nuclei-templates/ssl/weak-cipher-suites.yaml

860 lines
40 KiB
YAML
Raw Normal View History

2023-05-24 06:23:15 +00:00
id: weak-cipher-suites
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
info:
2023-05-24 06:23:15 +00:00
name: Weak Cipher Suites Detection
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
author: pussycat0x
Update weak-cipher-suites.yaml Here are some potential justifications for lowering the severity of the weak cipher suites alert in Nuclei from medium to low: - The risks associated with weak cipher suites are mainly related to interception of traffic and decryption of sensitive data in transit. This requires a man-in-the-middle position which limits the scale of potential abuse. - For an external scan, it is difficult to determine the true impact of weak cipher suites without knowing details of the application architecture and data flows. There could be other protections in place that mitigate the risk. - Weak cipher suites alone do not enable direct remote code execution or access to underlying resources. Additional vulnerabilities would need to be chained to result in system compromise. - The classification of "weak" cipher suites is also subjective and changes over time. Something considered weak today may still be commonly used and considered acceptable by many organizations. - The CVSS score ranges from none to low for interception of non-sensitive data in transit. For external scanning, it's uncertain if truly sensitive data is exposed. - Remediation requires updating server configurations across potentially many hosts. While recommended in the long term, it is not always trivial for organizations to deploy in the short term. - There are likely higher severity issues that should be prioritized for remediation first, rather than just the acceptable cipher suites. While weak cipher suites are not advisable, their ease of exploitation is limited in many real-world scenarios. And when performing external testing, it's difficult to determine the true impact. Given these factors, lowering the severity rating seems reasonable compared to other more serious remote bugs. But organizations should still look to phase out weak ciphers in a responsible manner.
2023-08-25 01:11:23 +00:00
severity: low
2023-10-14 11:27:55 +00:00
description: A weak cipher is defined as an encryption/decryption algorithm that uses a key of insufficient length. Using an insufficient length for a key in an encryption/decryption algorithm opens up the possibility (or probability) that the encryption scheme could be broken.
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
reference:
- https://www.acunetix.com/vulnerabilities/web/tls-ssl-weak-cipher-suites/
2023-05-24 06:23:15 +00:00
- http://ciphersuite.info
metadata:
max-request: 4
2023-10-14 11:27:55 +00:00
tags: ssl,tls,misconfig
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
ssl:
- address: "{{Host}}:{{Port}}"
min_version: tls10
max_version: tls10
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
matchers:
- type: word
name: tls-1.0
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
- address: "{{Host}}:{{Port}}"
min_version: tls11
max_version: tls11
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
matchers:
- type: word
name: tls-1.1
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
- address: "{{Host}}:{{Port}}"
min_version: tls12
max_version: tls12
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
matchers:
- type: word
name: tls-1.2
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
- address: "{{Host}}:{{Port}}"
min_version: tls13
max_version: tls13
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
matchers:
- type: word
name: tls-1.3
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
# digest: 490a0046304402201579cfe155780ba82a116137bf988f1513ae7e3cb55bea64341ca55b3053d1df02205e88c41a09207bed46d183f1e25097f233389770a9793545a5ceeb3e1a6639a1:922c64590222798bb761d5b6d8e72950