MostInterestingBotInTheWorld
c91e813807
Enhancement: cves/2021/CVE-2021-21311.yaml by md
2023-03-13 13:04:41 -04:00
QAQ
ffaec1abd9
Update CVE-2021-21311.yaml
2023-03-05 16:39:21 +08:00
QAQ
37d23242ce
Merge branch 'projectdiscovery:main' into main
2023-03-05 15:43:25 +08:00
GitHub Action
615e4e531d
Auto Generated CVE annotations [Sat Mar 4 08:22:19 UTC 2023] 🤖
2023-03-04 08:22:19 +00:00
QAQ
3dfd9e3915
Fix cve-2021-21311 ( #6821 )
...
* update zip-backup-files
* fix cve-2021-21311
* Update CVE-2021-21311.yaml
* Update php-backup-files
* add exposed-ds_store.yaml
* lint fixes
* added more matchers!
* removed duplicate template
* misc formatting update
* added fuzz tags
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-03-04 13:35:35 +05:30
sandeep
eafc69520b
lint fixes
2023-03-04 12:39:43 +05:30
QAQ
e07f16d18e
Update CVE-2021-21311.yaml
2023-03-03 15:53:41 +08:00
pwnhxl
b1b658f8e2
fix cve-2021-21311
2023-03-03 15:28:31 +08:00
MostInterestingBotInTheWorld
7450f53e76
Merge branch 'projectdiscovery:master' into dashboard
2022-06-29 09:36:23 -04:00
sullo
60ae2394a5
Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard
2022-06-28 11:33:36 -04:00
sullo
ebdc89543c
Fix HTML encodings Appsmith decoded
2022-06-28 11:33:21 -04:00
GitHub Action
62cb0ef094
Auto Generated CVE annotations [Tue Jun 28 03:37:20 UTC 2022] 🤖
2022-06-28 03:37:20 +00:00
Prince Chaddha
527e8a99f2
Update CVE-2021-21311.yaml
2022-06-28 08:46:27 +05:30
Prince Chaddha
904b45b6bd
Update CVE-2021-21311.yaml
2022-06-28 08:29:30 +05:30
MostInterestingBotInTheWorld
06012262ee
Enhancement: cves/2021/CVE-2021-21311.yaml by mp
2022-06-27 13:19:33 -04:00
MostInterestingBotInTheWorld
ebf945b78f
Enhancement: cves/2021/CVE-2021-21311.yaml by mp
2022-06-27 13:12:31 -04:00
Prince Chaddha
7ada510859
Fixed possible FPs in open redirect templates ( #4544 )
...
* Fixed possible FPs in open redirect templates
We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.
* updated example domain
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
Sandeep Singh
b59ff42aaf
additional reference to cves templates ( #4395 )
...
* additional reference to cves templates
* Update CVE-2006-1681.yaml
* Update CVE-2009-3318.yaml
* Update CVE-2009-4223.yaml
* Update CVE-2010-0942.yaml
* Update CVE-2010-0944.yaml
* Update CVE-2010-0972.yaml
* Update CVE-2010-1304.yaml
* Update CVE-2010-1308.yaml
* Update CVE-2010-1313.yaml
* Update CVE-2010-1461.yaml
* Update CVE-2010-1470.yaml
* Update CVE-2010-1471.yaml
* Update CVE-2010-1472.yaml
* Update CVE-2010-1474.yaml
* removed duplicate references
* misc fix
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: Prince Chaddha <cyberbossprince@gmail.com>
2022-05-17 14:48:12 +05:30
forgedhallpass
209538baa6
refactor: Description field uniformization
...
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
GitHub Action
074936d227
Auto Generated CVE annotations [Thu Mar 31 19:40:33 UTC 2022] 🤖
2022-03-31 19:40:33 +00:00
Adam Crosser
235ba94b41
Nuclei Template for Adminer SSRF Issue (CVE-2021-21311) ( #4019 )
...
* Updated CVE-2022-22963
* Added CVE-2021-21311 Template
* Added Shodan Query
* Updated Title
* misc update
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 01:10:06 +05:30