Commit Graph

6 Commits (ee5e250560532ea33a44ed88039afe4675a0be3b)

Author SHA1 Message Date
sandeep 33badb66d1 oob tags update 2021-10-19 02:10:26 +05:30
Ice3man543 e9f728c321 Added cve annotations + severity adjustments 2021-09-10 16:56:40 +05:30
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
forgedhallpass cdf9451158 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
sandeep 97dfd43f1e Added tag and removed unsafe 2021-07-15 23:46:08 +05:30
GwanYeong Kim a3699d912a Create CVE-2020-25506.yaml
The exploit targets a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 14:28:14 +09:00