* Remove blank cve-id lines

* Fix a typo
patch-1
sullo 2022-06-01 09:31:18 -04:00
parent a38d582832
commit 1514497213
9 changed files with 2 additions and 9 deletions

View File

@ -10,7 +10,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cve-id:
cwe-id: CWE-22
tags: xss,samsung,lfi

View File

@ -10,7 +10,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-77
tags: xss,samsung,rce

View File

@ -10,7 +10,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-77
metadata:
fofa-query: app="sangfor"

View File

@ -13,7 +13,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-77
metadata:
shodan-query: http.favicon.hash:116323821

View File

@ -1,7 +1,7 @@
id: springboot-log4j-rce
info:
name: Spring Boot - Remote Code Exection (Apache Log4j)
name: Spring Boot - Remote Code Execution (Apache Log4j)
author: pdteam
severity: critical
description: Spring Boot is susceptible to remote code execution via Apache Log4j.

View File

@ -10,7 +10,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-77
tags: thinkcmf,rce

View File

@ -8,7 +8,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-77
tags: thinkphp,rce

View File

@ -11,7 +11,6 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cve-id:
cwe-id: CWE-77
tags: wordpress,wp-plugin,rce,intrusive,upload,python