Merge pull request #5177 from world-dv/master

Modify spacing between id and info
patch-1
Prince Chaddha 2022-08-22 15:46:10 +05:30 committed by GitHub
commit 971b174749
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
27 changed files with 37 additions and 10 deletions

View File

@ -1,4 +1,5 @@
id: CVE-2018-19749 id: CVE-2018-19749
info: info:
name: DomainMOD 4.11.01 - Cross-Site Scripting name: DomainMOD 4.11.01 - Cross-Site Scripting
author: arafatansari author: arafatansari

View File

@ -1,4 +1,5 @@
id: CVE-2019-18665 id: CVE-2019-18665
info: info:
name: DOMOS 5.5 - Local File Inclusion name: DOMOS 5.5 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko

View File

@ -1,4 +1,5 @@
id: CVE-2020-20988 id: CVE-2020-20988
info: info:
name: DomainMOD 4.13.0 - Cross-Site Scripting name: DomainMOD 4.13.0 - Cross-Site Scripting
author: arafatansari author: arafatansari

View File

@ -1,4 +1,5 @@
id: CVE-2021-37589 id: CVE-2021-37589
info: info:
name: Virtua Software Cobranca <12R - Blind SQL Injection name: Virtua Software Cobranca <12R - Blind SQL Injection
author: princechaddha author: princechaddha

View File

@ -1,4 +1,5 @@
id: CVE-2021-41569 id: CVE-2021-41569
info: info:
name: SAS/Internet 9.4 1520 - Local File Inclusion name: SAS/Internet 9.4 1520 - Local File Inclusion
author: 0x_Akoko author: 0x_Akoko

View File

@ -1,4 +1,5 @@
id: CVE-2022-0594 id: CVE-2022-0594
info: info:
name: Shareaholic < 9.7.6 - Information Disclosure name: Shareaholic < 9.7.6 - Information Disclosure
author: atomiczsec author: atomiczsec

View File

@ -1,4 +1,5 @@
id: CVE-2022-27849 id: CVE-2022-27849
info: info:
name: WordPress Simple Ajax Chat <20220116 - Sensitive Information Disclosure vulnerability name: WordPress Simple Ajax Chat <20220116 - Sensitive Information Disclosure vulnerability
author: random-robbie author: random-robbie

View File

@ -1,4 +1,5 @@
id: CVE-2022-27927 id: CVE-2022-27927
info: info:
name: Microfinance Management System 1.0 - SQL Injection name: Microfinance Management System 1.0 - SQL Injection
author: lucasljm2001,ekrause author: lucasljm2001,ekrause

View File

@ -1,4 +1,5 @@
id: CVE-2022-36883 id: CVE-2022-36883
info: info:
name: Git Plugin up to 4.11.3 on Jenkins Build Authorization name: Git Plugin up to 4.11.3 on Jenkins Build Authorization
author: c-sh0 author: c-sh0

View File

@ -1,4 +1,5 @@
id: hybris-default-login id: hybris-default-login
info: info:
name: Hybris Default Login name: Hybris Default Login
author: princechaddha author: princechaddha

View File

@ -1,4 +1,5 @@
id: ibm-maximo-login id: ibm-maximo-login
info: info:
name: IBM Maximo Login Panel name: IBM Maximo Login Panel
author: ritikchaddha author: ritikchaddha

View File

@ -1,4 +1,5 @@
id: ibm-websphere-admin-panel id: ibm-websphere-admin-panel
info: info:
name: WebSphere Application Server Community Edition Admin Panel name: WebSphere Application Server Community Edition Admin Panel
author: ritikchaddha author: ritikchaddha

View File

@ -1,4 +1,5 @@
id: redmine-config id: redmine-config
info: info:
name: Redmine Configuration name: Redmine Configuration
author: DhiyaneshDK author: DhiyaneshDK

View File

@ -1,4 +1,5 @@
id: jolokia-info-disclosure id: jolokia-info-disclosure
info: info:
name: Jolokia - Information disclosure name: Jolokia - Information disclosure
author: pussycat0x author: pussycat0x

View File

@ -1,4 +1,5 @@
id: jolokia-list id: jolokia-list
info: info:
name: Jolokia - List name: Jolokia - List
author: pussycat0x author: pussycat0x
@ -24,4 +25,4 @@ requests:
- type: word - type: word
part: body part: body
words: words:
- '"type":"list"' - '"type":"list"'

View File

@ -1,4 +1,5 @@
id: jolokia-mbean-search id: jolokia-mbean-search
info: info:
name: Jolokia - Searching MBeans name: Jolokia - Searching MBeans
author: pussycat0x author: pussycat0x
@ -26,4 +27,4 @@ requests:
words: words:
- '"type":"search"' - '"type":"search"'
- '"value":' - '"value":'
condition: and condition: and

View File

@ -1,4 +1,5 @@
id: samsung-smarttv-debug id: samsung-smarttv-debug
info: info:
name: Samsung SmartTV Debug Config name: Samsung SmartTV Debug Config
author: pussycat0x author: pussycat0x

View File

@ -1,4 +1,5 @@
id: sap-spartacus-detect id: sap-spartacus-detect
info: info:
name: SAP Spartacus detect name: SAP Spartacus detect
author: TechbrunchFR author: TechbrunchFR

View File

@ -1,4 +1,5 @@
id: devalcms-xss id: devalcms-xss
info: info:
name: Devalcms 1.4A - Cross-Site Scripting name: Devalcms 1.4A - Cross-Site Scripting
author: arafatansari author: arafatansari

View File

@ -1,4 +1,5 @@
id: dell-idrac-workflow id: dell-idrac-workflow
info: info:
name: Dell iDRAC Security Checks name: Dell iDRAC Security Checks
author: kophjager007 author: kophjager007
@ -19,4 +20,4 @@ workflows:
- template: technologies/dell/dell-idrac9-detect.yaml - template: technologies/dell/dell-idrac9-detect.yaml
subtemplates: subtemplates:
- template: default-logins/dell/dell-idrac9-default-login.yaml - template: default-logins/dell/dell-idrac9-default-login.yaml

View File

@ -1,4 +1,5 @@
id: gocd-workflow id: gocd-workflow
info: info:
name: GoCD Security Checks name: GoCD Security Checks
author: dhiyaneshDk author: dhiyaneshDk
@ -7,4 +8,4 @@ info:
workflows: workflows:
- template: exposed-panels/gocd-login.yaml - template: exposed-panels/gocd-login.yaml
subtemplates: subtemplates:
- tags: gocd - tags: gocd

View File

@ -1,4 +1,5 @@
id: jellyfin-workflow id: jellyfin-workflow
info: info:
name: Jellyfin Security Checks name: Jellyfin Security Checks
author: dwisiswant0 author: dwisiswant0
@ -8,4 +9,4 @@ workflows:
- template: technologies/jellyfin-detect.yaml - template: technologies/jellyfin-detect.yaml
subtemplates: subtemplates:
- template: cves/2020/CVE-2020-26948.yaml - template: cves/2020/CVE-2020-26948.yaml
- template: cves/2021/CVE-2021-21402.yaml - template: cves/2021/CVE-2021-21402.yaml

View File

@ -1,4 +1,5 @@
id: symfony-workflow id: symfony-workflow
info: info:
name: Symfony Security Checks name: Symfony Security Checks
author: daffainfo author: daffainfo
@ -9,4 +10,4 @@ workflows:
matchers: matchers:
- name: symfony - name: symfony
subtemplates: subtemplates:
- tags: symfony - tags: symfony

View File

@ -1,4 +1,5 @@
id: thinkcmf-workflow id: thinkcmf-workflow
info: info:
name: ThinkCMF Security Checks name: ThinkCMF Security Checks
author: pdteam author: pdteam
@ -7,4 +8,4 @@ info:
workflows: workflows:
- template: technologies/thinkcmf-detect.yaml - template: technologies/thinkcmf-detect.yaml
subtemplates: subtemplates:
- tags: thinkcmf - tags: thinkcmf

View File

@ -1,4 +1,5 @@
id: thinkphp-workflow id: thinkphp-workflow
info: info:
name: ThinkPHP Security Checks name: ThinkPHP Security Checks
author: dr_set author: dr_set
@ -9,4 +10,4 @@ workflows:
matchers: matchers:
- name: thinkphp - name: thinkphp
subtemplates: subtemplates:
- tags: thinkphp - tags: thinkphp

View File

@ -1,4 +1,5 @@
id: weblogic-workflow id: weblogic-workflow
info: info:
name: WebLogic Security Checks name: WebLogic Security Checks
author: dr_set author: dr_set
@ -8,4 +9,4 @@ workflows:
- template: technologies/weblogic-detect.yaml - template: technologies/weblogic-detect.yaml
subtemplates: subtemplates:
- tags: weblogic - tags: weblogic

View File

@ -1,4 +1,5 @@
id: wordpress-workflow id: wordpress-workflow
info: info:
name: Wordpress Security Checks name: Wordpress Security Checks
author: kiblyn11,zomsop82 author: kiblyn11,zomsop82
@ -8,4 +9,4 @@ workflows:
- template: technologies/wordpress-detect.yaml - template: technologies/wordpress-detect.yaml
subtemplates: subtemplates:
- tags: wordpress - tags: wordpress