bauthard
|
c718848a88
|
Update CVE-2020-8512.yaml
|
2020-06-30 01:59:13 +05:30 |
bauthard
|
01378933c6
|
Update CVE-2020-12720.yaml
|
2020-06-29 19:25:45 +05:30 |
bauthard
|
75e2166cc5
|
updating CVE-2020-12720
|
2020-06-29 19:24:56 +05:30 |
bauthard
|
084a745600
|
added CVE-2020-8512
|
2020-06-26 09:14:54 +05:30 |
bauthard
|
2d56871bd0
|
Update CVE-2019-3799.yaml
|
2020-06-23 03:22:51 +05:30 |
bauthard
|
2d8efb04ba
|
Update CVE-2018-20824.yaml
|
2020-06-23 03:21:54 +05:30 |
bauthard
|
d8a79274ae
|
Update CVE-2018-19439.yaml
|
2020-06-23 03:17:00 +05:30 |
bauthard
|
b7103a2197
|
Pushing newly added cves
|
2020-06-22 19:05:37 +05:30 |
bauthard
|
32d9373273
|
adding more path with recent PR
|
2020-06-22 03:50:29 +05:30 |
bauthard
|
3b3ab42984
|
Merge pull request #144 from maverickNerd/master
Add directory traversal CVE-2020-5410 affecting Spring Cloud Config
|
2020-06-18 16:48:30 +05:30 |
Sachin Grover
|
68450463c2
|
Add directory traversal CVE-2020-5410 affecting Spring Cloud Config Server
|
2020-06-18 10:16:29 +00:00 |
bauthard
|
48e9534630
|
Removing CVE-2020-7473
I will try to find a more stable syntax and will add it again.
|
2020-06-18 00:00:00 +05:30 |
Sachin Grover
|
fea47dd3f5
|
Add CVE-2018-1000129 and version detection is enabled for port 8080 also
|
2020-06-17 09:18:49 +00:00 |
Aditya Soni
|
d72794b4d8
|
Create CVE-2018-1271.yaml
|
2020-06-03 06:23:25 +05:30 |
Fabian Affolter
|
d3b7f6b54c
|
Update syntax
|
2020-05-25 09:49:06 +02:00 |
bauthard
|
5d5647b05e
|
updated CVE-2019-5418
|
2020-05-24 03:55:32 +00:00 |
bauthard
|
999fbd9daf
|
updating severity
|
2020-05-24 09:20:13 +05:30 |
Andrea
|
c0bf01de1a
|
improve wp cve admin
|
2020-05-23 10:09:09 +02:00 |
Andrea
|
4132f3d7af
|
Merge remote-tracking branch 'upstream/master'
|
2020-05-23 10:08:02 +02:00 |
bauthard
|
7a6e1d181b
|
added CVE-2020-12720 vBulletin SQLI
|
2020-05-22 03:24:16 +05:30 |
bauthard
|
4a33940a37
|
Added CVE-2020-12720 vBulletin SQLI
|
2020-05-22 03:17:20 +05:30 |
Regala
|
03e957b0df
|
Update CVE-2020-7473.yaml
|
2020-05-19 13:55:49 +01:00 |
Regala
|
a2433d86a4
|
Update CVE-2020-7473.yaml
Updated to support 2xx and 3xx status code, as well as accepting redirects just in case.
|
2020-05-19 11:45:31 +01:00 |
Regala
|
5316f5dbcc
|
Update CVE-2020-7473.yaml
This is to avoid false positives. I think it would be better to only match 2xx and 3xx status code (don't know if nuclei supports this terminology)
|
2020-05-18 11:14:04 +01:00 |
bauthard
|
601b3c086d
|
Merge pull request #87 from 73735/front-page-misconfig.yaml
Add front-page-misconfig.yaml
|
2020-05-16 15:38:39 +05:30 |
João Teles
|
7a37488076
|
Update CVE-2020-7473.yaml
Ready guys. Now the template will check for size. I didn't implement the "HEAD" method because the nuclei is not supported.
|
2020-05-15 20:59:23 -03:00 |
Nadino92
|
7b88d4258e
|
adding 2 cves and crxde
|
2020-05-14 19:54:02 +02:00 |
bauthard
|
0d5b682e94
|
updating cve names
|
2020-05-08 18:40:02 +00:00 |
Andrea
|
fc797a94e1
|
fix crash for {{
|
2020-05-08 18:31:59 +02:00 |
Michael Blake
|
339ac74114
|
Prevent false-positives for CVE-2019-19368
|
2020-05-07 21:47:47 -07:00 |
Michael Blake
|
fe2efe6124
|
CVE-2019-14974 check and severity update
|
2020-05-07 21:45:25 -07:00 |
Joao Teles
|
d22d0745d2
|
Add CVE-2020-7473.yaml
|
2020-05-07 10:15:25 -03:00 |
organiccrap
|
413c126c29
|
pending pull
|
2020-04-22 14:42:01 +08:00 |
Prince Chaddha
|
dc58dc9f0d
|
Update CVE-2018-1247.yaml
|
2020-04-20 17:49:55 +05:30 |
bauthard
|
01d665867f
|
Update CVE-2019-8903.yaml
|
2020-04-15 17:38:14 +05:30 |
bauthard
|
7a676dc859
|
Update CVE-2020-5284.yaml
|
2020-04-15 17:36:26 +05:30 |
bauthard
|
1c6ae2caeb
|
Update CVE-2019-10475.yaml
|
2020-04-10 02:24:19 +05:30 |
bauthard
|
8314cf90b7
|
fixing the template
|
2020-04-10 02:15:42 +05:30 |
bauthard
|
4d5bdb15e4
|
updating temp
|
2020-04-10 01:51:15 +05:30 |
bauthard
|
50b1085603
|
updating matchers
|
2020-04-09 20:09:41 +05:30 |
bauthard
|
84c9d6581b
|
fixing the template
|
2020-04-09 18:32:30 +05:30 |
bauthard
|
cf61253752
|
Rename uWSGI PHP Plugin Directory Traversal.yaml to CVE-2018-7490.yaml
|
2020-04-08 22:15:03 +05:30 |
bauthard
|
71789aebc0
|
Rename totaljs-CVE-2019-8903.yaml to CVE-2019-8903.yaml
|
2020-04-08 22:13:39 +05:30 |
bauthard
|
5520abf86d
|
Rename nextjs-cve-2020-5284.yaml to CVE-2020-5284.yaml
|
2020-04-08 22:12:59 +05:30 |
bauthard
|
7461a3ab47
|
Rename cve-2019-19781.yaml to CVE-2019-19781.yaml
|
2020-04-08 22:10:31 +05:30 |
bauthard
|
f44cfef0dc
|
Rename jira-cve-2017-9506.yaml to CVE-2017-9506.yaml
|
2020-04-08 22:04:08 +05:30 |
bauthard
|
fea46895e3
|
updating file name for uniform structure
|
2020-04-08 22:02:49 +05:30 |
bauthard
|
1735b236d7
|
added to vulnerabilities section
|
2020-04-08 22:00:48 +05:30 |
bauthard
|
ea6f33f4a4
|
Update and rename Revive Adserver XSS.yaml to CVE-2020-8115.yaml
|
2020-04-08 21:52:47 +05:30 |
bauthard
|
96af25bc0a
|
Update and rename RSA Authentication Manager XSS.yaml to CVE-2018-1247.yaml
|
2020-04-08 21:47:23 +05:30 |