Commit Graph

506 Commits (f59a4cd47ecbe44aaa77b9cf86c20ec41bcaa933)

Author SHA1 Message Date
Abdulrahman Abdullah 152f1d33be
Update CVE-2022-1388.yaml 2022-05-09 19:46:33 +03:00
Abdulrahman Abdullah ac9f793b13
Update CVE-2022-1388.yaml 2022-05-09 16:57:14 +03:00
林寒 2a74f9ffda
Update CVE-2022-1040.yaml 2022-05-09 21:54:47 +08:00
edoardottt 681f1ddaf0 Add CVE-2022-29548 2022-05-09 12:25:53 +02:00
sandeep 6a005b7cbc misc update 2022-05-09 15:07:01 +05:30
GitHub Action 940202d772 Auto Generated CVE annotations [Mon May 9 08:58:57 UTC 2022] 🤖 2022-05-09 08:58:57 +00:00
Prince Chaddha 5b83312cb5
Update CVE-2022-1388.yaml 2022-05-09 14:10:31 +05:30
Prince Chaddha 2209df5576
Update CVE-2022-1388.yaml 2022-05-09 14:06:32 +05:30
Dwi Siswanto 955e67ca1f misc: Remove unnecessary request header 2022-05-09 15:15:36 +07:00
Dwi Siswanto f572c898c5 Add CVE-2022-1388 2022-05-09 14:53:05 +07:00
Prince Chaddha 16d96304bd
Merge pull request #4300 from Akokonunes/patch-143
Create CVE-2022-26233.yaml
2022-05-07 16:14:55 +05:30
Prince Chaddha e83081d0dc
Update and rename CVE-2022-26233.yaml to cves/2022/CVE-2022-26233.yaml 2022-05-07 15:48:02 +05:30
Prince Chaddha 3af4c93a9b
Update CVE-2022-1040.yaml 2022-05-06 21:55:41 +05:30
Prince Chaddha 4f75a44ef2
Update CVE-2022-1040.yaml 2022-05-06 21:47:16 +05:30
林寒 d6ba7f57ba
Create CVE-2022-1040.yaml 2022-05-06 22:57:40 +08:00
GitHub Action 50f3acc6d3 Auto Generated CVE annotations [Fri May 6 09:57:16 UTC 2022] 🤖 2022-05-06 09:57:16 +00:00
PikPikcU cd3f64e0f5
Create CVE-2022-1504 (#4308)
* Create CVE-2022-1504.yaml

* Added CVE-2022-1439

* removed additional template

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-06 15:26:54 +05:30
Dhiyaneshwaran 276060c66b
Create CVE-2022-0540.yaml (#4309)
* Create CVE-2022-0288.yaml

* misc updates

* Create CVE-2022-0540.yaml

* Update CVE-2022-0540.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-05-06 15:19:17 +05:30
GitHub Action 6ed54d662e Auto Generated CVE annotations [Thu May 5 17:04:21 UTC 2022] 🤖 2022-05-05 17:04:21 +00:00
Sandeep Singh d63e8dffe6
Added CVE-2022-0201 (#4306) 2022-05-05 22:32:43 +05:30
GitHub Action 26b16a5421 Auto Generated CVE annotations [Thu May 5 16:55:46 UTC 2022] 🤖 2022-05-05 16:55:46 +00:00
Sandeep Singh 412a5f5ecd
Added CVE-2022-0165 (#4305) 2022-05-05 22:25:21 +05:30
h1ei1 fd787859f5
Add CVE-2022-26352 (#4302)
* Create CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* misc updates

* Add CVE-2022-26352

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* Update CVE-2022-26352.yaml

* updated with harmless minimal poc

Co-authored-by: xiaoheihei1107 <62200676+xiaoheihei1107@users.noreply.github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-05 22:10:02 +05:30
Alex Rydzak e89c072410
Added template for CVE-2022-26564 (#4301) 2022-05-05 20:55:46 +05:30
GitHub Action fbc2ba38ee Auto Generated CVE annotations [Thu May 5 12:13:55 UTC 2022] 🤖 2022-05-05 12:13:55 +00:00
Dhiyaneshwaran 6b4724f5b1
Ad Inserter < 2.7.10 - Reflected Cross-Site Scripting (#4291)
* Create CVE-2022-0288.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-05 17:43:31 +05:30
GitHub Action 2c1f0cce4b Auto Generated CVE annotations [Sat Apr 30 20:27:48 UTC 2022] 🤖 2022-04-30 20:27:48 +00:00
Prince Chaddha 1cfdbb7c0d
Create CVE-2022-0591.yaml 2022-04-30 01:23:32 +05:30
GitHub Action 6841d03aef Auto Generated CVE annotations [Fri Apr 29 06:40:08 UTC 2022] 🤖 2022-04-29 06:40:08 +00:00
Sandeep Singh 2db05da4f6
Added CVE-2022-0422 (#4261) 2022-04-29 12:09:46 +05:30
sandeep 2d7cef7abd misc update 2022-04-28 18:52:35 +05:30
GitHub Action 6d0cccbd60 Auto Generated CVE annotations [Thu Apr 28 13:21:26 UTC 2022] 🤖 2022-04-28 13:21:26 +00:00
Dwi Siswanto 9929a2f524
Add CVE-2022-0543 (#4255) 2022-04-28 18:51:04 +05:30
Sandeep Singh 21145c1220
Added CVE-2022-1119 (#4240) 2022-04-25 21:44:36 +05:30
MostInterestingBotInTheWorld aa888bca8d
Dashboard Content Enhancements (#4238)
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
vrenzolaverace 1ca45751d1
Add CVE-2022-0208 (#4187)
* Add CVE-2022-0208

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 16:07:48 +05:30
GitHub Action cedf4dee89 Auto Generated CVE annotations [Sun Apr 24 10:05:04 UTC 2022] 🤖 2022-04-24 10:05:04 +00:00
Sandeep Singh 2989fb2b4b
Added CVE-2022-0140 (#4230) 2022-04-24 15:34:42 +05:30
Prince Chaddha 0a27decfe6
Create CVE-2022-0595.yaml (#4213)
* Create CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* misc updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-24 15:23:15 +05:30
forgedhallpass 4f7e02e8a4 Added CVE id in Classification for CVE-2022-29464.yaml 2022-04-22 19:31:52 +03:00
forgedhallpass f7ca5b134d CVE info update for CVE-2022-1054.yaml 2022-04-22 19:29:43 +03:00
forgedhallpass 99f8b1e4ae Description and classification CVE id fix in CVE-2022-1020.yaml 2022-04-22 19:21:09 +03:00
Prince Chaddha 5b6aec6474
Merge pull request #4211 from projectdiscovery/CVE-2022-1054
Create CVE-2022-1054.yaml
2022-04-22 17:30:44 +04:00
Prince Chaddha cc0a6213ca
Update CVE-2022-1054.yaml 2022-04-22 17:27:48 +04:00
Prince Chaddha af2937b7b7
Merge pull request #4210 from projectdiscovery/CVE-2022-1020
Create CVE-2022-1020.yaml
2022-04-22 17:22:43 +04:00
Prince Chaddha b685ac8072
Update CVE-2022-1020.yaml 2022-04-22 17:20:27 +04:00
Sandeep Singh 2487e9877f
Merge pull request #4219 from projectdiscovery/template_info_fixup
Info section refactor
2022-04-22 18:01:12 +05:30
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
Prince Chaddha 6942229274
Create CVE-2022-27849.yaml 2022-04-22 13:11:27 +04:00
MostInterestingBotInTheWorld 31312b1c19
Dashboard Content Enhancements (#4191)
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
sandeep caa4e827f1 added additional references 2022-04-21 12:41:01 +05:30
luci c02d919071
Adding CVE-2022-29464 (#4209)
* Adding CVE-2022-29464

* Fixin spaces I guess

* misc updates

* path update

* Update CVE-2022-29464.yaml

* added working exploit poc

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-21 12:32:42 +05:30
Prince Chaddha b0f264c0b8
Create CVE-2022-1054.yaml 2022-04-21 02:51:08 +04:00
Prince Chaddha 36bc825ad8
Create CVE-2022-1020.yaml 2022-04-21 02:47:29 +04:00
MostInterestingBotInTheWorld 3e2e842d0e
Dashboard Content Ehnancements (#4183)
* Spacing and other template cleanups
* duplicate yaml tags

Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Dominique RIGHETTO a3ad749c91
Add a template for Incapptic Connect (#4100)
* Add tpl for Incapptic

* Fix linter error

* misc update

* Auto Generated CVE annotations [Mon Apr 18 13:10:32 UTC 2022] 🤖

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
2022-04-18 18:40:41 +05:30
Prince Chaddha 5170996712
Merge pull request #4164 from Akokonunes/patch-139
Create CVE-2022-23347
2022-04-16 17:33:12 +04:00
Prince Chaddha 5a3d0c9227
Update CVE-2022-23347.yaml 2022-04-16 17:29:35 +04:00
Prince Chaddha 9b76b0840c
Update and rename CVE-2022-23347.yaml to cves/2022/CVE-2022-23347.yaml 2022-04-16 17:27:38 +04:00
GitHub Action 4e6338a4a0 Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖 2022-04-16 13:18:49 +00:00
MostInterestingBotInTheWorld 5730781afa
Dashboard Content Enhancements (#4157)
* Enhancement: exposures/files/joomla-file-listing.yaml by cs

* Enhancement: cves/2019/CVE-2019-5418.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2021/CVE-2021-20091.yaml by mp

* Enhancement: cves/2021/CVE-2021-20092.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: cves/2017/CVE-2017-9833.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: misconfiguration/symfony-debugmode.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: cves/2021/CVE-2021-31682.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Relocating to CVE folder

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-2628.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2019/CVE-2019-2588.yaml by mp

* Enhancement: cves/2021/CVE-2021-31755.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments

* Tag typo

Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha 00046e6ce3
Update CVE-2022-0271.yaml 2022-04-15 18:43:56 +04:00
Prince Chaddha 16d6e9d8eb
Create CVE-2022-0271.yaml 2022-04-15 17:50:14 +04:00
Prince Chaddha da1d31c0ab
Update CVE-2022-25216.yaml 2022-04-14 13:22:19 +04:00
Prince Chaddha 62bf35c347
Update CVE-2022-25216.yaml 2022-04-14 13:00:24 +04:00
Prince Chaddha 56aaa33a7b
Update and rename CVE-2022-25216.yaml to cves/2022/CVE-2022-25216.yaml 2022-04-14 12:33:01 +04:00
Sandeep Singh 0a4a7b31f7
Added VMware Workspace ONE Access - Freemarker SSTI (#4113)
Co-Authored-By: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>

Co-authored-by: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>
2022-04-11 22:17:00 +05:30
Muhammad Daffa eb2fc8dfbd
Update CVE-2022-0437.yaml (#4104) 2022-04-11 16:18:44 +05:30
Alexandre ZANNI f27f032188
CVE-2022-0482: add a reference (#4107) 2022-04-11 14:08:32 +05:30
Sandeep Singh 5eb47292e4
Added Reprise License Manager Templates (#4097)
Co-Authored-By: Akincibor <99909324+Akincibor@users.noreply.github.com>

Co-authored-by: Akincibor <99909324+Akincibor@users.noreply.github.com>
2022-04-10 12:41:31 +05:30
GitHub Action e4fed28fc2 Auto Generated CVE annotations [Sat Apr 9 15:50:05 UTC 2022] 🤖 2022-04-09 15:50:05 +00:00
Sandeep Singh 4236dfe3b7
Added CVE-2022-0482 (#4095) 2022-04-09 21:19:47 +05:30
sandeep 7d195c9984 Added POST method support to CVE-2022-22965 detection 2022-04-05 22:38:34 +05:30
Sandeep Singh d633c2db45
Updated intrusive detection with HTTP OOB interaction (#4028) 2022-04-04 19:58:38 +05:30
GitHub Action 9a769040d7 Auto Generated CVE annotations [Sat Apr 2 10:37:27 UTC 2022] 🤖 2022-04-02 10:37:27 +00:00
Prince Chaddha ef88c6b170
Merge pull request #4007 from pikpikcu/patch-328
Create CVE-2022-23881
2022-04-02 15:58:08 +05:30
Prince Chaddha 58cb6dfdcf
Update CVE-2022-23881.yaml 2022-04-02 15:55:31 +05:30
Sandeep Singh dd0cdb1385
Added CVE-2022-22965 - Spring Framework RCE via Data Binding on JDK 9+ (Spring4Shell) (#4024) 2022-04-01 17:13:45 +05:30
MostInterestingBotInTheWorld 6ddfbac2b4
Dashboard Content Enhancement (#4020)
* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

* Syntax  restore some characters

* Spacing

* Enhancement: vulnerabilities/wordpress/hide-security-enhancer-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/issuu-panel-lfi.yaml by mp

* Enhancement: cves/2019/CVE-2019-10068.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-11580.yaml by mp

* Enhancement: cves/2019/CVE-2019-11581.yaml by mp

* Enhancement: cves/2019/CVE-2019-12314.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Link wrapping issue

* Enhancement: cves/2019/CVE-2019-13462.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16759.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cves/2019/CVE-2019-16278.yaml by mp

* Enhancement: cves/2019/CVE-2019-10232.yaml by mp

* Enhancement: cves/2019/CVE-2019-10758.yaml by mp

* Enhancement: cves/2019/CVE-2019-11510.yaml by mp

* Enhancement: cves/2019/CVE-2019-12725.yaml by mp

* Enhancement: cves/2019/CVE-2019-13101.yaml by mp

* Enhancement: cves/2019/CVE-2019-15107.yaml by mp

* Enhancement: cves/2019/CVE-2019-15859.yaml by mp

* Enhancement: cves/2019/CVE-2019-16662.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-10543.yaml by cs

* Enhancement: cves/2021/CVE-2021-33807.yaml by mp

* Enhancement: cves/2010/CVE-2010-0943.yaml by mp

* Enhancement: cves/2008/CVE-2008-6172.yaml by mp

* Enhancement: vulnerabilities/simplecrm/simple-crm-sql-injection.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: network/cisco-smi-exposure.yaml by mp

* Enhancement: cves/2021/CVE-2021-37704.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2019/CVE-2019-16313.yaml by mp

* Enhancement: cves/2021/CVE-2021-3017.yaml by mp

* Enhancement: cves/2010/CVE-2010-1353.yaml by mp

* Enhancement: cves/2010/CVE-2010-5278.yaml by mp

* Enhancement: cves/2021/CVE-2021-37573.yaml by mp

* Enhancement: vulnerabilities/oracle/oracle-siebel-xss.yaml by mp

* Enhancement: cves/2010/CVE-2010-1602.yaml by mp

* Enhancement: cves/2010/CVE-2010-1474.yaml by mp

* Enhancement: vulnerabilities/other/microweber-xss.yaml by mp

* Enhancement: cves/2018/CVE-2018-11709.yaml by mp

* Enhancement: cves/2014/CVE-2014-2321.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Enhancement: vulnerabilities/other/visual-tools-dvr-rce.yaml by mp

* Manual enhancement

* Manual enhancement push due to dashboard failure

* Testing of dashboard accidentally commited to dashboard branch

* Spacing
Put some CVEs in the classification

* Add missing cve-id fields to templates in cve/

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 14:21:42 +05:30
xvnpw 001c10644f
Update CVE-2022-24990.yaml (#4016)
* Update CVE-2022-24990.yaml

Removed https://nvd.nist.gov/vuln/detail/CVE-2022-23990. CVE-2022-23990 is not related to this template.

* Update CVE-2022-24990.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-01 02:09:11 +05:30
Adam Crosser 2686307a64
Updated CVE-2022-22963 (#4011) 2022-03-31 00:39:28 +05:30
sandeep b06d02b2fe template id update 2022-03-30 15:16:52 +05:30
Geekby bec0912a2a
Create CVE-2022-26148.yaml (#4008)
* Create CVE-2022-26148.yaml

Add CVE-2022-26188

* updated matchers + extractors

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-30 13:49:34 +05:30
PikPikcU ae32c73ffa
Create CVE-2022-23881.yaml 2022-03-29 19:41:01 -04:00
MostInterestingBotInTheWorld 13bfc8ff57
Dashboard Content Enhancements (#3998)
* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

* Remove empty cve lines and relocate tags

* Remove blank cve lines & move tags

* Fix merge errors

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-2551.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-21224.yaml by mp

* Enhancement: cves/2020/CVE-2020-24148.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24186.yaml by mp

* Enhancement: cves/2020/CVE-2020-24391.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: cves/2020/CVE-2020-25213.yaml by mp

* Enhancement: cves/2020/CVE-2020-25223.yaml by mp

* Enhancement: cves/2020/CVE-2020-25506.yaml by mp

* Enhancement: cves/2020/CVE-2020-28871.yaml by mp

* Enhancement: cves/2020/CVE-2020-28188.yaml by mp

* Enhancement: cves/2020/CVE-2020-26948.yaml by mp

* Enhancement: cves/2020/CVE-2020-26919.yaml by mp

* Enhancement: cves/2020/CVE-2020-26214.yaml by mp

* Syntax cleanup

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Syntax and a title change

* Enhancement: cves/2021/CVE-2021-38702.yaml by mp

* Fix references

* Enhancement: cves/2021/CVE-2021-38704.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-44529.yaml by mp

* Conflicts resolved

* Fix quoting

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cves/2022/CVE-2022-23779.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/cobbler/hue-default-credential.yaml by mp

* Enhancement: default-logins/emqx/emqx-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-41691.yaml by mp

* Enhancement: cves/2021/CVE-2021-45967.yaml by mp

* Enhancement: cves/2022/CVE-2022-0189.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-14536.yaml by mp

* Enhancement: default-logins/apache/dolphinscheduler-default-login.yaml by mp

* Enhancement: default-logins/geoserver/geoserver-default-login.yaml by mp

* Update CVE-2020-25223.yaml

* Update CVE-2020-26214.yaml

* Update CVE-2020-25506.yaml

* Update CVE-2020-2551.yaml

* Update CVE-2020-26919.yaml

* Update CVE-2021-44529.yaml

* Update CVE-2020-28871.yaml

* Update CVE-2020-28188.yaml

* Update CVE-2021-45967.yaml

* Update hue-default-credential.yaml

* Update CVE-2021-44529.yaml

* misc syntax update

Co-authored-by: sullo <sullo@cirt.net>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-29 16:03:49 +05:30
sandeep 7b83c9990a minor updates to template names 2022-03-27 22:13:08 +05:30
GitHub Action c8380b3bf8 Auto Generated CVE annotations [Sun Mar 27 14:25:50 UTC 2022] 🤖 2022-03-27 14:25:50 +00:00
Dhiyaneshwaran 014a8c9192
4 New Wordpress Authenticated Templates (#3990)
* Create xss-childlist-selector.yaml

* Update xss-childlist-selector.yaml

* Rename xss-childlist-selector.yaml to aem-xss-childlist-selector.yaml

* adding metadata

* Create CVE-2021-25112.yaml

* Create CVE-2022-0189.yaml

* Create CVE-2021-25055.yaml

* Create CVE-2022-0148.yaml

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-27 19:55:03 +05:30
MostInterestingBotInTheWorld 814d07fb7d
Dashboard Content Enhancements (#3961)
* Enhancement: default-logins/viewpoint/trilithic-viewpoint-login.yaml by mp

* Enhancement: default-logins/visionhub/visionhub-default-login.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/wifisky/wifisky-default-login.yaml by mp

* Enhancement: default-logins/wso2/wso2-default-login.yaml by mp

* Enhancement: default-logins/xerox/xerox7-default-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: default-logins/zabbix/zabbix-default-login.yaml by mp

* Enhancement: default-logins/zmanda/zmanda-default-login.yaml by mp

* Enhancement: dns/azure-takeover-detection.yaml by mp

* Enhancement: dns/cname-fingerprint.yaml by mp

* Enhancement: dns/cname-service-detection.yaml by mp

* Enhancement: dns/detect-dangling-cname.yaml by mp

* Enhancement: dns/dns-waf-detect.yaml by mp

* Enhancement: default-logins/weblogic/weblogic-weak-login.yaml by mp

* Enhancement: default-logins/xxljob/xxljob-default-login.yaml by mp

* Enhancement: dns/dnssec-detection.yaml by mp

* Enhancement: dns/ec2-detection.yaml by mp

* Add CVSS/CWE

* Trailing space

* Linting error on comment indentation

* Typo

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: cves/2020/CVE-2020-23517.yaml by mp

* Enhancement: dns/elasticbeantalk-takeover.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/nameserver-fingerprint.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: dns/txt-fingerprint.yaml by mp

* Enhancement: dns/worksites-detection.yaml by mp

* Enhancement: exposed-panels/3g-wireless-gateway.yaml by mp

* Enhancement: exposed-panels/acemanager-login.yaml by mp

* Enhancement: exposed-panels/acrolinx-dashboard.yaml by mp

* Enhancement: dns/mx-fingerprint.yaml by mp

* Enhancement: dns/mx-service-detector.yaml by mp

* Enhancement: dns/ptr-fingerprint.yaml by mp

* Enhancement: dns/servfail-refused-hosts.yaml by mp

* Enhancement: dns/spoofable-spf-records-ptr.yaml by mp

* Enhancement: cves/2021/CVE-2021-39501.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: cves/2021/CVE-2021-40856.yaml by mp

* Enhancement: cves/2021/CVE-2021-40859.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-40539.yaml by mp

* Enhancement: cves/2010/CVE-2010-1875.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/akamai-cloudtest.yaml by mp

* Enhancement: exposed-panels/alfresco-detect.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: exposed-panels/amcrest-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: exposed-panels/alienvault-usm.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/ambari-exposure.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-17369.yaml by mp

* Enhancement: exposed-panels/apache/public-tomcat-manager.yaml by mp

* Enhancement: exposed-panels/apache/apache-apisix-panel.yaml by mp

* Enhancement: exposed-panels/ansible-tower-exposure.yaml by mp

* Enhancement: exposed-panels/ampps-panel.yaml by mp

* Enhancement: exposed-panels/ampps-admin-panel.yaml by mp

* Enhancement: exposed-panels/ametys-admin-login.yaml by mp

* Enhancement: cves/2010/CVE-2010-1878.yaml by mp

* Fix encoded chars

* trailing space

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15822.yaml by mp

* Enhancement: exposed-panels/apache/tomcat-pathnormalization.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: misconfiguration/horde-unauthenticated.yaml by mp

* Enhancement: cves/2021/CVE-2021-40542.yaml by mp

* Enhancement: exposed-panels/apiman-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1873.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-panel.yaml by mp

* Enhancement: exposed-panels/arcgis/arcgis-rest-api.yaml by mp

* Enhancement: exposed-panels/argocd-login.yaml by mp

* Enhancement: exposed-panels/atlassian-crowd-panel.yaml by mp

* Enhancement: exposed-panels/atvise-login.yaml by mp

* Enhancement: exposed-panels/avantfax-panel.yaml by mp

* Enhancement: exposed-panels/avatier-password-management.yaml by mp

* Enhancement: exposed-panels/axigen-webadmin.yaml by mp

* Enhancement: exposed-panels/axigen-webmail.yaml by mp

* Enhancement: exposed-panels/azkaban-web-client.yaml by mp

* Enhancement: exposed-panels/acunetix-panel.yaml by mp

* Enhancement: exposed-panels/adiscon-loganalyzer.yaml by mp

* Enhancement: exposed-panels/adminer-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1870.yaml by mp

* Enhancement: exposed-panels/adminset-panel.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-component-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-connect-central-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-experience-manager-login.yaml by mp

* Enhancement: exposed-panels/adobe/adobe-media-server.yaml by mp

* Enhancement: exposed-panels/advance-setup.yaml by mp

* Enhancement: exposed-panels/aerohive-netconfig-ui.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-mgmt-client.yaml by mp

* Enhancement: exposed-panels/aims-password-portal.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* Enhancement: exposed-panels/airflow-panel.yaml by mp

* spacing issues

* Spacing

* HTML codes improperly interpreted
Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Relocate horde-unauthenticated.yaml to CVE-2005-3344.yaml

* Enhancement: technologies/waf-detect.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-wpcourses-info-disclosure.yaml by mp

* Enhancement: network/sap-router-info-leak.yaml by mp

* Enhancement: network/exposed-adb.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml by mp

* Enhancement: exposures/tokens/digitalocean/tugboat-config-exposure.yaml by mp

* Enhancement: exposed-panels/concrete5/concrete5-install.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml by mp

* indentation issue

* Character encoding issue fix

* Enhancement: default-logins/alibaba/canal-default-login.yaml by mp

* Enhancement: default-logins/alphaweb/alphaweb-default-login.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Enhancement: default-logins/apache/airflow-default-login.yaml by mp

* Enhancement: default-logins/apache/apisix-default-login.yaml by mp

* Enhancement: default-logins/apollo/apollo-default-login.yaml by mp

* Enhancement: default-logins/arl/arl-default-login.yaml by mp

* Enhancement: default-logins/digitalrebar/digitalrebar-default-login.yaml by mp

* Enhancement: default-logins/mantisbt/mantisbt-default-credential.yaml by mp

* Enhancement: default-logins/stackstorm/stackstorm-default-login.yaml by mp

* Enhancement: dns/caa-fingerprint.yaml by mp

* Enhancement: exposed-panels/active-admin-exposure.yaml by mp

* Enhancement: exposed-panels/activemq-panel.yaml by mp

* Enhancement: default-logins/ambari/ambari-default-login.yaml by mp

* Restore & stomped by dashboard

* Enhancement: cves/2010/CVE-2010-1653.yaml by mp

* Enhancement: cves/2021/CVE-2021-38751.yaml by mp

* Enhancement: cves/2021/CVE-2021-39320.yaml by mp

* Enhancement: cves/2021/CVE-2021-39322.yaml by mp

* Enhancement: cves/2021/CVE-2021-39327.yaml by mp

* Enhancement: cves/2021/CVE-2021-39350.yaml by mp

* Enhancement: cves/2021/CVE-2021-39433.yaml by mp

* Enhancement: cves/2021/CVE-2021-41192.yaml by mp

* Enhancement: cnvd/2021/CNVD-2021-15824.yaml by mp

* Enhancement: exposed-panels/ansible-semaphore-panel.yaml by mp

* Enhancement: exposed-panels/aviatrix-panel.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Enhancement: exposed-panels/blue-iris-login.yaml by mp

* Enhancement: exposed-panels/bigbluebutton-login.yaml by mp

* Enhancement: cves/2022/CVE-2022-24288.yaml by mp

* Enhancement: cves/2022/CVE-2022-24990.yaml by mp

* Enhancement: cves/2022/CVE-2022-26159.yaml by mp

* Enhancement: default-logins/aem/aem-default-login.yaml by mp

* Spacing issues
Add cve-id field

* fix & stomping

* Enhancement: cves/2016/CVE-2016-1000141.yaml by mp

* Enhancement: cves/2020/CVE-2020-24912.yaml by mp

* Enhancement: cves/2021/CVE-2021-35265.yaml by mp

* Enhancement: cves/2022/CVE-2022-0437.yaml by mp

* Enhancement: cves/2010/CVE-2010-1601.yaml by mp

* Enhancement: technologies/teradici-pcoip.yaml by mp

* Enhancement: vulnerabilities/other/unauth-hoteldruid-panel.yaml by mp

* Enhancement: cves/2010/CVE-2010-1475.yaml by mp

* Enhancement: cves/2010/CVE-2010-1535.yaml by mp

* Enhancement: exposed-panels/epson-web-control-detect.yaml by mp

* Enhancement: exposed-panels/epson-access-detect.yaml by mp

* Enhancement: cves/2020/CVE-2020-29453.yaml by mp

* Fix spacing

Co-authored-by: sullo <sullo@cirt.net>
2022-03-25 17:15:10 +05:30
GitHub Action 412ff87c82 Auto Generated CVE annotations [Mon Mar 21 12:21:54 UTC 2022] 🤖 2022-03-21 12:21:54 +00:00
PikPikcU adbf3eca22
Create CVE-2022-0437 (#3673)
* Create CVE-2022-0437.yaml

* request + matcher update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-21 17:51:11 +05:30
Xeldax 10b23118aa
add airflow cve-2022-24288 (#3873)
* add airflow cve-2022-24288

* lint update

* template request + matcher + metadata update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-19 15:59:17 +05:30
Podalirius 4c66d04cf1
Added template for CVE-2022-26159 (#3923)
* Added template for CVE-2022-26159

* path + matcher update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-03-18 14:58:35 +05:30
sandeep 0edbae8e45 limit the matcher / extractor scope to location header 2022-03-15 11:46:47 +05:30
sandeep 2bff343eda more strict matchers for CVE-2022-23779 2022-03-15 02:03:06 +05:30
GitHub Action d23bfa0462 Auto Generated CVE annotations [Thu Mar 10 10:28:37 UTC 2022] 🤖 2022-03-10 10:28:37 +00:00
sullo 48675b803a Fix control character issue 2022-03-08 17:38:14 -05:00
MostInterestingBotInTheWorld 7cd9e673ca Enhancement: cves/2022/CVE-2022-24124.yaml by mp 2022-03-08 12:38:46 -05:00
MostInterestingBotInTheWorld acb55f3c06 Enhancement: cves/2022/CVE-2022-23808.yaml by mp 2022-03-08 12:36:49 -05:00
MostInterestingBotInTheWorld 2d350e0a2f Enhancement: cves/2022/CVE-2022-23134.yaml by mp 2022-03-08 12:35:20 -05:00
MostInterestingBotInTheWorld 295de3ec7b Enhancement: cves/2022/CVE-2022-22536.yaml by mp 2022-03-08 12:33:02 -05:00
MostInterestingBotInTheWorld eebef82c6a Enhancement: cves/2022/CVE-2022-21371.yaml by mp 2022-03-08 12:31:20 -05:00
MostInterestingBotInTheWorld 161ba2c6a2 Enhancement: cves/2022/CVE-2022-0692.yaml by mp 2022-03-08 12:29:12 -05:00
MostInterestingBotInTheWorld 28a422d658 Enhancement: cves/2022/CVE-2022-24260.yaml by mp 2022-03-08 10:57:25 -05:00
MostInterestingBotInTheWorld 9004746e16 Enhancement: cves/2022/CVE-2022-24124.yaml by mp 2022-03-08 10:54:16 -05:00
MostInterestingBotInTheWorld 1ce8284cbe Enhancement: cves/2022/CVE-2022-24112.yaml by mp 2022-03-08 10:51:53 -05:00
MostInterestingBotInTheWorld c2fba36a7a Enhancement: cves/2022/CVE-2022-23944.yaml by mp 2022-03-08 10:41:08 -05:00
MostInterestingBotInTheWorld 303f6f71c6 Enhancement: cves/2022/CVE-2022-23134.yaml by mp 2022-03-08 10:36:27 -05:00
MostInterestingBotInTheWorld 613ff3f1eb Enhancement: cves/2022/CVE-2022-23131.yaml by mp 2022-03-08 10:28:19 -05:00
MostInterestingBotInTheWorld dd2d525989 Enhancement: cves/2022/CVE-2022-22947.yaml by mp 2022-03-08 10:15:40 -05:00
MostInterestingBotInTheWorld d0be94c185 Enhancement: cves/2022/CVE-2022-22536.yaml by mp 2022-03-08 10:09:38 -05:00
MostInterestingBotInTheWorld f15357f415 Enhancement: cves/2022/CVE-2022-0692.yaml by mp 2022-03-08 10:03:35 -05:00
MostInterestingBotInTheWorld b6e96c73a8 Enhancement: cves/2022/CVE-2022-21371.yaml by mp 2022-03-08 09:58:58 -05:00
MostInterestingBotInTheWorld c1601ceded
Merge branch 'projectdiscovery:master' into dashboard 2022-03-08 09:36:06 -05:00
sandeep f0d3116b12 added metadata 2022-03-08 07:00:33 +05:30
Sandeep Singh 6ae7f3f361
Update CVE-2022-25323.yaml 2022-03-08 06:38:46 +05:30
Dwi Siswanto 29d462125c Add CVE-2022-24990 2022-03-08 08:05:30 +07:00
MostInterestingBotInTheWorld 5a99c2c4f4 Enhancement: cves/2022/CVE-2022-25323.yaml by mp 2022-03-07 16:36:44 -05:00
sandeep 2ebcbed6a3 additional matcher 2022-03-08 00:49:41 +05:30
edoardottt 74a69107bb Add CVE-2022-0381 2022-03-07 19:19:41 +01:00
sandeep 71410871c6 more strict matchers + extractor 2022-03-06 13:47:52 +05:30
cckuailong 4023282a2d add CVE-2022-23779 2022-03-06 09:38:26 +08:00
sandeep 103826f041 strict matchers for CVE-2022-22536 2022-03-05 20:57:11 +05:30
Sandeep Singh 541568a74c
Merge pull request #3835 from Akokonunes/patch-124
Create CVE-2022-0692.yaml
2022-03-04 22:24:46 +05:30
sandeep a3345c34ae template location update 2022-03-04 22:17:44 +05:30
sandeep 657c4cc1f7 matcher update 2022-03-04 20:46:40 +05:30
GwanYeong Kim 834c5a8c64 Create CVE-2022-24260.yaml
A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-03-04 10:18:40 +09:00
GitHub Action dbdfd6858a Auto Generated CVE annotations [Thu Mar 3 21:20:41 UTC 2022] 🤖 2022-03-03 21:20:41 +00:00
Sandeep Singh 09b90a84a4
Merge pull request #3776 from projectdiscovery/CVE-2022-22536
Added CVE-2022-22536 (SAP Memory Pipes(MPI) Desynchronization) Detection
2022-03-04 02:50:01 +05:30
sandeep 51af63b9ab misc update 2022-03-04 02:48:25 +05:30
Prince Chaddha 698bfa993e
Update CVE-2022-23808.yaml 2022-03-03 17:09:21 +05:30
Prince Chaddha 2e71889e88
Merge pull request #3799 from cckuailong/test2
add CVE-2022-24124
2022-03-03 16:16:57 +05:30
sandeep 496c66f6a4 minor updates 2022-03-03 02:44:27 +05:30
sandeep 9ba37cacfd Spring Cloud Gateway Code Injection (CVE-2022-22947) 2022-03-02 14:15:10 +05:30
sullo f2cc6fdf18 Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard 2022-02-28 17:41:23 -05:00
sullo ec90d215b0 Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard 2022-02-28 17:36:39 -05:00
sullo 93e9c04f38 Merge branch 'dashboard' of https://github.com/MostInterestingBotInTheWorld/nuclei-templates into dashboard 2022-02-28 17:31:38 -05:00
MostInterestingBotInTheWorld 390fe3b65f Enhancement: cves/2021/CVE-2021-45380.yaml by mp 2022-02-28 17:19:33 -05:00
Prince Chaddha fa10201d68
Update CVE-2022-24124.yaml 2022-03-01 03:31:40 +05:30
MostInterestingBotInTheWorld 121157cc78 Enhancement: cves/2022/CVE-2022-23808.yaml by mp 2022-02-28 16:30:49 -05:00
MostInterestingBotInTheWorld ae590f67d4 Enhancement: cves/2022/CVE-2022-23178.yaml by mp 2022-02-28 16:29:50 -05:00
MostInterestingBotInTheWorld 4296ac8ca7 Enhancement: cves/2022/CVE-2022-23131.yaml by mp 2022-02-28 16:20:42 -05:00
MostInterestingBotInTheWorld 746893454c Enhancement: cves/2022/CVE-2022-0653.yaml by mp 2022-02-28 16:13:26 -05:00
MostInterestingBotInTheWorld 48713e4d81 Enhancement: cves/2022/CVE-2022-0432.yaml by mp 2022-02-28 16:02:00 -05:00
MostInterestingBotInTheWorld 2737158259 Enhancement: cves/2022/CVE-2022-0378.yaml by mp 2022-02-28 15:58:49 -05:00
MostInterestingBotInTheWorld 1b502ef844 Enhancement: cves/2022/CVE-2022-0281.yaml by mp 2022-02-28 15:41:31 -05:00
MostInterestingBotInTheWorld e577bcf9fa Enhancement: cves/2022/CVE-2022-0218.yaml by mp 2022-02-28 15:38:39 -05:00
MostInterestingBotInTheWorld bd4ee10ac1 Enhancement: cves/2022/CVE-2022-0149.yaml by mp 2022-02-28 15:09:45 -05:00
MostInterestingBotInTheWorld c4a91ea72f Enhancement: cves/2022/CVE-2022-25369.yaml by cs 2022-02-28 14:31:36 -05:00
cckuailong 2f98ce8700 add CVE-2022-24124 2022-02-28 21:53:30 +08:00
Sandeep Singh e83c971ca5
Merge pull request #3625 from projectdiscovery/CVE-2022-21371
Added CVE-2022-21371
2022-02-26 22:56:53 +05:30
sandeep de14074dff using unsafe request and matcher update 2022-02-26 22:48:17 +05:30
GitHub Action 070e52ee3e Auto Generated CVE annotations [Fri Feb 25 18:40:49 UTC 2022] 🤖 2022-02-25 18:40:49 +00:00
sandeep 6bda604a36 additional path support 2022-02-26 00:09:07 +05:30
sandeep d8ae26f711 misc updates 2022-02-26 00:00:48 +05:30
sandeep 1ba756d00a Added CVE-2022-22536 (SAP Memory Pipes(MPI) Desynchronization) Detection 2022-02-25 23:29:02 +05:30
Daniel Santos 907f4d865f CVE-2022-23134 template 2022-02-25 10:00:40 -06:00
sandeep 322bc31df5 metadata update 2022-02-25 17:33:39 +05:30
sandeep c56ee59d51 Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates 2022-02-25 05:04:11 +05:30
sandeep c81f2e05da Reference update 2022-02-25 05:04:03 +05:30
GitHub Action 52ede2665a Auto Generated CVE annotations [Thu Feb 24 23:32:18 UTC 2022] 🤖 2022-02-24 23:32:18 +00:00
Sandeep Singh 90211a94db
Merge pull request #3736 from For3stCo1d/CVE-2022-23131
Create CVE-2022-23131.yaml
2022-02-25 04:57:52 +05:30
sandeep 9aa0e6be8a metadata update 2022-02-25 04:53:48 +05:30
sandeep ae6d460743 added metadata 2022-02-25 04:19:23 +05:30
Sandeep Singh 9032d8ec19
Merge pull request #3765 from projectdiscovery/dynamicweb
Dynamicweb (CVE-2022-25369)
2022-02-25 00:25:57 +05:30
Dhiyaneshwaran 1f9c5311ab
CVE-2022-0653 Wordpress Profile Builder – User Profile & User Registration Forms (#3761)
* Auto Generated New Template Addition List [Wed Feb 23 16:10:39 UTC 2022] 🤖

* Create CVE-2022-0653.yaml

* Auto Generated New Template Addition List [Wed Feb 23 16:13:51 UTC 2022] 🤖

* misc updates

* Auto Generated New Template Addition List [Thu Feb 24 11:29:05 UTC 2022] 🤖

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-24 17:03:20 +05:30
sandeep e400d6f1bb Added CVE-2022-25369 2022-02-24 13:44:58 +05:30
东方有鱼名为咸 3ec6f5a27b
add CVE-2022-24112.yaml (#3751)
* Create CVE-2022-24112.yaml

* minor improvements

* misc update

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-23 13:25:27 +05:30
sandeep 736e7427d6 added missing tags 2022-02-22 19:53:43 +05:30
Prince Chaddha 22f35f3e23
Merge pull request #3730 from DhiyaneshGeek/master
10 New Wordpress Template
2022-02-22 14:47:20 +05:30
Prince Chaddha fd011250b3
Update CVE-2022-25323.yaml 2022-02-22 14:09:05 +05:30
Prince Chaddha 363bc051a5
Update CVE-2022-0149.yaml 2022-02-22 13:33:56 +05:30
Prince Chaddha 87961281a8
Update CVE-2022-0149.yaml 2022-02-22 13:33:25 +05:30
林寒 56713b8175
Create CVE-2022-23131.yaml 2022-02-20 20:37:19 +08:00
PikPikcU 280de89a19
Update CVE-2022-25323.yaml 2022-02-19 17:32:56 -05:00
PikPikcU 2ca53695ca
Create CVE-2022-25323.yaml 2022-02-19 17:32:01 -05:00
GitHub Action 1fdab1ebfb Auto Generated CVE annotations [Sat Feb 19 11:22:51 UTC 2022] 🤖 2022-02-19 11:22:51 +00:00
Dhiyaneshwaran 45aacdad8c
Create CVE-2022-0149.yaml 2022-02-19 16:51:38 +05:30
cckuailong 5e5d294656
add CVE-2022-23808 (#3697)
* add CVE-2022-23808

* Update CVE-2022-23808.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-02-14 17:13:04 +05:30
GitHub Action c548ca9f59 Auto Generated CVE annotations [Wed Feb 9 19:42:28 UTC 2022] 🤖 2022-02-09 19:42:28 +00:00
Prince Chaddha c065716a94
Merge pull request #3672 from pikpikcu/patch-321
Create CVE-2022-0432
2022-02-10 01:10:52 +05:30
Prince Chaddha f8a31448f9
Update CVE-2022-0432.yaml 2022-02-10 01:06:59 +05:30
Prince Chaddha 9e26df67b3
Update CVE-2022-0432.yaml 2022-02-10 00:58:51 +05:30
GitHub Action 94ac089ed7 Auto Generated CVE annotations [Sun Feb 6 18:32:16 UTC 2022] 🤖 2022-02-06 18:32:16 +00:00
sandeep 574acfaddc minor template update 2022-02-06 23:59:47 +05:30
PikPikcU 0d5e0e891d
Update CVE-2022-0378.yaml 2022-02-06 05:18:24 -05:00
PikPikcU 0d311a72c3
Update CVE-2022-0281.yaml 2022-02-06 05:17:40 -05:00
PikPikcU 9e641734a3
Create CVE-2022-0432.yaml 2022-02-06 01:04:17 -05:00
PikPikcU 4f8a0ac62c
Create CVE-2022-0378.yaml 2022-02-06 00:41:20 -05:00
PikPikcU a12753c7fe
Create CVE-2022-0281.yaml 2022-02-06 00:28:32 -05:00
sandeep d34ca992d3 Added CVE-2022-21371 2022-01-28 16:59:22 +05:30
sandeep 57d742bfb4 Removing temporarily due to limited information 2022-01-28 16:58:30 +05:30
sandeep 9fa97d4221 path update 2022-01-28 16:55:45 +05:30
Prince Chaddha dfdfc369d1
Merge pull request #3597 from paradessia/master
CVE-2022-21371
2022-01-28 11:14:44 +05:30
cckuailong 5b424fafe1
add CVE-2022-23944 (#3605)
* add CVE-2022-23944

* fix CVE-2021-23944 matcher type

* Update CVE-2022-23944.yaml

* minor updates

Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-01-27 15:59:26 +05:30
Sullo 9a8482172d Remove:
- various nonstandard ascii chars in favor of the standard ones (mostly quotes)
 - spaces after : in some files
2022-01-25 14:38:53 -05:00
Prince Chaddha 97b38b98b4
Update CVE-2022-21371.yaml 2022-01-25 21:06:14 +05:30
GitHub Action 48add9c36b Auto Generated CVE annotations [Tue Jan 25 11:06:39 UTC 2022] 🤖 2022-01-25 11:06:39 +00:00
Prince Chaddha 2460dceff3
Update CVE-2022-21371.yaml 2022-01-25 16:36:10 +05:30
GitHub Action 5f2efaf5df Auto Generated CVE annotations [Tue Jan 25 09:56:37 UTC 2022] 🤖 2022-01-25 09:56:37 +00:00
on abfbfe29ae CVE-2022-21371.yaml 2022-01-25 12:48:56 +03:00
GitHub Action e035a797c6 Auto Generated CVE annotations [Tue Jan 25 09:41:31 UTC 2022] 🤖 2022-01-25 09:41:31 +00:00
Prince Chaddha 5511ff1efd
Merge pull request #3578 from hexcat/add-wp-html-mail-xss
Added wp-html-mail-xss template
2022-01-24 14:21:06 +05:30
Prince Chaddha 6dd35d6491
Update and rename vulnerabilities/wordpress/wp-html-mail-xss.yaml to cves/2022/CVE-2022-0218.yaml 2022-01-24 14:17:01 +05:30
Prince Chaddha e9897bddaa
Update CVE-2022-23178.yaml 2022-01-24 12:37:55 +05:30
GwanYeong Kim 2d53221aea Create CVE-2022-23178.yaml
An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-01-23 20:28:25 +09:00