diff --git a/http/cves/2021/CVE-2021-27670.yaml b/http/cves/2021/CVE-2021-27670.yaml index b6add29b04e..097e344a0be 100644 --- a/http/cves/2021/CVE-2021-27670.yaml +++ b/http/cves/2021/CVE-2021-27670.yaml @@ -33,7 +33,7 @@ info: - http.title:"appspace" fofa-query: title="appspace" google-query: intitle:"appspace" - tags: cve,cve2021,appspace,ssrf,vuln + tags: cve,cve2021,appspace,ssrf,vuln,vkev http: - method: GET diff --git a/http/cves/2025/CVE-2025-31125.yaml b/http/cves/2025/CVE-2025-31125.yaml index 27e4853f47f..58291345a6e 100644 --- a/http/cves/2025/CVE-2025-31125.yaml +++ b/http/cves/2025/CVE-2025-31125.yaml @@ -27,7 +27,7 @@ info: max-requests: 4 shodan-query: title:"Vite App" fofa-query: title="Vite App" - tags: cve,cve2025,vite,lfi,vkev,vuln + tags: cve,cve2025,vite,lfi,vkev,vuln,kev http: - raw: diff --git a/http/cves/2025/CVE-2025-34026.yaml b/http/cves/2025/CVE-2025-34026.yaml index 354f90aefb8..9aea9b4f47a 100644 --- a/http/cves/2025/CVE-2025-34026.yaml +++ b/http/cves/2025/CVE-2025-34026.yaml @@ -24,7 +24,7 @@ info: product: concerto max-request: 1 shodan-query: http.favicon.hash:-534530225 - tags: versa,concerto,actuator,auth-bypass,springboot,cve,cve2025,vkev,vuln + tags: versa,concerto,actuator,auth-bypass,springboot,cve,cve2025,vkev,vuln,kev http: - raw: diff --git a/http/cves/2025/CVE-2025-68645.yaml b/http/cves/2025/CVE-2025-68645.yaml index 8fd02cd8741..0e06751d02b 100644 --- a/http/cves/2025/CVE-2025-68645.yaml +++ b/http/cves/2025/CVE-2025-68645.yaml @@ -16,7 +16,7 @@ info: max-request: 1 verified: true shodan-query: http.title:"Zimbra Collaboration Suite" - tags: cve,cve2025,zimbra,zcs,lfi,vkev + tags: cve,cve2025,zimbra,zcs,lfi,vkev,kev http: - method: GET diff --git a/http/cves/2026/CVE-2026-23760.yaml b/http/cves/2026/CVE-2026-23760.yaml index a40fdcbbdbf..81d8c203df4 100644 --- a/http/cves/2026/CVE-2026-23760.yaml +++ b/http/cves/2026/CVE-2026-23760.yaml @@ -16,7 +16,7 @@ info: verified: true max-request: 1 shodan-query: html:"SmarterMail" - tags: cve,cve2026,intrusive,smartmail,admin,auth-bypass,kev,vkev + tags: cve,cve2026,intrusive,smartmail,admin,auth-bypass,vkev variables: password: "{{rand_text_alphanumeric(12)}}"