diff --git a/cves/2021/CVE-2021-42258.yaml b/cves/2021/CVE-2021-42258.yaml index 2816a1013b..d2c44c406a 100644 --- a/cves/2021/CVE-2021-42258.yaml +++ b/cves/2021/CVE-2021-42258.yaml @@ -29,7 +29,7 @@ requests: Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded - __EVENTTARGET=cmdOK&__EVENTARGUMENT=&__VIEWSTATE={{url_encode("Â{{VSÂ}}")}}&__VIEWSTATEGENERATOR={{url_encode("Â{{VSGÂ}}")}}&__EVENTVALIDATION={{url_encode("Â{{EVÂ}}")}}&txtID=uname%27&txtPW=passwd&hdnClientDPI=96 + __EVENTTARGET=cmdOK&__EVENTARGUMENT=&__VIEWSTATE={{url_encode("{{VS}}")}}&__VIEWSTATEGENERATOR={{url_encode("{{VSG}}")}}&__EVENTVALIDATION={{url_encode("{{EV}}")}}&txtID=uname%27&txtPW=passwd&hdnClientDPI=96 cookie-reuse: true extractors: diff --git a/exposed-panels/axigen-webadmin.yaml b/exposed-panels/axigen-webadmin.yaml index 515f319cbe..8e4a17f0d4 100644 --- a/exposed-panels/axigen-webadmin.yaml +++ b/exposed-panels/axigen-webadmin.yaml @@ -10,7 +10,7 @@ info: classification: cwe-id: CWE-200 metadata: - shodan-query: http.title:"Axigen WebAdmin" + shodan-query: http.title:"Axigen WebAdmin" tags: axigen,panel requests: @@ -22,7 +22,7 @@ requests: matchers: - type: word words: - - 'Axigen WebAdmin' + - 'Axigen WebAdmin' - type: status status: