-
## CVE-2018-7602 - Critical Severity Vulnerability
Vulnerable Library - drupal/core-8.3.6
Subtree split of drupal's /core directory
Dependency Hierarchy:
- :x: **drupal/core-8.3.6** (Vulnerable…
-
2023/08/18 15:39:28 read user rule file ok: 0
2023/08/18 15:39:28 Version: v2.0.321 beta
2023/08/18 15:39:29 API Server listen at 127.0.0.1:8361
2023/08/18 15:39:29 127.0.0.1:1400 GET /api/v1/live
…
-
While triaging issue projectdiscovery/nuclei-templates#9479 I determined a template pattern that leads to checks silently failing. I have tested this against multiple default credentials checks to con…
-
2023/02/17 13:30:32 Successfully raised file descriptor limit to 10240
2023/02/17 13:30:32 read user rule file ok: 0
2023/02/17 13:30:32 Version: v2.0.318 beta
2023/02/17 13:30:32 LicenseName: En…
-
## User story
As a user, if I don't want to provide a CVSS score, the entire `impact` section should be removed.
## What happens
Right now, if a user creates a CVE JSON and doesn't set anythi…
-
how get pro exploit tools?
```
* 1、Contribute 5 rce POCS we don't have
* 2、Contributing POC must be a generic vulnerability
```
List of current tools plug-ins:
```
01_CVE-2019-2729.py
02_CVE…
-
In the course of testing , I found that there are false positives in cve-2018-7602 . Please try using “python3 vulmap -u http://baidu.com” .In addition , can you write a python file for each vulnerabi…
ghost updated
4 years ago
-
Minor mispelling : "User must be authenticated. Did you provided a session cookie ?"
==>
"User must be authenticated. **Did** you provid**e** a session cookie ?"
-
https://www.drupal.org/psa-2018-003
-
Hi!
I'm sure you heard about the big news regarding another security hole prone to RCE against Drupal 7.X & 8.X. I was wondering if you plan on adding support for this bug in this PoC?
Reference…