Harsh Yadav
|
44da26c74c
|
Create CVE-2022-46071.yaml
|
2023-06-30 12:44:02 +05:30 |
Dhiyaneshwaran
|
131e8bfb0c
|
Create CVE-2022-40022.yaml
|
2023-06-22 11:16:36 +05:30 |
GitHub Action
|
41277637c0
|
TemplateMan Update [Wed Jun 21 21:03:53 UTC 2023] 🤖
|
2023-06-21 21:03:54 +00:00 |
sandeep
|
c90fa30096
|
removed deprecated header syntax with latest one
|
2023-06-20 02:40:30 +05:30 |
Dhiyaneshwaran
|
a1b59c6d32
|
rename file and tag added
|
2023-06-19 12:07:33 +05:30 |
J4vaovo
|
182af15c86
|
Update CVE-2022-23544.yaml
|
2023-06-18 02:35:12 +08:00 |
J4vaovo
|
76333efa1f
|
Update CVE-2022-23544.yaml
|
2023-06-17 18:42:40 +08:00 |
J4vaovo
|
64f18feec4
|
Create CVE-2022-23544.yaml
|
2023-06-17 03:48:01 +08:00 |
Dhiyaneshwaran
|
3d34c7b63f
|
Merge pull request #7452 from ctflearner/CVE-2022-0869
Create CVE-2022-0869.yaml
|
2023-06-15 22:06:21 +05:30 |
Dhiyaneshwaran
|
150475424a
|
added metadata
|
2023-06-15 22:00:09 +05:30 |
Dhiyaneshwaran
|
21a4d630ba
|
Update CVE-2022-0869.yaml
|
2023-06-15 21:54:33 +05:30 |
pussycat0x
|
7679e160fd
|
Update CVE-2022-23102.yaml
|
2023-06-15 17:46:41 +05:30 |
Dhiyaneshwaran
|
47b568a695
|
fix-template
|
2023-06-15 15:31:11 +05:30 |
ctflearner
|
0ba6e7ac6c
|
Create CVE-2022-0869.yaml
Added a New Nuclei Template as CVE-2022-0869
|
2023-06-15 13:01:32 +05:30 |
ctflearner
|
dce4169ad3
|
Create CVE-2022-23102.yaml
Added a New Nuclei Template as CVE-2022-23102
|
2023-06-15 12:36:37 +05:30 |
Ritik Chaddha
|
ce9517665b
|
updated matchers
|
2023-06-15 09:38:56 +05:30 |
J4vaovo
|
9f3116bf02
|
Update CVE-2022-25481.yaml
|
2023-06-10 21:33:20 +08:00 |
Ritik Chaddha
|
a4699f5b9f
|
Merge pull request #7335 from j4vaovo/patch-48
fix CVE-2022-1595-false positive
|
2023-06-08 23:47:52 +05:30 |
Ritik Chaddha
|
6f874d5d47
|
Update CVE-2022-1595.yaml
|
2023-06-08 23:40:56 +05:30 |
Ritik Chaddha
|
50b5047265
|
update
|
2023-06-05 13:06:24 +05:30 |
Ritik Chaddha
|
bbdceb3b4a
|
updated metadata and matchers
|
2023-06-05 12:57:06 +05:30 |
Prince Chaddha
|
ffc66c4bd8
|
templates added
|
2023-06-05 12:33:16 +05:30 |
sandeep
|
e53d19f583
|
boolean format update
|
2023-06-04 13:43:42 +05:30 |
GitHub Action
|
df5a969b80
|
Auto Generated CVE annotations [Sat Jun 3 18:56:35 UTC 2023] 🤖
|
2023-06-03 18:56:35 +00:00 |
J4vaovo
|
92d7192ed3
|
Update CVE-2022-1595.yaml
|
2023-06-01 13:01:39 +08:00 |
Ritik Chaddha
|
e7ce7295b5
|
Update CVE-2022-1595.yaml
|
2023-05-31 13:13:33 +05:30 |
J4vaovo
|
5b9ab2065a
|
Update CVE-2022-1595.yaml
|
2023-05-31 11:14:06 +08:00 |
Dhiyaneshwaran
|
67859eff2c
|
Create CVE-2022-2733.yaml
|
2023-05-22 15:49:45 +05:30 |
pussycat0x
|
726d826284
|
Merge pull request #7212 from Zeyad-Azima/patch-1
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI p…
|
2023-05-20 23:42:33 +05:30 |
Dhiyaneshwaran
|
ce1a476baf
|
trailspace fix
|
2023-05-18 21:05:15 +05:30 |
Dhiyaneshwaran
|
4939442773
|
re-wrote-template
|
2023-05-18 20:59:40 +05:30 |
GitHub Action
|
1c5197c6f7
|
Auto Generated CVE annotations [Thu May 11 13:27:36 UTC 2023] 🤖
|
2023-05-11 13:27:36 +00:00 |
Zer0verflow
|
7b035ab1eb
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:54:49 +08:00 |
Zer0verflow
|
749f2b5aa3
|
Update CVE-2022-22733.yaml
|
2023-05-11 13:50:07 +08:00 |
Zer0verflow
|
80d33d7741
|
Add template for CVE-2022-22733 Apache ShardingSphere ElasticJob-UI privilege escalation
|
2023-05-11 10:57:33 +08:00 |
Dhiyaneshwaran
|
0dcedab251
|
Merge pull request #7203 from david-bla/add-sophos-mobile-xxe_cve-2022-3980
add template for sophos mobile xxe ssrf (cve-2022-3980)
|
2023-05-11 07:36:04 +05:30 |
Dhiyaneshwaran
|
333b861ffc
|
shodan query update
|
2023-05-11 07:31:07 +05:30 |
pussycat0x
|
1cbcce382d
|
Merge pull request #7196 from projectdiscovery/CVE-2022-24716
CVE 2022 24716
|
2023-05-11 00:42:58 +05:30 |
Dhiyaneshwaran
|
2f84af20e0
|
Update CVE-2022-24716.yaml
|
2023-05-11 00:30:35 +05:30 |
Ritik Chaddha
|
2696334222
|
updated matcher
|
2023-05-10 17:42:58 +05:30 |
sandeep
|
aa90fc9036
|
added additional matcher to make it strict
|
2023-05-09 22:50:55 +05:30 |
Ritik Chaddha
|
b79431ad43
|
updated path and matchers
|
2023-05-09 21:45:10 +05:30 |
Ritik Chaddha
|
68b0734657
|
removed matcher condition
|
2023-05-09 19:36:13 +05:30 |
Dhiyaneshwaran
|
70a4c7180c
|
description added
|
2023-05-08 22:56:05 +05:30 |
Dhiyaneshwaran
|
badb9b7945
|
Create CVE-2022-24716.yaml
|
2023-05-08 22:54:19 +05:30 |
Prince Chaddha
|
124b2230cf
|
templates added
|
2023-05-06 17:42:20 +05:30 |
Dhiyaneshwaran
|
511a601dd6
|
Merge pull request #7175 from Co5mos/CVE-2022-40879
Updated CVE-2022-40879 Template
|
2023-05-05 22:52:41 +05:30 |
Dhiyaneshwaran
|
c585da0abe
|
Merge pull request #7176 from Co5mos/CVE-2022-0678
Updated CVE-2022-0678 Template
|
2023-05-05 22:52:23 +05:30 |
Ritik Chaddha
|
561b42ebe7
|
Merge branch 'main' into add-cpe-epss
|
2023-05-05 00:00:13 +05:30 |
Co5mos
|
c76b0a862a
|
Updated CVE-2022-0678 Template
|
2023-05-04 20:37:18 +08:00 |
Co5mos
|
4565b0a6fe
|
Updated CVE-2022-40879 Template
|
2023-05-04 20:34:45 +08:00 |
sandeep
|
2175d81329
|
removed duplicate key
|
2023-05-02 18:29:30 +05:30 |
sandeep
|
e5ae45127e
|
Merge remote-tracking branch 'origin' into add-cpe-epss
|
2023-05-02 18:21:24 +05:30 |
Sandeep Singh
|
28f4302dcd
|
Merge branch 'main' into add-max-request
|
2023-04-29 13:32:16 +05:30 |
MostInterestingBotInTheWorld
|
a34153eb9c
|
Dashboard Content Enhancements (#7149)
Dashboard Content Enhancements
|
2023-04-28 09:11:35 -04:00 |
sandeep
|
1f5b1f2c47
|
Added max request counter of each template
|
2023-04-28 13:41:21 +05:30 |
Prince Chaddha
|
e0af666e1c
|
Refactoring the directory structure based on protocols (#7137)
* moving http templates
* updated cves.json
* moved network CVEs
* updated scripts
* updated workflows
* updated requests to http
* replaced network to tcp
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-04-27 09:58:59 +05:30 |