From aacb6a38de59a18f22bcc992d6dca9e88883854e Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 4 Jul 2022 18:47:55 +0530 Subject: [PATCH] Update apache-tomcat-snoop.yaml --- misconfiguration/apache/apache-tomcat-snoop.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/misconfiguration/apache/apache-tomcat-snoop.yaml b/misconfiguration/apache/apache-tomcat-snoop.yaml index 9cb1ec5328..d341f28db6 100644 --- a/misconfiguration/apache/apache-tomcat-snoop.yaml +++ b/misconfiguration/apache/apache-tomcat-snoop.yaml @@ -7,6 +7,8 @@ info: description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection. reference: - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks + metadata: + shodan-query: title:"Apache Tomcat" tags: apache,misconfig,tomcat,disclosure requests: