Merge pull request #5177 from world-dv/master

Modify spacing between id and info
patch-1
Prince Chaddha 2022-08-22 15:46:10 +05:30 committed by GitHub
commit 971b174749
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
27 changed files with 37 additions and 10 deletions

View File

@ -1,4 +1,5 @@
id: CVE-2018-19749 id: CVE-2018-19749
info: info:
name: DomainMOD 4.11.01 - Cross-Site Scripting name: DomainMOD 4.11.01 - Cross-Site Scripting
author: arafatansari author: arafatansari

View File

@ -1,4 +1,5 @@
id: CVE-2019-18665 id: CVE-2019-18665
info: info:
name: DOMOS 5.5 - Local File Inclusion name: DOMOS 5.5 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko

View File

@ -1,4 +1,5 @@
id: CVE-2020-20988 id: CVE-2020-20988
info: info:
name: DomainMOD 4.13.0 - Cross-Site Scripting name: DomainMOD 4.13.0 - Cross-Site Scripting
author: arafatansari author: arafatansari

View File

@ -1,4 +1,5 @@
id: CVE-2021-37589 id: CVE-2021-37589
info: info:
name: Virtua Software Cobranca <12R - Blind SQL Injection name: Virtua Software Cobranca <12R - Blind SQL Injection
author: princechaddha author: princechaddha

View File

@ -1,4 +1,5 @@
id: CVE-2021-41569 id: CVE-2021-41569
info: info:
name: SAS/Internet 9.4 1520 - Local File Inclusion name: SAS/Internet 9.4 1520 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko

View File

@ -1,4 +1,5 @@
id: CVE-2022-0594 id: CVE-2022-0594
info: info:
name: Shareaholic < 9.7.6 - Information Disclosure name: Shareaholic < 9.7.6 - Information Disclosure
author: atomiczsec author: atomiczsec

View File

@ -1,4 +1,5 @@
id: CVE-2022-27849 id: CVE-2022-27849
info: info:
name: WordPress Simple Ajax Chat <20220116 - Sensitive Information Disclosure vulnerability name: WordPress Simple Ajax Chat <20220116 - Sensitive Information Disclosure vulnerability
author: random-robbie author: random-robbie

View File

@ -1,4 +1,5 @@
id: CVE-2022-27927 id: CVE-2022-27927
info: info:
name: Microfinance Management System 1.0 - SQL Injection name: Microfinance Management System 1.0 - SQL Injection
author: lucasljm2001,ekrause author: lucasljm2001,ekrause

View File

@ -1,4 +1,5 @@
id: CVE-2022-36883 id: CVE-2022-36883
info: info:
name: Git Plugin up to 4.11.3 on Jenkins Build Authorization name: Git Plugin up to 4.11.3 on Jenkins Build Authorization
author: c-sh0 author: c-sh0

View File

@ -1,4 +1,5 @@
id: hybris-default-login id: hybris-default-login
info: info:
name: Hybris Default Login name: Hybris Default Login
author: princechaddha author: princechaddha

View File

@ -1,4 +1,5 @@
id: ibm-maximo-login id: ibm-maximo-login
info: info:
name: IBM Maximo Login Panel name: IBM Maximo Login Panel
author: ritikchaddha author: ritikchaddha

View File

@ -1,4 +1,5 @@
id: ibm-websphere-admin-panel id: ibm-websphere-admin-panel
info: info:
name: WebSphere Application Server Community Edition Admin Panel name: WebSphere Application Server Community Edition Admin Panel
author: ritikchaddha author: ritikchaddha

View File

@ -1,4 +1,5 @@
id: redmine-config id: redmine-config
info: info:
name: Redmine Configuration name: Redmine Configuration
author: DhiyaneshDK author: DhiyaneshDK

View File

@ -1,4 +1,5 @@
id: jolokia-info-disclosure id: jolokia-info-disclosure
info: info:
name: Jolokia - Information disclosure name: Jolokia - Information disclosure
author: pussycat0x author: pussycat0x

View File

@ -1,4 +1,5 @@
id: jolokia-list id: jolokia-list
info: info:
name: Jolokia - List name: Jolokia - List
author: pussycat0x author: pussycat0x

View File

@ -1,4 +1,5 @@
id: jolokia-mbean-search id: jolokia-mbean-search
info: info:
name: Jolokia - Searching MBeans name: Jolokia - Searching MBeans
author: pussycat0x author: pussycat0x

View File

@ -1,4 +1,5 @@
id: samsung-smarttv-debug id: samsung-smarttv-debug
info: info:
name: Samsung SmartTV Debug Config name: Samsung SmartTV Debug Config
author: pussycat0x author: pussycat0x

View File

@ -1,4 +1,5 @@
id: sap-spartacus-detect id: sap-spartacus-detect
info: info:
name: SAP Spartacus detect name: SAP Spartacus detect
author: TechbrunchFR author: TechbrunchFR

View File

@ -1,4 +1,5 @@
id: devalcms-xss id: devalcms-xss
info: info:
name: Devalcms 1.4A - Cross-Site Scripting name: Devalcms 1.4A - Cross-Site Scripting
author: arafatansari author: arafatansari

View File

@ -1,4 +1,5 @@
id: dell-idrac-workflow id: dell-idrac-workflow
info: info:
name: Dell iDRAC Security Checks name: Dell iDRAC Security Checks
author: kophjager007 author: kophjager007

View File

@ -1,4 +1,5 @@
id: gocd-workflow id: gocd-workflow
info: info:
name: GoCD Security Checks name: GoCD Security Checks
author: dhiyaneshDk author: dhiyaneshDk

View File

@ -1,4 +1,5 @@
id: jellyfin-workflow id: jellyfin-workflow
info: info:
name: Jellyfin Security Checks name: Jellyfin Security Checks
author: dwisiswant0 author: dwisiswant0

View File

@ -1,4 +1,5 @@
id: symfony-workflow id: symfony-workflow
info: info:
name: Symfony Security Checks name: Symfony Security Checks
author: daffainfo author: daffainfo

View File

@ -1,4 +1,5 @@
id: thinkcmf-workflow id: thinkcmf-workflow
info: info:
name: ThinkCMF Security Checks name: ThinkCMF Security Checks
author: pdteam author: pdteam

View File

@ -1,4 +1,5 @@
id: thinkphp-workflow id: thinkphp-workflow
info: info:
name: ThinkPHP Security Checks name: ThinkPHP Security Checks
author: dr_set author: dr_set

View File

@ -1,4 +1,5 @@
id: weblogic-workflow id: weblogic-workflow
info: info:
name: WebLogic Security Checks name: WebLogic Security Checks
author: dr_set author: dr_set

View File

@ -1,4 +1,5 @@
id: wordpress-workflow id: wordpress-workflow
info: info:
name: Wordpress Security Checks name: Wordpress Security Checks
author: kiblyn11,zomsop82 author: kiblyn11,zomsop82