Dhiyaneshwaran
|
1e8df323d2
|
Merge pull request #7846 from numanturle/CVE-2023-39120
Create CVE-2023-39120.yaml
|
2023-08-07 16:07:53 +05:30 |
Dhiyaneshwaran
|
b58932e9c4
|
updated matcher and added metadata
|
2023-08-07 13:49:40 +05:30 |
Dhiyaneshwaran
|
3793c853fd
|
Create CVE-2023-39143.yaml (PaperCut Path Traversal Detection) KEV 🔥 (#7857)
* Create CVE-2023-39143.yaml
* added kev reference
* Fix FP and Match only against PaperCut
* updated to use dsl matchers
* classification update
* updated name
* misc update
---------
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
|
2023-08-06 22:51:19 +05:30 |
numan
|
6ae1c5e514
|
Update CVE-2023-39120.yaml
fix typo
|
2023-08-05 13:38:40 +03:00 |
numan
|
eee628ac8a
|
Create CVE-2023-39120.yaml
|
2023-08-05 11:48:31 +03:00 |
Dhiyaneshwaran
|
eba1d1ce83
|
Create CVE-2023-35082.yaml
|
2023-08-03 21:50:05 +05:30 |
Ritik Chaddha
|
133f18eca9
|
Merge pull request #7789 from projectdiscovery/CVE-2023-1698
Create CVE-2023-1698.yaml
|
2023-08-02 13:50:28 +05:30 |
Ritik Chaddha
|
580c51dbc2
|
updated matcher
|
2023-08-02 13:47:13 +05:30 |
pussycat0x
|
85ce257f9f
|
Merge pull request #7787 from projectdiscovery/CVE-2023-32117
Create CVE-2023-32117.yaml
|
2023-08-02 12:02:14 +05:30 |
pussycat0x
|
873bd7c3cc
|
Update CVE-2023-32117.yaml
|
2023-08-02 11:14:25 +05:30 |
pussycat0x
|
4d4d008de0
|
lint - fix
|
2023-08-02 11:08:15 +05:30 |
pussycat0x
|
ffd867ba2f
|
Update CVE-2023-32117.yaml
|
2023-08-02 11:05:02 +05:30 |
Dhiyaneshwaran
|
5c66e70568
|
remove name
|
2023-08-01 15:04:14 +05:30 |
GitHub Action
|
69bed45657
|
TemplateMan Update [Tue Aug 1 07:02:52 UTC 2023] 🤖
|
2023-08-01 07:02:52 +00:00 |
Ritik Chaddha
|
ddd0a02fbf
|
updated quote and space
|
2023-08-01 11:28:24 +05:30 |
Ritik Chaddha
|
69fb2db5c1
|
Create CVE-2023-37580.yaml (Zimbra XSS)
|
2023-08-01 10:56:17 +05:30 |
Dhiyaneshwaran
|
c615ced4f8
|
fix-template
|
2023-08-01 09:53:40 +05:30 |
Ritik Chaddha
|
042ef1eba2
|
updated matcher
|
2023-07-31 18:56:35 +05:30 |
Ritik Chaddha
|
5b57ab4e93
|
Metadata update CVE-2023-35078.yaml
|
2023-07-31 18:52:18 +05:30 |
Dhiyaneshwaran
|
ca576f0407
|
Create CVE-2023-1698.yaml
|
2023-07-30 22:11:33 +05:30 |
Dhiyaneshwaran
|
e7dd8eaee5
|
Create CVE-2023-32117.yaml
|
2023-07-30 20:42:56 +05:30 |
GitHub Action
|
2a0775df9b
|
TemplateMan Update [Fri Jul 28 21:41:00 UTC 2023] 🤖
|
2023-07-28 21:41:01 +00:00 |
Sandeep Singh
|
455c23dc36
|
Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass (CVE-2023-35078) (#7785)
* Added CVE-2023-35078 - Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass
Co-Authored-By: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
* added reference
---------
Co-authored-by: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
|
2023-07-29 03:08:50 +05:30 |
GitHub Action
|
6f4ca8977e
|
TemplateMan Update [Fri Jul 28 21:08:22 UTC 2023] 🤖
|
2023-07-28 21:08:23 +00:00 |
Dhiyaneshwaran
|
2f2626a6b3
|
Create CVE-2023-35885.yaml (#7771)
* Create CVE-2023-35885.yaml
* using echo string instead of webshell
---------
Co-authored-by: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
|
2023-07-29 02:36:02 +05:30 |
Sandeep Singh
|
92659332c3
|
Added CVE-2023-38646 (Metabase PreAuth RCE) (#7777)
* Added detection template for CVE-2023-38646
* payload update
|
2023-07-29 01:19:14 +05:30 |
GitHub Action
|
56316fa724
|
TemplateMan Update [Thu Jul 27 18:52:41 UTC 2023] 🤖
|
2023-07-27 18:52:42 +00:00 |
Ritik Chaddha
|
7c1cc02bb8
|
Merge pull request #7768 from HuTa0kj/dev/cve_2023_3836
Create CVE-2023-3836.yaml
|
2023-07-28 00:20:41 +05:30 |
Ritik Chaddha
|
c1ada9f68d
|
updated info
|
2023-07-28 00:17:36 +05:30 |
pussycat0x
|
a83b43697b
|
Merge pull request #7764 from projectdiscovery/use-headers_2
Update CVE-2023-2178.yaml
|
2023-07-27 14:48:19 +05:30 |
Dhiyaneshwaran
|
fe443b2d6d
|
CasaOS Authentication Bypass (CVE-2023-37265, CVE-2023-37266) (#7766)
* Create CVE-2023-37265.yaml
* Create CVE-2023-37266.yaml
|
2023-07-27 14:41:18 +05:30 |
Dhiyaneshwaran
|
877af18592
|
metadata
|
2023-07-26 14:55:27 +05:30 |
HuTa0
|
333233c53d
|
Fix Blank line
|
2023-07-26 17:10:21 +08:00 |
TFDDZ
|
5e9480eb49
|
Create CVE-2023-3836.yaml
|
2023-07-26 17:01:22 +08:00 |
Dhiyaneshwaran
|
9aa5690bd5
|
Merge pull request #7742 from ctflearner/CVE-2023-23161
Create CVE-2023-23161.yaml
|
2023-07-26 13:09:04 +05:30 |
Ritik Chaddha
|
f5ff8753de
|
updated matcher & info
|
2023-07-26 11:25:48 +05:30 |
Dhiyaneshwaran
|
6807ab9492
|
Update CVE-2023-2178.yaml
|
2023-07-25 17:57:42 +05:30 |
GitHub Action
|
9633a4f8d7
|
TemplateMan Update [Tue Jul 25 06:56:17 UTC 2023] 🤖
|
2023-07-25 06:56:17 +00:00 |
Ritik Chaddha
|
cd4831d909
|
Update CVE-2023-2178.yaml
|
2023-07-25 11:29:28 +05:30 |
Ritik Chaddha
|
2ccb307cbd
|
Create CVE-2023-2178.yaml
|
2023-07-25 11:28:16 +05:30 |
Dhiyaneshwaran
|
d201fcada6
|
metadata update
|
2023-07-22 21:34:47 +05:30 |
sandeep
|
e4cd8422ef
|
lint fix
|
2023-07-22 13:32:10 +05:30 |
ctflearner
|
d11708fead
|
Create CVE-2023-23161.yaml
|
2023-07-22 11:37:25 +05:30 |
sandeep
|
09d3e3facc
|
lint fix
|
2023-07-21 20:47:31 +05:30 |
Parth Malhotra
|
02b36239f5
|
Update CVE-2023-37462.yaml
|
2023-07-21 20:03:11 +05:30 |
Parth Malhotra
|
ae14c1dc03
|
Create CVE-2023-37462.yaml
|
2023-07-21 20:01:16 +05:30 |
Ritik Chaddha
|
49981b5a86
|
Merge pull request #7727 from projectdiscovery/CVE-2023-38205
Create CVE-2023-38205.yaml
|
2023-07-21 17:27:23 +05:30 |
Ritik Chaddha
|
14b1ec2fd9
|
updated metadata
|
2023-07-21 17:21:37 +05:30 |
Dhiyaneshwaran
|
b8383cbac0
|
Create CVE-2023-3765.yaml
|
2023-07-21 01:35:45 +05:30 |
Dhiyaneshwaran
|
0033cf148a
|
Create CVE-2023-38205.yaml
|
2023-07-20 02:55:31 +05:30 |