From fb545389e31133e3fedb0130ed08e7c51d78de91 Mon Sep 17 00:00:00 2001 From: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com> Date: Fri, 24 May 2024 03:15:20 +0530 Subject: [PATCH] fix queries --- http/cves/2018/CVE-2018-0127.yaml | 2 +- http/cves/2018/CVE-2018-16671.yaml | 2 +- http/cves/2018/CVE-2018-17246.yaml | 2 +- http/cves/2020/CVE-2020-11547.yaml | 2 +- http/cves/2021/CVE-2021-24849.yaml | 2 +- http/cves/2021/CVE-2021-25281.yaml | 2 +- http/cves/2021/CVE-2021-3002.yaml | 2 +- http/cves/2021/CVE-2021-32682.yaml | 2 +- http/cves/2021/CVE-2021-41192.yaml | 4 ++-- http/cves/2022/CVE-2022-24124.yaml | 2 +- http/cves/2023/CVE-2023-26360.yaml | 2 +- http/cves/2023/CVE-2023-28662.yaml | 2 +- http/cves/2023/CVE-2023-32315.yaml | 2 +- http/cves/2023/CVE-2023-34598.yaml | 2 +- http/cves/2023/CVE-2023-46805.yaml | 2 +- http/cves/2023/CVE-2023-6895.yaml | 2 +- http/cves/2024/CVE-2024-21887.yaml | 2 +- http/cves/2024/CVE-2024-21893.yaml | 2 +- http/cves/2024/CVE-2024-22024.yaml | 2 +- 19 files changed, 20 insertions(+), 20 deletions(-) diff --git a/http/cves/2018/CVE-2018-0127.yaml b/http/cves/2018/CVE-2018-0127.yaml index ffcab418a6..732fbc9eb4 100644 --- a/http/cves/2018/CVE-2018-0127.yaml +++ b/http/cves/2018/CVE-2018-0127.yaml @@ -24,7 +24,7 @@ info: cpe: cpe:2.3:o:cisco:rv132w_firmware:1.0.0.1:*:*:*:*:*:*:* metadata: max-request: 1 - vendor: "cisco" + vendor: cisco product: rv132w_firmware tags: cve,cve2018,cisco,router diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml index 66bf5e553e..18b2d6a8e9 100644 --- a/http/cves/2018/CVE-2018-16671.yaml +++ b/http/cves/2018/CVE-2018-16671.yaml @@ -25,7 +25,7 @@ info: cpe: cpe:2.3:a:circontrol:circarlife_scada:*:*:*:*:*:*:*:* metadata: max-request: 1 - vendor: "circontrol" + vendor: circontrol product: circarlife_scada tags: cve2018,cve,iot,disclosure,edb,circarlife,scada,circontrol diff --git a/http/cves/2018/CVE-2018-17246.yaml b/http/cves/2018/CVE-2018-17246.yaml index 8218daf197..b9ad011458 100644 --- a/http/cves/2018/CVE-2018-17246.yaml +++ b/http/cves/2018/CVE-2018-17246.yaml @@ -26,7 +26,7 @@ info: metadata: max-request: 1 vendor: elastic - product: "kibana" + product: kibana tags: cve,cve2018,lfi,kibana,vulhub,elastic http: diff --git a/http/cves/2020/CVE-2020-11547.yaml b/http/cves/2020/CVE-2020-11547.yaml index 8643df9cae..cc2e60bd10 100644 --- a/http/cves/2020/CVE-2020-11547.yaml +++ b/http/cves/2020/CVE-2020-11547.yaml @@ -27,7 +27,7 @@ info: verified: true max-request: 3 vendor: paessler - product: "prtg_network_monitor" + product: prtg_network_monitor shodan-query: title:"prtg" tags: cve2020,cve,prtg,disclosure,paessler diff --git a/http/cves/2021/CVE-2021-24849.yaml b/http/cves/2021/CVE-2021-24849.yaml index 8709514ac1..e4516b072b 100644 --- a/http/cves/2021/CVE-2021-24849.yaml +++ b/http/cves/2021/CVE-2021-24849.yaml @@ -23,7 +23,7 @@ info: verified: true max-request: 3 vendor: wclovers - product: "frontend_manager_for_woocommerce_along_with_bookings_subscription_listings_compatible" + product: frontend_manager_for_woocommerce_along_with_bookings_subscription_listings_compatible framework: wordpress publicwww-query: "/wp-content/plugins/wc-multivendor-marketplace" tags: wpscan,cve,cve2021,wp,wp-plugin,wordpress,wc-multivendor-marketplace,sqli diff --git a/http/cves/2021/CVE-2021-25281.yaml b/http/cves/2021/CVE-2021-25281.yaml index dc6449f51e..0489b4de45 100644 --- a/http/cves/2021/CVE-2021-25281.yaml +++ b/http/cves/2021/CVE-2021-25281.yaml @@ -24,7 +24,7 @@ info: metadata: max-request: 1 vendor: saltstack - product: "salt" + product: salt tags: cve,cve2021,saltapi,rce,saltstack,unauth http: diff --git a/http/cves/2021/CVE-2021-3002.yaml b/http/cves/2021/CVE-2021-3002.yaml index fb0446244f..19c5820323 100644 --- a/http/cves/2021/CVE-2021-3002.yaml +++ b/http/cves/2021/CVE-2021-3002.yaml @@ -25,7 +25,7 @@ info: cpe: cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:* metadata: max-request: 1 - vendor: "seopanel" + vendor: seopanel product: seo_panel tags: cve2021,cve,seopanel,xss diff --git a/http/cves/2021/CVE-2021-32682.yaml b/http/cves/2021/CVE-2021-32682.yaml index b684490a1e..ac86cf9c30 100644 --- a/http/cves/2021/CVE-2021-32682.yaml +++ b/http/cves/2021/CVE-2021-32682.yaml @@ -25,7 +25,7 @@ info: metadata: max-request: 9 vendor: std42 - product: "elfinder" + product: elfinder github: https://github.com/Studio-42/elFinder tags: cve2021,cve,elfinder,misconfig,rce,oss,std42 diff --git a/http/cves/2021/CVE-2021-41192.yaml b/http/cves/2021/CVE-2021-41192.yaml index 6de3ff1b9c..503b8f7ace 100644 --- a/http/cves/2021/CVE-2021-41192.yaml +++ b/http/cves/2021/CVE-2021-41192.yaml @@ -24,8 +24,8 @@ info: cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:* metadata: max-request: 2 - vendor: "redash" - product: "redash" + vendor: redash + product: redash shodan-query: http.favicon.hash:698624197 tags: cve2021,cve,hackerone,redash,auth-bypass diff --git a/http/cves/2022/CVE-2022-24124.yaml b/http/cves/2022/CVE-2022-24124.yaml index dfd0bce904..bf89028ef1 100644 --- a/http/cves/2022/CVE-2022-24124.yaml +++ b/http/cves/2022/CVE-2022-24124.yaml @@ -26,7 +26,7 @@ info: metadata: max-request: 1 vendor: casbin - product: "casdoor" + product: casdoor shodan-query: http.title:"Casdoor" tags: cve,cve2022,sqli,unauth,packetstorm,edb,casdoor,casbin diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml index 63542941b5..cbf14d6f72 100644 --- a/http/cves/2023/CVE-2023-26360.yaml +++ b/http/cves/2023/CVE-2023-26360.yaml @@ -27,7 +27,7 @@ info: metadata: verified: true max-request: 1 - vendor: "adobe" + vendor: adobe product: coldfusion shodan-query: http.component:"Adobe ColdFusion" tags: cve2023,cve,packetstorm,adobe,coldfusion,lfi,kev diff --git a/http/cves/2023/CVE-2023-28662.yaml b/http/cves/2023/CVE-2023-28662.yaml index 09f5e90b4f..53bdc464b9 100644 --- a/http/cves/2023/CVE-2023-28662.yaml +++ b/http/cves/2023/CVE-2023-28662.yaml @@ -26,7 +26,7 @@ info: metadata: max-request: 2 vendor: codemenschen - product: "gift_vouchers" + product: gift_vouchers framework: wordpress fofa-query: "body=\"/wp-content/plugins/gift-voucher/\"" tags: cve,cve2023,wordpress,wp,wp-plugin,sqli,unauth,gift-voucher diff --git a/http/cves/2023/CVE-2023-32315.yaml b/http/cves/2023/CVE-2023-32315.yaml index 11bb3d3bb4..73b4aef3a0 100644 --- a/http/cves/2023/CVE-2023-32315.yaml +++ b/http/cves/2023/CVE-2023-32315.yaml @@ -28,7 +28,7 @@ info: verified: true max-request: 1 vendor: igniterealtime - product: "openfire" + product: openfire shodan-query: title:"openfire" tags: cve2023,cve,auth-bypass,openfire,console,kev,igniterealtime diff --git a/http/cves/2023/CVE-2023-34598.yaml b/http/cves/2023/CVE-2023-34598.yaml index 4e12ddae19..caf93a901a 100644 --- a/http/cves/2023/CVE-2023-34598.yaml +++ b/http/cves/2023/CVE-2023-34598.yaml @@ -28,7 +28,7 @@ info: verified: true max-request: 1 vendor: gibbonedu - product: "gibbon" + product: gibbon shodan-query: http.favicon.hash:-165631681 fofa-query: icon_hash="-165631681" tags: cve2023,cve,gibbon,lfi,gibbonedu diff --git a/http/cves/2023/CVE-2023-46805.yaml b/http/cves/2023/CVE-2023-46805.yaml index 9cf94669f8..4fb876ef38 100644 --- a/http/cves/2023/CVE-2023-46805.yaml +++ b/http/cves/2023/CVE-2023-46805.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 2 vendor: ivanti - product: "connect_secure" + product: connect_secure shodan-query: "html:\"welcome.cgi?p=logo\"" tags: cve,cve2023,kev,auth-bypass,ivanti diff --git a/http/cves/2023/CVE-2023-6895.yaml b/http/cves/2023/CVE-2023-6895.yaml index 21a29b80a6..757d797758 100644 --- a/http/cves/2023/CVE-2023-6895.yaml +++ b/http/cves/2023/CVE-2023-6895.yaml @@ -21,7 +21,7 @@ info: verified: true max-request: 2 vendor: hikvision - product: "intercom_broadcast_system" + product: intercom_broadcast_system fofa-query: "icon_hash=\"-1830859634\"" tags: cve,cve2023,hikvision,rce diff --git a/http/cves/2024/CVE-2024-21887.yaml b/http/cves/2024/CVE-2024-21887.yaml index d0ecc2eb4e..0c542dddb3 100644 --- a/http/cves/2024/CVE-2024-21887.yaml +++ b/http/cves/2024/CVE-2024-21887.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 vendor: ivanti - product: "connect_secure" + product: connect_secure shodan-query: "html:\"welcome.cgi?p=logo\"" tags: cve,cve2024,kev,rce,ivanti diff --git a/http/cves/2024/CVE-2024-21893.yaml b/http/cves/2024/CVE-2024-21893.yaml index 5bacd3dd43..381a5e5c93 100644 --- a/http/cves/2024/CVE-2024-21893.yaml +++ b/http/cves/2024/CVE-2024-21893.yaml @@ -23,7 +23,7 @@ info: metadata: max-request: 1 vendor: ivanti - product: "connect_secure" + product: connect_secure shodan-query: "html:\"welcome.cgi?p=logo\"" tags: cve,cve2024,kev,ssrf,ivanti diff --git a/http/cves/2024/CVE-2024-22024.yaml b/http/cves/2024/CVE-2024-22024.yaml index bdfeb11f65..572a2940d4 100644 --- a/http/cves/2024/CVE-2024-22024.yaml +++ b/http/cves/2024/CVE-2024-22024.yaml @@ -16,7 +16,7 @@ info: metadata: max-request: 1 vendor: ivanti - product: "connect_secure" + product: connect_secure shodan-query: "html:\"welcome.cgi?p=logo\"" tags: cve,cve2024,xxe,ivanti