Commit Graph

6956 Commits (ce8bab80f963c1f4cd7bb03ce0b8b189a749690a)

Author SHA1 Message Date
Prince Chaddha ce8bab80f9
Update CVE-2016-1000130.yaml 2021-07-19 11:12:07 +05:30
Prince Chaddha fbf13672ba
Update CVE-2016-1000129.yaml 2021-07-19 11:11:45 +05:30
Prince Chaddha e694c5ed4f
Update CVE-2016-1000128.yaml 2021-07-19 11:11:14 +05:30
Prince Chaddha ac74c79880
Update CVE-2014-4513.yaml 2021-07-19 11:10:50 +05:30
Prince Chaddha 47adcf182a
Update CVE-2013-4625.yaml 2021-07-19 11:06:19 +05:30
Prince Chaddha 62617288d0
Update CVE-2013-4117.yaml 2021-07-19 11:05:55 +05:30
Prince Chaddha c8a1047ec1
Update CVE-2013-2287.yaml 2021-07-19 11:05:25 +05:30
Prince Chaddha 269d14b0be
Update CVE-2012-5913.yaml 2021-07-19 11:05:03 +05:30
Prince Chaddha 68e005d1a2
Update CVE-2012-4768.yaml 2021-07-19 11:03:46 +05:30
Prince Chaddha 0fb255a462
Update CVE-2012-4273.yaml 2021-07-19 11:03:23 +05:30
Prince Chaddha 70bd4c64ed
Update CVE-2012-4242.yaml 2021-07-19 11:02:53 +05:30
Prince Chaddha 6cd08e6f41
Update CVE-2012-2371.yaml 2021-07-19 11:01:40 +05:30
Prince Chaddha 41df1d8136
Update CVE-2012-1835.yaml 2021-07-19 11:01:12 +05:30
Prince Chaddha b4c91dc3c3
Update CVE-2012-0901.yaml 2021-07-19 11:00:43 +05:30
Prince Chaddha 16d049098f
Update CVE-2011-5265.yaml 2021-07-19 11:00:15 +05:30
Prince Chaddha 112172ca7f
Update CVE-2011-5181.yaml 2021-07-19 10:59:46 +05:30
Prince Chaddha c255951814
Update CVE-2011-5179.yaml 2021-07-19 10:59:15 +05:30
Prince Chaddha 88cbfd1c8a
Update CVE-2011-5107.yaml 2021-07-19 10:58:42 +05:30
Prince Chaddha 0ee4a82a51
Update CVE-2011-5106.yaml 2021-07-19 10:58:12 +05:30
Prince Chaddha 92e3ef5abb
Update CVE-2011-4926.yaml 2021-07-19 10:57:35 +05:30
Prince Chaddha c8776b52be
Update CVE-2011-4624.yaml 2021-07-19 10:56:53 +05:30
Prince Chaddha 9292a9a025
Update CVE-2011-4618.yaml 2021-07-19 10:55:56 +05:30
GitHub Action 0cb3c9d6b5 Auto Update README [Sun Jul 18 18:01:12 UTC 2021] 🤖 2021-07-18 18:01:12 +00:00
Sandeep Singh e21422a385
Merge pull request #2078 from gy741/rule-add-v28
Create mirai-unknown-rce.yaml
2021-07-18 23:30:54 +05:30
GitHub Action 8d9b19651f Auto Update README [Sun Jul 18 17:56:01 UTC 2021] 🤖 2021-07-18 17:56:01 +00:00
Sandeep Singh 922555503b
Merge pull request #2073 from gy741/rule-add-v26
Create CVE-2020-27866.yaml
2021-07-18 23:25:43 +05:30
sandeep 965e6fcc00 minor update 2021-07-18 23:24:55 +05:30
Sandeep Singh cd63b0d01f
Merge pull request #2075 from pdelteil/patch-23
Update exposed-gitignore.yaml
2021-07-18 23:19:03 +05:30
GitHub Action e975b6edac Auto Update README [Sun Jul 18 17:48:01 UTC 2021] 🤖 2021-07-18 17:48:01 +00:00
Sandeep Singh f9c8314092
Merge pull request #2077 from gy741/rule-add-v27
Create Advantech R-SeeNet Multiple Reflected XSS vulnerabilities
2021-07-18 23:17:40 +05:30
sandeep c56680cef3 Additional matcher 2021-07-18 23:14:19 +05:30
GitHub Action 27b8b08b42 Auto Update README [Sun Jul 18 17:13:47 UTC 2021] 🤖 2021-07-18 17:13:47 +00:00
Sandeep Singh 07266a7e8c
Merge pull request #2079 from DhiyaneshGeek/master
Adobe Lucee Complete Chain , GiveWP 2.9.7 Reflected Cross-Site Scripting , Cortex XSOAR Login Panel
2021-07-18 22:43:26 +05:30
sandeep be655ffd69 No more manual updates with tags support 2021-07-18 22:41:13 +05:30
sandeep 3088fb5431 Removing CVE-2021-24213
As per blog - https://bentl.ee/posts/cve-givewp/

> This vulnerability requires user interaction from an admin in order to be exploited.
2021-07-18 22:39:37 +05:30
sandeep 76e95ac1e5 Minor improvements 2021-07-18 22:36:15 +05:30
Dhiyaneshwaran 22fa4de8d8
Update CVE-2021-21307.yaml 2021-07-18 19:33:28 +05:30
Dhiyaneshwaran ce980acc50
Update CVE-2021-21307.yaml 2021-07-18 19:28:29 +05:30
Dhiyaneshwaran e692d81999
Update CVE-2021-21307.yaml 2021-07-18 19:24:46 +05:30
Dhiyaneshwaran c0ae7b8eda
Update lucee-workflow.yaml 2021-07-18 19:21:01 +05:30
Dhiyaneshwaran 0a8d2ffdcc
Create CVE-2021-21307.yaml 2021-07-18 19:19:19 +05:30
GwanYeong Kim 19fa522fec Create mirai-unknown-rce.yaml
The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 22:44:29 +09:00
GwanYeong Kim 4414ff60db Create Advantech R-SeeNet Multiple Reflected XSS vulnerabilities
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 22:12:01 +09:00
Dhiyaneshwaran ed9418961d
Create cortex-xsoar-login.yaml 2021-07-18 17:24:04 +05:30
Dhiyaneshwaran 0a01f0cd79
Create CVE-2021-24213.yaml 2021-07-18 16:44:57 +05:30
Dhiyaneshwaran dd8f248892
Merge pull request #75 from projectdiscovery/master
Updation
2021-07-18 13:08:23 +05:30
Philippe Delteil aec3d87e72
Update exposed-gitignore.yaml
New conditions to avoid false positives.
2021-07-17 23:15:08 -04:00
GwanYeong Kim fb22fd40c5 Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 10:03:38 +09:00
Sandeep Singh 24042afb39
Merge pull request #2069 from 0xPrial/master
Updated Heroku and Netlify takeover detection
2021-07-17 23:58:35 +05:30
sandeep d2970f3529 misc changes 2021-07-17 23:55:56 +05:30