fix: wrong year cves

This commit is contained in:
Muhammad Daffa
2026-01-15 17:25:09 +07:00
parent 567954bd1f
commit 0c638c2aec
28 changed files with 28 additions and 28 deletions

View File

@@ -38,7 +38,7 @@ info:
fofa-query: fofa-query:
- body="/remote/login" "xxxxxxxx" - body="/remote/login" "xxxxxxxx"
- icon_hash="945408572" - icon_hash="945408572"
tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln tags: cve,cve2022,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln
flow: http () && code() flow: http () && code()
http: http:

View File

@@ -26,7 +26,7 @@ info:
vendor: ossrs vendor: ossrs
product: simple_realtime_server product: simple_realtime_server
shodan-query: http.favicon.hash:1386054408 shodan-query: http.favicon.hash:1386054408
tags: cve,cve2023,srs,dom,xss,vuln tags: cve,cve2024,srs,dom,xss,vuln
headless: headless:
- steps: - steps:

View File

@@ -28,7 +28,7 @@ info:
product: securelinx_spider_firmware product: securelinx_spider_firmware
shodan-query: title:"Lantronix" shodan-query: title:"Lantronix"
fofa-query: title="Lantronix" fofa-query: title="Lantronix"
tags: cve,cve2022,lantronix,securelinx,sls,xss,vuln tags: cve,cve2018,lantronix,securelinx,sls,xss,vuln
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@@ -28,7 +28,7 @@ info:
vendor: openmrs vendor: openmrs
product: openmrs product: openmrs
shodan-query: html:"OpenMRS" shodan-query: html:"OpenMRS"
tags: cve,cve20218,openmrs,deserialization,rce,vkev,vuln tags: cve,cve20188,openmrs,deserialization,rce,vkev,vuln
http: http:
- raw: - raw:

View File

@@ -27,7 +27,7 @@ info:
product: spam_protection\,_antispam\,_firewall product: spam_protection\,_antispam\,_firewall
framework: wordpress framework: wordpress
fofa-query: body="/plugin/cleantalk-spam-protect/" fofa-query: body="/plugin/cleantalk-spam-protect/"
tags: cve,cve2024,wpscan,wordpress,wp,wp-plugin,cleantalk-spam-protect,sqli,passive,vkev,vuln tags: cve,cve2021,wpscan,wordpress,wp,wp-plugin,cleantalk-spam-protect,sqli,passive,vkev,vuln
http: http:
- raw: - raw:

View File

@@ -28,7 +28,7 @@ info:
product: gtranslate product: gtranslate
framework: wordpress framework: wordpress
fofa-query: body="/wp-content/plugins/gtranslate" fofa-query: body="/wp-content/plugins/gtranslate"
tags: cve,cve2022,wordpress,wp,wp-plugin,gtranslate,xss,vuln tags: cve,cve2021,wordpress,wp,wp-plugin,gtranslate,xss,vuln
http: http:
- method: GET - method: GET

View File

@@ -25,7 +25,7 @@ info:
vendor: wavlink vendor: wavlink
product: wl-wn531g3_firmware product: wl-wn531g3_firmware
fofa-query: body="AC1200" && body="wavlink" fofa-query: body="AC1200" && body="wavlink"
tags: cve,cve2022,wavlink,exposure,ac1200,vuln tags: cve,cve2021,wavlink,exposure,ac1200,vuln
http: http:
- method: GET - method: GET

View File

@@ -26,7 +26,7 @@ info:
max-request: 1 max-request: 1
vendor: keysight vendor: keysight
product: sensor_management_server product: sensor_management_server
tags: cve,cve2025,keysight,sensor_management_server,rce,vkev,oast,oob tags: cve,cve2022,keysight,sensor_management_server,rce,vkev,oast,oob
variables: variables:
cmd: '\\\\{{interactsh-url}}\\test' cmd: '\\\\{{interactsh-url}}\\test'

View File

@@ -25,7 +25,7 @@ info:
max-request: 1 max-request: 1
shodan-query: title:"Froxlor" shodan-query: title:"Froxlor"
product: froxlor product: froxlor
tags: cve2023,cve,froxlor,html,vuln tags: cve2022,cve,froxlor,html,vuln
http: http:
- method: GET - method: GET

View File

@@ -26,7 +26,7 @@ info:
product: pfblockerng product: pfblockerng
shodan-query: "pfBlockerNG" shodan-query: "pfBlockerNG"
fofa-query: "pfBlockerNG" fofa-query: "pfBlockerNG"
tags: cve,cve2024,pfsense,pfblockerng,rce,sqli,netgate,vuln tags: cve,cve2022,pfsense,pfblockerng,rce,sqli,netgate,vuln
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@@ -29,7 +29,7 @@ info:
- title="netscaler aaa" - title="netscaler aaa"
- title="citrix gateway" || title:"netscaler gateway" - title="citrix gateway" || title:"netscaler gateway"
shodan-query: http.title:"citrix gateway" || title:"netscaler gateway" shodan-query: http.title:"citrix gateway" || title:"netscaler gateway"
tags: cve,cve2025,citrix,saml,rce,kev,passive,vkev,vuln tags: cve,cve2023,citrix,saml,rce,kev,passive,vkev,vuln
http: http:
- raw: - raw:

View File

@@ -29,7 +29,7 @@ info:
fofa-query: body="/wp-content/plugins/agile-store-locator" fofa-query: body="/wp-content/plugins/agile-store-locator"
publicwww-query: /wp-content/plugins/agile-store-locator/ publicwww-query: /wp-content/plugins/agile-store-locator/
shodan-query: http.html:"/wp-content/plugins/agile-store-locator/" shodan-query: http.html:"/wp-content/plugins/agile-store-locator/"
tags: cve,cve2024,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln tags: cve,cve2023,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@@ -31,7 +31,7 @@ info:
fofa-query: body="/wp-content/plugins/wp-user-avatar/" fofa-query: body="/wp-content/plugins/wp-user-avatar/"
publicwww-query: "/wp-content/plugins/wp-user-avatar/" publicwww-query: "/wp-content/plugins/wp-user-avatar/"
shodan-query: http.component:"profilepress" shodan-query: http.component:"profilepress"
tags: cve,cve2022,wordpress,wp,wp-plugin,properfraction,profilepress,vkev tags: cve,cve2023,wordpress,wp,wp-plugin,properfraction,profilepress,vkev
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@@ -28,7 +28,7 @@ info:
product: xwiki product: xwiki
shodan-query: html:"data-xwiki-reference" shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference" fofa-query: body="data-xwiki-reference"
tags: cve,cve2024,xwiki,xss,vuln tags: cve,cve2023,xwiki,xss,vuln
http: http:
- method: GET - method: GET

View File

@@ -28,7 +28,7 @@ info:
product: xwiki product: xwiki
shodan-query: html:"data-xwiki-reference" shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference" fofa-query: body="data-xwiki-reference"
tags: cve,cve2024,xwiki,xss,vkev,vuln tags: cve,cve2023,xwiki,xss,vkev,vuln
http: http:
- method: GET - method: GET

View File

@@ -28,7 +28,7 @@ info:
product: xwiki product: xwiki
shodan-query: html:"data-xwiki-reference" shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference" fofa-query: body="data-xwiki-reference"
tags: cve,cve2024,xwiki,exposure,vuln tags: cve,cve2023,xwiki,exposure,vuln
http: http:
- method: GET - method: GET

View File

@@ -24,7 +24,7 @@ info:
vendor: kodcloud vendor: kodcloud
product: kodexplorer product: kodexplorer
fofa-query: app="powered-by-kodexplorer" fofa-query: app="powered-by-kodexplorer"
tags: cve,cve2024,kodexplorer,xss,vuln tags: cve,cve2023,kodexplorer,xss,vuln
http: http:
- raw: - raw:

View File

@@ -28,7 +28,7 @@ info:
product: xwiki product: xwiki
shodan-query: html:"data-xwiki-reference" shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference" fofa-query: body="data-xwiki-reference"
tags: cve,cve2024,xwiki,password,exposure,vuln tags: cve,cve2023,xwiki,password,exposure,vuln
http: http:
- method: GET - method: GET

View File

@@ -28,7 +28,7 @@ info:
product: xwiki product: xwiki
shodan-query: html:"data-xwiki-reference" shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference" fofa-query: body="data-xwiki-reference"
tags: cve,cve2024,xwiki,email,exposure,vuln tags: cve,cve2023,xwiki,email,exposure,vuln
http: http:
- method: GET - method: GET

View File

@@ -30,7 +30,7 @@ info:
framework: python framework: python
shodan-query: html:"__gradio_mode__" shodan-query: html:"__gradio_mode__"
fofa-query: body="__gradio_mode__" fofa-query: body="__gradio_mode__"
tags: cve,cve2024,lfi,gradio,unauth,intrusive,vuln tags: cve,cve2023,lfi,gradio,unauth,intrusive,vuln
variables: variables:
str: '{{rand_base(8)}}' str: '{{rand_base(8)}}'

View File

@@ -30,7 +30,7 @@ info:
product: digital_experience_platform,liferay_portal product: digital_experience_platform,liferay_portal
shodan-query: http.favicon.hash:129457226 shodan-query: http.favicon.hash:129457226
fofa-query: icon_hash=129457226 fofa-query: icon_hash=129457226
tags: cve,cve2019,liferay,liferay-portal,digital-experience-platform,open-redirect,vkev tags: cve,cve2024,liferay,liferay-portal,digital-experience-platform,open-redirect,vkev
http: http:
- method: GET - method: GET

View File

@@ -36,7 +36,7 @@ info:
- app="zimbra-邮件系统" - app="zimbra-邮件系统"
- body="zimbra collaboration suite web client" - body="zimbra collaboration suite web client"
- icon_hash="475145467" - icon_hash="475145467"
tags: cve,cve2022,zimbra,kev,passive,xss,vkev tags: cve,cve2024,zimbra,kev,passive,xss,vkev
http: http:
- method: GET - method: GET

View File

@@ -26,7 +26,7 @@ info:
framework: prestashop framework: prestashop
shodan-query: html:"/productsalert" shodan-query: html:"/productsalert"
fofa-query: body="/productsalert" fofa-query: body="/productsalert"
tags: time-based-sqli,cve,cve2023,prestashop,sqli,productsalert,vuln tags: time-based-sqli,cve,cve2024,prestashop,sqli,productsalert,vuln
flow: http(1) && http(2) flow: http(1) && http(2)

View File

@@ -27,7 +27,7 @@ info:
verified: true verified: true
vendor: gestioip vendor: gestioip
product: gestioip product: gestioip
tags: cve,cve2025,gestioip,xss,reflected,authenticated tags: cve,cve2024,gestioip,xss,reflected,authenticated
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:

View File

@@ -26,7 +26,7 @@ info:
vendor: santesoft vendor: santesoft
product: sante_pacs_server product: sante_pacs_server
shodan-query: http.favicon.hash:1185161484 shodan-query: http.favicon.hash:1185161484
tags: cve,cve2024,sante,pacs,lfi,vkev,vuln tags: cve,cve2025,sante,pacs,lfi,vkev,vuln
http: http:
- raw: - raw:

View File

@@ -25,7 +25,7 @@ info:
max-request: 1 max-request: 1
shodan-query: html:"apriso" shodan-query: html:"apriso"
fofa-query: body="/Apriso/Portal" fofa-query: body="/Apriso/Portal"
tags: cve,cve2024,delmia,apriso,serialization,rce,kev,vkev,vuln tags: cve,cve2025,delmia,apriso,serialization,rce,kev,vkev,vuln
http: http:
- raw: - raw:

View File

@@ -19,7 +19,7 @@ info:
classification: classification:
epss-score: 0.93587 epss-score: 0.93587
epss-percentile: 0.99822 epss-percentile: 0.99822
tags: cve,cve2018,js,network,postgresql,intrusive,vkev,vuln tags: cve,cve2019,js,network,postgresql,intrusive,vkev,vuln
javascript: javascript:

View File

@@ -23,7 +23,7 @@ info:
max-request: 1 max-request: 1
vendor: fortinet vendor: fortinet
product: forticlient_enterprise_management_server product: forticlient_enterprise_management_server
tags: cve,cve2024,sqli,fortinet,kev,vkev,vuln tags: cve,cve2023,sqli,fortinet,kev,vkev,vuln
tcp: tcp:
- inputs: - inputs: