Commit Graph

431 Commits (e93696fa8a719237cfd1040307b646db9cfe0235)

Author SHA1 Message Date
Prince Chaddha e93696fa8a
Create CVE-2016-3510.yaml 2023-05-18 11:30:51 +05:30
Dhiyaneshwaran c3db741049
Merge pull request #7220 from ricardojba/patch-1
Update exposed-redis.yaml
2023-05-17 10:43:08 +05:30
Dhiyaneshwaran 24aaa07529
Merge pull request #7222 from ricardojba/patch-3
Update CVE-2022-0543.yaml
2023-05-17 01:37:52 +05:30
Ricardo 46117c8435
Update CVE-2022-0543.yaml
Support TLS enabled Redis
2023-05-11 15:34:05 +01:00
Ricardo 5105ffc5c3
Update redis-detect.yaml
Detect TLS enabled Redis and TLS enabled Azure Cache for Redis
2023-05-11 15:30:15 +01:00
Ricardo fad493fcfb
Update exposed-redis.yaml
Detect TLS enabled Redis and TLS enabled Azure Cache for Redis
2023-05-11 15:27:52 +01:00
Ritik Chaddha 9a7ac7d2bd
Merge pull request #7208 from projectdiscovery/pussycat0x-patch-14
SMTP User Enumeration
2023-05-11 17:02:16 +05:30
Ritik Chaddha c187d4cc2c
Merge pull request #7181 from projectdiscovery/pussycat0x-patch-6
SMTP Commands Enumeration
2023-05-11 16:25:17 +05:30
pussycat0x 18323967e8
Create smtp-user-enum.yaml 2023-05-10 01:22:05 +05:30
pussycat0x 0246c47f00
Delete smtp-user-enum.yaml 2023-05-10 01:17:14 +05:30
pussycat0x 64b021ede2
SMTP User Enumeration 2023-05-10 01:11:48 +05:30
pussycat0x a289dc9ef5
Update smtp-commands-enum.yaml 2023-05-10 00:05:39 +05:30
pussycat0x 983915d4bc
Rename CVE-2020-11547.yaml to CVE-2020-11547.yaml 2023-05-05 19:02:53 +05:30
pussycat0x ed67d0b943
Update smtp-commands-enum.yaml 2023-05-05 18:58:03 +05:30
pussycat0x d17a0c1246
SMTP Commands Enumeration 2023-05-05 18:56:49 +05:30
Ritik Chaddha 561b42ebe7 Merge branch 'main' into add-cpe-epss 2023-05-05 00:00:13 +05:30
sandeep e5ae45127e Merge remote-tracking branch 'origin' into add-cpe-epss 2023-05-02 18:21:24 +05:30
sandeep 1f5b1f2c47 Added max request counter of each template 2023-04-28 13:41:21 +05:30
Prince Chaddha e0af666e1c
Refactoring the directory structure based on protocols (#7137)
* moving http templates

* updated cves.json

* moved network CVEs

* updated scripts

* updated workflows

* updated requests to http

* replaced network to tcp

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
2023-04-27 09:58:59 +05:30
Dhiyaneshwaran c6718f1499
Update beanstalk-service.yaml 2023-04-21 17:12:11 +05:30
Dhiyaneshwaran 799f713b8c
Update msmq-detect.yaml 2023-04-21 17:11:37 +05:30
pussycat0x bf126b24c8
Protocol update network -> tcp 2023-04-20 02:46:20 +05:30
Ritik Chaddha 5dc6036a9a
Update msmq-detect.yaml 2023-04-20 02:28:15 +05:30
Ritik Chaddha d4b490195d
indentation fix 2023-04-19 23:17:04 +05:30
Brandon Hutchinson e34e263509 Added network/detection/msmq-detect.yaml 2023-04-19 15:34:10 +00:00
pussycat0x a623589fcc
Beanstalk Service - Detect 2023-04-12 17:26:45 +05:30
Prince Chaddha 899029a1aa
updated to host 2023-04-09 08:17:24 +05:30
pussycat0x 40465c769c
minor -update 2023-04-08 22:42:10 +05:30
pussycat0x 5fa705e717
Update kafka-topics-list.yaml 2023-04-05 13:16:13 +05:30
pussycat0x db1f466f51
fix -FP 2023-04-05 10:28:38 +05:30
Ritik Chaddha dec264a418
Merge pull request #7009 from MostInterestingBotInTheWorld/dashboard
Dashboard Content Enhancements
2023-03-31 21:19:24 +05:30
pussycat0x e53386d074
Update kafka-topics-list.yaml 2023-03-30 20:02:42 +05:30
pussycat0x 7ea625bf1f
Kafka Topics List 2023-03-30 17:10:37 +05:30
MostInterestingBotInTheWorld 455f69376f Enhancement: network/detection/rtsp-detect.yaml by md 2023-03-29 15:24:51 -04:00
MostInterestingBotInTheWorld 3e2df9f3cd Enhancement: network/detection/imap-detect.yaml by md 2023-03-29 15:22:47 -04:00
MostInterestingBotInTheWorld c8ed0959c9 Enhancement: network/detection/esmtp-detect.yaml by md 2023-03-29 15:21:25 -04:00
MostInterestingBotInTheWorld 400886032e Enhancement: network/detection/dotnet-remoting-service-detect.yaml by md 2023-03-29 15:15:20 -04:00
Notealot 4d524fd178
Update CVE-2011-2523.yaml (#6975) 2023-03-28 16:52:10 +05:30
MostInterestingBotInTheWorld 186745475b
dos2unix conversions (#6969)
* Add description and enhance one where the UI failed to save properly.
dos2unix on a template

* Change cvedetails link to nvd

* make severities match

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2017/CVE-2017-14524.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2019/CVE-2019-16759.yaml by md

* Enhancement: cves/2021/CVE-2021-22986.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24347.yaml by md

* Enhancement: cves/2021/CVE-2021-25003.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25298.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-28151.yaml by md

* Enhancement: cves/2021/CVE-2021-30128.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0885.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-24816.yaml by md

* Enhancement: cves/2022/CVE-2022-31499.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-34753.yaml by md

* Enhancement: cves/2022/CVE-2022-39952.yaml by md

* Enhancement: cves/2022/CVE-2022-4060.yaml by md

* Enhancement: cves/2022/CVE-2022-44877.yaml by md

* Enhancement: cves/2023/CVE-2023-0669.yaml by md

* Enhancement: cves/2023/CVE-2023-26255.yaml by md

* Enhancement: cves/2023/CVE-2023-26256.yaml by md

* Enhancement: exposures/files/salesforce-credentials.yaml by md

* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md

* Enhancement: network/backdoor/backdoored-zte.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-dbt.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md

* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md

* Enhancement: vulnerabilities/froxlor-xss.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md

* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md

* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md

* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md

* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Initial cleanups for syntax errors

* dashboard gremlins

* Add log4j back to name

* Enhancement: exposures/files/salesforce-credentials.yaml by cs

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs

* Enhancement: network/backdoor/backdoored-zte.yaml by cs

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs

* Sev and other info tweaks

* Merge conflict

* Run dos2unix against all templates

* too many newlines error

* Fix too many blank lines error

* Fix severity mismatches
Cleanup language on a new test

---------

Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 14:22:40 -04:00
sullo 96d0b8f950 Run dos2unix against all templates 2023-03-27 13:56:52 -04:00
MostInterestingBotInTheWorld 301fddaeb0
Dashboard Content Enhancements (#6965)
* Add description and enhance one where the UI failed to save properly.
dos2unix on a template

* Change cvedetails link to nvd

* make severities match

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2017/CVE-2017-14524.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2019/CVE-2019-16759.yaml by md

* Enhancement: cves/2021/CVE-2021-22986.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24145.yaml by md

* Enhancement: cves/2021/CVE-2021-24347.yaml by md

* Enhancement: cves/2021/CVE-2021-25003.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25296.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-25298.yaml by md

* Enhancement: cves/2021/CVE-2021-25297.yaml by md

* Enhancement: cves/2021/CVE-2021-28151.yaml by md

* Enhancement: cves/2021/CVE-2021-30128.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0824.yaml by md

* Enhancement: cves/2022/CVE-2022-0885.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-24816.yaml by md

* Enhancement: cves/2022/CVE-2022-31499.yaml by md

* Enhancement: cves/2022/CVE-2022-21587.yaml by md

* Enhancement: cves/2021/CVE-2021-24155.yaml by md

* Enhancement: cves/2017/CVE-2017-5638.yaml by md

* Enhancement: cves/2015/CVE-2015-2863.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-2314.yaml by md

* Enhancement: cves/2022/CVE-2022-33901.yaml by md

* Enhancement: cves/2022/CVE-2022-34753.yaml by md

* Enhancement: cves/2022/CVE-2022-39952.yaml by md

* Enhancement: cves/2022/CVE-2022-4060.yaml by md

* Enhancement: cves/2022/CVE-2022-44877.yaml by md

* Enhancement: cves/2023/CVE-2023-0669.yaml by md

* Enhancement: cves/2023/CVE-2023-26255.yaml by md

* Enhancement: cves/2023/CVE-2023-26256.yaml by md

* Enhancement: exposures/files/salesforce-credentials.yaml by md

* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md

* Enhancement: network/backdoor/backdoored-zte.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: network/detection/ibm-d2b-database-server.yaml by md

* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-abuseipdb.yaml by md

* Enhancement: token-spray/api-dbt.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md

* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md

* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md

* Enhancement: vulnerabilities/froxlor-xss.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md

* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md

* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md

* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md

* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md

* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md

* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md

* Initial cleanups for syntax errors

* dashboard gremlins

* Add log4j back to name

* Enhancement: exposures/files/salesforce-credentials.yaml by cs

* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs

* Enhancement: network/backdoor/backdoored-zte.yaml by cs

* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs

* Sev and other info tweaks

* Merge conflict

---------

Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 23:16:47 +05:30
MostInterestingBotInTheWorld 6df60bcdbc Enhancement: network/backdoor/backdoored-zte.yaml by cs 2023-03-27 10:21:11 -04:00
MostInterestingBotInTheWorld 061159686a Enhancement: network/detection/ibm-d2b-database-server.yaml by md 2023-03-22 14:32:23 -04:00
MostInterestingBotInTheWorld 56ffd6e01a Enhancement: network/backdoor/backdoored-zte.yaml by md 2023-03-22 14:28:53 -04:00
sullo d69d4c45ca Add description and enhance one where the UI failed to save properly.
dos2unix on a template
2023-03-17 15:01:01 -04:00
MostInterestingBotInTheWorld 7677e07dec
Merge branch 'main' into dashboard 2023-03-17 11:24:28 -04:00
Ritik Chaddha 2b5c3c48cc
Merge pull request #6823 from sullo/severity-matching
Match severity with CVSS
2023-03-15 20:48:33 +05:30
MostInterestingBotInTheWorld b5383637ac Enhancement: network/detection/pgsql-detect.yaml by md 2023-03-15 11:07:42 -04:00
MostInterestingBotInTheWorld 64ae188a74 Enhancement: network/enumeration/mongodb-info-enum.yaml by md 2023-03-15 10:40:16 -04:00
MostInterestingBotInTheWorld 5774cb2bbb Enhancement: network/detection/pgsql-detect.yaml by md 2023-03-15 10:33:12 -04:00