diff --git a/cves/2016/CVE-2016-10033.yaml b/cves/2016/CVE-2016-10033.yaml index 03682bda49..b2b79a2b4c 100644 --- a/cves/2016/CVE-2016-10033.yaml +++ b/cves/2016/CVE-2016-10033.yaml @@ -51,5 +51,4 @@ requests: status: - 302 - # Enhanced by mp on 2022/04/13 diff --git a/cves/2016/CVE-2016-10960.yaml b/cves/2016/CVE-2016-10960.yaml index 6c77b6f1a5..4972933efc 100644 --- a/cves/2016/CVE-2016-10960.yaml +++ b/cves/2016/CVE-2016-10960.yaml @@ -33,5 +33,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/12 diff --git a/cves/2017/CVE-2017-10075.yaml b/cves/2017/CVE-2017-10075.yaml index de046e7d7e..afe0dfaf38 100644 --- a/cves/2017/CVE-2017-10075.yaml +++ b/cves/2017/CVE-2017-10075.yaml @@ -30,5 +30,4 @@ requests: - "" part: body - # Enhanced by mp on 2022/04/12 diff --git a/cves/2017/CVE-2017-14651.yaml b/cves/2017/CVE-2017-14651.yaml index 16220a4795..42e28efe61 100644 --- a/cves/2017/CVE-2017-14651.yaml +++ b/cves/2017/CVE-2017-14651.yaml @@ -37,5 +37,4 @@ requests: - "text/html" part: header - # Enhanced by mp on 2022/04/14 diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml index ffd32b3dd7..eb110557d0 100644 --- a/cves/2017/CVE-2017-3528.yaml +++ b/cves/2017/CVE-2017-3528.yaml @@ -27,5 +27,4 @@ requests: - 'noresize src="/\example.com?configName=' part: body - # Enhanced by mp on 2022/04/14 diff --git a/cves/2018/CVE-2018-2893.yaml b/cves/2018/CVE-2018-2893.yaml index b425128530..7bae323812 100644 --- a/cves/2018/CVE-2018-2893.yaml +++ b/cves/2018/CVE-2018-2893.yaml @@ -40,5 +40,4 @@ network: words: - "StreamMessageImpl cannot be cast to weblogic" - # Enhanced by mp on 2022/04/14 diff --git a/cves/2019/CVE-2019-2729.yaml b/cves/2019/CVE-2019-2729.yaml index d1ed4dda4d..1e8a70e14b 100644 --- a/cves/2019/CVE-2019-2729.yaml +++ b/cves/2019/CVE-2019-2729.yaml @@ -35,5 +35,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/14 diff --git a/cves/2021/CVE-2021-24358.yaml b/cves/2021/CVE-2021-24358.yaml index c59913e07c..143dda88dc 100644 --- a/cves/2021/CVE-2021-24358.yaml +++ b/cves/2021/CVE-2021-24358.yaml @@ -47,5 +47,4 @@ requests: regex: - 'ion: https:\/\/[a-z0-9.]+\/author\/([a-z]+)\/' - # Enhanced by mp on 2022/04/13 diff --git a/cves/2021/CVE-2021-25033.yaml b/cves/2021/CVE-2021-25033.yaml index 8ce42aefc7..9a759a6b94 100644 --- a/cves/2021/CVE-2021-25033.yaml +++ b/cves/2021/CVE-2021-25033.yaml @@ -24,5 +24,4 @@ requests: regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 - # Enhanced by mp on 2022/04/13 diff --git a/cves/2021/CVE-2021-25055.yaml b/cves/2021/CVE-2021-25055.yaml index 62b2146692..b89a18500c 100644 --- a/cves/2021/CVE-2021-25055.yaml +++ b/cves/2021/CVE-2021-25055.yaml @@ -48,5 +48,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/13 diff --git a/cves/2022/CVE-2022-28363.yaml b/cves/2022/CVE-2022-28363.yaml index 08792ddb8e..43b82109a2 100644 --- a/cves/2022/CVE-2022-28363.yaml +++ b/cves/2022/CVE-2022-28363.yaml @@ -11,14 +11,12 @@ info: - https://www.reprisesoftware.com/products/software-license-management.php - https://github.com/advisories/GHSA-rpvc-qgrm-r54f - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html - classification: - cve-id: CVE-2022-28363 - tags: cve,cve2022,xss,rlm classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.10 cve-id: CVE-2022-28363 cwe-id: CWE-79 + tags: cve,cve2022,xss,rlm requests: - method: GET diff --git a/cves/2022/CVE-2022-28365.yaml b/cves/2022/CVE-2022-28365.yaml index 4416b37e8b..17c731df63 100644 --- a/cves/2022/CVE-2022-28365.yaml +++ b/cves/2022/CVE-2022-28365.yaml @@ -11,14 +11,12 @@ info: - https://www.reprisesoftware.com/products/software-license-management.php - https://github.com/advisories/GHSA-4g2v-6x25-vr7p - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html - classification: - cve-id: CVE-2022-28365 - tags: cve,cve2022,exposure,rlm classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.30 cve-id: CVE-2022-28365 cwe-id: CWE-668 + tags: cve,cve2022,exposure,rlm requests: - method: GET diff --git a/vulnerabilities/wordpress/churchope-lfi.yaml b/vulnerabilities/wordpress/churchope-lfi.yaml index d988da23c1..9534b36c5d 100644 --- a/vulnerabilities/wordpress/churchope-lfi.yaml +++ b/vulnerabilities/wordpress/churchope-lfi.yaml @@ -28,5 +28,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/12 diff --git a/vulnerabilities/wordpress/elex-woocommerce-xss.yaml b/vulnerabilities/wordpress/elex-woocommerce-xss.yaml index 236e3fd682..011477541a 100644 --- a/vulnerabilities/wordpress/elex-woocommerce-xss.yaml +++ b/vulnerabilities/wordpress/elex-woocommerce-xss.yaml @@ -45,5 +45,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/13 diff --git a/vulnerabilities/wordpress/newsletter-open-redirect.yaml b/vulnerabilities/wordpress/newsletter-open-redirect.yaml index 32d7a60689..a9f034ffef 100644 --- a/vulnerabilities/wordpress/newsletter-open-redirect.yaml +++ b/vulnerabilities/wordpress/newsletter-open-redirect.yaml @@ -21,5 +21,4 @@ requests: regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 - # Enhanced by mp on 2022/04/13 diff --git a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml index 947ce5310d..57329b78e5 100644 --- a/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml +++ b/vulnerabilities/wordpress/wordpress-accessible-wpconfig.yaml @@ -50,5 +50,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/12 diff --git a/vulnerabilities/wordpress/wp-spot-premium-lfi.yaml b/vulnerabilities/wordpress/wp-spot-premium-lfi.yaml index 8bf63494c6..ba80c879e0 100644 --- a/vulnerabilities/wordpress/wp-spot-premium-lfi.yaml +++ b/vulnerabilities/wordpress/wp-spot-premium-lfi.yaml @@ -28,5 +28,4 @@ requests: status: - 200 - # Enhanced by mp on 2022/04/12