Skip to content

Releases: projectdiscovery/nuclei-templates

v10.0.2

14 Oct 14:33
Compare
Choose a tag to compare

What's Changed

🔥 Release Highlights 🔥


Bug Fixes

  • Resolved parsing issue in WordPress-WP-Mail-Logging template. (Issue #10908)

False Negatives

  • Improved detection in WordPress detection. (Issue #10463)
  • Enhanced detection in Adminer Panel. (Issue #10797)

False Positives

Enhancements

  • Improved SQL injection template for error-based scenarios. (PR #10996)
  • Updated CVE-2024-9465 for better accuracy. (PR #10986)
  • Enhanced XSS detection in Ninja-Forms. (PR #10974)
  • Updated Fumengyun-SQLi for better detection. (PR #10960)
  • Enhanced management of CVE-2024-7354. (PR #10925)
  • Ensured accurate detection in WordPress update. (PR #10915)
  • Refactored Strapi template for efficiency. (PR #10887)
  • Updated CONTRIBUTING.md to enhance contributions. (PR #10890)

Template Updates

New Templates Added: 68 | CVEs Added: 30 | First-time contributions: 5

New Contributors

Full Changelog: v10.0.1...v10.0.2

v10.0.1

30 Sep 15:25
Compare
Choose a tag to compare

What's Changed

🔥 Release Highlights 🔥


Bug Fixes

  • Resolved unresolved variables found: FQDN (#10349).

False Negatives

  • Improve detection and reduce false negatives for CVE-2024-47176 (Issue #10864).

False Positives

Enhancements

  • Added regex extractor for user-agent of HTTP request to identify vulnerable devices in CVE-2024-47176.yaml (#10864).
  • Updated severity in apple-cups-exposure.yaml (#10857).
  • Severity update for jwk-json-leak.yaml (#10840).
  • Added nacos configuration leak detection (#10825).
  • Refactored the "git-repository-browser" template (#10801).
  • Moved http/cves/CVE-2024-45507.yaml to http/cves/2024/CVE-2024-45507.yaml (#10785).
  • Refactored the "kubelet-metrics" template (#10765).
  • Refactored the "GITEA" template (#10752).
  • Optimized templates due to Nuclei changes and added new templates (Issue #10285).
  • Deleted http/fuzzing/valid-gmail-check.yaml as the Gmail API is no longer active (#10865).

Template Updates

New Templates Added: 86 | CVEs Added: 41 | First-time contributions: 2

Read more

Azure Config Review - Nuclei Templates v10.0.0 🎉

12 Sep 06:33
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

We're excited to announce the expansion of the Nuclei Templates with a new suite specifically designed for Azure Cloud Configurations. This update introduces a series of specialized security checks tailored for the comprehensive components of Azure services, including VMs, App Services, SQL Databases, and more. These new templates are crafted to pinpoint common misconfigurations, ensure compliance with regulatory standards, and maintain adherence to industry best practices, leveraging advanced features such as flow and code

The introduction of these Azure-specific templates empowers security teams to conduct thorough security audits of their Azure environments, uncovering crucial misconfigurations and vulnerabilities. Moreover, this release offers customizable checks that can be tailored to meet the unique operational demands of different teams, aiding in the prompt detection and remediation of security issues.

We encourage contributors and reviewers to provide their valuable feedback and suggestions to help enhance and evolve these Azure security templates further. For more details, please visit our latest blog post.

Other Highlights

What's Changed

New Templates Added: 253 | CVEs Added: 35 | First-time contributions: 2

Read more

v9.9.4

02 Sep 10:30
Compare
Choose a tag to compare

What's Changed

🔥 Release Highlights 🔥


Bug Fixes

  • Fixed typo in 'shodan-query' key in AirOS Panel detection (#10615).

False Positives

  • Fixed Nacos version detection false positive (#10647).
  • Fixed false positives for mixed active content (#10571).
  • Fixed false positives for weak login detection in XUI (#10533).
  • Fixed false positives in CVE-2023-33584 template (#10459).
  • Fixed false positives for CVE-2018-11784 detection (#10495).
  • Updated SQL injection delay time to reduce false positives in wp-statistics (#10377).
  • Updated SQL injection delay time for CVE-2023-6063 to reduce false positives (#10376).

Enhancements

  • Updated GitHub takeover matchers to match new 404 page (#10553).
  • Improved CVE-2014-6271 detection (#10621).
  • Enhanced detection of HashiCorp Vault login panel (#10599).
  • Added new endpoint detection for phpMyAdmin panel (#10451).

Template Updates

New Templates Added: 59 | CVEs Added: 30 | First-time contributions: 13

New Contributors

Full Changelog: v9.9.3...v9.9.4

v9.9.3

16 Aug 22:04
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

What's Changed

New Templates Added: 56 | CVEs Added: 33 | First-time contributions: 4

New Contributors

Full Changelog: v9.9.2...v9.9.3

v9.9.2

26 Jul 07:35
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

What's Changed

Bug Fixes

False Negatives

  • Improved detection in the SVN configuration leak template, reducing underreporting (Issue #10344).
  • Addressed false negatives in the following:
  • Exposed SVN configuration (PR #10362)
  • CVE-2019-7139 template (PR #10339)

False Positives

  • Reduced false positives and improved accuracy in the following templates:
  • IdeMia biometrics default login (Issues #10126, #10277)
  • jan-file-upload (PR #10361)
  • Apache XSS (PR #10342)
  • Beanstalk service (PR #10334, duplicated issue)
  • DS-Store file discovery (PR #10278)
  • GOIP default login (PR #10276)

Enhancements

  • Enhanced detection capabilities in dom-xss.yaml (PR #10360).
  • Improved accuracy in generic-xxe.yaml (PR #10359).

New Templates Added: 67 | CVEs Added: 32 | First-time contributions: 7

New Contributors

Full Changelog: v9.9.1...v9.9.2

v9.9.1

10 Jul 13:27
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

What's Changed

New Templates Added: 75 | CVEs Added: 29 | First-time contributions: 5

  • [CVE-2024-37881] SiteGuard WP Plugin <= 1.7.6 - Login Page Disclosure (@s4e-garage) [medium]
  • [CVE-2024-37152] Argo CD Unauthenticated Access to sensitive setting (@dhiyaneshdk) [medium]
  • [CVE-2024-37032] Ollama - Remote Code Execution (@kaks3c) [critical] 🔥
  • [CVE-2024-36991] Splunk Enterprise - Local File Inclusion (@dhiyaneshdk) [high] 🔥
  • [CVE-2024-36401] GeoServer RCE in Evaluating Property Name Expressions (@dhiyaneshdk) [critical] 🔥
  • [CVE-2024-34102] Adobe Commerce & Magento - CosmicSting (@dhiyaneshdk) [critical] 🔥
  • [CVE-2024-33610] Sharp Multifunction Printers - Cookie Exposure (@gy741) [medium]
  • [CVE-2024-33605] Sharp Multifunction Printers - Directory Listing (@gy741) [high]
  • [CVE-2024-33113] D-LINK DIR-845L bsc_sms_inbox.php file - Information Disclosure (@pussycat0x) [medium] 🔥
  • [CVE-2024-32709] WP-Recall <= 16.26.5 - SQL Injection (@s4e-garage) [critical]
  • [CVE-2024-29972] Zyxel NAS326 Firmware < V5.21(AAZF.17)C0 - NsaRescueAngel Backdoor Account (@gy741) [critical] 🔥
  • [CVE-2024-27292] Docassemble - Local File Inclusion (@johnk3r) [high]
  • [CVE-2024-25852] Linksys RE7000 - Command Injection (@s4e-garage) [high]
  • [CVE-2024-6188] TrakSYS 11.x.x - Sensitive Data Exposure (@s4e-garage) [medium]
  • [CVE-2024-6028] Quiz Maker <= 6.5.8.3 - SQL Injection (@s4e-garage) [critical] 🔥
  • [CVE-2024-5947] Deep Sea Electronics DSE855 - Authentication Bypass (@s4e-garage) [medium]
  • [CVE-2024-5522] WordPress HTML5 Video Player < 2.5.27 - SQL Injection (@JohnDoeAnonITA) [critical]
  • [CVE-2024-5084] Hash Form <= 1.1.0 - Arbitrary File Upload (@s4e-garage) [critical]
  • [CVE-2024-4836] Edito CMS - Sensitive Data Leak (@s4e-garage) [high]
  • [CVE-2024-4434] LearnPress WordPress LMS Plugin <= 4.2.6.5 - SQL Injection (@s4e-garage) [critical]
  • [CVE-2023-52251] Kafka UI 0.7.1 Command Injection (@yhy0, @iamnoooob) [high] 🔥
  • [CVE-2023-47117] Label Studio - Sensitive Information Exposure (@iamnoooob, @rootxharsh, @pdresearch) [high]
  • [CVE-2023-41599] JFinalCMS v5.0.0 - Directory Traversal (@pussycat0x) [medium]
  • [CVE-2023-35161] XWiki >= 6.2-milestone-1 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-35160] XWiki >= 2.5-milestone-2 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-35159] XWiki >= 3.4-milestone-1 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-35156] XWiki >= 6.0-rc-1 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-3380] WAVLINK WN579X3 - Remote Command Execution (@pussycat0x) [critical]
  • [CVE-2020-10189] ManageEngine Desktop Central Java Deserialization (@king-alexander) [critical] 🔥
  • [CNVD-2023-03903] EduSoho < v22.4.7 - Local File Inclusion (@s4e-garage) [high]
  • [CNVD-2021-64035] Leadsec VPN - Arbitrary File Read (@xiaoWangSec) [high]
  • [spring4shell-CVE-2022-22965] Spring Framework RCE via Data Binding on JDK 9+ (@dhiyaneshdk, @ritikchaddha) [critical] 🔥
  • [csv-injection] CSV Injection Detection (@dhiyaneshdk, @ritikchaddha) [medium]
  • [xinclude-injection] XInclude Injection - Detection (@dhiyaneshdk, @ritikchaddha) [high]
  • [apache-apollo-default-login] Apache Apollo - Default Login (@ritikchaddha) [high]
  • [caprover-default-login] Caprover - Default Login (@ritikchaddha) [high]
  • [dialogic-xms-default-login] Dialogic XMS Admin Console - Default Login (@ritikchaddha) [high]
  • [jeedom-default-login] Jeedom - Default Login (@ritikchaddha) [high]
  • [ruijie-nbr-default-login] Ruijie NBR Series Routers - Default Login (@pussycat0x) [high]
  • [apache-apollo-panel] Apache Apollo Panel - Detect (@ritikchaddha) [info]
  • [dialogic-xms-console] Dialogic XMS Admin Console - Detect (@ritikchaddha) [info]
  • [endpoint-protector-panel] Endpoint Protector Login Panel - Detect (@pussycat0x) [info]
  • [label-studio-panel] Label Studio - Login Panel (@dhiyaneshdk) [info]
  • [sql-server-dump] SQL Server - Dump Files (@userdehghani) [medium]
  • [apache-pinot-config] Apache Pinot - Exposure (@icarot) [medium]
  • [filestash-admin-config] Filestash Admin Password Configuration (@dhiyaneshdk) [high]
  • [neo4j-neodash-config] Neo4j Neodash Config - Exposure (@icarot) [medium]
  • [jwk-json-leak] JSON Web Key File - Exposure (@mohsen Yaghoubi) [low]
  • [coolify-register-account] Coolify Register User Account - Enabled (@dhiyaneshdk) [medium]
  • [forgejo-repo-exposure] Forgejo Repositories - Exposure (@dhiyaneshdk) [medium]
  • [kodbox-installer] Kodbox Installation Page - Exposure (@dhiyaneshdk) [high]
  • [piwigo-installer] Piwigo Installation Page - Exposure (@dhiyaneshdk) [high]
  • [poste-io-installer] Poste.io - Installer (@dhiyaneshdk) [high]
  • [subrion-installer] Subrion CMS Web Installer - Exposure (@ritikchaddha) [high]
  • [label-studio-signup] Label Studio - Sign-up Detect (@dhiyaneshdk) [unknown]
  • [laragon-phpinfo] Laragon - phpinfo Disclosure (@dhiyaneshdk) [low]
  • [seq-dashboard-unauth] Seq Dashboard - Unauthenticated (@dhiyaneshdk) [high]
  • [apache-cloudstack-detect] Apache CloudStack - Detect (@pussycat0x) [info]
  • [apache-pinot-detect] Apache Pinot - Detect (@icarot) [info]
  • [neo4j-neodash-detect] Neo4j Neodash - Detect (@icarot) [info]
  • [wordpress-chaty] Floating Chat Widget' Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button – Chaty Detection (@ricardomaia) [info]
  • [polyfill-backdoor] Polyfill.io - Detection (@kazet) [low]
  • [hjsoft-hcm-lfi] Hongjing HCM - Local File Inclusion (@s4e-garage) [high]
  • [hjsoft-hcm-sqli] Hongjing HCM - Sql Injection (@s4e-garage) [high]
  • [hjsoft-hcm-tb-sqli] Hongjing HCM - Time-Based Sql Injection (@s4e-garage) [high]
  • [jinhe-oa-c6-upload-lfi] Jinhe OA_C6_UploadFileDownLoadnew - Arbitrary File Read (@pussycat0x) [high]
  • [next-js-cache-poisoning] Next.js Cache Poisoning (@Ice3man543) [high]
  • [azon-dominator-sqli] Azon Dominator - SQL Injection (@s4e-garage) [high]
  • [bagisto-csti] Bagisto 2.1.2 Client-Side Template Injection (@s4e-garage) [medium]
  • [crocus-lfi] Crocus system Service.do - Arbitrary File Read (@pussycat0x) [high]
  • [enjoyrmis-sqli] EnjoyRMIS - SQL Injection (@s4e-garage) [high]
  • [h3c-cnsss-arbitrary-file-upload] H3C CNSSS - Arbitrary File Upload (@s4e-garage) [critical]
  • [pingsheng-electronic-sqli] Pingsheng Electronic Reservoir Supervision Platform - Sql Injection (@s4e-garage) [high]
  • [sharp-printers-lfi] Sharp Multifunction Printers - Local File Inclusion (@gy741) [high]
  • [ldap-metadata] LDAP Metadata - Enumeration (@pussycat0x) [info]

New Contributors

Full Changelog: v9.9.0...v9.9.1

v9.9.0 - Kubernetes Cluster Security 🎉

25 Jun 12:14
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

We are expanding the Nuclei Templates to include a specialized set of security checks dedicated to Kubernetes environments. This initiative will cover various Kubernetes components such as Pods, Deployments, StatefulSets, Services, and Network Policies. The new templates will focus on common misconfigurations, compliance issues, and adherence to industry best practices, utilizing the enhanced capabilities like flow, code & javascript protocol.

The addition of these Kubernetes-specific templates will enable security teams to perform in-depth security assessments of Kubernetes clusters, identifying critical misconfigurations and vulnerabilities. Additionally, this update will support customizable checks that align with unique operational needs, helping teams efficiently detect and address security gaps in their Kubernetes setups.

We invite contributors and reviewers to offer their insights and suggestions to refine and advance the development of these Kubernetes security templates. You can read more about it in this blog post.

Other Highlights

What's Changed

New Templates Added: 164 | CVEs Added: 41 | First-time contributions: 4

  • [CVE-2024-37393] SecurEnvoy Two Factor Authentication - LDAP Injection (s4e-garage) [critical]
  • [CVE-2024-36837] CRMEB v.5.2.2 - SQL Injection (@dhiyaneshdk) [high]
  • [CVE-2024-36527] Puppeteer Renderer - Directory Traversal (@Stux) [medium]
  • [CVE-2024-36412] SuiteCRM - SQL Injection (s4e-garage) [critical]
  • [CVE-2024-34982] LyLme-Spage - Arbitary File Upload (@dhiyaneshdk) [high]
  • [CVE-2024-32113] Apache OFBiz Directory Traversal - Remote Code Execution (@dhiyaneshdk) [high] 🔥
  • [CVE-2024-31982] XWiki < 4.10.20 - Remote code execution (@ritikchaddha) [critical] 🔥
  • [CVE-2024-31750] F-logic DataCube3 - SQL Injection (@dhiyaneshdk) [high]
  • [CVE-2024-29973] Zyxel NAS326 Firmware < V5.21(AAZF.17)C0 - Command Injection (@ritikchaddha) [critical] 🔥
  • [CVE-2024-29895] Cacti cmd_realtime.php - Command Injection (@pussycat0x) [critical] 🔥
  • [CVE-2024-29824] Ivanti EPM - Remote Code Execution (@dhiyaneshdk) [critical] 🔥
  • [CVE-2024-28995] SolarWinds Serv-U - Directory Traversal (@dhiyaneshdk) [high] 🔥
  • [CVE-2024-27718] Smart s200 Management Platform v.S200 - SQL Injection (@dhiyaneshdk) [high]
  • [CVE-2024-24565] CrateDB Database - Arbitrary File Read (@dhiyaneshdk) [medium]
  • [CVE-2024-24112] Exrick XMall - SQL Injection (@dhiyaneshdk) [critical]
  • [CVE-2024-23692] Rejetto HTTP File Server - Template injection (@johnk3r) [critical] 🔥
  • [CVE-2024-21650] XWiki < 4.10.20 - Remote code execution (@ritikchaddha) [critical]
  • [CVE-2024-4443] Business Directory Plugin <= 6.4.2 - SQL Injection (s4e-garage) [critical]
  • [CVE-2024-3922] Dokan Pro <= 3.10.3 - SQL Injection (s4e-garage) [critical]
  • [CVE-2024-3552] Web Directory Free < 1.7.0 - SQL Injection (s4e-garage) [critical]
  • [CVE-2024-3274] D-LINK DNS-320L,DNS-320LW and DNS-327L - Information Disclosure (@dhiyaneshdk) [medium]
  • [CVE-2024-2621] Fujian Kelixin Communication - Command Injection (@dhiyaneshdk) [medium]
  • [CVE-2024-1728] Gradio > 4.19.1 UploadButton - Path Traversal (@isacaya) [high]
  • [CVE-2024-0939] Smart S210 Management Platform - Arbitary File Upload (@dhiyaneshdk) [critical]
  • [CVE-2024-0250] Analytics Insights for Google Analytics 4 < 6.3 - Open Redirect (s4e-garage) [medium]
  • [CVE-2023-51449] Gradio Hugging Face - Local File Inclusion (@nvn1729) [high] 🔥
  • [CVE-2023-50720] XWiki < 4.10.15 - Email Disclosure (@ritikchaddha) [medium]
  • [CVE-2023-50719] XWiki < 4.10.15 - Sensitive Information Disclosure (@ritikchaddha) [high] 🔥
  • [CVE-2023-48241] XWiki < 4.10.15 - Information Disclosure (@ritikchaddha) [high]
  • [CVE-2023-46732] XWiki < 14.10.14 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-45136] XWiki < 14.10.14 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-43472] MLFlow < 2.8.1 - Sensitive Information Disclosure (@ritikchaddha) [high] 🔥
  • [CVE-2023-38194] SuperWebMailer - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-37645] EyouCms v1.6.3 - Information Disclosure (@pussycat0x) [medium]
  • [CVE-2023-32068] XWiki - Open Redirect (@ritikchaddha) [medium]
  • [CVE-2023-6786] Payment Gateway for Telcell < 2.0.4 - Open Redirect (s4e-garage) [medium]
  • [CVE-2023-6505] Prime Mover < 1.9.3 - Sensitive Data Exposure (s4e-garage) [high]
  • [CVE-2021-43831] Gradio < 2.5.0 - Arbitrary File Read (@isacaya) [high]
  • [CVE-2021-38147] Wipro Holmes Orchestrator 20.4.1 - Information Disclosure (s4e-garage) [high]
  • [CVE-2021-38146] Wipro Holmes Orchestrator 20.4.1 - Arbitrary File Download (s4e-garage) [high]
  • [CVE-2021-4436] 3DPrint Lite < 1.9.1.5 - Arbitrary File Upload (s4e-garage) [critical]
  • [sns-public-subscribe-access] Public Subscription Access of SNS Topics via Policy (@Ritesh_Gohil(#L4stPL4Y3R)) [high]
  • [k8s-cpu-limits-not-set] CPU limits not set in Deployments (@princechaddha) [medium]
  • [k8s-cpu-requests-not-set] CPU Requests not set in Deployments (@princechaddha) [medium]
  • [k8s-default-namespace-used] Default Namespace Usage in Deployments (@princechaddha) [high]
  • [k8s-host-ports-check] Host ports should not be used (@princechaddha) [medium]
  • [k8s-image-pull-policy-always] Image Pull Policy set to Always (@princechaddha) [low]
  • [k8s-image-tag-not-fixed] Image Tag should be fixed - not latest or blank (@princechaddha) [low]
  • [k8s-liveness-probe-not-configured] Liveness Probe Not Configured in Deployments (@princechaddha) [medium]
  • [k8s-memory-limits-not-set] Memory limits not set in Deployments (@princechaddha) [medium]
  • [k8s-memory-requests-not-set] Memory requests not set in Deployments (@princechaddha) [medium]
  • [minimize-added-capabilities] Minimize container added capabilities (@princechaddha) [high]
  • [k8s-privileged-containers] Privileged Containers Found in Deployments (@princechaddha) [critical]
  • [k8s-readiness-probe-not-set] Readiness Probes not set in Deployments (@princechaddha) [medium]
  • [k8s-root-container-admission] Minimize the admission of root containers (@princechaddha) [critical]
  • [k8s-seccomp-profile-set] Set appropriate seccomp profile (@princechaddha) [medium]
  • [kubernetes-code-env] Kubernetes Cluster Validation (@princechaddha) [info]
  • [k8s-netpol-egress-rules] Network policies define egress rules (@princechaddha) [medium]
  • [k8s-netpol-namespace] Network Policies specify namespace (@princechaddha) [medium]
  • [k8s-network-ingress-rules] Define network ingress rules (@princechaddha) [medium]
  • [k8s-allow-privilege-escalation-set] Containers run with allowPrivilegeEscalation enabled (@princechaddha) [critical]
  • [k8s-containers-share-host-ipc] Containers sharing host IPC namespace (@princechaddha) [critical]
  • [k8s-host-network-namespace-shared] Host Network Namespace Sharing (@princechaddha) [high]
  • [k8s-host-pid-namespace-sharing] Host PID Namespace Sharing (@princechaddha) [critical]
  • [k8s-readonly-fs] Enforce Read-Only Filesystem for Containers (@princechaddha) [critical]
  • [k8s-readonly-rootfs] Pods with read-only root filesystem (@princechaddha) [medium]
  • [k8s-root-user-id] Pods run with root user ID (@princechaddha) [low]
  • [audit-log-path-set] Ensure audit-log-path set (@princechaddha) [medium]
  • [k8s-enc-prov-conf] Ensure that encryption providers are configured (@princechaddha) [medium]
  • [k8s-etcd-cafile-set] Ensure etcd-cafile argument set (@princechaddha) [medium]
  • [k8s-etcd-files-set] Ensure etcd cert and key set (@princechaddha) [medium]
  • [k8s-ns-usage-check] Ensure namespaces are utilized (@princechaddha) [info]
  • [k8s-svc-acct-issuer-set] Checks if service-account-issuer is correctly configured (@princechaddha) [medium]
  • [k8s-svc-acct-key] Ensure service-account-key-file set (@princechaddha) [medium]
  • [k8s-svc-acct-lookup-set] Ensure service-account-lookup set (@princechaddha) [medium]
  • [k8s-tls-config-set] Ensure TLS config appropriately set (@princechaddha) [medium]
  • [time-based-sqli] Time-Based Blind SQL Injection (@0xKayala) [critical]
  • [anthem-deeppanda-malware-hash] Anthem DeepPanda Trojan Kakfum Malware Hash - Detect (@pussycat0x) [info]
  • [applejeus-malware-hash] AppleJeus Malware Hash - Detect (@pussycat0x) [info]
  • [avburner-malware-hash] AVBurner Malware Hash - Detect (@pussycat0x) [info]
  • [backwash-malware-hash] Backwash Malware Hash - Detect (@pussycat0x) [info]
  • [blackenergy-driver-amdide-hash] Blackenergy-Driver Amdide Hash - Detect (@pussycat0x) [info]
  • [blackenergy-driver-malware-hash] BlackEnergy Driver USBMDM Malware Hash - Detect (@pussycat0x) [info]
  • [blackenergy-killdisk-malware-hash] BlackEnergy KillDisk Malware Hash - Detect (@pussycat0x) [info]
  • [blackenergy-ssh-malware-hash] BlackEnergy BackdoorPass DropBear SSH Malware Hash - Detect (@pussycat0x) [info]
  • [blackenergy-vbs-malware-hash] BlackEnergy VBS Agent Malware Hash - Detect (@pussycat0x) [info]
  • [bluelight-malware-hash] bluelight Malware ...
Read more

Added CVE-2024-4577 + Bug fixes

09 Jun 19:53
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

[CVE-2024-4577] PHP CGI - Argument Injection (@hüseyin TINTAŞ, @sw0rk17, @s4e-garage, @pdresearch) [critical]

What's Changed

Full Changelog: v9.8.8...v9.8.9

v9.8.8

07 Jun 10:40
Compare
Choose a tag to compare

🔥 Release Highlights 🔥

  • [CVE-2024-27348] Apache HugeGraph-Server - Remote Command Execution (@dhiyaneshdk) [high] 🔥
  • [CVE-2024-24919] Check Point Quantum Gateway - Information Disclosure (@johnk3r) [high] 🔥
  • [CVE-2024-21683] Atlassian Confluence Data Center and Server - Remote Code Execution (@pdresearch) [high] 🔥
  • [CVE-2024-4358] Progress Telerik Report Server - Authentication Bypass (@dhiyaneshdk) [critical] 🔥
  • [CVE-2024-3495] Wordpress Country State City Dropdown <=2.7.2 - SQL Injection (@apple) [critical] 🔥

What's Changed

New Templates Added: 77 | CVEs Added: 17 | First-time contributions: 8

  • [CVE-2024-34470] HSC Mailinspector 5.2.17-3 through 5.2.18 - Local File Inclusion (@topscoder) [high]
  • [CVE-2024-27348] Apache HugeGraph-Server - Remote Command Execution (@dhiyaneshdk) [high] 🔥
  • [CVE-2024-25723] ZenML ZenML Server - Improper Authentication (@david Botelho Mariano) [critical]
  • [CVE-2024-24919] Check Point Quantum Gateway - Information Disclosure (@johnk3r) [high] 🔥
  • [CVE-2024-21683] Atlassian Confluence Data Center and Server - Remote Code Execution (@pdresearch) [high] 🔥
  • [CVE-2024-5230] FleetCart 4.1.1 - Information Disclosure (@SecurityForEveryone) [medium]
  • [CVE-2024-4358] Progress Telerik Report Server - Authentication Bypass (@dhiyaneshdk) [critical] 🔥
  • [CVE-2024-3822] Base64 Encoder/Decoder <= 0.9.2 - Cross-Site Scripting (@omranisecurity) [medium]
  • [CVE-2024-3495] Wordpress Country State City Dropdown <=2.7.2 - SQL Injection (@apple) [critical] 🔥
  • [CVE-2024-1380] Relevanssi (A Better Search) <= 4.22.0 - Query Log Export (@flx) [medium]
  • [CVE-2023-48084] Nagios XI < 5.11.3 - SQL Injection (@ritikchaddha) [critical]
  • [CVE-2023-35162] XWiki < 14.10.5 - Cross-Site Scripting (@ritikchaddha) [medium]
  • [CVE-2023-3077] MStore API < 3.9.8 - SQL Injection (@dhiyaneshdk) [critical]
  • [CVE-2023-2059] DedeCMS 5.7.87 - Directory Traversal (@pussycat0x) [medium]
  • [CVE-2022-34534] Digital Watchdog DW Spectrum Server 4.2.0.32842 - Information Disclosure (@ritikchaddha) [high]
  • [CVE-2022-1580] Site Offline WP Plugin < 1.5.3 - Authorization Bypass (@Kazgangap) [medium]
  • [CVE-2022-0666] Microweber < 1.2.11 - CRLF Injection (@ritikchaddha) [high]
  • [sns-topic-public-accessible] Public Access of SNS Topics via Policy (@Ritesh_Gohil(#L4stPL4Y3R)) [high]
  • [webpack-sourcemap] Webpack Sourcemap (@Lucky0x0D, @PulseSecurity.co.nz) [low]
  • [CNVD-2024-15077] AJ-Report Open Source Data Screen - Remote Code Execution (@pussycat0x) [high]
  • [ampjuke-default-login] AmpJuke - Default Login (@ritikchaddha) [high]
  • [cambium-networks-default-login] Canopy 5.7GHz Access Point - Default Login (@defektive) [high]
  • [digital-watchdog-default-login] Digital Watchdog - Default Login (@omranisecurity) [high]
  • [busybox-repository-browser] Busybox Repository Browser - Detect (@ritikchaddha) [info]
  • [cisco-firepower-panel] Cisco Firepower Management Center login - Detect (@charles D) [info]
  • [cox-business-panel] Cox Business Dominion Gateway Login Panel - Detect (@dhiyaneshdk) [info]
  • [digital-watchdog-panel] Digital Watchdog - Detect (@ritikchaddha) [info]
  • [f5-admin-interface] F5 Admin Interface - Detect (@drewvravick) [info]
  • [fortisiem-panel] FortiSIEM Login Panel - Detect (@pussycat0x) [info]
  • [oracle-access-management] Oracle Access Management Login Panel - Detect (@righettod) [info]
  • [oracle-peoplesoft-panel] Oracle PeopleSoft Login Panel - Detect (@idealphase, @righettod) [info]
  • [vrealize-hyperic-panel] vRealize Hyperic Login Panel - Detect (@charles D) [info]
  • [wechat-corpsecret-key] Enterprise WeChat Corpsecret Key (@N0el4kLs) [info]
  • [netgear-boarddataww-rce] Netgear Devices boardDataWW.php - Unauth RCE (@pussycat0x) [critical]
  • [directory-listing] Directory Listing Enabled (@themiddle) [low]
  • [dont-panic-traceback] DON'T PANIC Traceback (@ritikchaddha) [low]
  • [cowboy-detect] Cowboy - Detect (@Sechunt3r) [info]
  • [gabia-server-detect] Gabia Server - Detection (@jadu101) [info]
  • [gotweb-detect] GotWeb Detect (@lu4nx) [info]
  • [sparklighter-detect] Spark Lighter Detection (@icarot) [info]
  • [aquatronica-info-leak] Aquatronica Control System 5.1.6 - Information Disclosure (@SecurityForEveryone) [high]
  • [array-vpn-lfi] Array VPN - Arbitrary File Reading Vulnerability (@pussycat0x) [high]
  • [cerio-dt-rce] CERIO-DT Interface - Command Execution (@pussycat0x) [critical]
  • [easycvr-info-leak] EasyCVR video management - Users Information Exposure (@pussycat0x) [high]
  • [proftpd-backdoor] ProFTPd-1.3.3c - Backdoor Command Execution (@pussycat0x) [critical]
  • [samba-detect] Samba - Detection (@pussycat0x) [info]
  • [rsync-list-modules] Rsync List Modules - Enumeration (@pussycat0x) [low]
  • [bitvise-detect] SSH Bitvise Service - Detect (@abdullahisik) [info]
  • [activecollab-installer] ActiveCollab Installation Page - Exposure (@dhiyaneshdk) [high]
  • [call-com-installer] Call.com Setup Page - Exposure (@dhiyaneshdk) [high]
  • [cms-made-simple-installer] CMS Made Simple Installation Page - Exposure (@dhiyaneshdk) [high]
  • [confluence-installer] Confluence Installation Page - Exposure (@dhiyaneshdk) [high]
  • [cubebackup-setup-installer] CubeBackup Setup Page - Exposure (@dhiyaneshdk) [high]
  • [easy-wi-installer] Easy-WI Installation Page - Exposure (@dhiyaneshdk) [high]
  • [ejbca-enterprise-installer] EJBCA Enterprise Cloud Configuration Wizard - Exposure (@dhiyaneshdk) [high]
  • [flarum-installer] Flarum Installation Page - Exposure (@dhiyaneshdk) [high]
  • [fleetcart-installer] FleetCart Installation Page - Exposure (@dhiyaneshdk) [high]
  • [glpi-installer] GLPI Installation Page - Exposure (@dhiyaneshdk) [high]
  • [invicti-enterprise-installer] Invicti Enterprise Installation Page - Exposure (@dhiyaneshdk) [high]
  • [invoice-ninja-installer] Invoice Ninja Setup Page - Exposure (@dhiyaneshdk) [high]
  • [jfa-go-installer] jfa-go Setup Page - Exposure (@dhiyaneshdk) [high]
  • [justfans-installer] JustFans Installation Page - Exposure (@dhiyaneshdk) [high]
  • [librenms-installer] LibreNMS Installation Page - Exposure (@dhiyaneshdk) [high]
  • [mura-cms-setup-installer] Mura CMS Setup Page - Exposure (@dhiyaneshdk) [high]
  • [onlyoffice-installer] OnlyOffice Wizard Page - Exposure (@dhiyaneshdk) [high]
  • [openemr-setup-installer] OpenEMR Setup Installation Page - Exposure (@dhiyaneshdk) [high]
  • [orchard-installer] Orchard Setup Wizard - Exposure (@dhiyaneshdk) [high]
  • [pandora-fms-installer] Pandora FMS Installation Page - Exposure (@dhiyaneshdk) [high]
  • [profittrailer-installer] ProfitTrailer Setup Page - Exposure (@dhiyaneshdk) [high]
  • [projectsend-installer] ProjectSend Installation Page - Exposure (@dhiyaneshdk) [high]
  • [snipe-it-installer] Snipe-IT Setup Page - Exposure (@dhiyaneshdk) [high]
  • [stackposts-installer] StackPosts Installation Page - Exposure (@dhiyaneshdk) [high]
  • [tastyigniter-installer] TastyIgniter Setup Page - Exposure (@dhiyaneshdk) [high]
  • [ubersmith-installer] Ubersmith Setup Page - Exposure (@dhiyaneshdk) [high]
  • [uvdesk-helpdesk-installer] UVDesk Helpdesk Installation Page - Exposure (@dhiyaneshdk) [high]
  • [virtual-smartzone-installer] Virtual SmartZone Setup Wizard - Exposure (@dhiyaneshdk) [high]
  • [wowonder-installer] WoWonder Installation Page - Exposure (@dhiyaneshdk) [high]

New Contributors

Full Changelog: v9.8.7...v9.8.8