From a0aa8d443871fd968cb77a52acd700b86e537b0c Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Tue, 20 Sep 2022 19:04:49 +0000 Subject: [PATCH] Auto Generated CVE annotations [Tue Sep 20 19:04:49 UTC 2022] :robot: --- cves/2022/CVE-2022-2544.yaml | 2 +- network/backdoor/backdoored-zte.yaml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/cves/2022/CVE-2022-2544.yaml b/cves/2022/CVE-2022-2544.yaml index 562bcbcbc1..fc25e58c45 100644 --- a/cves/2022/CVE-2022-2544.yaml +++ b/cves/2022/CVE-2022-2544.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-425 metadata: verified: true - tags: cve,cve2022,wordpress,wp-plugin,wp,ninja,exposure + tags: ninja,exposure,wpscan,cve,cve2022,wordpress,wp-plugin,wp requests: - method: GET diff --git a/network/backdoor/backdoored-zte.yaml b/network/backdoor/backdoored-zte.yaml index 1c3c9c8e05..bbb7d29303 100644 --- a/network/backdoor/backdoored-zte.yaml +++ b/network/backdoor/backdoored-zte.yaml @@ -11,7 +11,7 @@ info: metadata: verified: true shodan-query: http.html:"ZTE Corporation" - tags: network,zte,telnet,backdoor,router + tags: edb,network,zte,telnet,backdoor,router network: - host: