Commit Graph

4277 Commits (f72da0f8a4737f77cee0b2fe2c83ad26c983bab9)

Author SHA1 Message Date
sullo c3d4dfd6ae
Tenda Template Enhancementleanup (#4257)
* Replace § markers with {{ }} pairs

* Clean up new Tenda admin panel template

* Update tenda-11n-wireless-router-login.yaml

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-29 10:34:34 +05:30
sandeep 2d7cef7abd misc update 2022-04-28 18:52:35 +05:30
GitHub Action 6d0cccbd60 Auto Generated CVE annotations [Thu Apr 28 13:21:26 UTC 2022] 🤖 2022-04-28 13:21:26 +00:00
Dwi Siswanto 9929a2f524
Add CVE-2022-0543 (#4255) 2022-04-28 18:51:04 +05:30
xiaoheihei1107 75cb4e3297
Add CVE-2021-22054.yaml (#4251)
* Create CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* Update CVE-2021-22054.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-28 13:18:32 +05:30
Prince Chaddha aaf32a716a
Merge pull request #4249 from For3stCo1d/CVE-2021-46417.yaml
Create CVE-2021-46417.yaml
2022-04-28 01:38:59 +05:30
Prince Chaddha 208f676590
Update CVE-2021-46417.yaml 2022-04-28 01:36:11 +05:30
林寒 006c2e71e0
update CWE-ID 2022-04-27 23:45:58 +08:00
林寒 1525af197c
Create CVE-2021-46417.yaml 2022-04-27 23:43:24 +08:00
GitHub Action 0d3bdec6c2 Auto Generated CVE annotations [Tue Apr 26 21:55:38 UTC 2022] 🤖 2022-04-26 21:55:38 +00:00
Sandeep Singh de09d067c3
Added CVE-2015-3224 (Ruby on Rails Web Console - Remote Code Execution) (#4248) 2022-04-27 03:25:12 +05:30
Prince Chaddha bc831be504
Merge pull request #4241 from p-l-/fix-cve-2020-16952
Fix CVE-2020-16952 template
2022-04-26 03:48:21 +04:00
Prince Chaddha ffbeb784f4
Update CVE-2020-16952.yaml 2022-04-26 03:43:33 +04:00
Pierre Lalet e20ac0da50 Fix CVE-2020-16952 template
The headers are normalized by nuclei, and
MicrosoftSharePointTeamServices will never match.
2022-04-25 21:42:29 +02:00
Sandeep Singh 21145c1220
Added CVE-2022-1119 (#4240) 2022-04-25 21:44:36 +05:30
MostInterestingBotInTheWorld aa888bca8d
Dashboard Content Enhancements (#4238)
Dashboard Content Enhancements
2022-04-25 10:35:07 -04:00
Prince Chaddha d76b1a0032
Merge pull request #4231 from edoardottt/master
Add CVE-2018-5715
2022-04-25 03:16:52 +04:00
Prince Chaddha 2a7f7c72b0
Merge pull request #4228 from Akokonunes/patch-141
Create CVE-2010-4239.yaml
2022-04-25 03:16:30 +04:00
Prince Chaddha 778c778707
Update CVE-2010-4239.yaml 2022-04-25 03:14:38 +04:00
Prince Chaddha 1a80d332da
Update CVE-2018-5715.yaml 2022-04-25 03:13:37 +04:00
Prince Chaddha b3c4935a68
Update and rename CVE-2010-4239.yaml to cves/2010/CVE-2010-4239.yaml 2022-04-24 18:52:35 +04:00
edoardottt 4f5ffa60ee Add CVE-2018-5715 2022-04-24 15:41:02 +02:00
edoardottt 3225c1cb94 Add CVE-2018-5715 2022-04-24 15:40:22 +02:00
edoardottt 9645f4fbc6 Add CVE-2018-5715 2022-04-24 15:39:12 +02:00
vrenzolaverace 1ca45751d1
Add CVE-2022-0208 (#4187)
* Add CVE-2022-0208

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 16:07:48 +05:30
Adam Crosser fd3a7c8fc5
Zoho Desktop Central Authentication Bypass Vulnerability (CVE-2021-44515) (#4142)
* Added Template for CVE-2021-44515

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* Update bigip-config-utility-detect.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:42:25 +05:30
GitHub Action cedf4dee89 Auto Generated CVE annotations [Sun Apr 24 10:05:04 UTC 2022] 🤖 2022-04-24 10:05:04 +00:00
Sandeep Singh 2989fb2b4b
Added CVE-2022-0140 (#4230) 2022-04-24 15:34:42 +05:30
Prince Chaddha 0a27decfe6
Create CVE-2022-0595.yaml (#4213)
* Create CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* Update CVE-2022-0595.yaml

* misc updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-24 15:23:15 +05:30
Adam Crosser 031720fc5f
Created Template for CVE-2021-44077 (#4129)
* Created Template for CVE-2021-44077

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-24 15:15:34 +05:30
sandeep 922d1d9aec more strict matchers 2022-04-23 00:30:59 +05:30
sandeep 9e505d4609 added missing tags 2022-04-22 22:13:51 +05:30
forgedhallpass 4f7e02e8a4 Added CVE id in Classification for CVE-2022-29464.yaml 2022-04-22 19:31:52 +03:00
forgedhallpass f7ca5b134d CVE info update for CVE-2022-1054.yaml 2022-04-22 19:29:43 +03:00
forgedhallpass 5451673368 Moved and renamed templates containing a CVE under their correct location 2022-04-22 19:25:23 +03:00
forgedhallpass 9f8650b0b8 Classification CVE id fix in CVE-2021-40542.yaml 2022-04-22 19:21:28 +03:00
forgedhallpass 99f8b1e4ae Description and classification CVE id fix in CVE-2022-1020.yaml 2022-04-22 19:21:09 +03:00
GitHub Action 9e3dcb86e6 Auto Generated CVE annotations [Fri Apr 22 14:30:15 UTC 2022] 🤖 2022-04-22 14:30:15 +00:00
Prince Chaddha 47a579f177
Merge pull request #4160 from ritikchaddha/patch-31
Create CVE-2019-16996.yaml
2022-04-22 18:13:31 +04:00
Prince Chaddha bc7436b471
Update CVE-2019-16996.yaml 2022-04-22 18:10:31 +04:00
Prince Chaddha 5b6aec6474
Merge pull request #4211 from projectdiscovery/CVE-2022-1054
Create CVE-2022-1054.yaml
2022-04-22 17:30:44 +04:00
Prince Chaddha cc0a6213ca
Update CVE-2022-1054.yaml 2022-04-22 17:27:48 +04:00
Prince Chaddha af2937b7b7
Merge pull request #4210 from projectdiscovery/CVE-2022-1020
Create CVE-2022-1020.yaml
2022-04-22 17:22:43 +04:00
Prince Chaddha b685ac8072
Update CVE-2022-1020.yaml 2022-04-22 17:20:27 +04:00
Sandeep Singh 2487e9877f
Merge pull request #4219 from projectdiscovery/template_info_fixup
Info section refactor
2022-04-22 18:01:12 +05:30
forgedhallpass e349c4ed72 YamlLint warning fix
* added new lines at the end of the template
2022-04-22 13:41:48 +03:00
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
Prince Chaddha 6942229274
Create CVE-2022-27849.yaml 2022-04-22 13:11:27 +04:00
MostInterestingBotInTheWorld 31312b1c19
Dashboard Content Enhancements (#4191)
Dashboard Content Enhancements
2022-04-21 17:16:41 -04:00
GitHub Action 8c19fffb6a Auto Generated CVE annotations [Thu Apr 21 09:35:20 UTC 2022] 🤖 2022-04-21 09:35:20 +00:00
sandeep caa4e827f1 added additional references 2022-04-21 12:41:01 +05:30
luci c02d919071
Adding CVE-2022-29464 (#4209)
* Adding CVE-2022-29464

* Fixin spaces I guess

* misc updates

* path update

* Update CVE-2022-29464.yaml

* added working exploit poc

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2022-04-21 12:32:42 +05:30
Prince Chaddha b0f264c0b8
Create CVE-2022-1054.yaml 2022-04-21 02:51:08 +04:00
Prince Chaddha 36bc825ad8
Create CVE-2022-1020.yaml 2022-04-21 02:47:29 +04:00
sandeep 338d4622bf parts update to use response instead of all 2022-04-20 20:08:07 +05:30
GitHub Action 775b18dfb2 Auto Generated CVE annotations [Tue Apr 19 21:56:21 UTC 2022] 🤖 2022-04-19 21:56:21 +00:00
Prince Chaddha f1a525907e
Update CVE-2020-7980.yaml 2022-04-20 01:50:19 +04:00
Ritik Chaddha f532a0ead3
Update CVE-2020-7980.yaml 2022-04-20 02:46:41 +05:30
Ritik Chaddha fd6b099f41
Create CVE-2020-7980.yaml 2022-04-20 02:40:53 +05:30
MostInterestingBotInTheWorld 3e2e842d0e
Dashboard Content Ehnancements (#4183)
* Spacing and other template cleanups
* duplicate yaml tags

Co-authored-by: sullo <sullo@cirt.net>
2022-04-18 10:00:15 -04:00
Dominique RIGHETTO a3ad749c91
Add a template for Incapptic Connect (#4100)
* Add tpl for Incapptic

* Fix linter error

* misc update

* Auto Generated CVE annotations [Mon Apr 18 13:10:32 UTC 2022] 🤖

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
2022-04-18 18:40:41 +05:30
Prince Chaddha 927a2f68e2
Update CVE-2021-31805.yaml 2022-04-18 15:12:27 +04:00
Prince Chaddha 5467e632dc
Create CVE-2021-31805.yaml 2022-04-18 15:08:19 +04:00
Prince Chaddha 6f30f445ad
Update and rename CVE-2018-14931.yaml to cves/2018/CVE-2018-14931.yaml 2022-04-18 13:34:00 +04:00
Muhammad Daffa 2c2312ab8c
Update CVE-2014-8682.yaml (#4173) 2022-04-17 12:00:44 +05:30
Muhammad Daffa a220bb8029
Update CVE-2016-10940.yaml (#4174) 2022-04-17 11:59:35 +05:30
Prince Chaddha 5170996712
Merge pull request #4164 from Akokonunes/patch-139
Create CVE-2022-23347
2022-04-16 17:33:12 +04:00
Prince Chaddha 5a3d0c9227
Update CVE-2022-23347.yaml 2022-04-16 17:29:35 +04:00
Prince Chaddha 9b76b0840c
Update and rename CVE-2022-23347.yaml to cves/2022/CVE-2022-23347.yaml 2022-04-16 17:27:38 +04:00
GitHub Action 4e6338a4a0 Auto Generated CVE annotations [Sat Apr 16 13:18:49 UTC 2022] 🤖 2022-04-16 13:18:49 +00:00
Ritik Chaddha 27c2b78ede
Create CVE-2019-16996.yaml 2022-04-16 12:52:19 +05:30
MostInterestingBotInTheWorld 5730781afa
Dashboard Content Enhancements (#4157)
* Enhancement: exposures/files/joomla-file-listing.yaml by cs

* Enhancement: cves/2019/CVE-2019-5418.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2021/CVE-2021-20091.yaml by mp

* Enhancement: cves/2021/CVE-2021-20092.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: vulnerabilities/other/solar-log-authbypass.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: cves/2017/CVE-2017-9833.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: misconfiguration/symfony-debugmode.yaml by mp

* Enhancement: cves/2016/CVE-2016-10940.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: cves/2016/CVE-2016-10960.yaml by mp

* Enhancement: cves/2015/CVE-2015-4694.yaml by mp

* Enhancement: vulnerabilities/wordpress/churchope-lfi.yaml by mp

* Enhancement: cves/2017/CVE-2017-10075.yaml by mp

* Enhancement: cves/2021/CVE-2021-27358.yaml by mp

* Enhancement: vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-spot-premium-lfi.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/my-chatbot-xss.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-adaptive-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: cves/2021/CVE-2021-31682.yaml by mp

* Enhancement: vulnerabilities/wordpress/wp-woocommerce-file-download.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: vulnerabilities/wordpress/newsletter-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/pieregister-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-25055.yaml by mp

* Enhancement: cves/2021/CVE-2021-25028.yaml by mp

* Enhancement: vulnerabilities/wordpress/noptin-open-redirect.yaml by mp

* Enhancement: vulnerabilities/wordpress/elex-woocommerce-xss.yaml by mp

* Enhancement: cves/2021/CVE-2021-24947.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2016/CVE-2016-10033.yaml by mp

* Enhancement: vulnerabilities/wordpress/elementorpage-open-redirect.yaml by mp

* Enhancement: cves/2021/CVE-2021-24406.yaml by mp

* Relocating to CVE folder

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-2628.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2019/CVE-2019-2588.yaml by mp

* Enhancement: cves/2021/CVE-2021-31755.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Enhancement: misconfiguration/zabbix-dashboards-access.yaml by mp

* Enhancement: cves/2017/CVE-2017-14651.yaml by mp

* Enhancement: cves/2020/CVE-2020-24589.yaml by mp

* Enhancement: vulnerabilities/confluence/confluence-ssrf-sharelinks.yaml by mp

* Enhancement: cves/2019/CVE-2019-2729.yaml by mp

* Enhancement: cves/2018/CVE-2018-2893.yaml by mp

* Enhancement: cves/2018/CVE-2018-3238.yaml by mp

* Enhancement: cves/2017/CVE-2017-3528.yaml by mp

* Enhancement: cves/2021/CVE-2021-42071.yaml by mp

* Syntax corrections
Added some cve-id fields
Removed duplicate dashboard comments

* Tag typo

Co-authored-by: sullo <sullo@cirt.net>
2022-04-15 12:39:44 -04:00
Prince Chaddha 00046e6ce3
Update CVE-2022-0271.yaml 2022-04-15 18:43:56 +04:00
Prince Chaddha ba3f842314
Update CVE-2021-24987.yaml 2022-04-15 18:40:28 +04:00
Prince Chaddha ce757d0581
Create CVE-2021-24987.yaml 2022-04-15 17:50:49 +04:00
Prince Chaddha 16d6e9d8eb
Create CVE-2022-0271.yaml 2022-04-15 17:50:14 +04:00
Prince Chaddha 428da484c4
Merge pull request #4136 from edoardottt/master
Add CVE-2017-5631
2022-04-15 16:26:58 +04:00
Prince Chaddha 755936a47a
Update CVE-2017-5631.yaml 2022-04-15 16:16:56 +04:00
GitHub Action 86a4ed6178 Auto Generated CVE annotations [Fri Apr 15 12:09:42 UTC 2022] 🤖 2022-04-15 12:09:42 +00:00
Prince Chaddha 9e82c6f530
Merge pull request #4148 from ritikchaddha/patch-29
Create CVE-2019-17418.yaml
2022-04-15 16:09:20 +04:00
Prince Chaddha 2ed1628058
Update CVE-2019-17418.yaml 2022-04-15 15:07:39 +04:00
Prince Chaddha 956fe8a482
Update CVE-2019-17418.yaml 2022-04-15 14:46:55 +04:00
Prince Chaddha 1837051002
Update CVE-2019-16997.yaml 2022-04-15 14:46:24 +04:00
Prince Chaddha 96669b9322
Merge pull request #4149 from ritikchaddha/patch-30
Create CVE-2019-16997.yaml
2022-04-15 14:39:51 +04:00
Prince Chaddha b48d9aa526
Update CVE-2019-16997.yaml 2022-04-15 14:38:30 +04:00
Sandeep Singh d495cca9b3
Added CVE-2019-17444 (Jfrog Artifactory default password) (#4151)
* Added CVE-2019-17444 (Jfrog Artifactory default password)

* misc update
2022-04-15 13:37:49 +05:30
Ritik Chaddha 190594db9d
Update CVE-2019-17418.yaml 2022-04-15 11:37:38 +05:30
Ritik Chaddha d70a0bda29
Create CVE-2019-16997.yaml 2022-04-15 11:33:55 +05:30
Ritik Chaddha eda4835ccc
Create CVE-2019-17418.yaml 2022-04-15 11:25:48 +05:30
Prince Chaddha 3b0149d066
Merge pull request #4130 from Akokonunes/patch-138
Create CVE-2022-25216.yaml
2022-04-14 13:36:03 +04:00
Prince Chaddha da1d31c0ab
Update CVE-2022-25216.yaml 2022-04-14 13:22:19 +04:00
Prince Chaddha 62bf35c347
Update CVE-2022-25216.yaml 2022-04-14 13:00:24 +04:00
Prince Chaddha 84d91e7c0e
Update CVE-2017-12583.yaml 2022-04-14 12:44:00 +04:00
Prince Chaddha be2632e99e
Update CVE-2017-12583.yaml 2022-04-14 12:42:58 +04:00
Prince Chaddha 02ce5e2f23
Update CVE-2017-12583.yaml 2022-04-14 12:42:11 +04:00
Prince Chaddha 2d28f3685e
Update CVE-2017-12583.yaml 2022-04-14 12:33:28 +04:00
Prince Chaddha 56aaa33a7b
Update and rename CVE-2022-25216.yaml to cves/2022/CVE-2022-25216.yaml 2022-04-14 12:33:01 +04:00
edoardottt 1d0e2b1b45 Add CVE-2017-5631 2022-04-13 12:41:03 +02:00
Muhammad Daffa f8240809bd
Update CVE-2021-24340.yaml (#4134) 2022-04-13 14:21:49 +05:30
GitHub Action a9cad3f0ad Auto Generated CVE annotations [Wed Apr 13 07:34:27 UTC 2022] 🤖 2022-04-13 07:34:27 +00:00
Dhiyaneshwaran d6b7cc95dc
Neo4j Browser , Refected XSS in doku.php (#4132)
* Create spring-core-rce.yaml

* Update spring-core-rce.yaml

* Update spring-core-rce.yaml

* Create exposed-neo4j-browser.yaml

* Create CVE-2017-12583.yaml

* removed duplicate template

* minor matchers update

* misc template updates

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-13 13:04:06 +05:30
Prince Chaddha 0359adc0d0
Update CVE-2020-28351.yaml 2022-04-12 23:29:20 +05:30
Prince Chaddha 3cdf2ae29f
Merge pull request #4099 from Akokonunes/patch-137
Create CVE-2018-10956.yaml
2022-04-12 19:37:02 +05:30
Prince Chaddha 2dc2f6ba3f
Update and rename CVE-2018-10956.yaml to cves/2018/CVE-2018-10956.yaml 2022-04-12 19:35:26 +05:30
GitHub Action f26f5f050c Auto Generated CVE annotations [Mon Apr 11 20:08:33 UTC 2022] 🤖 2022-04-11 20:08:33 +00:00
Prince Chaddha be4a05a855
Merge pull request #4103 from ritikchaddha/patch-24
Create CVE-2018-7662.yaml
2022-04-12 01:24:09 +05:30
Prince Chaddha 784ef6f25e
Update CVE-2018-7662.yaml 2022-04-12 01:22:14 +05:30
Sandeep Singh 0a4a7b31f7
Added VMware Workspace ONE Access - Freemarker SSTI (#4113)
Co-Authored-By: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>

Co-authored-by: Sherlock Secure <52328067+sherlocksecurity@users.noreply.github.com>
2022-04-11 22:17:00 +05:30
MostInterestingBotInTheWorld 45174dee16
Dashboard Content Enhancements (#4111)
Dashboard Content Enhancements
2022-04-11 10:42:35 -04:00
sandeep 4b395a60d1 template location fix 2022-04-11 18:43:12 +05:30
Muhammad Daffa eb2fc8dfbd
Update CVE-2022-0437.yaml (#4104) 2022-04-11 16:18:44 +05:30
Muhammad Daffa 3b4158529f
Update CVE-2020-35489.yaml (#4105) 2022-04-11 16:18:13 +05:30
Prince Chaddha e8f971c70b
Update CVE-2018-7662.yaml 2022-04-11 16:03:57 +05:30
Alexandre ZANNI f27f032188
CVE-2022-0482: add a reference (#4107) 2022-04-11 14:08:32 +05:30
Ritik Chaddha 3d173d5925
Create CVE-2018-7662.yaml 2022-04-11 12:14:02 +05:30
Sandeep Singh 5eb47292e4
Added Reprise License Manager Templates (#4097)
Co-Authored-By: Akincibor <99909324+Akincibor@users.noreply.github.com>

Co-authored-by: Akincibor <99909324+Akincibor@users.noreply.github.com>
2022-04-10 12:41:31 +05:30
Prince Chaddha 11c139e44b
Merge pull request #4082 from Akokonunes/patch-136
Create CVE-2015-3897.yaml
2022-04-10 00:33:33 +05:30
Prince Chaddha 7e6f810d1e
Update and rename CVE-2015-3897.yaml to cves/2015/CVE-2015-3897.yaml 2022-04-10 00:31:56 +05:30
GitHub Action e4fed28fc2 Auto Generated CVE annotations [Sat Apr 9 15:50:05 UTC 2022] 🤖 2022-04-09 15:50:05 +00:00
Sandeep Singh 4236dfe3b7
Added CVE-2022-0482 (#4095) 2022-04-09 21:19:47 +05:30
Sandeep Singh 2503c42816
payload + matchers update (#4094) 2022-04-09 20:22:22 +05:30
MostInterestingBotInTheWorld a24ef794b7
Dashboard Content Enhancements (#4031)
Dashboard Content Enhancements
2022-04-07 09:53:15 -04:00
sullo becdd7810b
Cleanup Joomla! Jvehicles template (#3983)
* Cleanup Joomla! Jvehicles template since it was labeled as SQLi but had a test for LFI
Create new template for the Jvehicles LFI

* Fix id

* path update

* Delete CVE-2010-1873.yaml

temporarily removing as it doesn't contain the exact matchers.

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
2022-04-06 17:21:08 +05:30
GitHub Action 83dae0cac1 Auto Generated CVE annotations [Wed Apr 6 04:33:20 UTC 2022] 🤖 2022-04-06 04:33:20 +00:00
Prince Chaddha a0e7094664
Update CVE-2021-24746.yaml 2022-04-06 09:55:48 +05:30
Prince Chaddha 68f4159393
Create CVE-2021-24746.yaml 2022-04-06 09:36:53 +05:30
Prince Chaddha 21a73f490c Update CVE-2021-24746.yaml 2022-04-06 09:35:04 +05:30
GitHub Action 9045a7bd9c Auto Generated CVE annotations [Wed Apr 6 04:01:51 UTC 2022] 🤖 2022-04-06 04:01:51 +00:00
Prince Chaddha 90a085d0e3
Merge pull request #4033 from projectdiscovery/CVE-2021-24746
Create CVE-2021-24746.yaml
2022-04-06 09:31:28 +05:30
Prince Chaddha d834c6aef3
Merge pull request #4052 from Akokonunes/patch-135
Create CVE-2017-1000029.yaml
2022-04-05 23:29:09 +05:30
Prince Chaddha f0af9a04b6
Update CVE-2021-24746.yaml 2022-04-05 23:28:52 +05:30
Prince Chaddha 0f8598a14c
Update and rename CVE-2017-1000029.yaml to cves/2017/CVE-2017-1000029.yaml 2022-04-05 22:54:06 +05:30
sandeep 7d195c9984 Added POST method support to CVE-2022-22965 detection 2022-04-05 22:38:34 +05:30
GitHub Action 15575ec82e Auto Generated CVE annotations [Tue Apr 5 13:17:39 UTC 2022] 🤖 2022-04-05 13:17:39 +00:00
Ritik Chaddha 34a2dca9e6
Update CVE-2019-11248.yaml (#4056)
* Update CVE-2019-11248.yaml

* misc fixes

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-04-05 18:47:15 +05:30
Prince Chaddha 18cfd2f11b
Merge pull request #4039 from gy741/rule-add-v104
Create CVE-2018-10562.yaml
2022-04-05 12:40:58 +05:30
Prince Chaddha 66a27e4da0
Update CVE-2018-10562.yaml 2022-04-05 12:18:20 +05:30
Prince Chaddha 02a1d0ce06
Update CVE-2018-10562.yaml 2022-04-05 12:13:12 +05:30
Prince Chaddha 77e61ae45e
Merge pull request #4042 from gy741/rule-add-v105
Create CVE-2021-26598.yaml
2022-04-05 00:14:57 +05:30
Prince Chaddha 3586ec841c
Update CVE-2021-26598.yaml 2022-04-05 00:13:18 +05:30
Prince Chaddha c9e108c7db
Update CVE-2021-26598.yaml 2022-04-04 23:57:11 +05:30
Sandeep Singh d633c2db45
Updated intrusive detection with HTTP OOB interaction (#4028) 2022-04-04 19:58:38 +05:30
Prince Chaddha 1890296f31
Merge pull request #4046 from Akokonunes/patch-134
Create CVE-2020-27191.yaml
2022-04-04 18:13:11 +05:30
Prince Chaddha 963742768a
Update and rename CVE-2020-27191.yaml to cves/2020/CVE-2020-27191.yaml 2022-04-04 18:08:30 +05:30
Rodrigo Schio 4d690358ae
fix match and extractors regexes (#4040) 2022-04-04 18:08:25 +05:30
GwanYeong Kim 1e374c7482 Create CVE-2021-26598.yaml
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-03 11:23:45 +09:00
GwanYeong Kim 21a3ce4f12 Create CVE-2018-10562.yaml
An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2022-04-02 23:56:35 +09:00
Prince Chaddha c1a7f2398c
Create CVE-2021-24746.yaml 2022-04-02 16:15:26 +05:30
Prince Chaddha a0b190434f
Merge pull request #4021 from rschio/CVE-2021-44103
Create CVE-2021-44103
2022-04-02 16:11:00 +05:30
GitHub Action 9a769040d7 Auto Generated CVE annotations [Sat Apr 2 10:37:27 UTC 2022] 🤖 2022-04-02 10:37:27 +00:00