Commit Graph

7 Commits (f80e8104532b78fca31605d212cf463e16966328)

Author SHA1 Message Date
sandeep 33badb66d1 oob tags update 2021-10-19 02:10:26 +05:30
GitHub Action 6a38e21a98 Auto Generated CVE annotations [Tue Sep 28 10:05:39 UTC 2021] 🤖 2021-09-28 10:05:39 +00:00
sandeep 609705f676 removed extra headers not required for template 2021-09-08 17:47:19 +05:30
forgedhallpass cdf9451158 Removed pipe (|) character from references, because the structure requires it to be a string slice, not a string
Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
2021-08-18 14:44:27 +03:00
Sandeep Singh 43d4644164
Update CVE-2021-33544.yaml 2021-07-13 16:29:55 +05:30
Sandeep Singh bb53177a74
Update CVE-2021-33544.yaml 2021-07-13 16:26:33 +05:30
GwanYeong Kim 0e1e727bb1 Create CVE-2021-33544.yaml
Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.

CVE-2021-33543 : Authentication Bypass
CVE-2021-33544 : Command injection multiple parameters

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-12 13:10:31 +09:00