nuclei-templates/ssl/weak-cipher-suites.yaml

865 lines
40 KiB
YAML
Raw Normal View History

2023-05-24 06:23:15 +00:00
id: weak-cipher-suites
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
info:
2023-05-24 06:23:15 +00:00
name: Weak Cipher Suites Detection
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
author: pussycat0x
2023-05-24 06:23:15 +00:00
severity: medium
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
reference:
- https://www.acunetix.com/vulnerabilities/web/tls-ssl-weak-cipher-suites/
2023-05-24 06:23:15 +00:00
- http://ciphersuite.info
description:
A weak cipher is defined as an encryption/decryption algorithm that uses a key of insufficient length. Using an insufficient length for a key
in an encryption/decryption algorithm opens up the possibility (or probability) that the encryption scheme could be broken.
tags: ssl,tls,misconfig
metadata:
max-request: 4
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
ssl:
- address: "{{Host}}:{{Port}}"
min_version: tls10
max_version: tls10
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
2023-05-24 06:23:15 +00:00
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
matchers:
- type: word
name: tls-1.0
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
- address: "{{Host}}:{{Port}}"
min_version: tls11
max_version: tls11
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
2023-05-24 06:23:15 +00:00
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
matchers:
- type: word
name: tls-1.1
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
- address: "{{Host}}:{{Port}}"
min_version: tls12
max_version: tls12
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
2023-05-24 06:23:15 +00:00
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
matchers:
- type: word
name: tls-1.2
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or
- address: "{{Host}}:{{Port}}"
min_version: tls13
max_version: tls13
extractors:
- type: dsl
dsl:
- "tls_version, cipher"
2023-05-24 06:23:15 +00:00
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
matchers:
- type: word
name: tls-1.3
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
part: cipher
words:
2023-05-24 06:23:15 +00:00
- "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_IDEA_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DH_RSA_WITH_SEED_CBC_SHA"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_DHE_DSS_WITH_SEED_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"
- "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_RSA_WITH_AES_128_CCM"
- "TLS_RSA_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CBC_SHA"
- "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_SEED_CBC_SHA"
- "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_AES_128_CCM_8"
- "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_ARIA_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_CCM_8"
- "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DHE_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
- "TLS_RSA_WITH_AES_128_CCM_8"
- "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_PSK_WITH_AES_128_CCM"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"
- "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
- "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"
- "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"
- "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"
- "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"
- "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_PSK_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"
- "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"
- "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_RSA_WITH_AES_256_CBC_SHA256"
- "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"
- "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"
- "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"
- "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
- "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_PSK_WITH_AES_128_GCM_SHA256"
- "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_GCM_SHA384"
- "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"
- "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"
- "TLS_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_RSA_WITH_SEED_CBC_SHA"
- "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"
- "TLS_PSK_WITH_AES_256_CCM"
- "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"
- "TLS_DH_RSA_WITH_AES_256_CBC_SHA"
- "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_RSA_WITH_3DES_EDE_CBC_SHA"
- "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"
- "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"
- "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"
- "TLS_PSK_WITH_AES_256_CCM_8"
- "TLS_RSA_WITH_AES_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"
- "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"
- "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"
- "TLS_KRB5_WITH_IDEA_CBC_SHA"
dos2unix conversions (#6969) * Add description and enhance one where the UI failed to save properly. dos2unix on a template * Change cvedetails link to nvd * make severities match * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2017/CVE-2017-14524.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2019/CVE-2019-16759.yaml by md * Enhancement: cves/2021/CVE-2021-22986.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24145.yaml by md * Enhancement: cves/2021/CVE-2021-24347.yaml by md * Enhancement: cves/2021/CVE-2021-25003.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25296.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-25298.yaml by md * Enhancement: cves/2021/CVE-2021-25297.yaml by md * Enhancement: cves/2021/CVE-2021-28151.yaml by md * Enhancement: cves/2021/CVE-2021-30128.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0824.yaml by md * Enhancement: cves/2022/CVE-2022-0885.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-24816.yaml by md * Enhancement: cves/2022/CVE-2022-31499.yaml by md * Enhancement: cves/2022/CVE-2022-21587.yaml by md * Enhancement: cves/2021/CVE-2021-24155.yaml by md * Enhancement: cves/2017/CVE-2017-5638.yaml by md * Enhancement: cves/2015/CVE-2015-2863.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-2314.yaml by md * Enhancement: cves/2022/CVE-2022-33901.yaml by md * Enhancement: cves/2022/CVE-2022-34753.yaml by md * Enhancement: cves/2022/CVE-2022-39952.yaml by md * Enhancement: cves/2022/CVE-2022-4060.yaml by md * Enhancement: cves/2022/CVE-2022-44877.yaml by md * Enhancement: cves/2023/CVE-2023-0669.yaml by md * Enhancement: cves/2023/CVE-2023-26255.yaml by md * Enhancement: cves/2023/CVE-2023-26256.yaml by md * Enhancement: exposures/files/salesforce-credentials.yaml by md * Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md * Enhancement: network/backdoor/backdoored-zte.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: network/detection/ibm-d2b-database-server.yaml by md * Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-abuseipdb.yaml by md * Enhancement: token-spray/api-dbt.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md * Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md * Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md * Enhancement: vulnerabilities/froxlor-xss.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md * Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md * Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md * Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md * Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md * Enhancement: vulnerabilities/other/graylog-log4j.yaml by md * Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md * Initial cleanups for syntax errors * dashboard gremlins * Add log4j back to name * Enhancement: exposures/files/salesforce-credentials.yaml by cs * Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs * Enhancement: network/backdoor/backdoored-zte.yaml by cs * Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs * Sev and other info tweaks * Merge conflict * Run dos2unix against all templates * too many newlines error * Fix too many blank lines error * Fix severity mismatches Cleanup language on a new test --------- Co-authored-by: sullo <sullo@cirt.net>
2023-03-27 18:22:40 +00:00
condition: or