Commit Graph

1956 Commits (fa4dad88dd7f354654ae69c27be997700964d967)

Author SHA1 Message Date
Arm!tage 3401689a2b
classify eyou, seeyon, tonged, weaver, dedecms, yonyou (#4557)
* Auto Generated CVE annotations [Sun May 15 12:16:57 UTC 2022] 🤖

* Auto Generated CVE annotations [Mon Jun  6 03:02:54 UTC 2022] 🤖

* create tongda directory and put templates in

* create weaver directory and put templates in

* create seeyon directory and put templates in

* create yonyou directory and put templates in

* create dedecms directory and put templates in

* create eyou directory and put templates in

* misc update

Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-08 13:31:29 +05:30
sullo 9bb6b91ba3
Remove Links for Dead sites (#4554)
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml

* Delete vulnerabilities/other/buffalo-config-injection.yaml

* Remove/replace links to dead sites:
* archives.neohapsis.com
* osvdb.org
* securityfocus.com
2022-06-08 02:20:59 +05:30
sullo 50fbea791c
buffalo-config-injection.yaml is a duplicate of CVE-2021-20091.yaml (#4547)
* Deleted buffalo-config-injection.yaml
Add reference from buffalo-config-injection.yaml to CVE-2021-20091.yaml

* Delete vulnerabilities/other/buffalo-config-injection.yaml
2022-06-06 20:32:33 +05:30
sandeep 606344bfad template id + file update 2022-06-06 16:23:02 +05:30
Prince Chaddha 7ada510859
Fixed possible FPs in open redirect templates (#4544)
* Fixed possible FPs in open redirect templates

We have replaced example.com with interact.sh since few domains redirect to example.com, which results in FP results.

* updated example domain

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-06-06 16:10:15 +05:30
Prince Chaddha 01080a3aed
Update phpok-sqli.yaml 2022-06-05 17:09:00 +05:30
Prince Chaddha 51cdbeaf6a
Merge pull request #4535 from ritikchaddha/patch-70
Update and rename cves/2020/CVE-2020-22210.yaml to vulnerabilities/ot…
2022-06-05 15:48:17 +05:30
Ritik Chaddha 914aa45704
Update and rename cves/2020/CVE-2020-22210.yaml to vulnerabilities/other/74cms-sqli.yaml 2022-06-05 15:04:44 +05:30
Ritik Chaddha 0780108196
Update phpok-sqli.yaml 2022-06-05 14:06:26 +05:30
Ritik Chaddha 49d7a23320
Create phpok-sqli.yaml 2022-06-05 14:01:28 +05:30
MostInterestingBotInTheWorld 5da580f9c2
Dashboard Content Enhancements (#4519)
Dashboard Content Enhancements
2022-06-03 15:12:31 -04:00
Prince Chaddha 85050febf7
Update unauth-message-read.yaml 2022-06-01 18:51:48 +05:30
Alexandre ZANNI 047a7231a3
add ref + rem 2022-06-01 13:44:10 +02:00
sullo 88c150d2e0
Remove blank cve-id fields from templates. (#4516)
* Remove blank cve-id fields from templates.
Add cve-id to CVE-2022-0776.yaml

* Fix classification spelling
2022-05-31 20:04:35 +05:30
Prince Chaddha ecc12ec58f
Merge pull request #4496 from MostInterestingBotInTheWorld/dashboard
Dashboard Content Enhancements
2022-05-31 15:24:07 +05:30
Prince Chaddha bbc9bd2a84
Update nuuo-nvrmini2-rce.yaml 2022-05-31 14:52:46 +05:30
Prince Chaddha c4aec5a0d1
Update oa-tongda-path-traversal.yaml 2022-05-31 14:51:16 +05:30
Prince Chaddha 683b511766
Update opensns-rce.yaml 2022-05-31 14:49:47 +05:30
Prince Chaddha 35e1863cda
Update oracle-fatwire-lfi.yaml 2022-05-31 14:48:35 +05:30
Prince Chaddha 630a29f710
Update php-zerodium-backdoor-rce.yaml 2022-05-31 14:48:05 +05:30
Prince Chaddha 927b557f16
Update powercreator-cms-rce.yaml 2022-05-31 14:47:10 +05:30
Prince Chaddha 39c25f539b
Update qi-anxin-netkang-next-generation-firewall-rce.yaml 2022-05-31 14:44:03 +05:30
Prince Chaddha e5eeae4afb
Update qihang-media-disclosure.yaml 2022-05-31 14:42:37 +05:30
Prince Chaddha 21cb387113
Update sar2html-rce.yaml 2022-05-31 14:41:26 +05:30
Prince Chaddha a0d74ba5e8
Update seowon-router-rce.yaml 2022-05-31 14:40:43 +05:30
Prince Chaddha 2d03dfdf85
Update showdoc-file-upload-rce.yaml 2022-05-31 14:38:36 +05:30
Prince Chaddha f46b4f6fb0
Update sonicwall-sslvpn-shellshock.yaml 2022-05-31 14:36:41 +05:30
Prince Chaddha cbed893fe9
Update sponip-network-system-ping-rce.yaml 2022-05-31 14:36:06 +05:30
Prince Chaddha e1d05486a8
Update rusty-joomla.yaml 2022-05-31 14:34:37 +05:30
Prince Chaddha 66fe14e8a0
Update metersphere-plugin-rce.yaml 2022-05-31 14:33:16 +05:30
Prince Chaddha 236a91ffd6
Update oracle-ebs-bispgraph-file-access.yaml 2022-05-31 14:32:35 +05:30
Prince Chaddha 399f4d1434
Update clockwatch-enterprise-rce.yaml 2022-05-31 14:31:19 +05:30
Prince Chaddha 9a4a006909
Update commax-biometric-auth-bypass.yaml 2022-05-31 14:30:59 +05:30
Prince Chaddha c4e9ddf1f0
Update commax-credentials-disclosure.yaml 2022-05-31 14:30:21 +05:30
Prince Chaddha 2919dc1469
Update icewarp-webclient-rce.yaml 2022-05-31 14:29:38 +05:30
Prince Chaddha fbf8533896
Update kevinlab-bems-backdoor.yaml 2022-05-31 14:29:07 +05:30
Prince Chaddha 18f573cc0d
Update kevinlab-hems-backdoor.yaml 2022-05-31 14:28:02 +05:30
Prince Chaddha 59f524e539
Update lotuscms-rce.yaml 2022-05-31 14:26:43 +05:30
Prince Chaddha 59a7391451
Update maccmsv10-backdoor.yaml 2022-05-31 14:26:02 +05:30
Prince Chaddha 32b085c52a
Update magicflow-lfi.yaml 2022-05-31 14:25:40 +05:30
Prince Chaddha cd9188a2d9
Update mirai-unknown-rce.yaml 2022-05-31 14:23:16 +05:30
Prince Chaddha 636dec14ab
Update natshell-rce.yaml 2022-05-31 14:22:28 +05:30
Prince Chaddha ff002c5b1b
Update netgear-router-exposure.yaml 2022-05-31 14:21:09 +05:30
Prince Chaddha 8dd9e07f80
Update apache-ofbiz-log4j-rce.yaml 2022-05-31 14:14:19 +05:30
Prince Chaddha 0d4b2cfd10
Update apache-solr-log4j-rce.yaml 2022-05-31 14:13:47 +05:30
Prince Chaddha ad4509d33b
Update code42-log4j-rce.yaml 2022-05-31 14:13:20 +05:30
Prince Chaddha 3106c22125
Update fastjson-1-2-68-rce.yaml 2022-05-31 14:12:39 +05:30
Prince Chaddha 4c90184054
Update jamf-log4j-jndi-rce.yaml 2022-05-31 14:12:11 +05:30
Prince Chaddha 03993005fb
Update jenkins-script.yaml 2022-05-31 14:11:09 +05:30
Prince Chaddha ebab53c7be
Update rusty-joomla.yaml 2022-05-31 14:09:58 +05:30