17505.yaml

* Updated tags for template CVE-2020-9376.yaml

* Updated tags for template CVE-2020-8497.yaml

* Updated tags for template CVE-2020-14092.yaml

* Updated tags for template CVE-2020-10148.yaml

* Updated tags for template CVE-2020-35847.yaml

* Updated tags for template CVE-2020-12116.yaml

* Updated tags for template CVE-2020-11930.yaml

* Updated tags for template CVE-2020-24186.yaml

* Updated tags for template CVE-2020-9496.yaml

* Updated tags for template CVE-2020-35489.yaml

* Updated tags for template CVE-2020-26413.yaml

* Updated tags for template CVE-2020-2096.yaml

* misc updates

* misc update

* more updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-05 01:04:16 +05:30
GwanYeong Kim d572716df0 Create CVE-2021-21881.yaml
An OS command injection vulnerability exists in the Web Manager Wireless Network Scanner functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-04 23:14:12 +09:00
GitHub Action 86c11d1b40 Auto Generated CVE annotations [Tue Jan 4 11:55:25 UTC 2022] 🤖 2022-01-04 11:55:25 +00:00
pajoda c45934891f
Create CVE-2021-36748.yaml (#2446)
* Create CVE-2021-36748.yaml

* Update indentation

* minor update

* Update CVE-2021-36748.yaml

* Additional unique matchers + easily readable syntax

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-04 17:23:56 +05:30
sandeep 6f3591f920 rseenet tags update 2022-01-01 12:28:32 +05:30
sandeep 7eba1c5a0a added reference for rce 2021-12-31 17:53:27 +05:30
GitHub Action e238128b1c Auto Generated CVE annotations [Thu Dec 30 11:40:55 UTC 2021] 🤖 2021-12-30 11:40:55 +00:00
Sandeep Singh de7bef1300
Added CVE-2021-42567 (Apereo CAS Reflected XSS) (#3450)
* Added CVE-2021-42567 (Apereo CAS Reflected XSS)

* Added login panel detection
2021-12-30 17:09:29 +05:30
Prince Chaddha a94c5d62a1
Update CVE-2021-40859.yaml 2021-12-30 12:15:22 +05:30
Prince Chaddha f3deec4325
Update CVE-2021-40859.yaml 2021-12-30 12:15:02 +05:30
Sandeep Singh a10aff06e5
Merge branch 'master' into master 2021-12-29 21:28:30 +05:30
sandeep 8744282d5b removing matcher to avoid false negative result. 2021-12-29 12:10:51 +05:30
东方有鱼名为咸 7a05f1b538
add CVE-2021-45232.yaml (#3437)
* Create CVE-2021-45232.yaml

* matcher fixes

* more reference

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-28 19:43:00 +05:30
GitHub Action c33766a93f Auto Generated CVE annotations [Fri Dec 24 13:38:52 UTC 2021] 🤖 2021-12-24 13:38:52 +00:00
Prince Chaddha 415f37a7a6
Update CVE-2021-27358.yaml 2021-12-24 19:02:18 +05:30
sandeep f892a053a2 Added Grafana unauthenticated snapshot creation 2021-12-24 17:47:55 +05:30
sandeep 54e064767d Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates 2021-12-23 21:46:10 +05:30
sandeep 99f5a47202 minor update 2021-12-23 21:40:28 +05:30
GitHub Action 132108f849 Auto Generated CVE annotations [Thu Dec 23 15:43:46 UTC 2021] 🤖 2021-12-23 15:43:46 +00:00
ImNightmaree a76a9baaf4
Create CVE-2021-45046 (#3378)
* Create CVE-2021-45046

* Update and rename CVE-2021-45046 to CVE-2021-45046.yaml

* minor update

Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-23 21:11:50 +05:30
Mohamed Elbadry d2d47bfcb0
Update CVE-2021-44228.yaml - Extract DNS interaction IP (#3396)
* Update CVE-2021-44228.yaml

* lint fix

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-22 18:17:30 +05:30
GitHub Action d253ff84ef Auto Generated CVE annotations [Wed Dec 22 06:47:35 UTC 2021] 🤖 2021-12-22 06:47:35 +00:00
pussycat0x 8a77db7919
unauthorized Puppet Node Manager (#3388)
* Add files via upload

* Update unauthorized-puppet-node-manager-detect.yaml

* Add files via upload

* Add files via upload

* Update CVE-2021-40859.yaml

* misc updates

* minor updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-22 12:16:05 +05:30
sandeep df2418ce18 misc updates 2021-12-22 12:10:38 +05:30
pussycat0x 08d097a751
Update CVE-2021-40859.yaml 2021-12-22 09:33:06 +05:30
pussycat0x 4b6a46f06f
Add files via upload 2021-12-22 09:30:36 +05:30
GitHub Action 10ba4de0d7 Auto Generated CVE annotations [Tue Dec 21 12:32:40 UTC 2021] 🤖 2021-12-21 12:32:40 +00:00
Prince Chaddha b622f5145d
Merge pull request #3383 from projectdiscovery/princechaddha-patch-2
Create CVE-2021-26085.yaml
2021-12-21 18:00:47 +05:30
GitHub Action 19bfb84638 Auto Generated CVE annotations [Tue Dec 21 11:06:14 UTC 2021] 🤖 2021-12-21 11:06:14 +00:00
GitHub Action 7fe5c23627 Auto Generated CVE annotations [Mon Dec 20 14:33:22 UTC 2021] 🤖 2021-12-20 14:33:22 +00:00
Prince Chaddha b8ee43e27a
Create CVE-2021-26085.yaml 2021-12-20 15:20:14 +05:30
Prince Chaddha ca6146a4af
Update CVE-2021-44228.yaml 2021-12-19 14:52:29 +05:30
Prince Chaddha fc566d27a8
Create CVE-2021-45092.yaml (#3372)
* Create CVE-2021-45092.yaml

* Added Thinfinity Iframe Injection

Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>

* Added Thinfinity VirtualUI User Enumeration

Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>

* added missing tag

Co-Authored-By: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Daniel Mofer <7999779+danielmofer@users.noreply.github.com>
2021-12-18 14:32:44 +05:30
Abhiram V dd40419ea5
Updated CVE-2021-44228 with most common vulnerable headers (#3334)
* Updated with common headers which can be exploited

Reference : https://blog.qualys.com/vulnerabilities-threat-research/2021/12/10/apache-log4j2-zero-day-exploited-in-the-wild-log4shell
These headers are collected from above blog in Detecting the Vulnerability part

* fix: lint update

* Update CVE-2021-44228.yaml

* Update CVE-2021-44228.yaml

* Updated changed matchers and extractors regex according to v8.7.3 update

* payload updates for CVE-2021-44228

- more injection points
- a fixed regex to extract uppercase hostnames
- standardized payloads
- printed injection points

Source - https://twitter.com/0xceba/status/1471664540542648322

Co-Authored-By: 0xceba <44234156+0xceba@users.noreply.github.com>
Co-Authored-By: Abhiram V <61599526+Anon-Artist@users.noreply.github.com>

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: 0xceba <44234156+0xceba@users.noreply.github.com>
2021-12-18 10:51:45 +05:30
sandeep b8fa0d5857 update: added more reference 2021-12-15 21:26:35 +05:30
Geeknik Labs 9c169bd682
Create CVE-2021-44528.yaml (#3342) 2021-12-15 20:43:07 +05:30
sandeep c9ddd7a0ae update: id + reference update 2021-12-14 21:07:46 +05:30
sandeep 34d4557dad update: making it compatible with self-hosted interactsh server 2021-12-14 03:21:47 +05:30
Evan Rubinstein dddb0bbb82
Added CVE-2021-24997 (#3298)
* Added CVE-39226

* Added CVE-39226

* Delete CVE-39226.yaml

* Renamed CVE-39226 to CVE-2021-39226

Fixed naming error

* Added Wp-Guppy-Information-Disclosure template

* Removed File

Found better descriptor

* Added CVE-2021-24997

Added WordPress Guppy Information Disclosure CVE

* Fixed CVE-2021-24997

Fixed YAML formatting

* Fixed Typo

URL Path had an extra double quote

* Auto Generated Templates Stats [Wed Dec  8 23:07:24 UTC 2021] 🤖

* Deleted Blank Space

* Update CVE-2021-24997.yaml

* Update CVE-2021-24997.yaml

* Update CVE-2021-24997.yaml

* Update CVE-2021-24997.yaml

* Added CVE-2021-43496

* Update CVE-2021-43496.yaml

* fix: syntax update

* Added New Vuln

* Update CVE-2021-24997.yaml

* Update CVE-2021-43496.yaml

* Update and rename hd-netowrk-realtime-monitor-system-LFI.yaml to hdnetwork-realtime-lfi.yaml

* fix: lints update

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2021-12-14 02:22:26 +05:30
Nicolas 1411edf332
Updated CVE-2021-44228.yaml (#3335)
Co-authored-by: olacin <olacin@users.noreply.github.com>
2021-12-13 20:24:06 +05:30
5tr1x 5dc71681c5
Add X-Forwarded-For and Authentication headers 2021-12-11 15:43:22 -06:00
Mohamed Elbadry 33fbe53930
Create CVE-2021-44228.yaml (#3319)
* Create CVE-2021-44228.yaml

* fix: syntax fix

* update: added additional path based payload

* update: strict matcher + pulling hostname information of the system

* update: added path based payload

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2021-12-12 00:56:50 +05:30
GitHub Action a19b941193 Auto Generated CVE annotations [Wed Dec 8 11:18:20 UTC 2021] 🤖 2021-12-08 11:18:20 +00:00
Sandeep Singh 2521cb62bf
Added CVE-2021-43798 (#3296)
* Added CVE-2021-43798

* updated with default plugin list

* Update grafana-file-read.yaml
2021-12-08 16:46:47 +05:30
Prince Chaddha 548980ae5b
Update CVE-2021-40856.yaml 2021-12-08 10:25:18 +05:30
GwanYeong Kim 48c6834de6 Create CVE-2021-40856.yaml
Inserting the prefix "/about/../" allows bypassing the authentication check for the web-based configuration management interface. This enables attackers to gain access to the login credentials used for authentication at the PBX, among other data.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-12-08 09:54:30 +09:00
sandeep b8d068416f update: added reference for CVE-2021-38314 2021-12-04 22:17:25 +05:30
sandeep f64926808d Added missing tag 2021-12-04 12:50:04 +05:30
GitHub Action 01cb3156ce Auto Generated CVE annotations [Sat Dec 4 07:17:12 UTC 2021] 🤖 2021-12-04 07:17:12 +00:00
sandeep d2d0d4bf8d minor update to description 2021-12-04 12:44:08 +05:30
alph4byt3 09468dc0f8 Create CVE-2021-29490.yaml 2021-12-04 12:40:47 +05:30
alph4byt3 5180d138bf Delete CVE-2021-29490 2021-12-04 12:40:47 +05:30
alph4byt3 41148c9f86 Create CVE-2021-29490 2021-12-04 12:40:47 +05:30
GitHub Action ee1c16543d Auto Generated CVE annotations [Fri Dec 3 09:17:18 UTC 2021] 🤖 2021-12-03 09:17:18 +00:00
Prince Chaddha 7a32fc3941
Update and rename CVE-2021-27310.yaml to cves/2021/CVE-2021-27310.yaml 2021-12-03 14:43:25 +05:30
Prince Chaddha 7bd27557d8
Merge pull request #3253 from projectdiscovery/pr-fix-1
Update CVE-2021-30213.yaml
2021-12-03 14:32:47 +05:30
Prince Chaddha 0ac3b4da59
Merge pull request #3252 from projectdiscovery/pr-fix
Update CVE-2021-27931.yaml
2021-12-03 14:32:06 +05:30
Prince Chaddha 10c0f1b22f
Update CVE-2021-30213.yaml 2021-12-03 14:31:08 +05:30
Prince Chaddha 04bb340596
Update CVE-2021-27931.yaml 2021-12-03 14:30:44 +05:30
Prince Chaddha 5a36367340
Merge branch 'master' into pr-fix-1 2021-12-03 13:49:27 +05:30
Prince Chaddha 3cade85cc8
Merge branch 'master' into pr-fix 2021-12-03 13:23:33 +05:30
GitHub Action 6731cb176b Auto Generated CVE annotations [Fri Dec 3 07:23:34 UTC 2021] 🤖 2021-12-03 07:23:34 +00:00
Prince Chaddha ccca1add3f
Update CVE-2021-30213.yaml 2021-12-03 12:53:01 +05:30
Prince Chaddha e53cdde0c0
Merge pull request #3199 from alph4byt3/alph4byt3-patch-1
Create CVE-2021-30213.yaml
2021-12-03 12:52:11 +05:30
GitHub Action 5afe45cba5 Auto Generated CVE annotations [Fri Dec 3 07:19:34 UTC 2021] 🤖 2021-12-03 07:19:34 +00:00
Prince Chaddha 636a82effd
Update CVE-2021-27931.yaml 2021-12-03 12:48:47 +05:30
Prince Chaddha 025475d950
Merge pull request #3251 from projectdiscovery/pr-fix
Update and rename CVE-2021-40542.yaml to cves/2021/CVE-2021-40542.yaml
2021-12-03 12:48:01 +05:30
Prince Chaddha bac5f0f843
Merge pull request #3206 from alph4byt3/patch-1
Create CVE-2021-27931.yaml
2021-12-03 12:47:18 +05:30
Prince Chaddha 0457cbd6b2
Update and rename CVE-2021-40542.yaml to cves/2021/CVE-2021-40542.yaml 2021-12-03 12:42:37 +05:30
sandeep 1dabef2e6f Revert "CVE update - CVE-2021-22049"
This reverts commit 70128c2587.
2021-12-02 01:34:29 +05:30
sandeep 70128c2587 CVE update - CVE-2021-22049 2021-12-02 01:31:41 +05:30
sandeep 814bf92a00 File name update - CVE-2021-39226 2021-12-02 01:14:10 +05:30
Sandeep Singh 19fcafa546
CVE-2021-39226 (#3241)
* Added CVE-39226

Co-Authored-By: Evan Rubinstein <70485623+evanRubinsteinIT@users.noreply.github.com>

Co-authored-by: Evan Rubinstein <70485623+evanRubinsteinIT@users.noreply.github.com>
2021-12-02 01:07:40 +05:30
sullo 854b464b1d
Add remediation information to CVE-2021-40539 and CVE-2021-44427 (#3237)
* Added remediation to CVE-2021-40539

* Added remediation to CVE-2021-44427

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2021-12-01 22:23:24 +05:30
Prince Chaddha c9b6c8e463
Merge pull request #3235 from cckuailong/master
add CVE-2021-43778.yaml
2021-12-01 19:21:08 +05:30
Prince Chaddha 93f9f3ccac
Update CVE-2021-43778.yaml 2021-12-01 19:19:10 +05:30
GitHub Action d3649d4f43 Auto Generated CVE annotations [Wed Dec 1 13:42:24 UTC 2021] 🤖 2021-12-01 13:42:24 +00:00
cckuailong 2a8ca5d836 add CVE-2021-43778.yaml 2021-12-01 15:04:29 +08:00
GitHub Action fb048c7972 Auto Generated CVE annotations [Tue Nov 30 18:51:32 UTC 2021] 🤖 2021-11-30 18:51:32 +00:00
Sandeep Singh eb5a6ab341
Added CVE-2021-41266 (#3229)
Co-Authored-By: Lenin Alevski <1795553+Alevsk@users.noreply.github.com>
2021-12-01 00:19:41 +05:30
Prince Chaddha d484fed316
Merge pull request #3224 from xShuden/master
Create  CVE-2021-44427.yaml
2021-11-30 21:55:47 +04:00