From 850b8707dd0808780b142f546ba4ec26617a91e4 Mon Sep 17 00:00:00 2001 From: ghost Date: Thu, 9 Oct 2025 03:17:22 +0000 Subject: [PATCH] =?UTF-8?q?chore:=20update=20KEV=20and=20vKEV=20tags=20and?= =?UTF-8?q?=20metadata=20=F0=9F=A4=96?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- http/cves/2019/CVE-2019-9874.yaml | 2 +- http/cves/2021/CVE-2021-27856.yaml | 2 +- http/cves/2021/CVE-2021-37291.yaml | 2 +- http/cves/2021/CVE-2021-45420.yaml | 2 +- http/cves/2025/CVE-2025-25037.yaml | 2 +- http/cves/2025/CVE-2025-55161.yaml | 2 +- 6 files changed, 6 insertions(+), 6 deletions(-) diff --git a/http/cves/2019/CVE-2019-9874.yaml b/http/cves/2019/CVE-2019-9874.yaml index 6e7559aa869..5de917e2364 100644 --- a/http/cves/2019/CVE-2019-9874.yaml +++ b/http/cves/2019/CVE-2019-9874.yaml @@ -24,7 +24,7 @@ info: product: experience_platform shodan-query: http.html:"SitecoSitecore Experience Platform" fofa-query: body="Sitecore Experience Platform" - tags: cve,cve2019,sitecore,deserialization,rce,kev + tags: cve,cve2019,sitecore,deserialization,rce,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-27856.yaml b/http/cves/2021/CVE-2021-27856.yaml index 159c456bfce..bf3e1515b7f 100644 --- a/http/cves/2021/CVE-2021-27856.yaml +++ b/http/cves/2021/CVE-2021-27856.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: fatpipeinc product: warp_firmware - tags: cve,cve2021,fatpipe,default-login,backdoor,auth-bypass,kev + tags: cve,cve2021,fatpipe,default-login,backdoor,auth-bypass,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-37291.yaml b/http/cves/2021/CVE-2021-37291.yaml index 3c6e796fea2..f3c21f539fd 100644 --- a/http/cves/2021/CVE-2021-37291.yaml +++ b/http/cves/2021/CVE-2021-37291.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: kevinlab product: 4st_l-bems - tags: cve,cve2021,kevinlab,sqli,edb,packetstorm + tags: cve,cve2021,kevinlab,sqli,edb,packetstorm,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-45420.yaml b/http/cves/2021/CVE-2021-45420.yaml index 1580618610b..2a463519497 100644 --- a/http/cves/2021/CVE-2021-45420.yaml +++ b/http/cves/2021/CVE-2021-45420.yaml @@ -23,7 +23,7 @@ info: vendor: emerson product: dixell_xweb-500 google-query: inurl:"xweb500.cgi" - tags: cve,cve2021,lfw,iot,dixell,xweb500,edb,fileupload,intrusive,kev + tags: cve,cve2021,lfw,iot,dixell,xweb500,edb,fileupload,intrusive,vkev http: - raw: diff --git a/http/cves/2025/CVE-2025-25037.yaml b/http/cves/2025/CVE-2025-25037.yaml index d9e90454d92..5bb1d7b0f16 100644 --- a/http/cves/2025/CVE-2025-25037.yaml +++ b/http/cves/2025/CVE-2025-25037.yaml @@ -23,7 +23,7 @@ info: vendor: aquatronica product: controller shodan-query: html:"aquatronica" - tags: cve,cve2025,aquatronica,info-leak,kev + tags: cve,cve2025,aquatronica,info-leak,vkev http: - raw: diff --git a/http/cves/2025/CVE-2025-55161.yaml b/http/cves/2025/CVE-2025-55161.yaml index 8737c83f93f..13014d7e9a0 100644 --- a/http/cves/2025/CVE-2025-55161.yaml +++ b/http/cves/2025/CVE-2025-55161.yaml @@ -21,7 +21,7 @@ info: verified: true max-request: 1 shodan-query: http.title:"Stirling PDF" - tags: cve,cve2025,ssrf,stirling-pdf,pdf,markdown,oast,oob + tags: cve,cve2025,ssrf,stirling-pdf,pdf,markdown,oast,oob,vkev variables: filename: "{{to_lower(rand_text_alpha(5))}}"