tags update

patch-1
sandeep 2022-03-19 15:15:41 +05:30
parent 145620c09c
commit dd2322c7f2
6 changed files with 12 additions and 7 deletions

View File

@ -4,7 +4,7 @@ info:
name: Deprecated SSHv1 Protocol Detection
author: iamthefrogy
severity: high
tags: network,ssh,openssh,cves,cves2001
tags: cve,cve2001,network,ssh,openssh
description: SSHv1 is deprecated and has known cryptographic issues.
remediation: Upgrade to SSH 2.4 or later.
reference:

View File

@ -1,4 +1,5 @@
id: CVE-2010-1870
info:
name: ListSERV Maestro <= 9.0-8 RCE
author: b0yd
@ -8,17 +9,19 @@ info:
reference:
- https://www.securifera.com/advisories/sec-2020-0001/
- https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt
tags: rce,listserv,ognl,cves,cve2010
tags: cve,cve2010,rce,listserv,ognl
classification:
cvss-metrics: AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss-score: 5.0
cve-id: CVE-2010-1870
cwe-id: CWE-917
requests:
- method: GET
path:
- "{{BaseURL}}/lui/"
- "{{BaseURL}}/hub/"
extractors:
- type: regex
regex:
@ -26,4 +29,5 @@ requests:
- 'LISTSERV Maestro\s+[5678]'
- 'Administration Hub 9\.0-[123456780]'
- 'Administration Hub [5678]'
# Enhanced by mp on 2022/02/15

View File

@ -6,7 +6,6 @@ info:
severity: medium
description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
tags: crlf,generic,cves,cve2016,apache
reference:
- https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
@ -15,6 +14,7 @@ info:
cvss-score: 6.1
cve-id: CVE-2016-4975
cwe-id: CWE-93
tags: cve,cve2016,crlf,generic,apache
requests:
- method: GET
@ -22,7 +22,8 @@ requests:
- "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
part: header
# Enhanced by cs on 2022/02/14

View File

@ -4,7 +4,7 @@ info:
name: OpenSSH username enumeration < v7.3
author: iamthefrogy,forgedhallpass
severity: medium
tags: network,openssh
tags: cve,cve2016,network,openssh
description: OpenSSH before 7.3 is vulnerable to username enumeration and DoS vulnerabilities.
reference:
- http://seclists.org/fulldisclosure/2016/Jul/51

View File

@ -8,12 +8,12 @@ info:
reference:
- https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82
- https://nvd.nist.gov/vuln/detail/CVE-2021-24838
tags: wordpress,wp-plugin,open-redirect
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cve-id: CVE-2021-24838
cwe-id: CWE-601
tags: cve,cve2021,wordpress,wp-plugin,open-redirect
requests:
- method: GET

View File

@ -23,7 +23,7 @@ info:
cvss-score: 9.80
cve-id: CVE-2021-42237
cwe-id: CWE-502
tags: rce,sitecore,deserialization,oast
tags: cve,cve2021,rce,sitecore,deserialization,oast
requests:
- raw: