Commit Graph

1881 Commits (bf0aff757989eb310e4052a2a3e608ce3fe7c870)

Author SHA1 Message Date
Prince Chaddha bf0aff7579
Update CVE-2019-15713.yaml 2021-07-19 11:32:53 +05:30
Prince Chaddha fee3b0dbba
Update CVE-2018-5316.yaml 2021-07-19 11:32:30 +05:30
Prince Chaddha 5923b1522e
Update CVE-2018-20462.yaml 2021-07-19 11:31:57 +05:30
Prince Chaddha 1453b08a1d
Update CVE-2018-11709.yaml 2021-07-19 11:31:16 +05:30
Prince Chaddha cfd72afbc5
Update CVE-2017-9288.yaml 2021-07-19 11:30:44 +05:30
Prince Chaddha 70b1ba08d6
Update CVE-2017-18536.yaml 2021-07-19 11:29:58 +05:30
Prince Chaddha 63765c5693
Update CVE-2017-17451.yaml 2021-07-19 11:29:23 +05:30
Prince Chaddha df69924f5b
Update CVE-2017-17059.yaml 2021-07-19 11:15:37 +05:30
Prince Chaddha b47cf72dd0
Update CVE-2017-17043.yaml 2021-07-19 11:15:08 +05:30
Prince Chaddha a81d23491b
Update CVE-2016-1000135.yaml 2021-07-19 11:14:30 +05:30
Prince Chaddha e6f51e19eb
Update CVE-2016-1000134.yaml 2021-07-19 11:13:59 +05:30
Prince Chaddha d74ebd67d7
Update CVE-2016-1000133.yaml 2021-07-19 11:13:30 +05:30
Prince Chaddha 1790dd8fc2
Update CVE-2016-1000132.yaml 2021-07-19 11:12:58 +05:30
Prince Chaddha 62c3971816
Update CVE-2016-1000131.yaml 2021-07-19 11:12:30 +05:30
Prince Chaddha ce8bab80f9
Update CVE-2016-1000130.yaml 2021-07-19 11:12:07 +05:30
Prince Chaddha fbf13672ba
Update CVE-2016-1000129.yaml 2021-07-19 11:11:45 +05:30
Prince Chaddha e694c5ed4f
Update CVE-2016-1000128.yaml 2021-07-19 11:11:14 +05:30
Prince Chaddha ac74c79880
Update CVE-2014-4513.yaml 2021-07-19 11:10:50 +05:30
Prince Chaddha 47adcf182a
Update CVE-2013-4625.yaml 2021-07-19 11:06:19 +05:30
Prince Chaddha 62617288d0
Update CVE-2013-4117.yaml 2021-07-19 11:05:55 +05:30
Prince Chaddha c8a1047ec1
Update CVE-2013-2287.yaml 2021-07-19 11:05:25 +05:30
Prince Chaddha 269d14b0be
Update CVE-2012-5913.yaml 2021-07-19 11:05:03 +05:30
Prince Chaddha 68e005d1a2
Update CVE-2012-4768.yaml 2021-07-19 11:03:46 +05:30
Prince Chaddha 0fb255a462
Update CVE-2012-4273.yaml 2021-07-19 11:03:23 +05:30
Prince Chaddha 70bd4c64ed
Update CVE-2012-4242.yaml 2021-07-19 11:02:53 +05:30
Prince Chaddha 6cd08e6f41
Update CVE-2012-2371.yaml 2021-07-19 11:01:40 +05:30
Prince Chaddha 41df1d8136
Update CVE-2012-1835.yaml 2021-07-19 11:01:12 +05:30
Prince Chaddha b4c91dc3c3
Update CVE-2012-0901.yaml 2021-07-19 11:00:43 +05:30
Prince Chaddha 16d049098f
Update CVE-2011-5265.yaml 2021-07-19 11:00:15 +05:30
Prince Chaddha 112172ca7f
Update CVE-2011-5181.yaml 2021-07-19 10:59:46 +05:30
Prince Chaddha c255951814
Update CVE-2011-5179.yaml 2021-07-19 10:59:15 +05:30
Prince Chaddha 88cbfd1c8a
Update CVE-2011-5107.yaml 2021-07-19 10:58:42 +05:30
Prince Chaddha 0ee4a82a51
Update CVE-2011-5106.yaml 2021-07-19 10:58:12 +05:30
Prince Chaddha 92e3ef5abb
Update CVE-2011-4926.yaml 2021-07-19 10:57:35 +05:30
Prince Chaddha c8776b52be
Update CVE-2011-4624.yaml 2021-07-19 10:56:53 +05:30
Prince Chaddha 9292a9a025
Update CVE-2011-4618.yaml 2021-07-19 10:55:56 +05:30
Sandeep Singh 922555503b
Merge pull request #2073 from gy741/rule-add-v26
Create CVE-2020-27866.yaml
2021-07-18 23:25:43 +05:30
sandeep 965e6fcc00 minor update 2021-07-18 23:24:55 +05:30
Sandeep Singh f9c8314092
Merge pull request #2077 from gy741/rule-add-v27
Create Advantech R-SeeNet Multiple Reflected XSS vulnerabilities
2021-07-18 23:17:40 +05:30
sandeep c56680cef3 Additional matcher 2021-07-18 23:14:19 +05:30
sandeep 3088fb5431 Removing CVE-2021-24213
As per blog - https://bentl.ee/posts/cve-givewp/

> This vulnerability requires user interaction from an admin in order to be exploited.
2021-07-18 22:39:37 +05:30
sandeep 76e95ac1e5 Minor improvements 2021-07-18 22:36:15 +05:30
Dhiyaneshwaran 22fa4de8d8
Update CVE-2021-21307.yaml 2021-07-18 19:33:28 +05:30
Dhiyaneshwaran e692d81999
Update CVE-2021-21307.yaml 2021-07-18 19:24:46 +05:30
Dhiyaneshwaran 0a8d2ffdcc
Create CVE-2021-21307.yaml 2021-07-18 19:19:19 +05:30
GwanYeong Kim 4414ff60db Create Advantech R-SeeNet Multiple Reflected XSS vulnerabilities
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 22:12:01 +09:00
Dhiyaneshwaran 0a01f0cd79
Create CVE-2021-24213.yaml 2021-07-18 16:44:57 +05:30
GwanYeong Kim fb22fd40c5 Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 10:03:38 +09:00
Sandeep Singh b707e46052
Merge pull request #1830 from random-robbie/patch-13
Create CVE-2013-3827.yaml
2021-07-17 21:50:24 +05:30
sandeep 41436ccef8 matcher update 2021-07-17 21:44:56 +05:30