diff --git a/file/android/deep-link-detect.yaml b/file/android/deep-link-detect.yaml index 7d9e1893ef..9836dc9e0c 100644 --- a/file/android/deep-link-detect.yaml +++ b/file/android/deep-link-detect.yaml @@ -9,7 +9,7 @@ info: - https://www.geeksforgeeks.org/deep-linking-in-android-with-example/ - https://medium.com/@muratcanbur/intro-to-deep-linking-on-android-1b9fe9e38abd metadata: - verified: "true" + verified: true tags: android,file,deeplink file: diff --git a/file/js/js-analyse.yaml b/file/js/js-analyse.yaml index 284bfbacc9..37be032685 100644 --- a/file/js/js-analyse.yaml +++ b/file/js/js-analyse.yaml @@ -7,7 +7,7 @@ info: description: | This process involves extracting tokens, endpoints, URIs, and variable names from the JS file and analyzing them for any potential weaknesses that could be exploited. By extracting and analyzing these elements, potential security threats can be identified, allowing for proactive measures to be taken to mitigate any risks associated with the application. This process can be used as part of a comprehensive bug-hunting strategy to ensure the security of an application. metadata: - verified: "true" + verified: true tags: file,js-analyse,js,javascript file: diff --git a/file/keys/adobe-secret.yaml b/file/keys/adobe-secret.yaml index 3506378732..1d16b548d8 100644 --- a/file/keys/adobe-secret.yaml +++ b/file/keys/adobe-secret.yaml @@ -10,7 +10,7 @@ info: - https://developer.adobe.com/developer-console/docs/guides/authentication/OAuthIntegration/ - https://developer.adobe.com/developer-console/docs/guides/authentication/OAuth/ metadata: - verified: "true" + verified: true tags: adobe,oauth,file,token file: diff --git a/file/keys/age/age-identity-secret-key.yaml b/file/keys/age/age-identity-secret-key.yaml index 60d5d672da..8efe8f0583 100644 --- a/file/keys/age/age-identity-secret-key.yaml +++ b/file/keys/age/age-identity-secret-key.yaml @@ -9,7 +9,7 @@ info: - https://github.com/FiloSottile/age/blob/main/doc/age.1.html - https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type metadata: - verified: "true" + verified: true tags: age-encryption,file,token file: diff --git a/file/keys/age/age-recipient-public-key.yaml b/file/keys/age/age-recipient-public-key.yaml index 1793053d57..c498efbc3f 100644 --- a/file/keys/age/age-recipient-public-key.yaml +++ b/file/keys/age/age-recipient-public-key.yaml @@ -9,7 +9,7 @@ info: - https://github.com/FiloSottile/age/blob/main/doc/age.1.html - https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type metadata: - verified: "true" + verified: true tags: age-encryption,file,token file: diff --git a/file/keys/amazon/amazon-account-id.yaml b/file/keys/amazon/amazon-account-id.yaml index 78aeda4a97..c078f9022d 100644 --- a/file/keys/amazon/amazon-account-id.yaml +++ b/file/keys/amazon/amazon-account-id.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/aws.yml metadata: - verified: "true" + verified: true tags: aws,amazon,token,file file: diff --git a/file/keys/amazon/amazon-session-token.yaml b/file/keys/amazon/amazon-session-token.yaml index 0877ad4ce0..e24dd7890f 100644 --- a/file/keys/amazon/amazon-session-token.yaml +++ b/file/keys/amazon/amazon-session-token.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/aws.yml metadata: - verified: "true" + verified: true tags: aws,amazon,token,file,session file: diff --git a/file/keys/azure/azure-connection-string.yaml b/file/keys/azure/azure-connection-string.yaml index 83e4709b2d..63e1b08ef4 100644 --- a/file/keys/azure/azure-connection-string.yaml +++ b/file/keys/azure/azure-connection-string.yaml @@ -9,7 +9,7 @@ info: - https://azure.microsoft.com/en-us/blog/windows-azure-web-sites-how-application-strings-and-connection-strings-work/ - https://docs.microsoft.com/en-us/azure/storage/common/storage-configure-connection-string metadata: - verified: "true" + verified: true tags: azure,file,token file: diff --git a/file/keys/code-climate-token.yaml b/file/keys/code-climate-token.yaml index eeeba21c8e..fc6927a21b 100644 --- a/file/keys/code-climate-token.yaml +++ b/file/keys/code-climate-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/codeclimate.yml - https://github.com/codeclimate/ruby-test-reporter/issues/34 metadata: - verified: "true" + verified: true tags: codeclimate,token,file file: diff --git a/file/keys/cratesio-api-key.yaml b/file/keys/cratesio-api-key.yaml index 69ede84c67..9c6766633b 100644 --- a/file/keys/cratesio-api-key.yaml +++ b/file/keys/cratesio-api-key.yaml @@ -9,7 +9,7 @@ info: - https://crates.io/data-access - https://github.com/rust-lang/crates.io/blob/master/src/util/token.rs metadata: - verified: "true" + verified: true tags: crates,token,file file: diff --git a/file/keys/digitalocean/digitalocean-access-token.yaml b/file/keys/digitalocean/digitalocean-access-token.yaml index cbb0fa27e6..713e1b0122 100644 --- a/file/keys/digitalocean/digitalocean-access-token.yaml +++ b/file/keys/digitalocean/digitalocean-access-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/rules/digitalocean.yml - https://docs.digitalocean.com/reference/api/ metadata: - verified: "true" + verified: true tags: digitalocean,file,token file: diff --git a/file/keys/digitalocean/digitalocean-personal-access.yaml b/file/keys/digitalocean/digitalocean-personal-access.yaml index f8f379c39d..6065498782 100644 --- a/file/keys/digitalocean/digitalocean-personal-access.yaml +++ b/file/keys/digitalocean/digitalocean-personal-access.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/rules/digitalocean.yml - https://docs.digitalocean.com/reference/api/ metadata: - verified: "true" + verified: true tags: digitalocean,file,token file: diff --git a/file/keys/digitalocean/digitalocean-refresh-token.yaml b/file/keys/digitalocean/digitalocean-refresh-token.yaml index 12f2382cdb..c2c6abaaff 100644 --- a/file/keys/digitalocean/digitalocean-refresh-token.yaml +++ b/file/keys/digitalocean/digitalocean-refresh-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/rules/digitalocean.yml - https://docs.digitalocean.com/reference/api/ metadata: - verified: "true" + verified: true tags: digitalocean,file,token file: diff --git a/file/keys/facebook/fb-access-token.yaml b/file/keys/facebook/fb-access-token.yaml index 28d949e71a..17d9e62ca7 100644 --- a/file/keys/facebook/fb-access-token.yaml +++ b/file/keys/facebook/fb-access-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/facebook.yml - https://developers.facebook.com/docs/facebook-login/access-tokens/ metadata: - verified: "true" + verified: true tags: facebook,token,file file: diff --git a/file/keys/figma-access-token.yaml b/file/keys/figma-access-token.yaml index e52d5dca20..76e345b661 100644 --- a/file/keys/figma-access-token.yaml +++ b/file/keys/figma-access-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/rules/figma.yml - https://www.figma.com/developers/api metadata: - verified: "true" + verified: true tags: figma,file,token file: diff --git a/file/keys/github/github-outdated-key.yaml b/file/keys/github/github-outdated-key.yaml index 32b41ba281..596281159b 100644 --- a/file/keys/github/github-outdated-key.yaml +++ b/file/keys/github/github-outdated-key.yaml @@ -10,7 +10,7 @@ info: - https://github.blog/2023-03-23-we-updated-our-rsa-ssh-host-key/ - https://web.archive.org/web/20230316194229/https://docs.github.com/en/enterprise-cloud@latest/authentication/keeping-your-account-and-data-secure/githubs-ssh-key-fingerprints metadata: - verified: "true" + verified: true tags: file,github,ssh,rsa file: diff --git a/file/keys/gitlab/gitlab-personal-accesstoken.yaml b/file/keys/gitlab/gitlab-personal-accesstoken.yaml index 6e9c3a36f2..00774772f5 100644 --- a/file/keys/gitlab/gitlab-personal-accesstoken.yaml +++ b/file/keys/gitlab/gitlab-personal-accesstoken.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/gitlab.yml - https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html metadata: - verified: "true" + verified: true tags: gitlab,token,file file: diff --git a/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml b/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml index 25fef56a87..19131d15fb 100644 --- a/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml +++ b/file/keys/gitlab/gitlab-pipeline-triggertoken.yaml @@ -10,7 +10,7 @@ info: - https://gitlab.com/gitlab-org/gitlab/-/issues/371396 - https://gitlab.com/gitlab-org/gitlab/-/issues/388379 metadata: - verified: "true" + verified: true tags: gitlab,token,file file: diff --git a/file/keys/gitlab/gitlab-runner-regtoken.yaml b/file/keys/gitlab/gitlab-runner-regtoken.yaml index dd1e4e3a6b..c811c2c530 100644 --- a/file/keys/gitlab/gitlab-runner-regtoken.yaml +++ b/file/keys/gitlab/gitlab-runner-regtoken.yaml @@ -10,7 +10,7 @@ info: - https://docs.gitlab.com/ee/security/token_overview.html#runner-registration-tokens-deprecated - https://docs.gitlab.com/ee/security/token_overview.html#security-considerations metadata: - verified: "true" + verified: true tags: gitlab,runner,token,file file: diff --git a/file/keys/google/google-clientid.yaml b/file/keys/google/google-clientid.yaml index 59191e5966..695e9af067 100644 --- a/file/keys/google/google-clientid.yaml +++ b/file/keys/google/google-clientid.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml metadata: - verified: "true" + verified: true tags: google,token,file file: diff --git a/file/keys/google/google-oauth-clientsecret.yaml b/file/keys/google/google-oauth-clientsecret.yaml index b3f47303f3..97060e0cc4 100644 --- a/file/keys/google/google-oauth-clientsecret.yaml +++ b/file/keys/google/google-oauth-clientsecret.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml metadata: - verified: "true" + verified: true tags: google,token,file file: diff --git a/file/keys/heroku-key.yaml b/file/keys/heroku-key.yaml index 9b02b5322e..40116fa08f 100644 --- a/file/keys/heroku-key.yaml +++ b/file/keys/heroku-key.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/heroku.yml - https://devcenter.heroku.com/articles/authentication metadata: - verified: "true" + verified: true tags: heroku,token,file file: diff --git a/file/keys/jenkins-token.yaml b/file/keys/jenkins-token.yaml index 02c9e5a0ba..53ce0dcc29 100644 --- a/file/keys/jenkins-token.yaml +++ b/file/keys/jenkins-token.yaml @@ -9,7 +9,7 @@ info: - https://www.jenkins.io/blog/2018/07/02/new-api-token-system/ - https://www.jenkins.io/doc/book/security/csrf-protection/ metadata: - verified: "true" + verified: true tags: jenkins,crumb,token,file file: diff --git a/file/keys/mapbox-token.yaml b/file/keys/mapbox-token.yaml index 265faf5fe8..633d69f111 100644 --- a/file/keys/mapbox-token.yaml +++ b/file/keys/mapbox-token.yaml @@ -8,7 +8,7 @@ info: - https://docs.gitguardian.com/secrets-detection/detectors/specifics/mapbox_token - https://github.com/zricethezav/gitleaks/blob/master/cmd/generate/config/rules/mapbox.go metadata: - verified: "true" + verified: true tags: token,file,mapbox file: diff --git a/file/keys/newrelic/newrelic-pixie-apikey.yaml b/file/keys/newrelic/newrelic-pixie-apikey.yaml index 572c0559a6..34de703a9b 100644 --- a/file/keys/newrelic/newrelic-pixie-apikey.yaml +++ b/file/keys/newrelic/newrelic-pixie-apikey.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/newrelic.yml - https://docs.px.dev/reference/admin/api-keys/ metadata: - verified: "true" + verified: true tags: newrelic,pixie,token,file file: diff --git a/file/keys/newrelic/newrelic-pixie-deploykey.yaml b/file/keys/newrelic/newrelic-pixie-deploykey.yaml index b120358a6f..07739f6da5 100644 --- a/file/keys/newrelic/newrelic-pixie-deploykey.yaml +++ b/file/keys/newrelic/newrelic-pixie-deploykey.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/newrelic.yml - https://docs.px.dev/reference/admin/api-keys/ metadata: - verified: "true" + verified: true tags: newrelic,pixie,token,file file: diff --git a/file/keys/npm-accesstoken.yaml b/file/keys/npm-accesstoken.yaml index 10225ddc9e..5aa0837544 100644 --- a/file/keys/npm-accesstoken.yaml +++ b/file/keys/npm-accesstoken.yaml @@ -10,7 +10,7 @@ info: - https://github.com/github/roadmap/issues/557 - https://github.blog/changelog/2022-12-06-limit-scope-of-npm-tokens-with-the-new-granular-access-tokens/ metadata: - verified: "true" + verified: true tags: npm,token,file file: diff --git a/file/keys/nuget-key.yaml b/file/keys/nuget-key.yaml index 745b448c26..967058a894 100644 --- a/file/keys/nuget-key.yaml +++ b/file/keys/nuget-key.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/nuget.yml - https://docs.microsoft.com/en-us/nuget/nuget-org/publish-a-package#create-api-keys metadata: - verified: "true" + verified: true tags: nuget,token,file file: diff --git a/file/keys/openai-key.yaml b/file/keys/openai-key.yaml index 5afc27547f..d17cb539db 100644 --- a/file/keys/openai-key.yaml +++ b/file/keys/openai-key.yaml @@ -9,7 +9,7 @@ info: - https://platform.openai.com/docs/api-reference - https://platform.openai.com/docs/api-reference/authentication metadata: - verified: "true" + verified: true tags: openai,token,file file: diff --git a/file/keys/postman-api-key.yaml b/file/keys/postman-api-key.yaml index c0eb672fc2..16949c29ad 100644 --- a/file/keys/postman-api-key.yaml +++ b/file/keys/postman-api-key.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/rules/postman.yml - https://learning.postman.com/docs/developer/intro-api/ metadata: - verified: "true" + verified: true tags: postman,keys,file,token file: diff --git a/file/keys/pypi-token.yaml b/file/keys/pypi-token.yaml index c2bbfac193..c52a0343ae 100644 --- a/file/keys/pypi-token.yaml +++ b/file/keys/pypi-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/pypa/warehouse/issues/6051 - https://pypi.org/project/pypitoken/ metadata: - verified: "true" + verified: true tags: pypi,token,file file: diff --git a/file/keys/rubygems-key.yaml b/file/keys/rubygems-key.yaml index 94257eb449..2f32147063 100644 --- a/file/keys/rubygems-key.yaml +++ b/file/keys/rubygems-key.yaml @@ -9,7 +9,7 @@ info: - https://guides.rubygems.org/rubygems-org-api/ - https://guides.rubygems.org/api-key-scopes/ metadata: - verified: "true" + verified: true tags: rubygems,token,file,ruby file: diff --git a/file/keys/sauce-access-token.yaml b/file/keys/sauce-access-token.yaml index 638b1f2c3f..5d528c72cd 100644 --- a/file/keys/sauce-access-token.yaml +++ b/file/keys/sauce-access-token.yaml @@ -7,7 +7,7 @@ info: reference: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/sauce.yml metadata: - verified: "true" + verified: true tags: sauce,token,file file: diff --git a/file/keys/segment-public-api.yaml b/file/keys/segment-public-api.yaml index 528338391b..4d4ae189f7 100644 --- a/file/keys/segment-public-api.yaml +++ b/file/keys/segment-public-api.yaml @@ -9,7 +9,7 @@ info: - https://segment.com/docs/api/public-api/ - https://segment.com/blog/how-segment-proactively-protects-customer-api-tokens/ metadata: - verified: "true" + verified: true tags: segment,token,file file: diff --git a/file/keys/shopify-public-access.yaml b/file/keys/shopify-public-access.yaml index 933047507b..fef350f2d1 100644 --- a/file/keys/shopify-public-access.yaml +++ b/file/keys/shopify-public-access.yaml @@ -9,7 +9,7 @@ info: - https://shopify.dev/apps/auth - https://shopify.dev/changelog/app-secret-key-length-has-increased metadata: - verified: "true" + verified: true tags: shopify,token,file file: diff --git a/file/keys/stackhawk-api-key.yaml b/file/keys/stackhawk-api-key.yaml index 2f22b4eb63..fd8c124055 100644 --- a/file/keys/stackhawk-api-key.yaml +++ b/file/keys/stackhawk-api-key.yaml @@ -7,7 +7,7 @@ info: reference: - https://docs.stackhawk.com/apidocs.html metadata: - verified: "true" + verified: true tags: token,file file: diff --git a/file/keys/telegram-token.yaml b/file/keys/telegram-token.yaml index c39618130e..91a3b6d135 100644 --- a/file/keys/telegram-token.yaml +++ b/file/keys/telegram-token.yaml @@ -9,7 +9,7 @@ info: - https://core.telegram.org/bots/api - https://core.telegram.org/bots/features#botfather metadata: - verified: "true" + verified: true tags: telegram,token,file file: diff --git a/http/cnvd/2023/CNVD-2023-12632.yaml b/http/cnvd/2023/CNVD-2023-12632.yaml index cb7d4f7a88..d853063508 100644 --- a/http/cnvd/2023/CNVD-2023-12632.yaml +++ b/http/cnvd/2023/CNVD-2023-12632.yaml @@ -11,7 +11,7 @@ info: - https://blog.csdn.net/qq_50854662/article/details/129992329 metadata: max-request: 1 - verified: "true" + verified: true fofa-query: app="泛微-协同商务系统" shodan-query: 'ecology_JSessionid' tags: cnvd,cnvd2023,ecology,sqli diff --git a/http/cves/2008/CVE-2008-6982.yaml b/http/cves/2008/CVE-2008-6982.yaml index 5a30c961a4..2010a10f9b 100644 --- a/http/cves/2008/CVE-2008-6982.yaml +++ b/http/cves/2008/CVE-2008-6982.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2008,devalcms,xss,cms,edb http: diff --git a/http/cves/2009/CVE-2009-1872.yaml b/http/cves/2009/CVE-2009-1872.yaml index cfc4e10f82..b9b0fe674e 100644 --- a/http/cves/2009/CVE-2009-1872.yaml +++ b/http/cves/2009/CVE-2009-1872.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Adobe ColdFusion" - verified: "true" + verified: true tags: cve,cve2009,adobe,xss,coldfusion,tenable http: diff --git a/http/cves/2010/CVE-2010-1429.yaml b/http/cves/2010/CVE-2010-1429.yaml index 9cec5aec51..ffd45a5ff0 100644 --- a/http/cves/2010/CVE-2010-1429.yaml +++ b/http/cves/2010/CVE-2010-1429.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: title:"JBoss" - verified: "true" + verified: true tags: cve,cve2010,jboss,eap,tomcat,exposure http: diff --git a/http/cves/2012/CVE-2012-0394.yaml b/http/cves/2012/CVE-2012-0394.yaml index b3fefceaa5..35e0d96980 100644 --- a/http/cves/2012/CVE-2012-0394.yaml +++ b/http/cves/2012/CVE-2012-0394.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: html:"Struts Problem Report" - verified: "true" + verified: true tags: ognl,injection,edb,cve,cve2012,apache,struts variables: diff --git a/http/cves/2013/CVE-2013-6281.yaml b/http/cves/2013/CVE-2013-6281.yaml index 9b250470dc..a680b38686 100644 --- a/http/cves/2013/CVE-2013-6281.yaml +++ b/http/cves/2013/CVE-2013-6281.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 google-query: inurl:/wp-content/plugins/dhtmlxspreadsheet - verified: "true" + verified: true tags: wp,wpscan,cve,cve2013,wordpress,xss,wp-plugin http: diff --git a/http/cves/2014/CVE-2014-2383.yaml b/http/cves/2014/CVE-2014-2383.yaml index 4bef415602..77d8d99bd0 100644 --- a/http/cves/2014/CVE-2014-2383.yaml +++ b/http/cves/2014/CVE-2014-2383.yaml @@ -19,7 +19,7 @@ info: cve-id: CVE-2014-2383 metadata: max-request: 11 - verified: "true" + verified: true tags: cve,lfi,wp-plugin,wpscan,cve2014,dompdf,wordpress,wp,edb,seclists http: diff --git a/http/cves/2014/CVE-2014-6287.yaml b/http/cves/2014/CVE-2014-6287.yaml index 5b4ca16f58..b3fc584488 100644 --- a/http/cves/2014/CVE-2014-6287.yaml +++ b/http/cves/2014/CVE-2014-6287.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:2124459909 - verified: "true" + verified: true tags: packetstorm,msf,cve,cve2014,hfs,rce,kev variables: diff --git a/http/cves/2015/CVE-2015-2068.yaml b/http/cves/2015/CVE-2015-2068.yaml index a351b7f346..fbfb85b04a 100644 --- a/http/cves/2015/CVE-2015-2068.yaml +++ b/http/cves/2015/CVE-2015-2068.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Magento" - verified: "true" + verified: true tags: plugin,edb,packetstorm,cve,cve2015,magento,magmi,xss http: diff --git a/http/cves/2015/CVE-2015-2196.yaml b/http/cves/2015/CVE-2015-2196.yaml index cbfcd7dfc7..97179e8e4a 100644 --- a/http/cves/2015/CVE-2015-2196.yaml +++ b/http/cves/2015/CVE-2015-2196.yaml @@ -19,7 +19,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: wordpress,wp,sqli,cve2015,wpscan,wp-plugin,spider-event-calendar,unauth,edb,cve http: diff --git a/http/cves/2015/CVE-2015-2755.yaml b/http/cves/2015/CVE-2015-2755.yaml index 243dd1ef18..a2a65acab1 100644 --- a/http/cves/2015/CVE-2015-2755.yaml +++ b/http/cves/2015/CVE-2015-2755.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2015,xss,wordpress,wp-plugin,wp,ab-map,packetstorm,cve http: diff --git a/http/cves/2015/CVE-2015-3035.yaml b/http/cves/2015/CVE-2015-3035.yaml index 51fa889f8c..1703df4634 100644 --- a/http/cves/2015/CVE-2015-3035.yaml +++ b/http/cves/2015/CVE-2015-3035.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"TP-LINK" - verified: "true" + verified: true tags: router,lfi,seclists,cve,cve2015,tplink,kev http: diff --git a/http/cves/2015/CVE-2015-4062.yaml b/http/cves/2015/CVE-2015-4062.yaml index 8676a3c47f..6ac4995fbf 100644 --- a/http/cves/2015/CVE-2015-4062.yaml +++ b/http/cves/2015/CVE-2015-4062.yaml @@ -20,7 +20,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: authenticated,cve,sqli,wp-plugin,newstatpress,packetstorm,cve2015,wordpress,wp http: diff --git a/http/cves/2015/CVE-2015-4063.yaml b/http/cves/2015/CVE-2015-4063.yaml index aed43c751c..5cd1a3595c 100644 --- a/http/cves/2015/CVE-2015-4063.yaml +++ b/http/cves/2015/CVE-2015-4063.yaml @@ -19,7 +19,7 @@ info: cwe-id: CWE-80 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2015,xss,wordpress,wp-plugin,wp,newstatpress,packetstorm http: diff --git a/http/cves/2015/CVE-2015-9312.yaml b/http/cves/2015/CVE-2015-9312.yaml index 6be9afbe05..cb2b65651e 100644 --- a/http/cves/2015/CVE-2015-9312.yaml +++ b/http/cves/2015/CVE-2015-9312.yaml @@ -19,7 +19,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2015,xss,authenticated,wp,newstatpress,wpscan,cve,wordpress,wp-plugin http: diff --git a/http/cves/2016/CVE-2016-10367.yaml b/http/cves/2016/CVE-2016-10367.yaml index 1939c2863c..3dd204fa23 100644 --- a/http/cves/2016/CVE-2016-10367.yaml +++ b/http/cves/2016/CVE-2016-10367.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"Opsview" - verified: "true" + verified: true tags: cve,cve2016,opsview,lfi http: diff --git a/http/cves/2017/CVE-2017-10075.yaml b/http/cves/2017/CVE-2017-10075.yaml index a04f4b8d30..9fe9e66a87 100644 --- a/http/cves/2017/CVE-2017-10075.yaml +++ b/http/cves/2017/CVE-2017-10075.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 2 google-query: inurl:"/cs/idcplg" - verified: "true" + verified: true tags: cve,cve2017,xss,oracle http: diff --git a/http/cves/2017/CVE-2017-11165.yaml b/http/cves/2017/CVE-2017-11165.yaml index 536c95e550..1ddf591f86 100644 --- a/http/cves/2017/CVE-2017-11165.yaml +++ b/http/cves/2017/CVE-2017-11165.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"datataker" - verified: "true" + verified: true tags: lfr,edb,cve,cve2017,datataker,config,packetstorm,exposure http: diff --git a/http/cves/2017/CVE-2017-11512.yaml b/http/cves/2017/CVE-2017-11512.yaml index e493e72da6..b4b1086ea8 100644 --- a/http/cves/2017/CVE-2017-11512.yaml +++ b/http/cves/2017/CVE-2017-11512.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: http.title:"ManageEngine" - verified: "true" + verified: true tags: cve,cve2017,manageengine,lfr,unauth,tenable http: diff --git a/http/cves/2017/CVE-2017-11586.yaml b/http/cves/2017/CVE-2017-11586.yaml index 574709df15..d2bdff4245 100644 --- a/http/cves/2017/CVE-2017-11586.yaml +++ b/http/cves/2017/CVE-2017-11586.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-601 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2017,redirect,finecms http: diff --git a/http/cves/2017/CVE-2017-11629.yaml b/http/cves/2017/CVE-2017-11629.yaml index 317bae0e2d..1e9b9a6e9a 100644 --- a/http/cves/2017/CVE-2017-11629.yaml +++ b/http/cves/2017/CVE-2017-11629.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2017,xss,finecms http: diff --git a/http/cves/2017/CVE-2017-14186.yaml b/http/cves/2017/CVE-2017-14186.yaml index 586f724f9d..293ddf21e4 100644 --- a/http/cves/2017/CVE-2017-14186.yaml +++ b/http/cves/2017/CVE-2017-14186.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: port:10443 http.favicon.hash:945408572 - verified: "true" + verified: true tags: cve,cve2017,fortigate,xss,fortinet http: - method: GET diff --git a/http/cves/2017/CVE-2017-14622.yaml b/http/cves/2017/CVE-2017-14622.yaml index 6f91a90233..3782c781d6 100644 --- a/http/cves/2017/CVE-2017-14622.yaml +++ b/http/cves/2017/CVE-2017-14622.yaml @@ -19,7 +19,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: xss,wordpress,wp-plugin,wp,2kb-amazon-affiliates-store,authenticated,packetstorm http: diff --git a/http/cves/2017/CVE-2017-16894.yaml b/http/cves/2017/CVE-2017-16894.yaml index 5035fca49a..03e3baec72 100644 --- a/http/cves/2017/CVE-2017-16894.yaml +++ b/http/cves/2017/CVE-2017-16894.yaml @@ -21,7 +21,7 @@ info: max-request: 1 fofa-query: app="Laravel-Framework" shodan-query: Laravel-Framework - verified: "true" + verified: true tags: cve2017,laravel,exposure,packetstorm,cve http: diff --git a/http/cves/2017/CVE-2017-17736.yaml b/http/cves/2017/CVE-2017-17736.yaml index 34a697bb0e..ba7052be23 100644 --- a/http/cves/2017/CVE-2017-17736.yaml +++ b/http/cves/2017/CVE-2017-17736.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 google-query: intitle:"kentico database setup" - verified: "true" + verified: true tags: cve,cve2017,kentico,cms,install,unauth,edb http: diff --git a/http/cves/2017/CVE-2017-5487.yaml b/http/cves/2017/CVE-2017-5487.yaml index 55e0f7dae4..0a3b332aad 100644 --- a/http/cves/2017/CVE-2017-5487.yaml +++ b/http/cves/2017/CVE-2017-5487.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 2 shodan-query: http.component:"WordPress" - verified: "true" + verified: true tags: cve,cve2017,wordpress,wp,edb http: diff --git a/http/cves/2017/CVE-2017-5638.yaml b/http/cves/2017/CVE-2017-5638.yaml index 3b2aca2347..dc201eb144 100644 --- a/http/cves/2017/CVE-2017-5638.yaml +++ b/http/cves/2017/CVE-2017-5638.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: html:"Apache Struts" - verified: "true" + verified: true tags: cve,cve2017,apache,kev,msf,struts,rce http: diff --git a/http/cves/2017/CVE-2017-5689.yaml b/http/cves/2017/CVE-2017-5689.yaml index 55a9a8bf6a..739b9c922f 100644 --- a/http/cves/2017/CVE-2017-5689.yaml +++ b/http/cves/2017/CVE-2017-5689.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 2 shodan-query: title:"Active Management Technology" - verified: "true" + verified: true tags: cve,cve2017,amt,intel,tenable,kev http: diff --git a/http/cves/2017/CVE-2017-8917.yaml b/http/cves/2017/CVE-2017-8917.yaml index 3b6477d5dc..f9356b324d 100644 --- a/http/cves/2017/CVE-2017-8917.yaml +++ b/http/cves/2017/CVE-2017-8917.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Joomla" - verified: "true" + verified: true tags: cve,cve2017,joomla,sqli variables: diff --git a/http/cves/2017/CVE-2017-9416.yaml b/http/cves/2017/CVE-2017-9416.yaml index cda911cd90..b161d35b87 100644 --- a/http/cves/2017/CVE-2017-9416.yaml +++ b/http/cves/2017/CVE-2017-9416.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-22 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2017,odoo,lfi http: diff --git a/http/cves/2017/CVE-2017-9791.yaml b/http/cves/2017/CVE-2017-9791.yaml index 4e20d1de71..229030e990 100644 --- a/http/cves/2017/CVE-2017-9791.yaml +++ b/http/cves/2017/CVE-2017-9791.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.9753 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Struts2 Showcase" fofa-query: title="Struts2 Showcase" tags: cve,cve2017,apache,rce,struts,kev diff --git a/http/cves/2018/CVE-2018-1000671.yaml b/http/cves/2018/CVE-2018-1000671.yaml index f77786fada..f47b246cae 100644 --- a/http/cves/2018/CVE-2018-1000671.yaml +++ b/http/cves/2018/CVE-2018-1000671.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"sympa" - verified: "true" + verified: true tags: cve,cve2018,redirect,sympa,debian http: diff --git a/http/cves/2018/CVE-2018-1000856.yaml b/http/cves/2018/CVE-2018-1000856.yaml index 8edcca991d..3ef3fee5a2 100644 --- a/http/cves/2018/CVE-2018-1000856.yaml +++ b/http/cves/2018/CVE-2018-1000856.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2018,domainmod,xss,authenticated http: diff --git a/http/cves/2018/CVE-2018-11227.yaml b/http/cves/2018/CVE-2018-11227.yaml index b6b338a44d..adeefb5650 100644 --- a/http/cves/2018/CVE-2018-11227.yaml +++ b/http/cves/2018/CVE-2018-11227.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:419828698 - verified: "true" + verified: true tags: cve,cve2018,xss,mostra,mostracms,cms,edb http: diff --git a/http/cves/2018/CVE-2018-11473.yaml b/http/cves/2018/CVE-2018-11473.yaml index 3a4bc70a64..b41176d8f4 100644 --- a/http/cves/2018/CVE-2018-11473.yaml +++ b/http/cves/2018/CVE-2018-11473.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 2 shodan-query: http.favicon.hash:419828698 - verified: "true" + verified: true tags: cve,cve2018,xss,mostra,mostracms,cms http: diff --git a/http/cves/2018/CVE-2018-12675.yaml b/http/cves/2018/CVE-2018-12675.yaml index 643389db5d..21456e18ad 100644 --- a/http/cves/2018/CVE-2018-12675.yaml +++ b/http/cves/2018/CVE-2018-12675.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-601 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2018,redirect,sv3c,camera,iot http: diff --git a/http/cves/2018/CVE-2018-14918.yaml b/http/cves/2018/CVE-2018-14918.yaml index 65e68e56ba..dd969d1069 100644 --- a/http/cves/2018/CVE-2018-14918.yaml +++ b/http/cves/2018/CVE-2018-14918.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"LGATE-902" - verified: "true" + verified: true tags: loytec,lfi,seclists,packetstorm,cve,cve2018,lgate http: diff --git a/http/cves/2018/CVE-2018-16139.yaml b/http/cves/2018/CVE-2018-16139.yaml index 4bff987656..2d3d270e8d 100644 --- a/http/cves/2018/CVE-2018-16139.yaml +++ b/http/cves/2018/CVE-2018-16139.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"Bibliopac" - verified: "true" + verified: true tags: cve,cve2018,xss,bibliopac,bibliosoft http: diff --git a/http/cves/2018/CVE-2018-16159.yaml b/http/cves/2018/CVE-2018-16159.yaml index 781973135c..89ab9f7d60 100644 --- a/http/cves/2018/CVE-2018-16159.yaml +++ b/http/cves/2018/CVE-2018-16159.yaml @@ -19,7 +19,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: sqli,wordpress,unauth,wp,gift-voucher,cve2018,edb,wpscan,cve,wp-plugin http: diff --git a/http/cves/2018/CVE-2018-16979.yaml b/http/cves/2018/CVE-2018-16979.yaml index 10aa757bdf..84a59a0192 100644 --- a/http/cves/2018/CVE-2018-16979.yaml +++ b/http/cves/2018/CVE-2018-16979.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-113 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2018,crlf,mostra,mostracms,cms http: diff --git a/http/cves/2018/CVE-2018-18608.yaml b/http/cves/2018/CVE-2018-18608.yaml index 575c8176c0..5924c006a9 100644 --- a/http/cves/2018/CVE-2018-18608.yaml +++ b/http/cves/2018/CVE-2018-18608.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"DedeCms" - verified: "true" + verified: true tags: dedecms,xss,cve,cve2018 http: diff --git a/http/cves/2018/CVE-2018-19136.yaml b/http/cves/2018/CVE-2018-19136.yaml index 3b138c75f0..99f4cd5a9b 100644 --- a/http/cves/2018/CVE-2018-19136.yaml +++ b/http/cves/2018/CVE-2018-19136.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: edb,cve,cve2018,domainmod,xss,authenticated http: diff --git a/http/cves/2018/CVE-2018-19137.yaml b/http/cves/2018/CVE-2018-19137.yaml index b669878bf5..75b7fd4247 100644 --- a/http/cves/2018/CVE-2018-19137.yaml +++ b/http/cves/2018/CVE-2018-19137.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2018,domainmod,xss,authenticated http: diff --git a/http/cves/2018/CVE-2018-19287.yaml b/http/cves/2018/CVE-2018-19287.yaml index 61024d93a4..119c37063e 100644 --- a/http/cves/2018/CVE-2018-19287.yaml +++ b/http/cves/2018/CVE-2018-19287.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: wp-plugin,wp,xss,authenticated,wpscan,edb,cve,cve2018,ninja-forms,wordpress http: diff --git a/http/cves/2018/CVE-2018-19749.yaml b/http/cves/2018/CVE-2018-19749.yaml index 267f423c8b..98ff191189 100644 --- a/http/cves/2018/CVE-2018-19749.yaml +++ b/http/cves/2018/CVE-2018-19749.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2018,domainmod,xss,authenticated,edb http: diff --git a/http/cves/2018/CVE-2018-19751.yaml b/http/cves/2018/CVE-2018-19751.yaml index 5f0260bcf3..bc9065b67e 100644 --- a/http/cves/2018/CVE-2018-19751.yaml +++ b/http/cves/2018/CVE-2018-19751.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2018,domainmod,xss,authenticated,edb http: diff --git a/http/cves/2018/CVE-2018-19752.yaml b/http/cves/2018/CVE-2018-19752.yaml index 5b4382f656..3fd8455784 100644 --- a/http/cves/2018/CVE-2018-19752.yaml +++ b/http/cves/2018/CVE-2018-19752.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2018,domainmod,xss,authenticated,edb http: diff --git a/http/cves/2018/CVE-2018-19877.yaml b/http/cves/2018/CVE-2018-19877.yaml index 120bf54deb..d8fbcf9c2d 100644 --- a/http/cves/2018/CVE-2018-19877.yaml +++ b/http/cves/2018/CVE-2018-19877.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true tags: adiscon,xss,edb,cve,cve2018 http: diff --git a/http/cves/2018/CVE-2018-19892.yaml b/http/cves/2018/CVE-2018-19892.yaml index 20229a6ceb..1c26436c97 100644 --- a/http/cves/2018/CVE-2018-19892.yaml +++ b/http/cves/2018/CVE-2018-19892.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve2018,domainmod,xss,authenticated,edb,cve http: diff --git a/http/cves/2018/CVE-2018-19914.yaml b/http/cves/2018/CVE-2018-19914.yaml index 7cf9520a4b..2a19d1b12b 100644 --- a/http/cves/2018/CVE-2018-19914.yaml +++ b/http/cves/2018/CVE-2018-19914.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve2018,domainmod,xss,authenticated,edb,cve http: diff --git a/http/cves/2018/CVE-2018-20463.yaml b/http/cves/2018/CVE-2018-20463.yaml index 4a5c7e1f00..15f5bd34d6 100644 --- a/http/cves/2018/CVE-2018-20463.yaml +++ b/http/cves/2018/CVE-2018-20463.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - verified: "true" + verified: true tags: wp,wp-plugin,wordpress,jsmol2wp,wpscan,cve,cve2018,traversal http: diff --git a/http/cves/2018/CVE-2018-20526.yaml b/http/cves/2018/CVE-2018-20526.yaml index 0e6170b740..74f3f80398 100644 --- a/http/cves/2018/CVE-2018-20526.yaml +++ b/http/cves/2018/CVE-2018-20526.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 2 google-query: intitle:"Roxy file manager" - verified: "true" + verified: true tags: cve,cve2018,roxy,fileman,rce,fileupload,intrusive,packetstorm,edb http: diff --git a/http/cves/2019/CVE-2019-10692.yaml b/http/cves/2019/CVE-2019-10692.yaml index 99d97ad43b..0e3976e66e 100644 --- a/http/cves/2019/CVE-2019-10692.yaml +++ b/http/cves/2019/CVE-2019-10692.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.97416 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2019,wp,wp-plugin,unauth,sqli,wordpress,googlemaps,wpscan http: - method: GET diff --git a/http/cves/2019/CVE-2019-10717.yaml b/http/cves/2019/CVE-2019-10717.yaml index 404d179184..d3e299c74d 100644 --- a/http/cves/2019/CVE-2019-10717.yaml +++ b/http/cves/2019/CVE-2019-10717.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Blogengine.net" - verified: "true" + verified: true tags: cve,cve2019,blogengine,lfi,traversal http: diff --git a/http/cves/2019/CVE-2019-11370.yaml b/http/cves/2019/CVE-2019-11370.yaml index 9be34c8f67..c60735c7be 100644 --- a/http/cves/2019/CVE-2019-11370.yaml +++ b/http/cves/2019/CVE-2019-11370.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"pCOWeb" - verified: "true" + verified: true tags: pcoweb,xss,carel,edb,cve,cve2019 http: diff --git a/http/cves/2019/CVE-2019-12962.yaml b/http/cves/2019/CVE-2019-12962.yaml index 9bbaf9889e..e4a95f3b5d 100644 --- a/http/cves/2019/CVE-2019-12962.yaml +++ b/http/cves/2019/CVE-2019-12962.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:LiveZilla - verified: "true" + verified: true tags: xss,edb,packetstorm,cve,cve2019,livezilla diff --git a/http/cves/2019/CVE-2019-14530.yaml b/http/cves/2019/CVE-2019-14530.yaml index f754762a14..de80551adf 100644 --- a/http/cves/2019/CVE-2019-14530.yaml +++ b/http/cves/2019/CVE-2019-14530.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.94591 metadata: max-request: 2 - verified: "true" + verified: true tags: lfi,authenticated,edb,cve,cve2019,openemr http: diff --git a/http/cves/2019/CVE-2019-15043.yaml b/http/cves/2019/CVE-2019-15043.yaml index 5c6553f16d..222e1ffe8d 100644 --- a/http/cves/2019/CVE-2019-15043.yaml +++ b/http/cves/2019/CVE-2019-15043.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 shodan-query: title:"Grafana" - verified: "true" + verified: true tags: cve,cve2019,grafana,dos,intrusive variables: diff --git a/http/cves/2019/CVE-2019-15501.yaml b/http/cves/2019/CVE-2019-15501.yaml index 743147b9af..050ca7ffd0 100644 --- a/http/cves/2019/CVE-2019-15501.yaml +++ b/http/cves/2019/CVE-2019-15501.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"LISTSERV" - verified: "true" + verified: true tags: cve,cve2019,xss,listserv,edb http: diff --git a/http/cves/2019/CVE-2019-15811.yaml b/http/cves/2019/CVE-2019-15811.yaml index 1af4654daf..aca348417c 100644 --- a/http/cves/2019/CVE-2019-15811.yaml +++ b/http/cves/2019/CVE-2019-15811.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2019,domainmod,xss,authenticated,edb http: diff --git a/http/cves/2019/CVE-2019-16759.yaml b/http/cves/2019/CVE-2019-16759.yaml index 329277e986..b87b9641bf 100644 --- a/http/cves/2019/CVE-2019-16759.yaml +++ b/http/cves/2019/CVE-2019-16759.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"vBulletin" - verified: "true" + verified: true tags: cve,cve2019,rce,kev,seclists,vbulletin http: diff --git a/http/cves/2019/CVE-2019-16931.yaml b/http/cves/2019/CVE-2019-16931.yaml index 6cb2e90d3d..db8fb0200a 100644 --- a/http/cves/2019/CVE-2019-16931.yaml +++ b/http/cves/2019/CVE-2019-16931.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00244 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2019,wp-plugin,wordpress,wp,xss,unauth,wpscan http: diff --git a/http/cves/2019/CVE-2019-20933.yaml b/http/cves/2019/CVE-2019-20933.yaml index df381b1678..1127146f90 100644 --- a/http/cves/2019/CVE-2019-20933.yaml +++ b/http/cves/2019/CVE-2019-20933.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: InfluxDB - verified: "true" + verified: true tags: unauth,db,influxdb,misconfig http: - method: GET diff --git a/http/cves/2019/CVE-2019-5434.yaml b/http/cves/2019/CVE-2019-5434.yaml index c2fd18cd66..e9dc7eda99 100644 --- a/http/cves/2019/CVE-2019-5434.yaml +++ b/http/cves/2019/CVE-2019-5434.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: http.favicon.hash:106844876 - verified: "true" + verified: true tags: edb,packetstorm,cve,cve2019,revive,adserver,rce http: diff --git a/http/cves/2019/CVE-2019-6799.yaml b/http/cves/2019/CVE-2019-6799.yaml index 30022226ae..ee90472cf7 100644 --- a/http/cves/2019/CVE-2019-6799.yaml +++ b/http/cves/2019/CVE-2019-6799.yaml @@ -22,7 +22,7 @@ info: fofa-query: body="pma_servername" && body="4.8.4" hunter-query: app.name="phpMyAdmin"&&web.body="pma_servername"&&web.body="4.8.4" shodan-query: title:"phpmyadmin" - verified: "true" + verified: true tags: cve,cve2019,phpmyadmin,mysql,lfr http: diff --git a/http/cves/2019/CVE-2019-6802.yaml b/http/cves/2019/CVE-2019-6802.yaml index e8297e7b9b..1b20d4bbdf 100644 --- a/http/cves/2019/CVE-2019-6802.yaml +++ b/http/cves/2019/CVE-2019-6802.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: html:"pypiserver" - verified: "true" + verified: true tags: cve,cve2019,crlf,generic,pypiserver http: diff --git a/http/cves/2019/CVE-2019-7255.yaml b/http/cves/2019/CVE-2019-7255.yaml index 1570a049c8..8af197390c 100644 --- a/http/cves/2019/CVE-2019-7255.yaml +++ b/http/cves/2019/CVE-2019-7255.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"eMerge" - verified: "true" + verified: true tags: emerge,xss,packetstorm,cve,cve2019,nortek http: diff --git a/http/cves/2019/CVE-2019-7256.yaml b/http/cves/2019/CVE-2019-7256.yaml index 30f3ff3ffd..01d7194af5 100644 --- a/http/cves/2019/CVE-2019-7256.yaml +++ b/http/cves/2019/CVE-2019-7256.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.97447 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"eMerge" tags: cve,cve2019,emerge,rce,edb diff --git a/http/cves/2019/CVE-2019-8937.yaml b/http/cves/2019/CVE-2019-8937.yaml index de433d2883..ff42b26e2d 100644 --- a/http/cves/2019/CVE-2019-8937.yaml +++ b/http/cves/2019/CVE-2019-8937.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true tags: packetstorm,cve,cve2019,xss,hoteldruid,edb http: diff --git a/http/cves/2019/CVE-2019-9915.yaml b/http/cves/2019/CVE-2019-9915.yaml index d592a83900..68c3d78ba7 100644 --- a/http/cves/2019/CVE-2019-9915.yaml +++ b/http/cves/2019/CVE-2019-9915.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-601 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2019,redirect,getsimple,cms http: diff --git a/http/cves/2020/CVE-2020-10973.yaml b/http/cves/2020/CVE-2020-10973.yaml index 51b2667398..db27960fe5 100644 --- a/http/cves/2020/CVE-2020-10973.yaml +++ b/http/cves/2020/CVE-2020-10973.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve,cve2020,exposure,wavlink http: diff --git a/http/cves/2020/CVE-2020-11530.yaml b/http/cves/2020/CVE-2020-11530.yaml index 33cd21c447..6203f39a18 100644 --- a/http/cves/2020/CVE-2020-11530.yaml +++ b/http/cves/2020/CVE-2020-11530.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.65475 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2020,sqli,wpscan,wordpress,wp-plugin,wp,chopslider,unauth http: diff --git a/http/cves/2020/CVE-2020-11978.yaml b/http/cves/2020/CVE-2020-11978.yaml index 7f21536d0f..3731c247d6 100644 --- a/http/cves/2020/CVE-2020-11978.yaml +++ b/http/cves/2020/CVE-2020-11978.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 4 shodan-query: http.html:"Apache Airflow" || title:"Airflow - DAGs" - verified: "true" + verified: true tags: cve,cve2020,apache,airflow,rce,kev http: diff --git a/http/cves/2020/CVE-2020-12127.yaml b/http/cves/2020/CVE-2020-12127.yaml index 820ccd8655..77411546a8 100644 --- a/http/cves/2020/CVE-2020-12127.yaml +++ b/http/cves/2020/CVE-2020-12127.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve,cve2020,wavlink,exposure http: diff --git a/http/cves/2020/CVE-2020-12478.yaml b/http/cves/2020/CVE-2020-12478.yaml index db4c38c379..3b63e404d8 100644 --- a/http/cves/2020/CVE-2020-12478.yaml +++ b/http/cves/2020/CVE-2020-12478.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"teampass" - verified: "true" + verified: true tags: cve,cve2020,teampass,exposure,unauth http: diff --git a/http/cves/2020/CVE-2020-13117.yaml b/http/cves/2020/CVE-2020-13117.yaml index 760889550d..a47050c766 100644 --- a/http/cves/2020/CVE-2020-13117.yaml +++ b/http/cves/2020/CVE-2020-13117.yaml @@ -16,7 +16,7 @@ info: epss-score: 0.06609 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Wi-Fi APP Login" tags: cve,cve2020,wavlink,rce,oast,router diff --git a/http/cves/2020/CVE-2020-13379.yaml b/http/cves/2020/CVE-2020-13379.yaml index f790f21cc9..a49ae3ada9 100644 --- a/http/cves/2020/CVE-2020-13379.yaml +++ b/http/cves/2020/CVE-2020-13379.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: title:"Grafana" - verified: "true" + verified: true tags: cve,cve2020,grafana,ssrf http: diff --git a/http/cves/2020/CVE-2020-13405.yaml b/http/cves/2020/CVE-2020-13405.yaml index 38c2f0b0fb..8f940179da 100644 --- a/http/cves/2020/CVE-2020-13405.yaml +++ b/http/cves/2020/CVE-2020-13405.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 3 shodan-query: http.html:"microweber" - verified: "true" + verified: true tags: cve,cve2020,microweber,unauth,disclosure http: diff --git a/http/cves/2020/CVE-2020-13820.yaml b/http/cves/2020/CVE-2020-13820.yaml index 647f829281..a7e9c69519 100644 --- a/http/cves/2020/CVE-2020-13820.yaml +++ b/http/cves/2020/CVE-2020-13820.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: title:"Extreme Management Center" - verified: "true" + verified: true tags: cve,cve2020,xss,extremenetworks http: diff --git a/http/cves/2020/CVE-2020-13927.yaml b/http/cves/2020/CVE-2020-13927.yaml index e75d589b56..44cf0e4670 100644 --- a/http/cves/2020/CVE-2020-13927.yaml +++ b/http/cves/2020/CVE-2020-13927.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.95492 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Airflow - DAGs" || http.html:"Apache Airflow" tags: packetstorm,cve,cve2020,apache,airflow,unauth,auth-bypass,kev diff --git a/http/cves/2020/CVE-2020-14144.yaml b/http/cves/2020/CVE-2020-14144.yaml index 248d1e0a2b..b8cbad88f6 100644 --- a/http/cves/2020/CVE-2020-14144.yaml +++ b/http/cves/2020/CVE-2020-14144.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 7 shodan-query: html:"Powered by Gitea Version" - verified: "true" + verified: true tags: cve,cve2020,rce,gitea,authenticated,git http: diff --git a/http/cves/2020/CVE-2020-14408.yaml b/http/cves/2020/CVE-2020-14408.yaml index be314cb162..c40d6b81dc 100644 --- a/http/cves/2020/CVE-2020-14408.yaml +++ b/http/cves/2020/CVE-2020-14408.yaml @@ -17,7 +17,7 @@ info: epss-score: 0.00113 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2020,cockpit,agentejo,xss,oss http: diff --git a/http/cves/2020/CVE-2020-14750.yaml b/http/cves/2020/CVE-2020-14750.yaml index f502fb8056..6a9c22a194 100644 --- a/http/cves/2020/CVE-2020-14750.yaml +++ b/http/cves/2020/CVE-2020-14750.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Weblogic Application Server" - verified: "true" + verified: true tags: cve,cve2020,rce,oracle,weblogic,unauth,kev http: diff --git a/http/cves/2020/CVE-2020-14883.yaml b/http/cves/2020/CVE-2020-14883.yaml index ec6ce346e4..5d42e36293 100644 --- a/http/cves/2020/CVE-2020-14883.yaml +++ b/http/cves/2020/CVE-2020-14883.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.97532 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Oracle PeopleSoft Sign-in" tags: oracle,rce,weblogic,kev,packetstorm,cve,cve2020 diff --git a/http/cves/2020/CVE-2020-15867.yaml b/http/cves/2020/CVE-2020-15867.yaml index 79fd7f51b9..27e59a2494 100644 --- a/http/cves/2020/CVE-2020-15867.yaml +++ b/http/cves/2020/CVE-2020-15867.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.9663 metadata: max-request: 7 - verified: "true" + verified: true tags: cve,cve2020,rce,gogs,git,authenticated,packetstorm http: diff --git a/http/cves/2020/CVE-2020-17526.yaml b/http/cves/2020/CVE-2020-17526.yaml index ca320f2aae..bfec3e29dd 100644 --- a/http/cves/2020/CVE-2020-17526.yaml +++ b/http/cves/2020/CVE-2020-17526.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 2 fofa-query: Apache Airflow - verified: "true" + verified: true tags: cve,cve2020,apache,airflow,auth-bypass http: diff --git a/http/cves/2020/CVE-2020-1956.yaml b/http/cves/2020/CVE-2020-1956.yaml index 4b8fea70bd..eef5f49fdf 100644 --- a/http/cves/2020/CVE-2020-1956.yaml +++ b/http/cves/2020/CVE-2020-1956.yaml @@ -20,7 +20,7 @@ info: cpe: cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.favicon.hash:-186961397 tags: cve,cve2020,apache,kylin,rce,oast,kev diff --git a/http/cves/2020/CVE-2020-20285.yaml b/http/cves/2020/CVE-2020-20285.yaml index e5a8c00f10..f7afedecc1 100644 --- a/http/cves/2020/CVE-2020-20285.yaml +++ b/http/cves/2020/CVE-2020-20285.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 fofa-query: zzcms - verified: "true" + verified: true tags: cve,cve2020,zzcms,xss http: diff --git a/http/cves/2020/CVE-2020-20300.yaml b/http/cves/2020/CVE-2020-20300.yaml index b80f3906c4..9751e6da45 100644 --- a/http/cves/2020/CVE-2020-20300.yaml +++ b/http/cves/2020/CVE-2020-20300.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"WeiPHP5.0" - verified: "true" + verified: true tags: weiphp,sql http: diff --git a/http/cves/2020/CVE-2020-20982.yaml b/http/cves/2020/CVE-2020-20982.yaml index c0e24d82c5..7389d363fd 100644 --- a/http/cves/2020/CVE-2020-20982.yaml +++ b/http/cves/2020/CVE-2020-20982.yaml @@ -17,7 +17,7 @@ info: epss-score: 0.01606 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2020,xss,wdja,shadoweb http: diff --git a/http/cves/2020/CVE-2020-20988.yaml b/http/cves/2020/CVE-2020-20988.yaml index 2c4fd1c7e8..b7d2287b24 100644 --- a/http/cves/2020/CVE-2020-20988.yaml +++ b/http/cves/2020/CVE-2020-20988.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.0009 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2020,domainmod,xss,authenticated http: diff --git a/http/cves/2020/CVE-2020-21012.yaml b/http/cves/2020/CVE-2020-21012.yaml index bc393a989d..cedf94aba6 100644 --- a/http/cves/2020/CVE-2020-21012.yaml +++ b/http/cves/2020/CVE-2020-21012.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.02586 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2020,hotel,sqli,unauth http: diff --git a/http/cves/2020/CVE-2020-23517.yaml b/http/cves/2020/CVE-2020-23517.yaml index 698621a234..075b82623f 100644 --- a/http/cves/2020/CVE-2020-23517.yaml +++ b/http/cves/2020/CVE-2020-23517.yaml @@ -17,7 +17,7 @@ info: epss-score: 0.00118 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"HighMail" fofa-query: title="HighMail" tags: cve,cve2020,xss,cms,highmail,aryanic diff --git a/http/cves/2020/CVE-2020-23697.yaml b/http/cves/2020/CVE-2020-23697.yaml index 73eccb90c7..5283ef23e2 100644 --- a/http/cves/2020/CVE-2020-23697.yaml +++ b/http/cves/2020/CVE-2020-23697.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.0009 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,cve2020,xss,mostra,mostracms,cms,authenticated variables: diff --git a/http/cves/2020/CVE-2020-24902.yaml b/http/cves/2020/CVE-2020-24902.yaml index 341d4fa8cd..0847034ee1 100644 --- a/http/cves/2020/CVE-2020-24902.yaml +++ b/http/cves/2020/CVE-2020-24902.yaml @@ -20,7 +20,7 @@ info: max-request: 1 google-query: intitle:"My Download Server" shodan-query: http.title:"My Download Server" - verified: "true" + verified: true tags: cve,cve2020,quixplorer,xss http: diff --git a/http/cves/2020/CVE-2020-24903.yaml b/http/cves/2020/CVE-2020-24903.yaml index 9965aa1499..ebfd9c4e73 100644 --- a/http/cves/2020/CVE-2020-24903.yaml +++ b/http/cves/2020/CVE-2020-24903.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"ASP.NET" - verified: "true" + verified: true tags: cve,cve2020,cuteeditor,xss,seclists http: diff --git a/http/cves/2020/CVE-2020-26248.yaml b/http/cves/2020/CVE-2020-26248.yaml index 00558c8938..a01de4f5db 100644 --- a/http/cves/2020/CVE-2020-26248.yaml +++ b/http/cves/2020/CVE-2020-26248.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.0128 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2020,sqli,prestshop,packetstorm http: diff --git a/http/cves/2020/CVE-2020-2733.yaml b/http/cves/2020/CVE-2020-2733.yaml index 9185e7b8b5..41390f3afa 100644 --- a/http/cves/2020/CVE-2020-2733.yaml +++ b/http/cves/2020/CVE-2020-2733.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: port:8999 product:"Oracle WebLogic Server" - verified: "true" + verified: true tags: cve,cve2020,oracle,weblogic,disclosure,exposure http: diff --git a/http/cves/2020/CVE-2020-29284.yaml b/http/cves/2020/CVE-2020-29284.yaml index 8899709b04..93d5deb1c2 100644 --- a/http/cves/2020/CVE-2020-29284.yaml +++ b/http/cves/2020/CVE-2020-29284.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.02921 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2020,tablereservation,sqli,unauth,edb,cve http: diff --git a/http/cves/2020/CVE-2020-29583.yaml b/http/cves/2020/CVE-2020-29583.yaml index 7da9ddcbb8..da1087b5d6 100644 --- a/http/cves/2020/CVE-2020-29583.yaml +++ b/http/cves/2020/CVE-2020-29583.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-522 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"USG FLEX 100" tags: cve,cve2020,ftp-backdoor,zyxel,bypass,kev diff --git a/http/cves/2020/CVE-2020-29597.yaml b/http/cves/2020/CVE-2020-29597.yaml index 65ed8c6ad8..88a40e1ef5 100644 --- a/http/cves/2020/CVE-2020-29597.yaml +++ b/http/cves/2020/CVE-2020-29597.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.78911 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2020,incomcms,fileupload,intrusive http: diff --git a/http/cves/2020/CVE-2020-35476.yaml b/http/cves/2020/CVE-2020-35476.yaml index 2f28d2bf02..857c5f6d8d 100644 --- a/http/cves/2020/CVE-2020-35476.yaml +++ b/http/cves/2020/CVE-2020-35476.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.78489 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"OpenTSDB" tags: cve,cve2020,opentsdb,rce,packetstorm diff --git a/http/cves/2020/CVE-2020-35847.yaml b/http/cves/2020/CVE-2020-35847.yaml index aaeee3fbed..cef561011a 100644 --- a/http/cves/2020/CVE-2020-35847.yaml +++ b/http/cves/2020/CVE-2020-35847.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.80883 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:688609340 tags: cve,cve2020,nosqli,sqli,cockpit,injection diff --git a/http/cves/2020/CVE-2020-5191.yaml b/http/cves/2020/CVE-2020-5191.yaml index 35378d62db..c63c9bf013 100644 --- a/http/cves/2020/CVE-2020-5191.yaml +++ b/http/cves/2020/CVE-2020-5191.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00311 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2020,hms,cms,xss,authenticated,edb,cve http: diff --git a/http/cves/2020/CVE-2020-5192.yaml b/http/cves/2020/CVE-2020-5192.yaml index bb61f56d15..aa44f8c74a 100644 --- a/http/cves/2020/CVE-2020-5192.yaml +++ b/http/cves/2020/CVE-2020-5192.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00529 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2020,hms,cms,sqli,authenticated,edb,cve variables: diff --git a/http/cves/2020/CVE-2020-7107.yaml b/http/cves/2020/CVE-2020-7107.yaml index 0b3328541a..c8ff4df5a1 100644 --- a/http/cves/2020/CVE-2020-7107.yaml +++ b/http/cves/2020/CVE-2020-7107.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.00517 metadata: max-request: 1 - verified: "true" + verified: true tags: ultimate-faqs,wpscan,cve,cve2020,xss,wordpress,wp-plugin,wp http: diff --git a/http/cves/2020/CVE-2020-8772.yaml b/http/cves/2020/CVE-2020-8772.yaml index 933339ddfb..ae7a40f713 100644 --- a/http/cves/2020/CVE-2020-8772.yaml +++ b/http/cves/2020/CVE-2020-8772.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.96929 metadata: max-request: 2 - verified: "true" + verified: true tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,infinitewp,auth-bypass http: diff --git a/http/cves/2020/CVE-2020-9043.yaml b/http/cves/2020/CVE-2020-9043.yaml index aa80c9927e..16363ff4b0 100644 --- a/http/cves/2020/CVE-2020-9043.yaml +++ b/http/cves/2020/CVE-2020-9043.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.03474 metadata: max-request: 4 - verified: "true" + verified: true tags: wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan,cve,cve2020 http: diff --git a/http/cves/2021/CVE-2021-1472.yaml b/http/cves/2021/CVE-2021-1472.yaml index c545b969fe..8732d20b62 100644 --- a/http/cves/2021/CVE-2021-1472.yaml +++ b/http/cves/2021/CVE-2021-1472.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Cisco rv340" - verified: "true" + verified: true tags: auth-bypass,injection,packetstorm,cve,cve2021,cisco,rce,intrusive http: diff --git a/http/cves/2021/CVE-2021-20123.yaml b/http/cves/2021/CVE-2021-20123.yaml index 92c09c3d13..c6c7ea326a 100644 --- a/http/cves/2021/CVE-2021-20123.yaml +++ b/http/cves/2021/CVE-2021-20123.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00868 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.html:"VigorConnect" tags: cve,cve2021,draytek,lfi,vigorconnect,tenable diff --git a/http/cves/2021/CVE-2021-20124.yaml b/http/cves/2021/CVE-2021-20124.yaml index 47bdd85dc2..c01b7aa29e 100644 --- a/http/cves/2021/CVE-2021-20124.yaml +++ b/http/cves/2021/CVE-2021-20124.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00388 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.html:"VigorConnect" tags: cve,cve2021,draytek,lfi,vigorconnect,tenable diff --git a/http/cves/2021/CVE-2021-20323.yaml b/http/cves/2021/CVE-2021-20323.yaml index efaed5c5b5..235f135eed 100644 --- a/http/cves/2021/CVE-2021-20323.yaml +++ b/http/cves/2021/CVE-2021-20323.yaml @@ -23,7 +23,7 @@ info: metadata: max-request: 4 shodan-query: html:"Keycloak" - verified: "true" + verified: true tags: cve,cve2021,keycloak,xss http: diff --git a/http/cves/2021/CVE-2021-21402.yaml b/http/cves/2021/CVE-2021-21402.yaml index 0b0ef3b762..1c6b4cd911 100644 --- a/http/cves/2021/CVE-2021-21402.yaml +++ b/http/cves/2021/CVE-2021-21402.yaml @@ -24,7 +24,7 @@ info: max-request: 2 fofa-query: title="Jellyfin" || body="http://jellyfin.media" shodan-query: http.html:"Jellyfin" - verified: "true" + verified: true tags: cve,cve2021,jellyfin,lfi http: diff --git a/http/cves/2021/CVE-2021-21799.yaml b/http/cves/2021/CVE-2021-21799.yaml index 8ae5b09b9c..a6a2820a5c 100644 --- a/http/cves/2021/CVE-2021-21799.yaml +++ b/http/cves/2021/CVE-2021-21799.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"R-SeeNet" - verified: "true" + verified: true tags: cve,cve2021,xss,r-seenet http: diff --git a/http/cves/2021/CVE-2021-21800.yaml b/http/cves/2021/CVE-2021-21800.yaml index e22832c1bd..03bf893c20 100644 --- a/http/cves/2021/CVE-2021-21800.yaml +++ b/http/cves/2021/CVE-2021-21800.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"R-SeeNet" - verified: "true" + verified: true tags: cve,cve2021,xss,r-seenet http: diff --git a/http/cves/2021/CVE-2021-21805.yaml b/http/cves/2021/CVE-2021-21805.yaml index bf456f0dac..0299566de7 100644 --- a/http/cves/2021/CVE-2021-21805.yaml +++ b/http/cves/2021/CVE-2021-21805.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"R-SeeNet" - verified: "true" + verified: true tags: cve,cve2021,rce,r-seenet http: diff --git a/http/cves/2021/CVE-2021-22873.yaml b/http/cves/2021/CVE-2021-22873.yaml index 5e70cb59a0..04e0071872 100644 --- a/http/cves/2021/CVE-2021-22873.yaml +++ b/http/cves/2021/CVE-2021-22873.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 6 shodan-query: http.favicon.hash:106844876 - verified: "true" + verified: true tags: cve2021,redirect,revive,hackerone,seclists,cve http: diff --git a/http/cves/2021/CVE-2021-22911.yaml b/http/cves/2021/CVE-2021-22911.yaml index be6e92c01e..9515a468d4 100644 --- a/http/cves/2021/CVE-2021-22911.yaml +++ b/http/cves/2021/CVE-2021-22911.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Rocket.Chat" - verified: "true" + verified: true tags: rocketchat,nosqli,packetstorm,vulhub,hackerone,cve,cve2021 http: diff --git a/http/cves/2021/CVE-2021-24145.yaml b/http/cves/2021/CVE-2021-24145.yaml index 787e786a80..7d36abe7f4 100644 --- a/http/cves/2021/CVE-2021-24145.yaml +++ b/http/cves/2021/CVE-2021-24145.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.93641 metadata: max-request: 3 - verified: "true" + verified: true tags: auth,wpscan,cve,wordpress,wp-plugin,wp,modern-events-calendar-lite,cve2021,rce http: diff --git a/http/cves/2021/CVE-2021-24150.yaml b/http/cves/2021/CVE-2021-24150.yaml index 40c2305ed3..586d2d0a8a 100644 --- a/http/cves/2021/CVE-2021-24150.yaml +++ b/http/cves/2021/CVE-2021-24150.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.02348 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,wordpress,wp-plugin,wp,ssrf,wpscan,unauth,likebtn-like-button http: diff --git a/http/cves/2021/CVE-2021-24155.yaml b/http/cves/2021/CVE-2021-24155.yaml index c77ba1712e..ed17c57857 100644 --- a/http/cves/2021/CVE-2021-24155.yaml +++ b/http/cves/2021/CVE-2021-24155.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.96024 metadata: max-request: 4 - verified: "true" + verified: true tags: authenticated,wp,packetstorm,wp-plugin,cve2021,rce,wordpress,cve,backup,wpscan http: diff --git a/http/cves/2021/CVE-2021-24169.yaml b/http/cves/2021/CVE-2021-24169.yaml index 1e01b97e19..5c3c4014b1 100644 --- a/http/cves/2021/CVE-2021-24169.yaml +++ b/http/cves/2021/CVE-2021-24169.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.00183 metadata: max-request: 2 - verified: "true" + verified: true tags: wordpress,authenticated,wpscan,cve,cve2021,xss,wp-plugin,wp,woo-order-export-lite,edb http: diff --git a/http/cves/2021/CVE-2021-24214.yaml b/http/cves/2021/CVE-2021-24214.yaml index bd5a42f862..ac90e52921 100644 --- a/http/cves/2021/CVE-2021-24214.yaml +++ b/http/cves/2021/CVE-2021-24214.yaml @@ -17,7 +17,7 @@ info: epss-score: 0.00369 metadata: max-request: 1 - verified: "true" + verified: true tags: wpscan,cve,cve2021,wordpress,xss,wp-plugin,wp,openid http: diff --git a/http/cves/2021/CVE-2021-24239.yaml b/http/cves/2021/CVE-2021-24239.yaml index 5723cf8f30..19d02ed97a 100644 --- a/http/cves/2021/CVE-2021-24239.yaml +++ b/http/cves/2021/CVE-2021-24239.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00116 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,xss,pie-register,wp,wpscan http: diff --git a/http/cves/2021/CVE-2021-24287.yaml b/http/cves/2021/CVE-2021-24287.yaml index f92b678a9f..ed01215174 100644 --- a/http/cves/2021/CVE-2021-24287.yaml +++ b/http/cves/2021/CVE-2021-24287.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.00177 metadata: max-request: 2 - verified: "true" + verified: true tags: wp,select-all-categories,taxonomies-change-checkbox-to-radio-buttons,authenticated,wpscan,cve2021,xss,wp-plugin,cve,wordpress,edb http: diff --git a/http/cves/2021/CVE-2021-24347.yaml b/http/cves/2021/CVE-2021-24347.yaml index d853a2e222..fdbafd1e04 100644 --- a/http/cves/2021/CVE-2021-24347.yaml +++ b/http/cves/2021/CVE-2021-24347.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.94776 metadata: max-request: 4 - verified: "true" + verified: true tags: sp-client-document-manager,wpscan,cve,wp-plugin,wp,authenticated,wordpress,cve2021,rce,packetstorm http: diff --git a/http/cves/2021/CVE-2021-24435.yaml b/http/cves/2021/CVE-2021-24435.yaml index f14d2d15e0..aa15b91bb6 100644 --- a/http/cves/2021/CVE-2021-24435.yaml +++ b/http/cves/2021/CVE-2021-24435.yaml @@ -19,7 +19,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: wp,xss,wp-plugin,titan-framework,wpscan,cve,cve2021,wordpress http: diff --git a/http/cves/2021/CVE-2021-24436.yaml b/http/cves/2021/CVE-2021-24436.yaml index 5df24c12b1..2445ebd37e 100644 --- a/http/cves/2021/CVE-2021-24436.yaml +++ b/http/cves/2021/CVE-2021-24436.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.001 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,authenticated http: diff --git a/http/cves/2021/CVE-2021-24452.yaml b/http/cves/2021/CVE-2021-24452.yaml index de2d6d4d57..873e4d5066 100644 --- a/http/cves/2021/CVE-2021-24452.yaml +++ b/http/cves/2021/CVE-2021-24452.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00089 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,auth http: diff --git a/http/cves/2021/CVE-2021-24554.yaml b/http/cves/2021/CVE-2021-24554.yaml index 3a81e82620..ba008e4112 100644 --- a/http/cves/2021/CVE-2021-24554.yaml +++ b/http/cves/2021/CVE-2021-24554.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.05404 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2021,sqli,wordpress,wp-plugin,wp,wp-paytm-pay,wpscan,cve http: diff --git a/http/cves/2021/CVE-2021-24666.yaml b/http/cves/2021/CVE-2021-24666.yaml index 2fa6caaca5..750f0b0eb6 100644 --- a/http/cves/2021/CVE-2021-24666.yaml +++ b/http/cves/2021/CVE-2021-24666.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.18585 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2021,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,cve http: diff --git a/http/cves/2021/CVE-2021-24827.yaml b/http/cves/2021/CVE-2021-24827.yaml index 6744454dd8..d074221331 100644 --- a/http/cves/2021/CVE-2021-24827.yaml +++ b/http/cves/2021/CVE-2021-24827.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.01312 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2022,wp-plugin,asgaros-forum,unauth,wpscan,cve,wordpress,wp,sqli http: diff --git a/http/cves/2021/CVE-2021-24838.yaml b/http/cves/2021/CVE-2021-24838.yaml index a31374d9d4..2ce3807047 100644 --- a/http/cves/2021/CVE-2021-24838.yaml +++ b/http/cves/2021/CVE-2021-24838.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00119 metadata: max-request: 2 - verified: "true" + verified: true tags: redirect,anycomment,wpscan,cve,cve2021,wordpress,wp-plugin http: diff --git a/http/cves/2021/CVE-2021-24862.yaml b/http/cves/2021/CVE-2021-24862.yaml index 958fdc885e..850458d596 100644 --- a/http/cves/2021/CVE-2021-24862.yaml +++ b/http/cves/2021/CVE-2021-24862.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.54169 metadata: max-request: 3 - verified: "true" + verified: true tags: wpscan,cve,wp-plugin,cve2021,wordpress,wp,registrationmagic,sqli,authenticated,packetstorm http: diff --git a/http/cves/2021/CVE-2021-24875.yaml b/http/cves/2021/CVE-2021-24875.yaml index 661e079795..f950268fcc 100644 --- a/http/cves/2021/CVE-2021-24875.yaml +++ b/http/cves/2021/CVE-2021-24875.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00193 metadata: max-request: 2 - verified: "true" + verified: true tags: wp,authenticated,wpscan,ecommerce-product-catalog,cve,cve2022,xss,wordpress,wp-plugin http: diff --git a/http/cves/2021/CVE-2021-24910.yaml b/http/cves/2021/CVE-2021-24910.yaml index 8555464c1b..6e75dd7eee 100644 --- a/http/cves/2021/CVE-2021-24910.yaml +++ b/http/cves/2021/CVE-2021-24910.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00083 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2021,wordpress,wp-plugin,xss,wp,wpscan,cve http: diff --git a/http/cves/2021/CVE-2021-24917.yaml b/http/cves/2021/CVE-2021-24917.yaml index 47139c2550..467de93143 100644 --- a/http/cves/2021/CVE-2021-24917.yaml +++ b/http/cves/2021/CVE-2021-24917.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01446 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2021,wp,wordpress,wp-plugin,unauth,wpscan,cve http: diff --git a/http/cves/2021/CVE-2021-24931.yaml b/http/cves/2021/CVE-2021-24931.yaml index 9241c26fcf..084ee3d3e9 100644 --- a/http/cves/2021/CVE-2021-24931.yaml +++ b/http/cves/2021/CVE-2021-24931.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.02846 metadata: max-request: 1 - verified: "true" + verified: true tags: wp-plugin,cve,wp,packetstorm,unauth,wpscan,cve2021,sqli,wordpress,secure-copy-content-protection http: diff --git a/http/cves/2021/CVE-2021-24940.yaml b/http/cves/2021/CVE-2021-24940.yaml index ba1c30e179..633a728226 100644 --- a/http/cves/2021/CVE-2021-24940.yaml +++ b/http/cves/2021/CVE-2021-24940.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.001 metadata: max-request: 2 - verified: "true" + verified: true tags: wp,xss,authenticated,wpscan,cve,cve2021,wordpress,wp-plugin http: diff --git a/http/cves/2021/CVE-2021-24946.yaml b/http/cves/2021/CVE-2021-24946.yaml index 18f4ed1067..b30ffde3a3 100644 --- a/http/cves/2021/CVE-2021-24946.yaml +++ b/http/cves/2021/CVE-2021-24946.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.02157 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2021,sqli,packetstorm,wp,wp-plugin,unauth,wpscan,cve,modern-events-calendar-lite,wordpress http: diff --git a/http/cves/2021/CVE-2021-24970.yaml b/http/cves/2021/CVE-2021-24970.yaml index 2213ffbb44..52c6208783 100644 --- a/http/cves/2021/CVE-2021-24970.yaml +++ b/http/cves/2021/CVE-2021-24970.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00621 metadata: max-request: 2 - verified: "true" + verified: true tags: wpscan,cve,cve2021,wp,wp-plugin,wordpress,lfi,authenticated http: diff --git a/http/cves/2021/CVE-2021-25003.yaml b/http/cves/2021/CVE-2021-25003.yaml index b660713941..a97dd6f97c 100644 --- a/http/cves/2021/CVE-2021-25003.yaml +++ b/http/cves/2021/CVE-2021-25003.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.65102 metadata: max-request: 3 - verified: "true" + verified: true tags: rce,wpcargo,unauth,cve,cve2021,wordpress,wp,wp-plugin,wpscan variables: diff --git a/http/cves/2021/CVE-2021-25067.yaml b/http/cves/2021/CVE-2021-25067.yaml index d8112e6c02..69785cc510 100644 --- a/http/cves/2021/CVE-2021-25067.yaml +++ b/http/cves/2021/CVE-2021-25067.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 2 - verified: "true" + verified: true tags: xss,wordpress,authenticated,wpscan,cve,cve2021,wp-plugin,wp,page-builder-add http: diff --git a/http/cves/2021/CVE-2021-25078.yaml b/http/cves/2021/CVE-2021-25078.yaml index 2c56345e8a..35d5af9a60 100644 --- a/http/cves/2021/CVE-2021-25078.yaml +++ b/http/cves/2021/CVE-2021-25078.yaml @@ -12,7 +12,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-25078 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,wp,wordpress,authenticated,cve2021,affiliates-manager,wp-plugin,xss,wpscan http: diff --git a/http/cves/2021/CVE-2021-25085.yaml b/http/cves/2021/CVE-2021-25085.yaml index ab96d7e67c..d188e970d1 100644 --- a/http/cves/2021/CVE-2021-25085.yaml +++ b/http/cves/2021/CVE-2021-25085.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00112 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,wordpress,wp-plugin,wp,xss,wpscan http: diff --git a/http/cves/2021/CVE-2021-25099.yaml b/http/cves/2021/CVE-2021-25099.yaml index b878dcc214..11d794eda7 100644 --- a/http/cves/2021/CVE-2021-25099.yaml +++ b/http/cves/2021/CVE-2021-25099.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00112 metadata: max-request: 1 - verified: "true" + verified: true tags: xss,cve2021,wp,give,wordpress,cve,wp-plugin,unauth,wpscan http: diff --git a/http/cves/2021/CVE-2021-25104.yaml b/http/cves/2021/CVE-2021-25104.yaml index 7922affadb..2e6d61a661 100644 --- a/http/cves/2021/CVE-2021-25104.yaml +++ b/http/cves/2021/CVE-2021-25104.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,wp,ocean-extra http: diff --git a/http/cves/2021/CVE-2021-25114.yaml b/http/cves/2021/CVE-2021-25114.yaml index 19dbe18178..e0feda0e7d 100644 --- a/http/cves/2021/CVE-2021-25114.yaml +++ b/http/cves/2021/CVE-2021-25114.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 google-query: inurl:"/wp-content/plugins/paid-memberships-pro" - verified: "true" + verified: true tags: wp-plugin,wp,sqli,paid-memberships-pro,wpscan,cve,cve2021,wordpress http: diff --git a/http/cves/2021/CVE-2021-25296.yaml b/http/cves/2021/CVE-2021-25296.yaml index b4e28d5530..6b9e04b5f3 100644 --- a/http/cves/2021/CVE-2021-25296.yaml +++ b/http/cves/2021/CVE-2021-25296.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 4 shodan-query: title:"Nagios XI" - verified: "true" + verified: true tags: rce,oast,authenticated,msf,cve,cve2021,nagiosxi,kev http: diff --git a/http/cves/2021/CVE-2021-25297.yaml b/http/cves/2021/CVE-2021-25297.yaml index af3243c15c..0de33fbc71 100644 --- a/http/cves/2021/CVE-2021-25297.yaml +++ b/http/cves/2021/CVE-2021-25297.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 4 shodan-query: title:"Nagios XI" - verified: "true" + verified: true tags: rce,oast,authenticated,msf,cve,cve2021,nagiosxi,kev http: diff --git a/http/cves/2021/CVE-2021-25298.yaml b/http/cves/2021/CVE-2021-25298.yaml index cdabecfe46..c300adf114 100644 --- a/http/cves/2021/CVE-2021-25298.yaml +++ b/http/cves/2021/CVE-2021-25298.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 4 shodan-query: title:"Nagios XI" - verified: "true" + verified: true tags: oast,authenticated,msf,cve,cve2021,nagiosxi,rce,kev http: diff --git a/http/cves/2021/CVE-2021-25299.yaml b/http/cves/2021/CVE-2021-25299.yaml index 39b437fa19..f73bdee5a8 100644 --- a/http/cves/2021/CVE-2021-25299.yaml +++ b/http/cves/2021/CVE-2021-25299.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 3 shodan-query: title:"Nagios XI" - verified: "true" + verified: true tags: cve,cve2021,nagios,nagiosxi,xss,authenticated http: diff --git a/http/cves/2021/CVE-2021-26295.yaml b/http/cves/2021/CVE-2021-26295.yaml index 048555c603..cab01d5718 100644 --- a/http/cves/2021/CVE-2021-26295.yaml +++ b/http/cves/2021/CVE-2021-26295.yaml @@ -23,7 +23,7 @@ info: metadata: max-request: 1 shodan-query: OFBiz.Visitor= - verified: "true" + verified: true ysoserial-payload: java -jar ysoserial.jar URLDNS https://oob-url-to-request.tld | hex tags: packetstorm,cve,cve2021,apache,ofbiz,deserialization,rce diff --git a/http/cves/2021/CVE-2021-27309.yaml b/http/cves/2021/CVE-2021-27309.yaml index 4089b79a1f..252152152c 100644 --- a/http/cves/2021/CVE-2021-27309.yaml +++ b/http/cves/2021/CVE-2021-27309.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.001 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,clansphere,xss,cms,unauth http: diff --git a/http/cves/2021/CVE-2021-27314.yaml b/http/cves/2021/CVE-2021-27314.yaml index 60200ba10d..a568d8b064 100644 --- a/http/cves/2021/CVE-2021-27314.yaml +++ b/http/cves/2021/CVE-2021-27314.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm http: diff --git a/http/cves/2021/CVE-2021-27315.yaml b/http/cves/2021/CVE-2021-27315.yaml index 8d13ca22ee..336e489a38 100644 --- a/http/cves/2021/CVE-2021-27315.yaml +++ b/http/cves/2021/CVE-2021-27315.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm http: diff --git a/http/cves/2021/CVE-2021-27316.yaml b/http/cves/2021/CVE-2021-27316.yaml index 5f04968b57..e88c9074c3 100644 --- a/http/cves/2021/CVE-2021-27316.yaml +++ b/http/cves/2021/CVE-2021-27316.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm http: diff --git a/http/cves/2021/CVE-2021-27319.yaml b/http/cves/2021/CVE-2021-27319.yaml index bd258637d8..05641d09fb 100644 --- a/http/cves/2021/CVE-2021-27319.yaml +++ b/http/cves/2021/CVE-2021-27319.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: packetstorm,cve,cve2021,sqli,doctor-appointment-system http: diff --git a/http/cves/2021/CVE-2021-27320.yaml b/http/cves/2021/CVE-2021-27320.yaml index 83cd37f834..dd0c2a9b47 100644 --- a/http/cves/2021/CVE-2021-27320.yaml +++ b/http/cves/2021/CVE-2021-27320.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,sqli,doctor-appointment-system,packetstorm http: diff --git a/http/cves/2021/CVE-2021-27330.yaml b/http/cves/2021/CVE-2021-27330.yaml index e18b44d8de..a539c2deff 100644 --- a/http/cves/2021/CVE-2021-27330.yaml +++ b/http/cves/2021/CVE-2021-27330.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 google-query: intitle:TriConsole.com - PHP Calendar Date Picker - verified: "true" + verified: true tags: xss,edb,cve,cve2021,triconsole http: diff --git a/http/cves/2021/CVE-2021-27519.yaml b/http/cves/2021/CVE-2021-27519.yaml index 8734bdbb39..f3165a6df6 100644 --- a/http/cves/2021/CVE-2021-27519.yaml +++ b/http/cves/2021/CVE-2021-27519.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: 'http.html:"Powered by: FUDforum"' - verified: "true" + verified: true tags: xss,fudforum,edb,packetstorm,cve,cve2021 http: diff --git a/http/cves/2021/CVE-2021-27520.yaml b/http/cves/2021/CVE-2021-27520.yaml index 7c254cf9ea..7c113c1579 100644 --- a/http/cves/2021/CVE-2021-27520.yaml +++ b/http/cves/2021/CVE-2021-27520.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 2 shodan-query: html:"FUDforum" - verified: "true" + verified: true tags: packetstorm,cve,cve2021,xss,fuddorum,edb http: diff --git a/http/cves/2021/CVE-2021-27909.yaml b/http/cves/2021/CVE-2021-27909.yaml index 42542682f9..f97e6f45e9 100644 --- a/http/cves/2021/CVE-2021-27909.yaml +++ b/http/cves/2021/CVE-2021-27909.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: title:"Mautic" - verified: "true" + verified: true tags: cve,cve2021,mautic,xss http: diff --git a/http/cves/2021/CVE-2021-28419.yaml b/http/cves/2021/CVE-2021-28419.yaml index cd3151d70c..bb0d839599 100644 --- a/http/cves/2021/CVE-2021-28419.yaml +++ b/http/cves/2021/CVE-2021-28419.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.10967 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,sqli,seopanel,auth,packetstorm http: diff --git a/http/cves/2021/CVE-2021-29490.yaml b/http/cves/2021/CVE-2021-29490.yaml index dd34b27962..043c158589 100644 --- a/http/cves/2021/CVE-2021-29490.yaml +++ b/http/cves/2021/CVE-2021-29490.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00137 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.title:"Jellyfin" tags: cve,cve2021,ssrf,jellyfin,oast diff --git a/http/cves/2021/CVE-2021-30128.yaml b/http/cves/2021/CVE-2021-30128.yaml index 677d21259c..69bd6e1519 100644 --- a/http/cves/2021/CVE-2021-30128.yaml +++ b/http/cves/2021/CVE-2021-30128.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 fofa-query: app="Apache_OFBiz" - verified: "true" + verified: true tags: cve,cve2021,apache,ofbiz,deserialization,rce http: diff --git a/http/cves/2021/CVE-2021-30134.yaml b/http/cves/2021/CVE-2021-30134.yaml index ca8944bdca..40e8343c03 100644 --- a/http/cves/2021/CVE-2021-30134.yaml +++ b/http/cves/2021/CVE-2021-30134.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 google-query: inurl:"/php-curl-test/post_file_path_upload.php" - verified: "true" + verified: true tags: cve,cve2021,xss,php-mod,wpscan http: diff --git a/http/cves/2021/CVE-2021-3110.yaml b/http/cves/2021/CVE-2021-3110.yaml index 5c9f03784b..b0053cbc1f 100644 --- a/http/cves/2021/CVE-2021-3110.yaml +++ b/http/cves/2021/CVE-2021-3110.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.95326 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,sqli,prestshop,edb http: - raw: diff --git a/http/cves/2021/CVE-2021-33851.yaml b/http/cves/2021/CVE-2021-33851.yaml index ab4d41fd6e..cd13e6c041 100644 --- a/http/cves/2021/CVE-2021-33851.yaml +++ b/http/cves/2021/CVE-2021-33851.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 4 - verified: "true" + verified: true tags: wpscan,cve2021,wordpress,customize-login-image,wp,authenticated,cve,wp-plugin,xss http: diff --git a/http/cves/2021/CVE-2021-35488.yaml b/http/cves/2021/CVE-2021-35488.yaml index 997488d56d..158d87ab37 100644 --- a/http/cves/2021/CVE-2021-35488.yaml +++ b/http/cves/2021/CVE-2021-35488.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Thruk" - verified: "true" + verified: true tags: cve,cve2021,thruk,xss http: diff --git a/http/cves/2021/CVE-2021-36450.yaml b/http/cves/2021/CVE-2021-36450.yaml index a57ed81d23..8212d7976f 100644 --- a/http/cves/2021/CVE-2021-36450.yaml +++ b/http/cves/2021/CVE-2021-36450.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: title:"Verint Sign-in" - verified: "true" + verified: true tags: cve,cve2021,xss,verint http: diff --git a/http/cves/2021/CVE-2021-36873.yaml b/http/cves/2021/CVE-2021-36873.yaml index 4e09675a7d..fcbcd1d504 100644 --- a/http/cves/2021/CVE-2021-36873.yaml +++ b/http/cves/2021/CVE-2021-36873.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00151 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,wp-plugin,iq-block-country,cve2021,wordpress,wp,xss,authenticated,wpscan http: diff --git a/http/cves/2021/CVE-2021-37304.yaml b/http/cves/2021/CVE-2021-37304.yaml index dfa0195142..1abeca7fc5 100644 --- a/http/cves/2021/CVE-2021-37304.yaml +++ b/http/cves/2021/CVE-2021-37304.yaml @@ -13,7 +13,7 @@ info: cve-id: CVE-2021-37304 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" tags: cve,cve2021,jeecg,exposure diff --git a/http/cves/2021/CVE-2021-37305.yaml b/http/cves/2021/CVE-2021-37305.yaml index b528a1bd8d..136b237189 100644 --- a/http/cves/2021/CVE-2021-37305.yaml +++ b/http/cves/2021/CVE-2021-37305.yaml @@ -13,7 +13,7 @@ info: cve-id: CVE-2021-37305 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" tags: cve,cve2021,jeecg,exposure diff --git a/http/cves/2021/CVE-2021-37416.yaml b/http/cves/2021/CVE-2021-37416.yaml index b604f9183e..15afda38c3 100644 --- a/http/cves/2021/CVE-2021-37416.yaml +++ b/http/cves/2021/CVE-2021-37416.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"ManageEngine" - verified: "true" + verified: true tags: cve,cve2021,zoho,xss http: diff --git a/http/cves/2021/CVE-2021-37589.yaml b/http/cves/2021/CVE-2021-37589.yaml index 0563681255..16bbe86ae2 100644 --- a/http/cves/2021/CVE-2021-37589.yaml +++ b/http/cves/2021/CVE-2021-37589.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 3 shodan-query: http.favicon.hash:876876147 - verified: "true" + verified: true tags: cve,cve2021,virtua,sqli http: diff --git a/http/cves/2021/CVE-2021-39165.yaml b/http/cves/2021/CVE-2021-39165.yaml index 3343b422ef..0605487d62 100644 --- a/http/cves/2021/CVE-2021-39165.yaml +++ b/http/cves/2021/CVE-2021-39165.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-1606065523 tags: cve,cve2021,cachet,sqli diff --git a/http/cves/2021/CVE-2021-39320.yaml b/http/cves/2021/CVE-2021-39320.yaml index 4a99f67d15..0fb6462f14 100644 --- a/http/cves/2021/CVE-2021-39320.yaml +++ b/http/cves/2021/CVE-2021-39320.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.0021 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,wp-plugin,wpscan,wordpress,wp,xss,authenticated http: diff --git a/http/cves/2021/CVE-2021-40149.yaml b/http/cves/2021/CVE-2021-40149.yaml index b4cd6c3f96..3b9f6407bd 100644 --- a/http/cves/2021/CVE-2021-40149.yaml +++ b/http/cves/2021/CVE-2021-40149.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Reolink" - verified: "true" + verified: true tags: exposure,unauth,packetstorm,cve,cve2021,reolink,camera,iot http: diff --git a/http/cves/2021/CVE-2021-40150.yaml b/http/cves/2021/CVE-2021-40150.yaml index a5a003111e..94b56d59f9 100644 --- a/http/cves/2021/CVE-2021-40150.yaml +++ b/http/cves/2021/CVE-2021-40150.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Reolink" - verified: "true" + verified: true tags: cve,cve2021,reolink,camera,exposure,iot http: diff --git a/http/cves/2021/CVE-2021-40661.yaml b/http/cves/2021/CVE-2021-40661.yaml index 28ba99ce56..4966a2847c 100644 --- a/http/cves/2021/CVE-2021-40661.yaml +++ b/http/cves/2021/CVE-2021-40661.yaml @@ -21,7 +21,7 @@ info: max-request: 1 google-query: inurl:excalweb.dll shodan-query: IND780 - verified: "true" + verified: true tags: cve,cve2021,ind780,lfi http: diff --git a/http/cves/2021/CVE-2021-40822.yaml b/http/cves/2021/CVE-2021-40822.yaml index c79b5bb711..38c38f8b99 100644 --- a/http/cves/2021/CVE-2021-40822.yaml +++ b/http/cves/2021/CVE-2021-40822.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 fofa-query: app="GeoServer" - verified: "true" + verified: true tags: cve,cve2021,ssrf,geoserver http: diff --git a/http/cves/2021/CVE-2021-41432.yaml b/http/cves/2021/CVE-2021-41432.yaml index 52b8d00491..bb471c1f4e 100644 --- a/http/cves/2021/CVE-2021-41432.yaml +++ b/http/cves/2021/CVE-2021-41432.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 4 shodan-query: http.html:"Flatpress" - verified: "true" + verified: true tags: cve,cve2021,flatpress,xss,authenticated,oss http: diff --git a/http/cves/2021/CVE-2021-41773.yaml b/http/cves/2021/CVE-2021-41773.yaml index 9cf1badd2b..06d743e4e5 100644 --- a/http/cves/2021/CVE-2021-41773.yaml +++ b/http/cves/2021/CVE-2021-41773.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 3 shodan-query: Apache 2.4.49 - verified: "true" + verified: true tags: cve,cve2021,lfi,rce,apache,misconfig,traversal,kev variables: diff --git a/http/cves/2021/CVE-2021-41878.yaml b/http/cves/2021/CVE-2021-41878.yaml index 84a39fa65d..b4bf4af8d7 100644 --- a/http/cves/2021/CVE-2021-41878.yaml +++ b/http/cves/2021/CVE-2021-41878.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00476 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,ipanel,xss,packetstorm http: diff --git a/http/cves/2021/CVE-2021-42013.yaml b/http/cves/2021/CVE-2021-42013.yaml index da706a791b..27e0f16b46 100644 --- a/http/cves/2021/CVE-2021-42013.yaml +++ b/http/cves/2021/CVE-2021-42013.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.97546 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,lfi,apache,rce,misconfig,traversal,kev variables: diff --git a/http/cves/2021/CVE-2021-42627.yaml b/http/cves/2021/CVE-2021-42627.yaml index 08326866f7..f2d3692e06 100644 --- a/http/cves/2021/CVE-2021-42627.yaml +++ b/http/cves/2021/CVE-2021-42627.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Roteador Wireless" - verified: "true" + verified: true tags: cve,cve2021,d-link,router,unauth,dir-615,roteador http: diff --git a/http/cves/2021/CVE-2021-42663.yaml b/http/cves/2021/CVE-2021-42663.yaml index e8b0d6d1be..e876182659 100644 --- a/http/cves/2021/CVE-2021-42663.yaml +++ b/http/cves/2021/CVE-2021-42663.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.0013 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,xss http: diff --git a/http/cves/2021/CVE-2021-42667.yaml b/http/cves/2021/CVE-2021-42667.yaml index d341a5e07c..a542fc43e6 100644 --- a/http/cves/2021/CVE-2021-42667.yaml +++ b/http/cves/2021/CVE-2021-42667.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.01689 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,sqli,authenticated variables: diff --git a/http/cves/2021/CVE-2021-43421.yaml b/http/cves/2021/CVE-2021-43421.yaml index 66fb78a22b..38ab6d4316 100644 --- a/http/cves/2021/CVE-2021-43421.yaml +++ b/http/cves/2021/CVE-2021-43421.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.0079 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,elfinder,upload,rce,intrusive http: diff --git a/http/cves/2021/CVE-2021-43510.yaml b/http/cves/2021/CVE-2021-43510.yaml index 6a19967118..cfae765178 100644 --- a/http/cves/2021/CVE-2021-43510.yaml +++ b/http/cves/2021/CVE-2021-43510.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01295 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2021,simpleclientmanagement,sqli,auth-bypass http: diff --git a/http/cves/2021/CVE-2021-43574.yaml b/http/cves/2021/CVE-2021-43574.yaml index bf8b359a5b..23712b9fa1 100644 --- a/http/cves/2021/CVE-2021-43574.yaml +++ b/http/cves/2021/CVE-2021-43574.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 3 shodan-query: http.html:"Powered by Atmail" - verified: "true" + verified: true tags: cve,cve2021,atmail,xss http: diff --git a/http/cves/2021/CVE-2021-43734.yaml b/http/cves/2021/CVE-2021-43734.yaml index 6e89868a00..967f1e7a92 100644 --- a/http/cves/2021/CVE-2021-43734.yaml +++ b/http/cves/2021/CVE-2021-43734.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"kkFileView" - verified: "true" + verified: true tags: cve,cve2021,kkfileview,traversal,lfi http: diff --git a/http/cves/2021/CVE-2021-43798.yaml b/http/cves/2021/CVE-2021-43798.yaml index ac97799bf3..12f9020120 100644 --- a/http/cves/2021/CVE-2021-43798.yaml +++ b/http/cves/2021/CVE-2021-43798.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.97083 metadata: max-request: 3 - verified: "true" + verified: true shodan-query: title:"Grafana" tags: cve,cve2021,grafana,lfi diff --git a/http/cves/2021/CVE-2021-45422.yaml b/http/cves/2021/CVE-2021-45422.yaml index e3f0957aa8..5ba96684cf 100644 --- a/http/cves/2021/CVE-2021-45422.yaml +++ b/http/cves/2021/CVE-2021-45422.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Reprise License" - verified: "true" + verified: true tags: cve,cve2021,reprise,xss,seclists http: diff --git a/http/cves/2021/CVE-2021-45428.yaml b/http/cves/2021/CVE-2021-45428.yaml index 467c6453c5..bcb3f7cf68 100644 --- a/http/cves/2021/CVE-2021-45428.yaml +++ b/http/cves/2021/CVE-2021-45428.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 3 shodan-query: http.html:"TLR-2005KSH" - verified: "true" + verified: true tags: cve,cve2021,telesquare,intrusive,fileupload,packetstorm http: diff --git a/http/cves/2021/CVE-2021-46068.yaml b/http/cves/2021/CVE-2021-46068.yaml index 5647ce3fae..3d21281da1 100644 --- a/http/cves/2021/CVE-2021-46068.yaml +++ b/http/cves/2021/CVE-2021-46068.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,xss,vms,authenticated http: - raw: diff --git a/http/cves/2021/CVE-2021-46069.yaml b/http/cves/2021/CVE-2021-46069.yaml index 8594574a93..dc8071e5b9 100644 --- a/http/cves/2021/CVE-2021-46069.yaml +++ b/http/cves/2021/CVE-2021-46069.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,xss,vms,authenticated http: diff --git a/http/cves/2021/CVE-2021-46071.yaml b/http/cves/2021/CVE-2021-46071.yaml index f53e8a71b8..ee2b1be3cd 100644 --- a/http/cves/2021/CVE-2021-46071.yaml +++ b/http/cves/2021/CVE-2021-46071.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,xss,vms,authenticated http: diff --git a/http/cves/2021/CVE-2021-46072.yaml b/http/cves/2021/CVE-2021-46072.yaml index d77ab94132..eaf1f3a7f8 100644 --- a/http/cves/2021/CVE-2021-46072.yaml +++ b/http/cves/2021/CVE-2021-46072.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,xss,vms,authenticated http: - raw: diff --git a/http/cves/2021/CVE-2021-46073.yaml b/http/cves/2021/CVE-2021-46073.yaml index e095727f89..232a4d26ca 100644 --- a/http/cves/2021/CVE-2021-46073.yaml +++ b/http/cves/2021/CVE-2021-46073.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00092 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2021,xss,vms,authenticated http: diff --git a/http/cves/2021/CVE-2021-46379.yaml b/http/cves/2021/CVE-2021-46379.yaml index 64d64ea5e0..a80eabc9c0 100644 --- a/http/cves/2021/CVE-2021-46379.yaml +++ b/http/cves/2021/CVE-2021-46379.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00246 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2021,redirect,dlink,router http: diff --git a/http/cves/2021/CVE-2021-46417.yaml b/http/cves/2021/CVE-2021-46417.yaml index 83504440c3..f1dddce4ca 100644 --- a/http/cves/2021/CVE-2021-46417.yaml +++ b/http/cves/2021/CVE-2021-46417.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Franklin Fueling Systems" - verified: "true" + verified: true tags: packetstorm,cve,cve2021,franklinfueling,lfi http: diff --git a/http/cves/2021/CVE-2021-46422.yaml b/http/cves/2021/CVE-2021-46422.yaml index 9642ecfe07..f55cabc5a9 100644 --- a/http/cves/2021/CVE-2021-46422.yaml +++ b/http/cves/2021/CVE-2021-46422.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: html:"SDT-CW3B1" - verified: "true" + verified: true tags: cve,cve2021,telesquare,rce,router,injection,edb variables: diff --git a/http/cves/2021/CVE-2021-46424.yaml b/http/cves/2021/CVE-2021-46424.yaml index e18d59b579..5ea8839c4e 100644 --- a/http/cves/2021/CVE-2021-46424.yaml +++ b/http/cves/2021/CVE-2021-46424.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 3 shodan-query: http.html:"TLR-2005KSH" - verified: "true" + verified: true tags: cve,cve2021,telesquare,intrusive,packetstorm http: diff --git a/http/cves/2022/CVE-2022-0147.yaml b/http/cves/2022/CVE-2022-0147.yaml index 3b821d1cc4..8d6f51590e 100644 --- a/http/cves/2022/CVE-2022-0147.yaml +++ b/http/cves/2022/CVE-2022-0147.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00103 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2022,wordpress,xss,wp,authenticated,cve,wp-plugin,wp-gdpr-compliance,wpscan http: diff --git a/http/cves/2022/CVE-2022-0206.yaml b/http/cves/2022/CVE-2022-0206.yaml index 8fa6b0a955..881b7b5918 100644 --- a/http/cves/2022/CVE-2022-0206.yaml +++ b/http/cves/2022/CVE-2022-0206.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00119 metadata: max-request: 2 - verified: "true" + verified: true tags: xss,wp,authenticated,cve2022,wordpress,wp-plugin,newstatpress,wpscan,cve http: diff --git a/http/cves/2022/CVE-2022-0212.yaml b/http/cves/2022/CVE-2022-0212.yaml index 2a38d45b02..32e1ecc2e4 100644 --- a/http/cves/2022/CVE-2022-0212.yaml +++ b/http/cves/2022/CVE-2022-0212.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00097 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,xss,wpscan,wordpress,wp-plugin,wp,spider-event-calendar,unauthenticated http: diff --git a/http/cves/2022/CVE-2022-0234.yaml b/http/cves/2022/CVE-2022-0234.yaml index 8c63d7d08c..4e70f90e29 100644 --- a/http/cves/2022/CVE-2022-0234.yaml +++ b/http/cves/2022/CVE-2022-0234.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 google-query: inurl:"wp-content/plugins/woocommerce-currency-switcher" - verified: "true" + verified: true tags: wpscan,cve,cve2022,wordpress,wp-plugin,wp,xss,woocs http: diff --git a/http/cves/2022/CVE-2022-0346.yaml b/http/cves/2022/CVE-2022-0346.yaml index 27ab610bdf..985949658c 100644 --- a/http/cves/2022/CVE-2022-0346.yaml +++ b/http/cves/2022/CVE-2022-0346.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 2 - verified: "true" + verified: true tags: wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org http: diff --git a/http/cves/2022/CVE-2022-0349.yaml b/http/cves/2022/CVE-2022-0349.yaml index 87a4bdc6d2..bd68a47327 100644 --- a/http/cves/2022/CVE-2022-0349.yaml +++ b/http/cves/2022/CVE-2022-0349.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01065 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2022,wordpress,wp-plugin,wp,sqli,notificationx,wpscan,cve http: diff --git a/http/cves/2022/CVE-2022-0412.yaml b/http/cves/2022/CVE-2022-0412.yaml index 3afca14cf0..30ae41927f 100644 --- a/http/cves/2022/CVE-2022-0412.yaml +++ b/http/cves/2022/CVE-2022-0412.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.01037 metadata: max-request: 1 - verified: "true" + verified: true tags: sqli,ti-woocommerce-wishlist,wpscan,cve,cve2022,woocommerce,wordpress,wp-plugin,wp http: diff --git a/http/cves/2022/CVE-2022-0415.yaml b/http/cves/2022/CVE-2022-0415.yaml index 8539b0aab8..ddf84ff663 100644 --- a/http/cves/2022/CVE-2022-0415.yaml +++ b/http/cves/2022/CVE-2022-0415.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.44522 metadata: max-request: 6 - verified: "true" + verified: true tags: rce,gogs,authenticated,huntr,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-0434.yaml b/http/cves/2022/CVE-2022-0434.yaml index 437bda8adb..5a5f2667f1 100644 --- a/http/cves/2022/CVE-2022-0434.yaml +++ b/http/cves/2022/CVE-2022-0434.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01851 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wpscan,unauth variables: diff --git a/http/cves/2022/CVE-2022-0441.yaml b/http/cves/2022/CVE-2022-0441.yaml index 2077929161..e3709df657 100644 --- a/http/cves/2022/CVE-2022-0441.yaml +++ b/http/cves/2022/CVE-2022-0441.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.07571 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp-plugin,wpscan,wp,unauth variables: diff --git a/http/cves/2022/CVE-2022-0535.yaml b/http/cves/2022/CVE-2022-0535.yaml index 60446d1452..22dd103dcd 100644 --- a/http/cves/2022/CVE-2022-0535.yaml +++ b/http/cves/2022/CVE-2022-0535.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00111 metadata: max-request: 4 - verified: "true" + verified: true tags: cve2022,wp-plugin,xss,authenticated,e2pdf,wpscan,cve,wordpress,wp http: diff --git a/http/cves/2022/CVE-2022-0594.yaml b/http/cves/2022/CVE-2022-0594.yaml index 2fb34b3fe9..419c11ec83 100644 --- a/http/cves/2022/CVE-2022-0594.yaml +++ b/http/cves/2022/CVE-2022-0594.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00302 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp,wp-plugin,exposure,wpscan http: - method: GET diff --git a/http/cves/2022/CVE-2022-0656.yaml b/http/cves/2022/CVE-2022-0656.yaml index 0e800b51de..d5e3ba38fc 100644 --- a/http/cves/2022/CVE-2022-0656.yaml +++ b/http/cves/2022/CVE-2022-0656.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 google-query: inurl:"/wp-content/plugins/udraw" - verified: "true" + verified: true tags: wp,wordpress,wp-plugin,unauth,cve,cve2022,lfi,udraw,wpscan http: diff --git a/http/cves/2022/CVE-2022-0660.yaml b/http/cves/2022/CVE-2022-0660.yaml index 00c1c53be7..7e57ac641b 100644 --- a/http/cves/2022/CVE-2022-0660.yaml +++ b/http/cves/2022/CVE-2022-0660.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.0053 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2022,microweber,disclosure,authenticated,huntr,cve http: diff --git a/http/cves/2022/CVE-2022-0678.yaml b/http/cves/2022/CVE-2022-0678.yaml index db1c4ae1da..d87dbc0531 100644 --- a/http/cves/2022/CVE-2022-0678.yaml +++ b/http/cves/2022/CVE-2022-0678.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:780351152 - verified: "true" + verified: true tags: huntr,cve,cve2022,xss,microweber http: diff --git a/http/cves/2022/CVE-2022-0679.yaml b/http/cves/2022/CVE-2022-0679.yaml index c5502e1145..aa14fd17a9 100644 --- a/http/cves/2022/CVE-2022-0679.yaml +++ b/http/cves/2022/CVE-2022-0679.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00661 metadata: max-request: 1 - verified: "true" + verified: true tags: narnoo-distributor,cve,cve2022,wordpress,wp-plugin,wpscan,wp,rce,unauth,lfi http: diff --git a/http/cves/2022/CVE-2022-0693.yaml b/http/cves/2022/CVE-2022-0693.yaml index cb80a827e1..62ea6bfba5 100644 --- a/http/cves/2022/CVE-2022-0693.yaml +++ b/http/cves/2022/CVE-2022-0693.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00782 metadata: max-request: 1 - verified: "true" + verified: true tags: unauth,wpscan,wp-plugin,wp,sqli,wordpress,master-elements,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-0747.yaml b/http/cves/2022/CVE-2022-0747.yaml index 46b5f8736d..548351bd31 100644 --- a/http/cves/2022/CVE-2022-0747.yaml +++ b/http/cves/2022/CVE-2022-0747.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,infographic-and-list-builder-ilist,wpscan http: diff --git a/http/cves/2022/CVE-2022-0760.yaml b/http/cves/2022/CVE-2022-0760.yaml index 27c91e7d18..e1b0c29bd2 100644 --- a/http/cves/2022/CVE-2022-0760.yaml +++ b/http/cves/2022/CVE-2022-0760.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00879 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,simple-link-directory,unauth,wpscan http: diff --git a/http/cves/2022/CVE-2022-0769.yaml b/http/cves/2022/CVE-2022-0769.yaml index 031cd678bc..7b71319c0b 100644 --- a/http/cves/2022/CVE-2022-0769.yaml +++ b/http/cves/2022/CVE-2022-0769.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: wp,users-ultra,wpscan,cve,cve2022,sqli,wordpress,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-0773.yaml b/http/cves/2022/CVE-2022-0773.yaml index 72407f58a7..dfba43cb83 100644 --- a/http/cves/2022/CVE-2022-0773.yaml +++ b/http/cves/2022/CVE-2022-0773.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: unauth,cve2022,sqli,wp-plugin,wp,documentor-lite,wpscan,cve,wordpress http: diff --git a/http/cves/2022/CVE-2022-0781.yaml b/http/cves/2022/CVE-2022-0781.yaml index 5d77e22fc4..c6508b80de 100644 --- a/http/cves/2022/CVE-2022-0781.yaml +++ b/http/cves/2022/CVE-2022-0781.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01112 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,wpscan,nirweb-support,unauth variables: diff --git a/http/cves/2022/CVE-2022-0784.yaml b/http/cves/2022/CVE-2022-0784.yaml index f1baedbcd4..7eca40ccba 100644 --- a/http/cves/2022/CVE-2022-0784.yaml +++ b/http/cves/2022/CVE-2022-0784.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01515 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,wpscan,wp-plugin,wp,sqli,wp-experiments-free,unauth,cve2022,wordpress http: diff --git a/http/cves/2022/CVE-2022-0785.yaml b/http/cves/2022/CVE-2022-0785.yaml index c37d942f42..ed6a0c7d5b 100644 --- a/http/cves/2022/CVE-2022-0785.yaml +++ b/http/cves/2022/CVE-2022-0785.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01364 metadata: max-request: 1 - verified: "true" + verified: true tags: sqli,wordpress,wp-plugin,unauth,daily-prayer-time-for-mosques,wpscan,cve,cve2022,wp http: diff --git a/http/cves/2022/CVE-2022-0786.yaml b/http/cves/2022/CVE-2022-0786.yaml index a8fc9a0782..66094693a2 100644 --- a/http/cves/2022/CVE-2022-0786.yaml +++ b/http/cves/2022/CVE-2022-0786.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.02366 metadata: max-request: 1 - verified: "true" + verified: true tags: sqli,kivicare-clinic-management-system,unauth,wordpress,wp-plugin,wp,cve,cve2022,wpscan http: diff --git a/http/cves/2022/CVE-2022-0788.yaml b/http/cves/2022/CVE-2022-0788.yaml index 00cdfc6650..aa91b90fa0 100644 --- a/http/cves/2022/CVE-2022-0788.yaml +++ b/http/cves/2022/CVE-2022-0788.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.02366 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,sqli,wordpress,wp-plugin,cve2022,wp,wp-fundraising-donation,unauth,wpscan http: diff --git a/http/cves/2022/CVE-2022-0817.yaml b/http/cves/2022/CVE-2022-0817.yaml index 6e2d6a1ab3..2769b6b78b 100644 --- a/http/cves/2022/CVE-2022-0817.yaml +++ b/http/cves/2022/CVE-2022-0817.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01364 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2022,wp,unauth,sqli,cve,wp-plugin,badgeos,wpscan,wordpress variables: diff --git a/http/cves/2022/CVE-2022-0827.yaml b/http/cves/2022/CVE-2022-0827.yaml index f62c641b9a..32c69d87aa 100644 --- a/http/cves/2022/CVE-2022-0827.yaml +++ b/http/cves/2022/CVE-2022-0827.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.02366 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,bestbooks,unauthenticated http: diff --git a/http/cves/2022/CVE-2022-0846.yaml b/http/cves/2022/CVE-2022-0846.yaml index ad294b3711..3901e92395 100644 --- a/http/cves/2022/CVE-2022-0846.yaml +++ b/http/cves/2022/CVE-2022-0846.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: wordpress,wp-plugin,wp,unauth,wpscan,cve,cve2022,sqli,speakout,speakout-email-petitions http: diff --git a/http/cves/2022/CVE-2022-0864.yaml b/http/cves/2022/CVE-2022-0864.yaml index 1fe454fafc..983a8ee389 100644 --- a/http/cves/2022/CVE-2022-0864.yaml +++ b/http/cves/2022/CVE-2022-0864.yaml @@ -14,7 +14,7 @@ info: cve-id: CVE-2022-0864 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2022,xss,authenticated,updraftplus,wpscan,cve,wp-plugin,wp,wordpress http: diff --git a/http/cves/2022/CVE-2022-0867.yaml b/http/cves/2022/CVE-2022-0867.yaml index 75be37c3f1..ce95b64fee 100644 --- a/http/cves/2022/CVE-2022-0867.yaml +++ b/http/cves/2022/CVE-2022-0867.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.0208 metadata: max-request: 2 - verified: "true" + verified: true tags: unauth,wp,cve2022,wordpress,wp-plugin,arprice-responsive-pricing-table,sqli,wpscan,cve http: diff --git a/http/cves/2022/CVE-2022-0870.yaml b/http/cves/2022/CVE-2022-0870.yaml index 84268ef880..4f98c9369c 100644 --- a/http/cves/2022/CVE-2022-0870.yaml +++ b/http/cves/2022/CVE-2022-0870.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00125 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,cve2022,ssrf,gogs,authenticated,huntr http: diff --git a/http/cves/2022/CVE-2022-0885.yaml b/http/cves/2022/CVE-2022-0885.yaml index 2b29ecae5f..c8bd3bba65 100644 --- a/http/cves/2022/CVE-2022-0885.yaml +++ b/http/cves/2022/CVE-2022-0885.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.07018 metadata: max-request: 1 - verified: "true" + verified: true tags: unauth,wpscan,wp-plugin,rce,wp,wordpress,member-hero,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-0948.yaml b/http/cves/2022/CVE-2022-0948.yaml index 3c0dfce3d3..841dccd20b 100644 --- a/http/cves/2022/CVE-2022-0948.yaml +++ b/http/cves/2022/CVE-2022-0948.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.03454 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,wp,unauth,sqli,woc-order-alert,wpscan,cve2022,wordpress,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-0949.yaml b/http/cves/2022/CVE-2022-0949.yaml index 1ffec25df5..24a74c6c9e 100644 --- a/http/cves/2022/CVE-2022-0949.yaml +++ b/http/cves/2022/CVE-2022-0949.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.01364 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,stopbadbots,wp-plugin,wp,unauth,wpscan,cve2022,sqli,wordpress variables: diff --git a/http/cves/2022/CVE-2022-0952.yaml b/http/cves/2022/CVE-2022-0952.yaml index cc35b7d211..d899a26aeb 100644 --- a/http/cves/2022/CVE-2022-0952.yaml +++ b/http/cves/2022/CVE-2022-0952.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.34971 metadata: max-request: 3 - verified: "true" + verified: true tags: wp,wp-plugin,sitemap,wpscan,cve,cve2022,wordpress http: diff --git a/http/cves/2022/CVE-2022-0954.yaml b/http/cves/2022/CVE-2022-0954.yaml index 1fda195fc2..174675612b 100644 --- a/http/cves/2022/CVE-2022-0954.yaml +++ b/http/cves/2022/CVE-2022-0954.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00135 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,xss,microweber,huntr http: diff --git a/http/cves/2022/CVE-2022-0963.yaml b/http/cves/2022/CVE-2022-0963.yaml index f4d217b465..9a1d8f50bd 100644 --- a/http/cves/2022/CVE-2022-0963.yaml +++ b/http/cves/2022/CVE-2022-0963.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00135 metadata: max-request: 3 - verified: "true" + verified: true tags: xss,microweber,cms,authenticated,huntr,cve,cve2022,intrusive http: diff --git a/http/cves/2022/CVE-2022-1007.yaml b/http/cves/2022/CVE-2022-1007.yaml index 396a56a7dd..83ea8e6d7d 100644 --- a/http/cves/2022/CVE-2022-1007.yaml +++ b/http/cves/2022/CVE-2022-1007.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00078 metadata: max-request: 2 - verified: "true" + verified: true tags: wp-plugin,advanced-booking-calendar,cve,cve2022,wp,authenticated,wpscan,wordpress,xss http: diff --git a/http/cves/2022/CVE-2022-1013.yaml b/http/cves/2022/CVE-2022-1013.yaml index 74eccdb6b4..0b3536fe00 100644 --- a/http/cves/2022/CVE-2022-1013.yaml +++ b/http/cves/2022/CVE-2022-1013.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00876 metadata: max-request: 1 - verified: "true" + verified: true tags: wp,unauth,wpscan,cve,cve2022,sqli,wordpress,wp-plugin,personal-dictionary http: diff --git a/http/cves/2022/CVE-2022-1040.yaml b/http/cves/2022/CVE-2022-1040.yaml index 83875d1695..31014a941b 100644 --- a/http/cves/2022/CVE-2022-1040.yaml +++ b/http/cves/2022/CVE-2022-1040.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Sophos" - verified: "true" + verified: true tags: cve,cve2022,sophos,firewall,auth-bypass,rce,kev http: diff --git a/http/cves/2022/CVE-2022-1057.yaml b/http/cves/2022/CVE-2022-1057.yaml index 09252118e3..3219f61cf0 100644 --- a/http/cves/2022/CVE-2022-1057.yaml +++ b/http/cves/2022/CVE-2022-1057.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.11201 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,wpscan,wordpress,wp-plugin,wp,pricing-deals-for-woocommerce,unauth http: diff --git a/http/cves/2022/CVE-2022-1058.yaml b/http/cves/2022/CVE-2022-1058.yaml index df23e0ef0a..810588b484 100644 --- a/http/cves/2022/CVE-2022-1058.yaml +++ b/http/cves/2022/CVE-2022-1058.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: title:"Gitea" - verified: "true" + verified: true tags: huntr,cve,cve2022,open-redirect,gitea http: diff --git a/http/cves/2022/CVE-2022-1168.yaml b/http/cves/2022/CVE-2022-1168.yaml index 7108d97767..f50ae82644 100644 --- a/http/cves/2022/CVE-2022-1168.yaml +++ b/http/cves/2022/CVE-2022-1168.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 google-query: inurl:"wp-content/plugins/wp-jobsearch" - verified: "true" + verified: true tags: wp-jobsearch",wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss http: diff --git a/http/cves/2022/CVE-2022-1221.yaml b/http/cves/2022/CVE-2022-1221.yaml index 9ffd26db02..5e4e2f6733 100644 --- a/http/cves/2022/CVE-2022-1221.yaml +++ b/http/cves/2022/CVE-2022-1221.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2022,wpscan,xss,wordpress,wp-plugin,wp,cve http: diff --git a/http/cves/2022/CVE-2022-1329.yaml b/http/cves/2022/CVE-2022-1329.yaml index 3097926c77..fbad5268ae 100644 --- a/http/cves/2022/CVE-2022-1329.yaml +++ b/http/cves/2022/CVE-2022-1329.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.96934 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,cve2022,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload http: diff --git a/http/cves/2022/CVE-2022-1388.yaml b/http/cves/2022/CVE-2022-1388.yaml index 51d9880012..167e3c7b4b 100644 --- a/http/cves/2022/CVE-2022-1388.yaml +++ b/http/cves/2022/CVE-2022-1388.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: http.title:"BIG-IP®-+Redirect" +"Server" - verified: "true" + verified: true tags: f5,bigip,cve,cve2022,rce,mirai,kev variables: diff --git a/http/cves/2022/CVE-2022-1398.yaml b/http/cves/2022/CVE-2022-1398.yaml index ae5153bbeb..0ced7e8421 100644 --- a/http/cves/2022/CVE-2022-1398.yaml +++ b/http/cves/2022/CVE-2022-1398.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00319 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,wpscan,external-media-without-import,authenticated http: diff --git a/http/cves/2022/CVE-2022-1442.yaml b/http/cves/2022/CVE-2022-1442.yaml index e17ce6e69d..a2943a65c1 100644 --- a/http/cves/2022/CVE-2022-1442.yaml +++ b/http/cves/2022/CVE-2022-1442.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 2 google-query: inurl:/wp-content/plugins/metform - verified: "true" + verified: true tags: wpscan,cve2022,wordpress,wp-plugin,disclosure,unauth,metform,cve,wp http: diff --git a/http/cves/2022/CVE-2022-1574.yaml b/http/cves/2022/CVE-2022-1574.yaml index 06f765d76b..c162dd4824 100644 --- a/http/cves/2022/CVE-2022-1574.yaml +++ b/http/cves/2022/CVE-2022-1574.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.60802 metadata: max-request: 2 - verified: "true" + verified: true tags: wp-plugin,wp,fileupload,unauth,wpscan,cve2022,wordpress,intrusive,cve,html2wp http: diff --git a/http/cves/2022/CVE-2022-1595.yaml b/http/cves/2022/CVE-2022-1595.yaml index f151784ca3..dae7dafeaf 100644 --- a/http/cves/2022/CVE-2022-1595.yaml +++ b/http/cves/2022/CVE-2022-1595.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00145 metadata: max-request: 1 - verified: "true" + verified: true tags: unauth,wpscan,cve,cve2022,wordpress,wp-plugin,wp,hc-custom-wp-admin-url http: diff --git a/http/cves/2022/CVE-2022-1597.yaml b/http/cves/2022/CVE-2022-1597.yaml index 3a1b6feba6..e7a4f186f5 100644 --- a/http/cves/2022/CVE-2022-1597.yaml +++ b/http/cves/2022/CVE-2022-1597.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 google-query: inurl:/wp-content/plugins/wpqa - verified: "true" + verified: true tags: wpscan,xss,wordpress,wp-plugin,wp,cve,cve2022,wpqa variables: diff --git a/http/cves/2022/CVE-2022-1598.yaml b/http/cves/2022/CVE-2022-1598.yaml index b1466bb047..64ee85feab 100644 --- a/http/cves/2022/CVE-2022-1598.yaml +++ b/http/cves/2022/CVE-2022-1598.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 google-query: inurl:/wp-content/plugins/wpqa - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp-plugin,wpqa,idor,wpscan http: diff --git a/http/cves/2022/CVE-2022-1724.yaml b/http/cves/2022/CVE-2022-1724.yaml index 47a57ac27f..1a1ced3914 100644 --- a/http/cves/2022/CVE-2022-1724.yaml +++ b/http/cves/2022/CVE-2022-1724.yaml @@ -17,7 +17,7 @@ info: epss-score: 0.00071 metadata: max-request: 1 - verified: "true" + verified: true tags: xss,wp,wordpress,wpscan,cve,cve2022,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-1768.yaml b/http/cves/2022/CVE-2022-1768.yaml index f232b58b8b..be86437a72 100644 --- a/http/cves/2022/CVE-2022-1768.yaml +++ b/http/cves/2022/CVE-2022-1768.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.72757 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp-plugin,wp,sqli,rsvpmaker http: diff --git a/http/cves/2022/CVE-2022-1815.yaml b/http/cves/2022/CVE-2022-1815.yaml index ef42dfe54d..5f02d9d17a 100644 --- a/http/cves/2022/CVE-2022-1815.yaml +++ b/http/cves/2022/CVE-2022-1815.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.0061 metadata: max-request: 1 - verified: "true" + verified: true tags: huntr,cve,cve2022,drawio,ssrf,oast,oss,jgraph http: diff --git a/http/cves/2022/CVE-2022-1903.yaml b/http/cves/2022/CVE-2022-1903.yaml index f8f689bc58..f295b76c68 100644 --- a/http/cves/2022/CVE-2022-1903.yaml +++ b/http/cves/2022/CVE-2022-1903.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-862 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated http: diff --git a/http/cves/2022/CVE-2022-1904.yaml b/http/cves/2022/CVE-2022-1904.yaml index 4ba532bfe1..7988d9dff5 100644 --- a/http/cves/2022/CVE-2022-1904.yaml +++ b/http/cves/2022/CVE-2022-1904.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00083 metadata: max-request: 1 - verified: "true" + verified: true tags: wp,wordpress,wpscan,cve,cve2022,wp-plugin,xss http: diff --git a/http/cves/2022/CVE-2022-1906.yaml b/http/cves/2022/CVE-2022-1906.yaml index 48d0f7f149..043af0b522 100644 --- a/http/cves/2022/CVE-2022-1906.yaml +++ b/http/cves/2022/CVE-2022-1906.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 google-query: inurl:/wp-content/plugins/digiproveblog - verified: "true" + verified: true tags: wordpress,xss,wp-plugin,wp,wpscan,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-1910.yaml b/http/cves/2022/CVE-2022-1910.yaml index e28e810b10..41d09ca8bb 100644 --- a/http/cves/2022/CVE-2022-1910.yaml +++ b/http/cves/2022/CVE-2022-1910.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 1 - verified: "true" + verified: true tags: wordpress,xss,auxin-elements,wpscan,cve,cve2017,wp-plugin,wp http: diff --git a/http/cves/2022/CVE-2022-1933.yaml b/http/cves/2022/CVE-2022-1933.yaml index 6be16bc37f..c6561281b4 100644 --- a/http/cves/2022/CVE-2022-1933.yaml +++ b/http/cves/2022/CVE-2022-1933.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00083 metadata: max-request: 1 - verified: "true" + verified: true tags: cdi,wpscan,cve,cve2022,wp-plugin,wp,wordpress,xss http: diff --git a/http/cves/2022/CVE-2022-1937.yaml b/http/cves/2022/CVE-2022-1937.yaml index fbf0dca7b1..965670afde 100644 --- a/http/cves/2022/CVE-2022-1937.yaml +++ b/http/cves/2022/CVE-2022-1937.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00083 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,xss,awin,wpscan,wp-plugin,wp,wordpress,authenticated http: diff --git a/http/cves/2022/CVE-2022-1946.yaml b/http/cves/2022/CVE-2022-1946.yaml index 843d87bab4..5d69be7fa6 100644 --- a/http/cves/2022/CVE-2022-1946.yaml +++ b/http/cves/2022/CVE-2022-1946.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 google-query: inurl:"/wp-content/plugins/gallery-album/" - verified: "true" + verified: true tags: wpscan,cve2022,wp,xss,wordpress,gallery,unauth,cve,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-2034.yaml b/http/cves/2022/CVE-2022-2034.yaml index 4e75cabc6d..572df3ef12 100644 --- a/http/cves/2022/CVE-2022-2034.yaml +++ b/http/cves/2022/CVE-2022-2034.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.01053 metadata: max-request: 100 - verified: "true" + verified: true tags: wp,disclosure,wpscan,cve,cve2022,sensei-lms,fuzz,hackerone,wordpress,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-21500.yaml b/http/cves/2022/CVE-2022-21500.yaml index a5c7397ce2..fba7584773 100644 --- a/http/cves/2022/CVE-2022-21500.yaml +++ b/http/cves/2022/CVE-2022-21500.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Login" "X-ORACLE-DMS-ECID" 200 - verified: "true" + verified: true tags: cve,cve2022,oracle,misconfig,auth-bypass http: diff --git a/http/cves/2022/CVE-2022-21661.yaml b/http/cves/2022/CVE-2022-21661.yaml index a09ba381c4..c60975e614 100644 --- a/http/cves/2022/CVE-2022-21661.yaml +++ b/http/cves/2022/CVE-2022-21661.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.95358 metadata: max-request: 1 - verified: "true" + verified: true tags: wp,sqli,wpquery,wpscan,packetstorm,cve,cve2022,wordpress http: diff --git a/http/cves/2022/CVE-2022-2219.yaml b/http/cves/2022/CVE-2022-2219.yaml index 6e0b9031be..b4092643d3 100644 --- a/http/cves/2022/CVE-2022-2219.yaml +++ b/http/cves/2022/CVE-2022-2219.yaml @@ -12,7 +12,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2022-2219 metadata: max-request: 2 - verified: "true" + verified: true tags: authenticated,cve,cve2022,wordpress,wp,xss,unyson,wp-plugin,wpscan http: diff --git a/http/cves/2022/CVE-2022-22242.yaml b/http/cves/2022/CVE-2022-22242.yaml index 906001dc0e..9c652fd416 100644 --- a/http/cves/2022/CVE-2022-22242.yaml +++ b/http/cves/2022/CVE-2022-22242.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: title:"Juniper Web Device Manager" - verified: "true" + verified: true tags: cve,cve2022,xss,juniper,junos http: diff --git a/http/cves/2022/CVE-2022-22733.yaml b/http/cves/2022/CVE-2022-22733.yaml index fa37f13235..bff525ee13 100644 --- a/http/cves/2022/CVE-2022-22733.yaml +++ b/http/cves/2022/CVE-2022-22733.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:816588900 - verified: "true" + verified: true tags: cve,cve2023,exposure,sharingsphere,apache http: diff --git a/http/cves/2022/CVE-2022-2290.yaml b/http/cves/2022/CVE-2022-2290.yaml index a43612cb57..25015fdb30 100644 --- a/http/cves/2022/CVE-2022-2290.yaml +++ b/http/cves/2022/CVE-2022-2290.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 3 shodan-query: title:"Trilium Notes" - verified: "true" + verified: true tags: cve,cve2022,xss,trilium,huntr http: diff --git a/http/cves/2022/CVE-2022-2314.yaml b/http/cves/2022/CVE-2022-2314.yaml index a94700ab68..2108b95ff3 100644 --- a/http/cves/2022/CVE-2022-2314.yaml +++ b/http/cves/2022/CVE-2022-2314.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.04893 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp,wp-plugin,rce,vr-calendar-sync,unauth,wpscan http: diff --git a/http/cves/2022/CVE-2022-23347.yaml b/http/cves/2022/CVE-2022-23347.yaml index 8239482209..3b303e182b 100644 --- a/http/cves/2022/CVE-2022-23347.yaml +++ b/http/cves/2022/CVE-2022-23347.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"BigAnt" - verified: "true" + verified: true tags: cve,cve2022,bigant,lfi http: diff --git a/http/cves/2022/CVE-2022-23348.yaml b/http/cves/2022/CVE-2022-23348.yaml index 639bc87256..1f2ce33995 100644 --- a/http/cves/2022/CVE-2022-23348.yaml +++ b/http/cves/2022/CVE-2022-23348.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"bigant" - verified: "true" + verified: true tags: cve,cve2022,bigant,unauth,exposure http: diff --git a/http/cves/2022/CVE-2022-2373.yaml b/http/cves/2022/CVE-2022-2373.yaml index f9652d974a..f410b20f2f 100644 --- a/http/cves/2022/CVE-2022-2373.yaml +++ b/http/cves/2022/CVE-2022-2373.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00392 metadata: max-request: 1 - verified: "true" + verified: true tags: simply-schedule-appointments,unauth,wpscan,cve,cve2022,wordpress,wp-plugin,wp http: diff --git a/http/cves/2022/CVE-2022-2379.yaml b/http/cves/2022/CVE-2022-2379.yaml index fe00594c7e..d6a87c78e0 100644 --- a/http/cves/2022/CVE-2022-2379.yaml +++ b/http/cves/2022/CVE-2022-2379.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.0257 metadata: max-request: 2 - verified: "true" + verified: true tags: wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-2383.yaml b/http/cves/2022/CVE-2022-2383.yaml index 2888f407b8..e42e45a451 100644 --- a/http/cves/2022/CVE-2022-2383.yaml +++ b/http/cves/2022/CVE-2022-2383.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 1 - verified: "true" + verified: true tags: wp,wordpress,wp-plugin,wpscan,cve,cve2022,xss http: diff --git a/http/cves/2022/CVE-2022-23854.yaml b/http/cves/2022/CVE-2022-23854.yaml index 5d5efdf57d..3845859535 100644 --- a/http/cves/2022/CVE-2022-23854.yaml +++ b/http/cves/2022/CVE-2022-23854.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"InTouch Access Anywhere" - verified: "true" + verified: true tags: lfi,packetstorm,cve,cve2022,aveva,intouch http: diff --git a/http/cves/2022/CVE-2022-23898.yaml b/http/cves/2022/CVE-2022-23898.yaml index a085bfd7b1..90739fceb5 100644 --- a/http/cves/2022/CVE-2022-23898.yaml +++ b/http/cves/2022/CVE-2022-23898.yaml @@ -21,7 +21,7 @@ info: max-request: 1 fofa-query: icon_hash="1464851260" shodan-query: http.favicon.hash:1464851260 - verified: "true" + verified: true tags: cve,cve2022,sqli,mcms variables: diff --git a/http/cves/2022/CVE-2022-24181.yaml b/http/cves/2022/CVE-2022-24181.yaml index 29b5e6b319..5910515ffe 100644 --- a/http/cves/2022/CVE-2022-24181.yaml +++ b/http/cves/2022/CVE-2022-24181.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00139 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,xss,oss,pkp-lib,edb http: diff --git a/http/cves/2022/CVE-2022-24223.yaml b/http/cves/2022/CVE-2022-24223.yaml index 34e18d91c5..65f9b52e72 100644 --- a/http/cves/2022/CVE-2022-24223.yaml +++ b/http/cves/2022/CVE-2022-24223.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: packetstorm,cve,cve2022,sqli,atom,cms http: diff --git a/http/cves/2022/CVE-2022-24264.yaml b/http/cves/2022/CVE-2022-24264.yaml index f4550e4ee1..839bde05a1 100644 --- a/http/cves/2022/CVE-2022-24264.yaml +++ b/http/cves/2022/CVE-2022-24264.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,cuppa,authenticated variables: diff --git a/http/cves/2022/CVE-2022-24265.yaml b/http/cves/2022/CVE-2022-24265.yaml index 05ad805470..0996a3a29e 100644 --- a/http/cves/2022/CVE-2022-24265.yaml +++ b/http/cves/2022/CVE-2022-24265.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,cuppa,authenticated http: diff --git a/http/cves/2022/CVE-2022-24266.yaml b/http/cves/2022/CVE-2022-24266.yaml index 4782651129..42c44ed56a 100644 --- a/http/cves/2022/CVE-2022-24266.yaml +++ b/http/cves/2022/CVE-2022-24266.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,cuppa,authenticated http: diff --git a/http/cves/2022/CVE-2022-2467.yaml b/http/cves/2022/CVE-2022-2467.yaml index 2deab6a7a9..3c835a014c 100644 --- a/http/cves/2022/CVE-2022-2467.yaml +++ b/http/cves/2022/CVE-2022-2467.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00866 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sourcecodester,garagemanagementsystem,sqli http: diff --git a/http/cves/2022/CVE-2022-24816.yaml b/http/cves/2022/CVE-2022-24816.yaml index 4810e74d61..87b45b3ace 100644 --- a/http/cves/2022/CVE-2022-24816.yaml +++ b/http/cves/2022/CVE-2022-24816.yaml @@ -23,7 +23,7 @@ info: max-request: 1 fofa-query: app="GeoServer" shodan-query: /geoserver/ - verified: "true" + verified: true tags: cve,cve2022,geoserver,rce http: diff --git a/http/cves/2022/CVE-2022-2486.yaml b/http/cves/2022/CVE-2022-2486.yaml index 3a0a1cb51d..71b151d385 100644 --- a/http/cves/2022/CVE-2022-2486.yaml +++ b/http/cves/2022/CVE-2022-2486.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: cve,cve2022,iot,wavlink,router,rce,oast http: diff --git a/http/cves/2022/CVE-2022-2487.yaml b/http/cves/2022/CVE-2022-2487.yaml index f4dfe04995..71cf85f57d 100644 --- a/http/cves/2022/CVE-2022-2487.yaml +++ b/http/cves/2022/CVE-2022-2487.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: cve,cve2022,iot,wavlink,router,rce,oast variables: diff --git a/http/cves/2022/CVE-2022-2488.yaml b/http/cves/2022/CVE-2022-2488.yaml index 1995ab9274..b035e37a16 100644 --- a/http/cves/2022/CVE-2022-2488.yaml +++ b/http/cves/2022/CVE-2022-2488.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: cve,cve2022,iot,wavlink,router,rce,oast http: diff --git a/http/cves/2022/CVE-2022-25125.yaml b/http/cves/2022/CVE-2022-25125.yaml index 0498d88ed5..439be54db3 100644 --- a/http/cves/2022/CVE-2022-25125.yaml +++ b/http/cves/2022/CVE-2022-25125.yaml @@ -21,7 +21,7 @@ info: max-request: 1 fofa-query: icon_hash="1464851260" shodan-query: http.favicon.hash:1464851260 - verified: "true" + verified: true tags: cve,cve2022,sqli,mcms variables: diff --git a/http/cves/2022/CVE-2022-25356.yaml b/http/cves/2022/CVE-2022-25356.yaml index e7be832cc6..bda28b002d 100644 --- a/http/cves/2022/CVE-2022-25356.yaml +++ b/http/cves/2022/CVE-2022-25356.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 google-query: inurl:"/SecurityGateway.dll" - verified: "true" + verified: true tags: cve,cve2022,altn,gateway,xml,injection http: diff --git a/http/cves/2022/CVE-2022-2546.yaml b/http/cves/2022/CVE-2022-2546.yaml index ef02d08165..e253bacf33 100644 --- a/http/cves/2022/CVE-2022-2546.yaml +++ b/http/cves/2022/CVE-2022-2546.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00361 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,all-in-one-wp-migration,authenticated,wpscan,cve2022,wordpress,wp-plugin,wp,xss http: diff --git a/http/cves/2022/CVE-2022-25481.yaml b/http/cves/2022/CVE-2022-25481.yaml index 5ea3f9e43b..b7d21161a7 100644 --- a/http/cves/2022/CVE-2022-25481.yaml +++ b/http/cves/2022/CVE-2022-25481.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: title:"ThinkPHP" - verified: "true" + verified: true tags: cve,cve2022,thinkphp,exposure,oss http: diff --git a/http/cves/2022/CVE-2022-25485.yaml b/http/cves/2022/CVE-2022-25485.yaml index 222390760c..4d1c9a0f95 100644 --- a/http/cves/2022/CVE-2022-25485.yaml +++ b/http/cves/2022/CVE-2022-25485.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-829 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,lfi,cuppa http: diff --git a/http/cves/2022/CVE-2022-25486.yaml b/http/cves/2022/CVE-2022-25486.yaml index e6c59b6c22..16ac79e893 100644 --- a/http/cves/2022/CVE-2022-25486.yaml +++ b/http/cves/2022/CVE-2022-25486.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-829 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,lfi,cuppa http: diff --git a/http/cves/2022/CVE-2022-25487.yaml b/http/cves/2022/CVE-2022-25487.yaml index 532d79f88b..989c04815f 100644 --- a/http/cves/2022/CVE-2022-25487.yaml +++ b/http/cves/2022/CVE-2022-25487.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-434 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,rce,atom,cms,unauth,packetstorm http: diff --git a/http/cves/2022/CVE-2022-25488.yaml b/http/cves/2022/CVE-2022-25488.yaml index e344aca146..b6463ccfb1 100644 --- a/http/cves/2022/CVE-2022-25488.yaml +++ b/http/cves/2022/CVE-2022-25488.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,atom,cms variables: diff --git a/http/cves/2022/CVE-2022-25489.yaml b/http/cves/2022/CVE-2022-25489.yaml index 9ec96ecb4b..be418026a8 100644 --- a/http/cves/2022/CVE-2022-25489.yaml +++ b/http/cves/2022/CVE-2022-25489.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,xss,atom,cms http: diff --git a/http/cves/2022/CVE-2022-25497.yaml b/http/cves/2022/CVE-2022-25497.yaml index b269e03cdb..31ee4132f5 100644 --- a/http/cves/2022/CVE-2022-25497.yaml +++ b/http/cves/2022/CVE-2022-25497.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-552 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,lfi,cuppa http: diff --git a/http/cves/2022/CVE-2022-2551.yaml b/http/cves/2022/CVE-2022-2551.yaml index 60af7a9d2f..94efe3e19f 100644 --- a/http/cves/2022/CVE-2022-2551.yaml +++ b/http/cves/2022/CVE-2022-2551.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 2 google-query: inurl:/backups-dup-lite/dup-installer/ - verified: "true" + verified: true tags: cve2022,wordpress,wp,wp-plugin,duplicator,wpscan,cve http: diff --git a/http/cves/2022/CVE-2022-2599.yaml b/http/cves/2022/CVE-2022-2599.yaml index 7e5f3013bc..21fbff8c1a 100644 --- a/http/cves/2022/CVE-2022-2599.yaml +++ b/http/cves/2022/CVE-2022-2599.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00064 metadata: max-request: 2 - verified: "true" + verified: true tags: wordpress,wp-plugin,xss,gotmls,authenticated,wpscan,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-26134.yaml b/http/cves/2022/CVE-2022-26134.yaml index 83ce05d7d5..c6d1c7bf78 100644 --- a/http/cves/2022/CVE-2022-26134.yaml +++ b/http/cves/2022/CVE-2022-26134.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: http.component:"Atlassian Confluence" - verified: "true" + verified: true tags: cve,cve2022,confluence,rce,ognl,oast,kev http: diff --git a/http/cves/2022/CVE-2022-2633.yaml b/http/cves/2022/CVE-2022-2633.yaml index 75ed556bcb..4e7ddd7049 100644 --- a/http/cves/2022/CVE-2022-2633.yaml +++ b/http/cves/2022/CVE-2022-2633.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-610 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2022,wp-plugin,unauth,ssrf,wpscan,cve,wordpress,wp,all-in-one-video-gallery http: diff --git a/http/cves/2022/CVE-2022-2733.yaml b/http/cves/2022/CVE-2022-2733.yaml index 627f810d24..e9952c2266 100644 --- a/http/cves/2022/CVE-2022-2733.yaml +++ b/http/cves/2022/CVE-2022-2733.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 2 shodan-query: title:"OpenEMR" - verified: "true" + verified: true tags: cve,cve2022,xss,openemr,authenticated,huntr http: diff --git a/http/cves/2022/CVE-2022-2756.yaml b/http/cves/2022/CVE-2022-2756.yaml index 35a0bff1f3..24f00e40ae 100644 --- a/http/cves/2022/CVE-2022-2756.yaml +++ b/http/cves/2022/CVE-2022-2756.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 3 shodan-query: title:"kavita" - verified: "true" + verified: true tags: ssrf,kavita,authenticated,huntr,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-27926.yaml b/http/cves/2022/CVE-2022-27926.yaml index 447ddb7c22..bd586f1bfc 100644 --- a/http/cves/2022/CVE-2022-27926.yaml +++ b/http/cves/2022/CVE-2022-27926.yaml @@ -20,7 +20,7 @@ info: cpe: cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,zimbra,xss,kev http: diff --git a/http/cves/2022/CVE-2022-27927.yaml b/http/cves/2022/CVE-2022-27927.yaml index c7a2be6e95..7ec5bd1256 100644 --- a/http/cves/2022/CVE-2022-27927.yaml +++ b/http/cves/2022/CVE-2022-27927.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00961 metadata: max-request: 1 - verified: "true" + verified: true tags: microfinance,edb,cve,cve2022,sqli variables: diff --git a/http/cves/2022/CVE-2022-27984.yaml b/http/cves/2022/CVE-2022-27984.yaml index b1d721106e..a6f2da4571 100644 --- a/http/cves/2022/CVE-2022-27984.yaml +++ b/http/cves/2022/CVE-2022-27984.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,cuppa,authenticated http: diff --git a/http/cves/2022/CVE-2022-27985.yaml b/http/cves/2022/CVE-2022-27985.yaml index 6566568419..caa8d04154 100644 --- a/http/cves/2022/CVE-2022-27985.yaml +++ b/http/cves/2022/CVE-2022-27985.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-89 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,cuppa,authenticated variables: diff --git a/http/cves/2022/CVE-2022-28032.yaml b/http/cves/2022/CVE-2022-28032.yaml index 494f9f5794..e6c1d674c2 100644 --- a/http/cves/2022/CVE-2022-28032.yaml +++ b/http/cves/2022/CVE-2022-28032.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,atom,cms http: diff --git a/http/cves/2022/CVE-2022-28079.yaml b/http/cves/2022/CVE-2022-28079.yaml index 5153b3d5a8..66f8884c32 100644 --- a/http/cves/2022/CVE-2022-28079.yaml +++ b/http/cves/2022/CVE-2022-28079.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.79301 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,cms,collegemanagement variables: diff --git a/http/cves/2022/CVE-2022-28117.yaml b/http/cves/2022/CVE-2022-28117.yaml index 88d9864d69..9a0212e908 100644 --- a/http/cves/2022/CVE-2022-28117.yaml +++ b/http/cves/2022/CVE-2022-28117.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00943 metadata: max-request: 4 - verified: "true" + verified: true tags: authenticated,packetstorm,cve,cve2022,ssrf,navigate,cms,lfi http: diff --git a/http/cves/2022/CVE-2022-28219.yaml b/http/cves/2022/CVE-2022-28219.yaml index c96e2a416f..62afdff50a 100644 --- a/http/cves/2022/CVE-2022-28219.yaml +++ b/http/cves/2022/CVE-2022-28219.yaml @@ -25,7 +25,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"ADAudit Plus" || http.title:"ManageEngine - ADManager Plus" - verified: "true" + verified: true tags: cve,cve2022,xxe,rce,zoho,manageengine,unauth http: diff --git a/http/cves/2022/CVE-2022-28923.yaml b/http/cves/2022/CVE-2022-28923.yaml index 7509e7fd86..ec20351cfd 100644 --- a/http/cves/2022/CVE-2022-28923.yaml +++ b/http/cves/2022/CVE-2022-28923.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00821 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: 'Server: caddy' tags: cve,cve2022,redirect,caddy,webserver diff --git a/http/cves/2022/CVE-2022-28955.yaml b/http/cves/2022/CVE-2022-28955.yaml index 969ae37e9c..84356e19b0 100644 --- a/http/cves/2022/CVE-2022-28955.yaml +++ b/http/cves/2022/CVE-2022-28955.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"DIR-816L" - verified: "true" + verified: true tags: cve,cve2022,dlink,exposure http: diff --git a/http/cves/2022/CVE-2022-29004.yaml b/http/cves/2022/CVE-2022-29004.yaml index fdd4a8f35f..8cdff8dd4f 100644 --- a/http/cves/2022/CVE-2022-29004.yaml +++ b/http/cves/2022/CVE-2022-29004.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00103 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,xss,authenticated,edms http: - raw: diff --git a/http/cves/2022/CVE-2022-29005.yaml b/http/cves/2022/CVE-2022-29005.yaml index 2398c15948..5e452600de 100644 --- a/http/cves/2022/CVE-2022-29005.yaml +++ b/http/cves/2022/CVE-2022-29005.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00079 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,xss,obcs,authenticated http: - raw: diff --git a/http/cves/2022/CVE-2022-29006.yaml b/http/cves/2022/CVE-2022-29006.yaml index 5d28986596..41490d10f4 100644 --- a/http/cves/2022/CVE-2022-29006.yaml +++ b/http/cves/2022/CVE-2022-29006.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.16225 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,auth-bypass,edb http: - raw: diff --git a/http/cves/2022/CVE-2022-29007.yaml b/http/cves/2022/CVE-2022-29007.yaml index 2172f2cbe4..eb72a6b090 100644 --- a/http/cves/2022/CVE-2022-29007.yaml +++ b/http/cves/2022/CVE-2022-29007.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.16225 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,auth-bypass,edb http: - raw: diff --git a/http/cves/2022/CVE-2022-29009.yaml b/http/cves/2022/CVE-2022-29009.yaml index 7262c36121..09a81fcb76 100644 --- a/http/cves/2022/CVE-2022-29009.yaml +++ b/http/cves/2022/CVE-2022-29009.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.16225 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2022,sqli,auth-bypass,edb,cve http: - raw: diff --git a/http/cves/2022/CVE-2022-29153.yaml b/http/cves/2022/CVE-2022-29153.yaml index 41697b53bd..871b137c31 100644 --- a/http/cves/2022/CVE-2022-29153.yaml +++ b/http/cves/2022/CVE-2022-29153.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: title:"Consul by HashiCorp" - verified: "true" + verified: true tags: cve,cve2022,consul,hashicorp,ssrf http: diff --git a/http/cves/2022/CVE-2022-29298.yaml b/http/cves/2022/CVE-2022-29298.yaml index ace8563250..bf1f07c71a 100644 --- a/http/cves/2022/CVE-2022-29298.yaml +++ b/http/cves/2022/CVE-2022-29298.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"SolarView Compact" - verified: "true" + verified: true tags: lfi,solarview,edb,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-29303.yaml b/http/cves/2022/CVE-2022-29303.yaml index 83a3d2365b..211feb758d 100644 --- a/http/cves/2022/CVE-2022-29303.yaml +++ b/http/cves/2022/CVE-2022-29303.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"SolarView Compact" - verified: "true" + verified: true tags: injection,solarview,edb,packetstorm,cve,cve2022,rce variables: diff --git a/http/cves/2022/CVE-2022-29349.yaml b/http/cves/2022/CVE-2022-29349.yaml index d67c80ef7d..01e52b5c73 100644 --- a/http/cves/2022/CVE-2022-29349.yaml +++ b/http/cves/2022/CVE-2022-29349.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"kkFileView" - verified: "true" + verified: true tags: cve,cve2022,kkFileView,xss http: diff --git a/http/cves/2022/CVE-2022-29383.yaml b/http/cves/2022/CVE-2022-29383.yaml index e23b52429f..bf311cf3eb 100644 --- a/http/cves/2022/CVE-2022-29383.yaml +++ b/http/cves/2022/CVE-2022-29383.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.54769 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,netgear,router http: diff --git a/http/cves/2022/CVE-2022-29455.yaml b/http/cves/2022/CVE-2022-29455.yaml index 52fd499aa3..6dc9cec971 100644 --- a/http/cves/2022/CVE-2022-29455.yaml +++ b/http/cves/2022/CVE-2022-29455.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00148 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,xss,wordpress,elementor http: diff --git a/http/cves/2022/CVE-2022-29548.yaml b/http/cves/2022/CVE-2022-29548.yaml index 5c517ba3a0..2ddcfabbe2 100644 --- a/http/cves/2022/CVE-2022-29548.yaml +++ b/http/cves/2022/CVE-2022-29548.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 google-query: inurl:"carbon/admin/login" - verified: "true" + verified: true tags: cve,cve2022,wso2,xss,packetstorm http: diff --git a/http/cves/2022/CVE-2022-29775.yaml b/http/cves/2022/CVE-2022-29775.yaml index 2e3f9534fe..067536ad9a 100644 --- a/http/cves/2022/CVE-2022-29775.yaml +++ b/http/cves/2022/CVE-2022-29775.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"iSpy is running" - verified: "true" + verified: true tags: cve,cve2022,ispy,auth-bypass http: diff --git a/http/cves/2022/CVE-2022-30073.yaml b/http/cves/2022/CVE-2022-30073.yaml index a98f713182..82d35222f4 100644 --- a/http/cves/2022/CVE-2022-30073.yaml +++ b/http/cves/2022/CVE-2022-30073.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00124 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,cve2022,wbcecms,xss http: diff --git a/http/cves/2022/CVE-2022-30489.yaml b/http/cves/2022/CVE-2022-30489.yaml index 7b7fa899f3..43ae27c14a 100644 --- a/http/cves/2022/CVE-2022-30489.yaml +++ b/http/cves/2022/CVE-2022-30489.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: xss,cve2022,wavlink,cve,router,iot http: diff --git a/http/cves/2022/CVE-2022-30512.yaml b/http/cves/2022/CVE-2022-30512.yaml index 04353d90a0..4407768314 100644 --- a/http/cves/2022/CVE-2022-30512.yaml +++ b/http/cves/2022/CVE-2022-30512.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01442 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli http: diff --git a/http/cves/2022/CVE-2022-3062.yaml b/http/cves/2022/CVE-2022-3062.yaml index 32dffa12b9..014eae5913 100644 --- a/http/cves/2022/CVE-2022-3062.yaml +++ b/http/cves/2022/CVE-2022-3062.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,authenticated,wordpress,wp-plugin,wp,wpscan,cve2022,xss,simple-file-list http: diff --git a/http/cves/2022/CVE-2022-30776.yaml b/http/cves/2022/CVE-2022-30776.yaml index 20be79e613..e7b1e4bddd 100644 --- a/http/cves/2022/CVE-2022-30776.yaml +++ b/http/cves/2022/CVE-2022-30776.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"atmail" - verified: "true" + verified: true tags: cve,cve2022,atmail,xss http: diff --git a/http/cves/2022/CVE-2022-30777.yaml b/http/cves/2022/CVE-2022-30777.yaml index 70cf1d90c2..d85c02d448 100644 --- a/http/cves/2022/CVE-2022-30777.yaml +++ b/http/cves/2022/CVE-2022-30777.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: title:"h-sphere" - verified: "true" + verified: true tags: cve,cve2022,parallels,hsphere,xss http: diff --git a/http/cves/2022/CVE-2022-31126.yaml b/http/cves/2022/CVE-2022-31126.yaml index 9e2e5a6d6b..145256b5b0 100644 --- a/http/cves/2022/CVE-2022-31126.yaml +++ b/http/cves/2022/CVE-2022-31126.yaml @@ -23,7 +23,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Roxy-WI" - verified: "true" + verified: true tags: cve,cve2022,rce,unauth,roxy,packetstorm http: diff --git a/http/cves/2022/CVE-2022-31268.yaml b/http/cves/2022/CVE-2022-31268.yaml index 0fa47d802c..2148d72457 100644 --- a/http/cves/2022/CVE-2022-31268.yaml +++ b/http/cves/2022/CVE-2022-31268.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Gitblit" - verified: "true" + verified: true tags: cve,cve2022,lfi,gitblit http: diff --git a/http/cves/2022/CVE-2022-31269.yaml b/http/cves/2022/CVE-2022-31269.yaml index 54e1591113..e506fd5fc1 100644 --- a/http/cves/2022/CVE-2022-31269.yaml +++ b/http/cves/2022/CVE-2022-31269.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Linear eMerge" - verified: "true" + verified: true tags: cve2022,emerge,exposure,packetstorm,cve http: diff --git a/http/cves/2022/CVE-2022-31299.yaml b/http/cves/2022/CVE-2022-31299.yaml index 38afc80f6e..c68b932b0b 100644 --- a/http/cves/2022/CVE-2022-31299.yaml +++ b/http/cves/2022/CVE-2022-31299.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00103 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,haraj,xss http: diff --git a/http/cves/2022/CVE-2022-31373.yaml b/http/cves/2022/CVE-2022-31373.yaml index cfcd105da8..721776d9bd 100644 --- a/http/cves/2022/CVE-2022-31373.yaml +++ b/http/cves/2022/CVE-2022-31373.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"SolarView Compact" - verified: "true" + verified: true tags: cve,cve2022,xss,solarview http: diff --git a/http/cves/2022/CVE-2022-31499.yaml b/http/cves/2022/CVE-2022-31499.yaml index 04ef29df6a..ab87121e82 100644 --- a/http/cves/2022/CVE-2022-31499.yaml +++ b/http/cves/2022/CVE-2022-31499.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: title:"eMerge" - verified: "true" + verified: true tags: packetstorm,cve,cve2022,emerge,rce http: diff --git a/http/cves/2022/CVE-2022-31656.yaml b/http/cves/2022/CVE-2022-31656.yaml index 59bde7fde3..3651a12cdb 100644 --- a/http/cves/2022/CVE-2022-31656.yaml +++ b/http/cves/2022/CVE-2022-31656.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:-1250474341 - verified: "true" + verified: true tags: cve,cve2022,vmware,lfi http: diff --git a/http/cves/2022/CVE-2022-31798.yaml b/http/cves/2022/CVE-2022-31798.yaml index 7a46e8a47c..cea4fff8ca 100644 --- a/http/cves/2022/CVE-2022-31798.yaml +++ b/http/cves/2022/CVE-2022-31798.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"eMerge" - verified: "true" + verified: true tags: cve2022,emerge,nortek,xss,packetstorm,cve http: diff --git a/http/cves/2022/CVE-2022-31814.yaml b/http/cves/2022/CVE-2022-31814.yaml index f6f43522cb..59a7de4b16 100644 --- a/http/cves/2022/CVE-2022-31814.yaml +++ b/http/cves/2022/CVE-2022-31814.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.97126 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,pfsense,pfblockerng,rce,oast http: diff --git a/http/cves/2022/CVE-2022-31845.yaml b/http/cves/2022/CVE-2022-31845.yaml index 989932e038..b56923d326 100644 --- a/http/cves/2022/CVE-2022-31845.yaml +++ b/http/cves/2022/CVE-2022-31845.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve,cve2022,wavlink,exposure http: diff --git a/http/cves/2022/CVE-2022-31846.yaml b/http/cves/2022/CVE-2022-31846.yaml index 908f1a94a5..9f787eceb8 100644 --- a/http/cves/2022/CVE-2022-31846.yaml +++ b/http/cves/2022/CVE-2022-31846.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve,cve2022,wavlink,exposure http: diff --git a/http/cves/2022/CVE-2022-31847.yaml b/http/cves/2022/CVE-2022-31847.yaml index 68089484d0..a5808c9dfc 100644 --- a/http/cves/2022/CVE-2022-31847.yaml +++ b/http/cves/2022/CVE-2022-31847.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve,cve2022,wavlink,exposure http: diff --git a/http/cves/2022/CVE-2022-31854.yaml b/http/cves/2022/CVE-2022-31854.yaml index 6fc4657749..dd0b391325 100644 --- a/http/cves/2022/CVE-2022-31854.yaml +++ b/http/cves/2022/CVE-2022-31854.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.03161 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,cve2022,rce,codoforumrce,authenticated http: diff --git a/http/cves/2022/CVE-2022-32007.yaml b/http/cves/2022/CVE-2022-32007.yaml index 4bb9063e8d..9745e153c4 100644 --- a/http/cves/2022/CVE-2022-32007.yaml +++ b/http/cves/2022/CVE-2022-32007.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00458 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,eris,authenticated variables: diff --git a/http/cves/2022/CVE-2022-32015.yaml b/http/cves/2022/CVE-2022-32015.yaml index 2f17e92c35..0693c75d8e 100644 --- a/http/cves/2022/CVE-2022-32015.yaml +++ b/http/cves/2022/CVE-2022-32015.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00458 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,jobsearch variables: diff --git a/http/cves/2022/CVE-2022-32018.yaml b/http/cves/2022/CVE-2022-32018.yaml index 9d4c990710..bc9be3a37c 100644 --- a/http/cves/2022/CVE-2022-32018.yaml +++ b/http/cves/2022/CVE-2022-32018.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00458 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli variables: diff --git a/http/cves/2022/CVE-2022-32022.yaml b/http/cves/2022/CVE-2022-32022.yaml index 72d7bb989f..c1bb8389ea 100644 --- a/http/cves/2022/CVE-2022-32022.yaml +++ b/http/cves/2022/CVE-2022-32022.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"Car Rental Management System" - verified: "true" + verified: true tags: cve,cve2022,carrental,cms,sqli,login-bypass http: diff --git a/http/cves/2022/CVE-2022-32024.yaml b/http/cves/2022/CVE-2022-32024.yaml index 655e75644b..96b9060daa 100644 --- a/http/cves/2022/CVE-2022-32024.yaml +++ b/http/cves/2022/CVE-2022-32024.yaml @@ -20,7 +20,7 @@ info: max-request: 2 comment: Login bypass is also possible using the payload- admin'+or+'1'%3D'1' in username. shodan-query: http.html:"Car Rental Management System" - verified: "true" + verified: true tags: cve,cve2022,carrental,cms,sqli,authenticated variables: diff --git a/http/cves/2022/CVE-2022-32025.yaml b/http/cves/2022/CVE-2022-32025.yaml index 7c12943bb7..7212c793bc 100644 --- a/http/cves/2022/CVE-2022-32025.yaml +++ b/http/cves/2022/CVE-2022-32025.yaml @@ -20,7 +20,7 @@ info: max-request: 2 comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username. shodan-query: http.html:"Car Rental Management System" - verified: "true" + verified: true tags: cve,cve2022,carrental,cms,sqli,authenticated variables: diff --git a/http/cves/2022/CVE-2022-32026.yaml b/http/cves/2022/CVE-2022-32026.yaml index 02e6b0cec1..cf38159336 100644 --- a/http/cves/2022/CVE-2022-32026.yaml +++ b/http/cves/2022/CVE-2022-32026.yaml @@ -21,7 +21,7 @@ info: max-request: 2 comment: Login bypass is also possible using the payload- admin'+or+'1'%3D'1' in username. shodan-query: http.html:"Car Rental Management System" - verified: "true" + verified: true tags: cve,cve2022,carrental,cms,sqli,authenticated variables: diff --git a/http/cves/2022/CVE-2022-32028.yaml b/http/cves/2022/CVE-2022-32028.yaml index 7da126e794..9f1063e27e 100644 --- a/http/cves/2022/CVE-2022-32028.yaml +++ b/http/cves/2022/CVE-2022-32028.yaml @@ -20,7 +20,7 @@ info: max-request: 2 comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username. shodan-query: http.html:"Car Rental Management System" - verified: "true" + verified: true tags: cve,cve2022,carrental,cms,sqli,authenticated variables: diff --git a/http/cves/2022/CVE-2022-32094.yaml b/http/cves/2022/CVE-2022-32094.yaml index 35d41e0026..2531db7a12 100644 --- a/http/cves/2022/CVE-2022-32094.yaml +++ b/http/cves/2022/CVE-2022-32094.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Hospital Management System" - verified: "true" + verified: true tags: cve,cve2022,hms,cms,sqli,auth-bypass http: diff --git a/http/cves/2022/CVE-2022-32195.yaml b/http/cves/2022/CVE-2022-32195.yaml index cbd9833ffe..9a81adcae8 100644 --- a/http/cves/2022/CVE-2022-32195.yaml +++ b/http/cves/2022/CVE-2022-32195.yaml @@ -21,7 +21,7 @@ info: max-request: 1 comment: Hover the cursor on the redirect link shodan-query: http.html:"Open edX" - verified: "true" + verified: true tags: cve,cve2022,openedx,xss http: diff --git a/http/cves/2022/CVE-2022-32409.yaml b/http/cves/2022/CVE-2022-32409.yaml index a9e1cb2d53..298d664e5f 100644 --- a/http/cves/2022/CVE-2022-32409.yaml +++ b/http/cves/2022/CVE-2022-32409.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"i3geo" - verified: "true" + verified: true tags: cve,cve2022,i3geo,lfi http: diff --git a/http/cves/2022/CVE-2022-32429.yaml b/http/cves/2022/CVE-2022-32429.yaml index 51c9b73d87..6d907bf6e7 100644 --- a/http/cves/2022/CVE-2022-32429.yaml +++ b/http/cves/2022/CVE-2022-32429.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:-2073748627 || http.favicon.hash:-1721140132 - verified: "true" + verified: true tags: config,dump,packetstorm,cve,cve2022,msmswitch,unauth,switch http: diff --git a/http/cves/2022/CVE-2022-32770.yaml b/http/cves/2022/CVE-2022-32770.yaml index 570fda0aa3..a7950d0b9d 100644 --- a/http/cves/2022/CVE-2022-32770.yaml +++ b/http/cves/2022/CVE-2022-32770.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"AVideo" - verified: "true" + verified: true tags: cve,cve2022,avideo,xss,wwbn http: diff --git a/http/cves/2022/CVE-2022-32771.yaml b/http/cves/2022/CVE-2022-32771.yaml index 8b23f5f8b5..f195c25744 100644 --- a/http/cves/2022/CVE-2022-32771.yaml +++ b/http/cves/2022/CVE-2022-32771.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"AVideo" - verified: "true" + verified: true tags: cve,cve2022,avideo,xss http: diff --git a/http/cves/2022/CVE-2022-32772.yaml b/http/cves/2022/CVE-2022-32772.yaml index 1b4579ea20..65e71653bd 100644 --- a/http/cves/2022/CVE-2022-32772.yaml +++ b/http/cves/2022/CVE-2022-32772.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"AVideo" - verified: "true" + verified: true tags: cve,cve2022,avideo,xss,wwbn http: diff --git a/http/cves/2022/CVE-2022-33119.yaml b/http/cves/2022/CVE-2022-33119.yaml index 38a4323ec2..806aee3602 100644 --- a/http/cves/2022/CVE-2022-33119.yaml +++ b/http/cves/2022/CVE-2022-33119.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"NVRsolo" - verified: "true" + verified: true tags: cve,cve2022,nvrsolo,xss http: diff --git a/http/cves/2022/CVE-2022-33174.yaml b/http/cves/2022/CVE-2022-33174.yaml index 242befed87..85913e3c93 100644 --- a/http/cves/2022/CVE-2022-33174.yaml +++ b/http/cves/2022/CVE-2022-33174.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Powertek" - verified: "true" + verified: true tags: cve,cve2022,powertek,auth-bypass http: diff --git a/http/cves/2022/CVE-2022-33891.yaml b/http/cves/2022/CVE-2022-33891.yaml index e10953e404..feef69d742 100644 --- a/http/cves/2022/CVE-2022-33891.yaml +++ b/http/cves/2022/CVE-2022-33891.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: title:"Spark Master at" - verified: "true" + verified: true tags: cve2022,apache,spark,authenticated,kev,packetstorm,cve variables: diff --git a/http/cves/2022/CVE-2022-33901.yaml b/http/cves/2022/CVE-2022-33901.yaml index e53c29cbc1..5f3c1f74be 100644 --- a/http/cves/2022/CVE-2022-33901.yaml +++ b/http/cves/2022/CVE-2022-33901.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00698 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce http: diff --git a/http/cves/2022/CVE-2022-33965.yaml b/http/cves/2022/CVE-2022-33965.yaml index 9a7e3d83bd..e67aeddc3a 100644 --- a/http/cves/2022/CVE-2022-33965.yaml +++ b/http/cves/2022/CVE-2022-33965.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 google-query: inurl:"/wp-content/plugins/wp-stats-manager" - verified: "true" + verified: true tags: cve,cve2022,wordpress,wp-plugin,wp,unauth,sqli,wp-stats-manager http: diff --git a/http/cves/2022/CVE-2022-34045.yaml b/http/cves/2022/CVE-2022-34045.yaml index 119bf5aaf2..fea326cff1 100644 --- a/http/cves/2022/CVE-2022-34045.yaml +++ b/http/cves/2022/CVE-2022-34045.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"WN530HG4" - verified: "true" + verified: true tags: cve,cve2022,wavlink,exposure http: diff --git a/http/cves/2022/CVE-2022-34046.yaml b/http/cves/2022/CVE-2022-34046.yaml index 7cf7fa7bc3..e8c01d05b7 100644 --- a/http/cves/2022/CVE-2022-34046.yaml +++ b/http/cves/2022/CVE-2022-34046.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: packetstorm,cve,cve2022,wavlink,router,exposure http: diff --git a/http/cves/2022/CVE-2022-34047.yaml b/http/cves/2022/CVE-2022-34047.yaml index 043b470e87..95ed686732 100644 --- a/http/cves/2022/CVE-2022-34047.yaml +++ b/http/cves/2022/CVE-2022-34047.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: cve2022,wavlink,router,exposure,packetstorm,cve http: diff --git a/http/cves/2022/CVE-2022-34048.yaml b/http/cves/2022/CVE-2022-34048.yaml index 2887df9bf9..12327793d4 100644 --- a/http/cves/2022/CVE-2022-34048.yaml +++ b/http/cves/2022/CVE-2022-34048.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve2022,wavlink,xss,router,edb,cve http: diff --git a/http/cves/2022/CVE-2022-34049.yaml b/http/cves/2022/CVE-2022-34049.yaml index 4e9bbb2802..bba7515354 100644 --- a/http/cves/2022/CVE-2022-34049.yaml +++ b/http/cves/2022/CVE-2022-34049.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" + verified: true tags: cve,cve2022,wavlink,router,exposure http: diff --git a/http/cves/2022/CVE-2022-34121.yaml b/http/cves/2022/CVE-2022-34121.yaml index 5f75633e93..0eaa4d84da 100644 --- a/http/cves/2022/CVE-2022-34121.yaml +++ b/http/cves/2022/CVE-2022-34121.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.7596 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,lfi,cuppa,cms http: diff --git a/http/cves/2022/CVE-2022-34328.yaml b/http/cves/2022/CVE-2022-34328.yaml index 2b8b4bd376..a92f9eddd2 100644 --- a/http/cves/2022/CVE-2022-34328.yaml +++ b/http/cves/2022/CVE-2022-34328.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"PMB Group" - verified: "true" + verified: true tags: cve,cve2022,pmb,xss http: diff --git a/http/cves/2022/CVE-2022-34576.yaml b/http/cves/2022/CVE-2022-34576.yaml index d0b7763702..2a1d979f62 100644 --- a/http/cves/2022/CVE-2022-34576.yaml +++ b/http/cves/2022/CVE-2022-34576.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Wavlink" - verified: "true" + verified: true tags: cve,cve2022,wavlink,exposure http: diff --git a/http/cves/2022/CVE-2022-34590.yaml b/http/cves/2022/CVE-2022-34590.yaml index 26b6b5eadc..f4e30f8423 100644 --- a/http/cves/2022/CVE-2022-34590.yaml +++ b/http/cves/2022/CVE-2022-34590.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Hospital Management System" - verified: "true" + verified: true tags: cve,cve2022,hms,cms,sqli http: diff --git a/http/cves/2022/CVE-2022-3506.yaml b/http/cves/2022/CVE-2022-3506.yaml index 5247a4614e..04dd2655a6 100644 --- a/http/cves/2022/CVE-2022-3506.yaml +++ b/http/cves/2022/CVE-2022-3506.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.0007 metadata: max-request: 4 - verified: "true" + verified: true tags: wordpress,wp,wp-plugin,relatedposts,cve,cve2022,xss,authenticated,huntr http: diff --git a/http/cves/2022/CVE-2022-35151.yaml b/http/cves/2022/CVE-2022-35151.yaml index 796ce71f05..1bee91575c 100644 --- a/http/cves/2022/CVE-2022-35151.yaml +++ b/http/cves/2022/CVE-2022-35151.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"kkFileView" - verified: "true" + verified: true tags: cve,cve2022,xss,kkfileview http: diff --git a/http/cves/2022/CVE-2022-35413.yaml b/http/cves/2022/CVE-2022-35413.yaml index ab715f9f1c..d3216c6de2 100644 --- a/http/cves/2022/CVE-2022-35413.yaml +++ b/http/cves/2022/CVE-2022-35413.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Intelligent WAPPLES" - verified: "true" + verified: true tags: cve,cve2022,wapples,firewall,default-login http: diff --git a/http/cves/2022/CVE-2022-35416.yaml b/http/cves/2022/CVE-2022-35416.yaml index 44d4b4c9a6..4f1e5c7c1e 100644 --- a/http/cves/2022/CVE-2022-35416.yaml +++ b/http/cves/2022/CVE-2022-35416.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html_hash:510586239 - verified: "true" + verified: true tags: cve,cve2022,xss,vpn,h3c http: diff --git a/http/cves/2022/CVE-2022-35493.yaml b/http/cves/2022/CVE-2022-35493.yaml index 4abcd4d130..782cf3a1cb 100644 --- a/http/cves/2022/CVE-2022-35493.yaml +++ b/http/cves/2022/CVE-2022-35493.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"eShop - Multipurpose Ecommerce" - verified: "true" + verified: true tags: cve,cve2022,eshop,xss http: diff --git a/http/cves/2022/CVE-2022-3578.yaml b/http/cves/2022/CVE-2022-3578.yaml index 9af6bee45d..aa7c9ecacb 100644 --- a/http/cves/2022/CVE-2022-3578.yaml +++ b/http/cves/2022/CVE-2022-3578.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00064 metadata: max-request: 2 - verified: "true" + verified: true tags: wp-plugin,wordpress,wpscan,cve,wp,xss,profilegrid,authenticated,cve2022 http: diff --git a/http/cves/2022/CVE-2022-35914.yaml b/http/cves/2022/CVE-2022-35914.yaml index 295958c731..0abf6666bc 100644 --- a/http/cves/2022/CVE-2022-35914.yaml +++ b/http/cves/2022/CVE-2022-35914.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:"-1474875778" - verified: "true" + verified: true tags: cve,cve2022,glpi,rce,kev variables: diff --git a/http/cves/2022/CVE-2022-36537.yaml b/http/cves/2022/CVE-2022-36537.yaml index 239047d2a6..abbf5d6b33 100644 --- a/http/cves/2022/CVE-2022-36537.yaml +++ b/http/cves/2022/CVE-2022-36537.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 2 shodan-query: http.title:"Server backup manager" - verified: "true" + verified: true tags: cve,cve2022,zk-framework,exposure,unauth,kev http: diff --git a/http/cves/2022/CVE-2022-36642.yaml b/http/cves/2022/CVE-2022-36642.yaml index d104bfefba..fb54b763a4 100644 --- a/http/cves/2022/CVE-2022-36642.yaml +++ b/http/cves/2022/CVE-2022-36642.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: http.title:"Omnia MPX Node | Login" - verified: "true" + verified: true tags: traversal,omnia,edb,cve,cve2022,lfi http: diff --git a/http/cves/2022/CVE-2022-36883.yaml b/http/cves/2022/CVE-2022-36883.yaml index 6140d1fdbd..5b7ddfcfb0 100644 --- a/http/cves/2022/CVE-2022-36883.yaml +++ b/http/cves/2022/CVE-2022-36883.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: X-Jenkins - verified: "true" + verified: true tags: cve,cve2022,jenkins,plugin,git http: diff --git a/http/cves/2022/CVE-2022-37153.yaml b/http/cves/2022/CVE-2022-37153.yaml index dfc1ad4aaa..609417d9f6 100644 --- a/http/cves/2022/CVE-2022-37153.yaml +++ b/http/cves/2022/CVE-2022-37153.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Artica" - verified: "true" + verified: true tags: cve,cve2022,xss,artica http: diff --git a/http/cves/2022/CVE-2022-37190.yaml b/http/cves/2022/CVE-2022-37190.yaml index b00937b5f0..d9b626e455 100644 --- a/http/cves/2022/CVE-2022-37190.yaml +++ b/http/cves/2022/CVE-2022-37190.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-732 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,rce,cuppa,authenticated http: diff --git a/http/cves/2022/CVE-2022-37191.yaml b/http/cves/2022/CVE-2022-37191.yaml index 0f0c0efc3e..aa6d3a4939 100644 --- a/http/cves/2022/CVE-2022-37191.yaml +++ b/http/cves/2022/CVE-2022-37191.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-829 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,lfi,cuppa,authenticated http: diff --git a/http/cves/2022/CVE-2022-37299.yaml b/http/cves/2022/CVE-2022-37299.yaml index 8e5ab8d1a1..fea6531480 100644 --- a/http/cves/2022/CVE-2022-37299.yaml +++ b/http/cves/2022/CVE-2022-37299.yaml @@ -18,7 +18,7 @@ info: epss-score: 0.00402 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,shirnecms,lfi http: diff --git a/http/cves/2022/CVE-2022-3768.yaml b/http/cves/2022/CVE-2022-3768.yaml index 3f1ce84d8b..f5c44e14ec 100644 --- a/http/cves/2022/CVE-2022-3768.yaml +++ b/http/cves/2022/CVE-2022-3768.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.00844 metadata: max-request: 2 - verified: "true" + verified: true tags: wp-smart-contracts,wpscan,cve,wp-plugin,sqli,wordpress,cve2022,wp,authenticated http: diff --git a/http/cves/2022/CVE-2022-38295.yaml b/http/cves/2022/CVE-2022-38295.yaml index 628c68028f..edb0fd3404 100644 --- a/http/cves/2022/CVE-2022-38295.yaml +++ b/http/cves/2022/CVE-2022-38295.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-79 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,xss,cuppa,authenticated http: diff --git a/http/cves/2022/CVE-2022-38296.yaml b/http/cves/2022/CVE-2022-38296.yaml index 439d6460a3..03c6a7e88b 100644 --- a/http/cves/2022/CVE-2022-38296.yaml +++ b/http/cves/2022/CVE-2022-38296.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-434 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,rce,cuppa http: diff --git a/http/cves/2022/CVE-2022-38463.yaml b/http/cves/2022/CVE-2022-38463.yaml index ffaaf5250e..abe4c91c2d 100644 --- a/http/cves/2022/CVE-2022-38463.yaml +++ b/http/cves/2022/CVE-2022-38463.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"ServiceNow" - verified: "true" + verified: true tags: cve,cve2022,servicenow,xss http: - method: GET diff --git a/http/cves/2022/CVE-2022-38467.yaml b/http/cves/2022/CVE-2022-38467.yaml index 613f69517a..e16bb136e6 100644 --- a/http/cves/2022/CVE-2022-38467.yaml +++ b/http/cves/2022/CVE-2022-38467.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2022-38467 metadata: max-request: 2 - verified: "true" + verified: true tags: crm-perks-forms,wpscan,cve,cve2022,wordpress,wp,wp-plugin,xss http: diff --git a/http/cves/2022/CVE-2022-38553.yaml b/http/cves/2022/CVE-2022-38553.yaml index 2f83bf4c39..cf43edf1cc 100644 --- a/http/cves/2022/CVE-2022-38553.yaml +++ b/http/cves/2022/CVE-2022-38553.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 google-query: intext:"Study any topic, anytime" - verified: "true" + verified: true tags: cve,cve2022,academylms,xss http: diff --git a/http/cves/2022/CVE-2022-38637.yaml b/http/cves/2022/CVE-2022-38637.yaml index 346d3476a4..bf1eeffc4d 100644 --- a/http/cves/2022/CVE-2022-38637.yaml +++ b/http/cves/2022/CVE-2022-38637.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Hospital Management System" - verified: "true" + verified: true tags: cve,cve2022,hms,cms,sqli,auth-bypass http: diff --git a/http/cves/2022/CVE-2022-3908.yaml b/http/cves/2022/CVE-2022-3908.yaml index 1905eb4148..6b00889d8e 100644 --- a/http/cves/2022/CVE-2022-3908.yaml +++ b/http/cves/2022/CVE-2022-3908.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00071 metadata: max-request: 2 - verified: "true" + verified: true tags: xss,wordpress,wp-plugin,helloprint,cve,cve2022,wp,authenticated,wpscan http: diff --git a/http/cves/2022/CVE-2022-39195.yaml b/http/cves/2022/CVE-2022-39195.yaml index 2559a37781..65569ba807 100644 --- a/http/cves/2022/CVE-2022-39195.yaml +++ b/http/cves/2022/CVE-2022-39195.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"LISTSERV" - verified: "true" + verified: true tags: cve,cve2022,xss,listserv,packetstorm http: diff --git a/http/cves/2022/CVE-2022-3933.yaml b/http/cves/2022/CVE-2022-3933.yaml index 0cfabbb353..753d6b8c9d 100644 --- a/http/cves/2022/CVE-2022-3933.yaml +++ b/http/cves/2022/CVE-2022-3933.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00078 metadata: max-request: 2 - verified: "true" + verified: true tags: wpscan,cve2022,authenticated,wordpress,wp-plugin,wp,essential-real-estate,cve,xss http: diff --git a/http/cves/2022/CVE-2022-3934.yaml b/http/cves/2022/CVE-2022-3934.yaml index 2a0ee9348c..1d5ed318ce 100644 --- a/http/cves/2022/CVE-2022-3934.yaml +++ b/http/cves/2022/CVE-2022-3934.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00078 metadata: max-request: 2 - verified: "true" + verified: true tags: authenticated,wpscan,cve,cve2022,xss,flatpm,wordpress,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-3980.yaml b/http/cves/2022/CVE-2022-3980.yaml index e1acfb278a..7f84c56dc4 100644 --- a/http/cves/2022/CVE-2022-3980.yaml +++ b/http/cves/2022/CVE-2022-3980.yaml @@ -16,7 +16,7 @@ info: cve-id: CVE-2022-3980 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-1274798165 fofa-query: title="Sophos Mobile" tags: cve,cve2022,xxe,ssrf,sophos diff --git a/http/cves/2022/CVE-2022-3982.yaml b/http/cves/2022/CVE-2022-3982.yaml index d5f9a6d065..3d9d04d10e 100644 --- a/http/cves/2022/CVE-2022-3982.yaml +++ b/http/cves/2022/CVE-2022-3982.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.93708 metadata: max-request: 3 - verified: "true" + verified: true tags: cve,cve2022,rce,wpscan,wordpress,wp-plugin,wp,booking-calendar,unauthenticated http: diff --git a/http/cves/2022/CVE-2022-39952.yaml b/http/cves/2022/CVE-2022-39952.yaml index c776485290..bb0a891370 100644 --- a/http/cves/2022/CVE-2022-39952.yaml +++ b/http/cves/2022/CVE-2022-39952.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 shodan-query: title:"FortiNAC" - verified: "true" + verified: true tags: fortinet,fortinac,cve,cve2022,fileupload,rce,intrusive variables: diff --git a/http/cves/2022/CVE-2022-39960.yaml b/http/cves/2022/CVE-2022-39960.yaml index 4b408e9773..3742da45e6 100644 --- a/http/cves/2022/CVE-2022-39960.yaml +++ b/http/cves/2022/CVE-2022-39960.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Atlassian Jira" - verified: "true" + verified: true tags: cve,cve2022,atlassian,jira,netic,unauth http: diff --git a/http/cves/2022/CVE-2022-40359.yaml b/http/cves/2022/CVE-2022-40359.yaml index 140b939e72..a55ee407c6 100644 --- a/http/cves/2022/CVE-2022-40359.yaml +++ b/http/cves/2022/CVE-2022-40359.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00064 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,xss,kfm http: diff --git a/http/cves/2022/CVE-2022-4050.yaml b/http/cves/2022/CVE-2022-4050.yaml index 17187df0c6..4f0603a184 100644 --- a/http/cves/2022/CVE-2022-4050.yaml +++ b/http/cves/2022/CVE-2022-4050.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.11791 metadata: max-request: 1 - verified: "true" + verified: true tags: wpscan,cve,cve2022,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth http: diff --git a/http/cves/2022/CVE-2022-4060.yaml b/http/cves/2022/CVE-2022-4060.yaml index cc85e25500..a1a30a2f72 100644 --- a/http/cves/2022/CVE-2022-4060.yaml +++ b/http/cves/2022/CVE-2022-4060.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.01059 metadata: max-request: 1 - verified: "true" + verified: true tags: unauth,wpscan,cve2022,rce,wordpress,wp-plugin,wp,cve,wp-upg http: diff --git a/http/cves/2022/CVE-2022-4063.yaml b/http/cves/2022/CVE-2022-4063.yaml index 0bed6309a9..41d18e8762 100644 --- a/http/cves/2022/CVE-2022-4063.yaml +++ b/http/cves/2022/CVE-2022-4063.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.01177 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,wp-plugin,wp,inpost-gallery,cve2022,lfi,wordpress,unauth,wpscan http: diff --git a/http/cves/2022/CVE-2022-40734.yaml b/http/cves/2022/CVE-2022-40734.yaml index 46d48137c3..76fa58127b 100644 --- a/http/cves/2022/CVE-2022-40734.yaml +++ b/http/cves/2022/CVE-2022-40734.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"Laravel Filemanager" - verified: "true" + verified: true tags: cve,cve2022,laravel,unisharp,lfi,traversal http: diff --git a/http/cves/2022/CVE-2022-40881.yaml b/http/cves/2022/CVE-2022-40881.yaml index 10870305d9..9198748ec5 100644 --- a/http/cves/2022/CVE-2022-40881.yaml +++ b/http/cves/2022/CVE-2022-40881.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:"-244067125" - verified: "true" + verified: true tags: cve,cve2022,solarview,rce,lfi variables: diff --git a/http/cves/2022/CVE-2022-4117.yaml b/http/cves/2022/CVE-2022-4117.yaml index 5e795f3aa9..f68652c943 100644 --- a/http/cves/2022/CVE-2022-4117.yaml +++ b/http/cves/2022/CVE-2022-4117.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.06254 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,iws-geo-form-fields,wpscan http: diff --git a/http/cves/2022/CVE-2022-4140.yaml b/http/cves/2022/CVE-2022-4140.yaml index 087ef3ab6f..4d979cd80b 100644 --- a/http/cves/2022/CVE-2022-4140.yaml +++ b/http/cves/2022/CVE-2022-4140.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.02425 metadata: max-request: 2 - verified: "true" + verified: true tags: usc-e-shop,wpscan,cve,cve2022,wp-plugin,wp,wordpress,lfi,unauthenticated http: diff --git a/http/cves/2022/CVE-2022-41441.yaml b/http/cves/2022/CVE-2022-41441.yaml index 603d05b6d5..29bc22c3e3 100644 --- a/http/cves/2022/CVE-2022-41441.yaml +++ b/http/cves/2022/CVE-2022-41441.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-79 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.html:"ReQlogic" tags: cve,cve2022,xss,reqlogic diff --git a/http/cves/2022/CVE-2022-41473.yaml b/http/cves/2022/CVE-2022-41473.yaml index 5f50ee70c1..529cb6473e 100644 --- a/http/cves/2022/CVE-2022-41473.yaml +++ b/http/cves/2022/CVE-2022-41473.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"RPCMS" - verified: "true" + verified: true tags: cve,cve2022,rpcms,xss http: diff --git a/http/cves/2022/CVE-2022-41840.yaml b/http/cves/2022/CVE-2022-41840.yaml index 6cafd0ec79..b7527ab0c7 100644 --- a/http/cves/2022/CVE-2022-41840.yaml +++ b/http/cves/2022/CVE-2022-41840.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00276 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wp-plugin,wordpress,wp,lfi,unauth,usc-e-shop http: diff --git a/http/cves/2022/CVE-2022-42094.yaml b/http/cves/2022/CVE-2022-42094.yaml index 31548694b8..7c4aaae563 100644 --- a/http/cves/2022/CVE-2022-42094.yaml +++ b/http/cves/2022/CVE-2022-42094.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 4 - verified: "true" + verified: true tags: cve,cve2022,xss,cms,backdrop,authenticated http: diff --git a/http/cves/2022/CVE-2022-42095.yaml b/http/cves/2022/CVE-2022-42095.yaml index 64819ea7df..6cc6d1f8dd 100644 --- a/http/cves/2022/CVE-2022-42095.yaml +++ b/http/cves/2022/CVE-2022-42095.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 5 - verified: "true" + verified: true tags: cve,cve2022,xss,cms,backdrop,authenticated http: diff --git a/http/cves/2022/CVE-2022-42096.yaml b/http/cves/2022/CVE-2022-42096.yaml index dd8fb493e3..cb8f554ac5 100644 --- a/http/cves/2022/CVE-2022-42096.yaml +++ b/http/cves/2022/CVE-2022-42096.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 5 - verified: "true" + verified: true tags: cve,cve2022,xss,cms,backdrop,authenticated http: diff --git a/http/cves/2022/CVE-2022-42233.yaml b/http/cves/2022/CVE-2022-42233.yaml index 1100df529e..65dc739f8d 100644 --- a/http/cves/2022/CVE-2022-42233.yaml +++ b/http/cves/2022/CVE-2022-42233.yaml @@ -19,7 +19,7 @@ info: max-request: 1 fofa-query: product=="Tenda-11N-Wireless-AP" shodan-query: http.title:"Tenda 11N" - verified: "true" + verified: true tags: cve,cve2022,tenda,auth-bypass,router,iot http: diff --git a/http/cves/2022/CVE-2022-4260.yaml b/http/cves/2022/CVE-2022-4260.yaml index e6427e4da8..9b39a94a68 100644 --- a/http/cves/2022/CVE-2022-4260.yaml +++ b/http/cves/2022/CVE-2022-4260.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00078 metadata: max-request: 4 - verified: "true" + verified: true tags: cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,cve,wp-ban http: diff --git a/http/cves/2022/CVE-2022-42746.yaml b/http/cves/2022/CVE-2022-42746.yaml index 29ed707e14..8312d6aeef 100644 --- a/http/cves/2022/CVE-2022-42746.yaml +++ b/http/cves/2022/CVE-2022-42746.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"CandidATS" - verified: "true" + verified: true tags: cve,cve2022,candidats,xss http: diff --git a/http/cves/2022/CVE-2022-42747.yaml b/http/cves/2022/CVE-2022-42747.yaml index fd0a59727b..bd7596aea7 100644 --- a/http/cves/2022/CVE-2022-42747.yaml +++ b/http/cves/2022/CVE-2022-42747.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"CandidATS" - verified: "true" + verified: true tags: cve,cve2022,candidats,xss http: diff --git a/http/cves/2022/CVE-2022-42748.yaml b/http/cves/2022/CVE-2022-42748.yaml index 1e4230ca2a..4ed73ed9a1 100644 --- a/http/cves/2022/CVE-2022-42748.yaml +++ b/http/cves/2022/CVE-2022-42748.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"CandidATS" - verified: "true" + verified: true tags: cve,cve2022,candidats,xss http: diff --git a/http/cves/2022/CVE-2022-42749.yaml b/http/cves/2022/CVE-2022-42749.yaml index 28199e456d..15c9e66296 100644 --- a/http/cves/2022/CVE-2022-42749.yaml +++ b/http/cves/2022/CVE-2022-42749.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"CandidATS" - verified: "true" + verified: true tags: cve,cve2022,candidats,xss http: diff --git a/http/cves/2022/CVE-2022-4301.yaml b/http/cves/2022/CVE-2022-4301.yaml index de36983dd2..011ffc4a77 100644 --- a/http/cves/2022/CVE-2022-4301.yaml +++ b/http/cves/2022/CVE-2022-4301.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,xss,sunshine,wordpress,wp-plugin,wpscan,unauth http: diff --git a/http/cves/2022/CVE-2022-43014.yaml b/http/cves/2022/CVE-2022-43014.yaml index 1552ba1958..d8f42d2d11 100644 --- a/http/cves/2022/CVE-2022-43014.yaml +++ b/http/cves/2022/CVE-2022-43014.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: title:"OpenCATS" - verified: "true" + verified: true tags: cve,cve2022,xss,opencats,authenticated http: diff --git a/http/cves/2022/CVE-2022-43015.yaml b/http/cves/2022/CVE-2022-43015.yaml index 76439e4a7a..701b05b9b5 100644 --- a/http/cves/2022/CVE-2022-43015.yaml +++ b/http/cves/2022/CVE-2022-43015.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: title:"OpenCATS" - verified: "true" + verified: true tags: cve,cve2022,xss,opencats,authenticated http: diff --git a/http/cves/2022/CVE-2022-43016.yaml b/http/cves/2022/CVE-2022-43016.yaml index fb6923383d..62a0024e02 100644 --- a/http/cves/2022/CVE-2022-43016.yaml +++ b/http/cves/2022/CVE-2022-43016.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: title:"OpenCATS" - verified: "true" + verified: true tags: cve,cve2022,xss,opencats,authenticated http: diff --git a/http/cves/2022/CVE-2022-43017.yaml b/http/cves/2022/CVE-2022-43017.yaml index f42b241850..b7047a166a 100644 --- a/http/cves/2022/CVE-2022-43017.yaml +++ b/http/cves/2022/CVE-2022-43017.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: title:"OpenCATS" - verified: "true" + verified: true tags: cve,cve2022,xss,opencats,authenticated http: diff --git a/http/cves/2022/CVE-2022-43018.yaml b/http/cves/2022/CVE-2022-43018.yaml index 586e073919..73d884f4b0 100644 --- a/http/cves/2022/CVE-2022-43018.yaml +++ b/http/cves/2022/CVE-2022-43018.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: title:"OpenCATS" - verified: "true" + verified: true tags: cve,cve2022,xss,opencats,authenticated http: diff --git a/http/cves/2022/CVE-2022-4306.yaml b/http/cves/2022/CVE-2022-4306.yaml index 623263ba1e..d857c8c58a 100644 --- a/http/cves/2022/CVE-2022-4306.yaml +++ b/http/cves/2022/CVE-2022-4306.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00078 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,xss,panda,pods,repeater,wordpress,wp-plugin,wpscan,authenticated http: diff --git a/http/cves/2022/CVE-2022-43140.yaml b/http/cves/2022/CVE-2022-43140.yaml index 6e171b8f4f..c15d649263 100644 --- a/http/cves/2022/CVE-2022-43140.yaml +++ b/http/cves/2022/CVE-2022-43140.yaml @@ -20,7 +20,7 @@ info: max-request: 1 fofa-query: app="kkFileView" shodan-query: http.html:"kkFileView" - verified: "true" + verified: true tags: cve,cve2022,ssrf,kkFileview http: diff --git a/http/cves/2022/CVE-2022-4320.yaml b/http/cves/2022/CVE-2022-4320.yaml index 767035e4d0..44e3570827 100644 --- a/http/cves/2022/CVE-2022-4320.yaml +++ b/http/cves/2022/CVE-2022-4320.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00085 metadata: max-request: 3 - verified: "true" + verified: true tags: calendar,event,xss,wordpress,wp,wp-plugin,cve,cve2022,wpscan http: diff --git a/http/cves/2022/CVE-2022-4321.yaml b/http/cves/2022/CVE-2022-4321.yaml index 52d33884a5..b0fab6db57 100644 --- a/http/cves/2022/CVE-2022-4321.yaml +++ b/http/cves/2022/CVE-2022-4321.yaml @@ -13,7 +13,7 @@ info: - https://wordpress.org/plugins/pdf-generator-for-wp/ metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,wpscan,wordpress,wp,wp-plugin,xss,pdf-generator-for-wp http: diff --git a/http/cves/2022/CVE-2022-4325.yaml b/http/cves/2022/CVE-2022-4325.yaml index 2e11cfddc0..d403fd3e94 100644 --- a/http/cves/2022/CVE-2022-4325.yaml +++ b/http/cves/2022/CVE-2022-4325.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00071 metadata: max-request: 2 - verified: "true" + verified: true tags: wp,wordpress,wpscan,authenticated,cve,cve2022,xss,wp-plugin,post-status-notifier-lite http: diff --git a/http/cves/2022/CVE-2022-4328.yaml b/http/cves/2022/CVE-2022-4328.yaml index f86016a1c1..5e7b286bb2 100644 --- a/http/cves/2022/CVE-2022-4328.yaml +++ b/http/cves/2022/CVE-2022-4328.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-434 metadata: max-request: 2 - verified: "true" + verified: true tags: wp,n-media-woocommerce-checkout-fields,wpscan,cve,cve2022,rce,wordpress,wp-plugin http: diff --git a/http/cves/2022/CVE-2022-43769.yaml b/http/cves/2022/CVE-2022-43769.yaml index 290ebf0ac2..4ea8dbb760 100644 --- a/http/cves/2022/CVE-2022-43769.yaml +++ b/http/cves/2022/CVE-2022-43769.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:1749354953 - verified: "true" + verified: true tags: cve,cve2022,rce,ssti,pentaho,kev http: diff --git a/http/cves/2022/CVE-2022-4447.yaml b/http/cves/2022/CVE-2022-4447.yaml index 7aca58a8ec..e63a486d4f 100644 --- a/http/cves/2022/CVE-2022-4447.yaml +++ b/http/cves/2022/CVE-2022-4447.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.04513 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,wordpress,wp,wpscan,cve2022,wp-plugin,sqli,fontsy,unauth variables: diff --git a/http/cves/2022/CVE-2022-44877.yaml b/http/cves/2022/CVE-2022-44877.yaml index 5f2aedbeaa..8e8f437639 100644 --- a/http/cves/2022/CVE-2022-44877.yaml +++ b/http/cves/2022/CVE-2022-44877.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"Login | Control WebPanel" - verified: "true" + verified: true tags: cve,cve2022,centos,rce,kev http: diff --git a/http/cves/2022/CVE-2022-45037.yaml b/http/cves/2022/CVE-2022-45037.yaml index 78f0ff0306..9bea0b3b22 100644 --- a/http/cves/2022/CVE-2022-45037.yaml +++ b/http/cves/2022/CVE-2022-45037.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 5 - verified: "true" + verified: true tags: cve,cve2022,xss,wbce,cms,authenticated http: diff --git a/http/cves/2022/CVE-2022-45038.yaml b/http/cves/2022/CVE-2022-45038.yaml index 624f139854..6a107d64aa 100644 --- a/http/cves/2022/CVE-2022-45038.yaml +++ b/http/cves/2022/CVE-2022-45038.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-79 metadata: max-request: 5 - verified: "true" + verified: true tags: cve,cve2022,xss,wbce,cms,authenticated http: diff --git a/http/cves/2022/CVE-2022-45805.yaml b/http/cves/2022/CVE-2022-45805.yaml index 7dfb957d05..d1b2bcdf66 100644 --- a/http/cves/2022/CVE-2022-45805.yaml +++ b/http/cves/2022/CVE-2022-45805.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-45805 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,sqli,wordpress,wp-plugin,wp,paytm-payments,authenticated http: diff --git a/http/cves/2022/CVE-2022-45835.yaml b/http/cves/2022/CVE-2022-45835.yaml index a565e32fbd..2102953abc 100644 --- a/http/cves/2022/CVE-2022-45835.yaml +++ b/http/cves/2022/CVE-2022-45835.yaml @@ -18,7 +18,7 @@ info: cve-id: CVE-2022-45835 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,ssrf,wordpress,wp-plugin,wp,phonepe-payment-solutions,unauth,oast,phonepe http: diff --git a/http/cves/2022/CVE-2022-45917.yaml b/http/cves/2022/CVE-2022-45917.yaml index fa89c83ecb..04d1f68d87 100644 --- a/http/cves/2022/CVE-2022-45917.yaml +++ b/http/cves/2022/CVE-2022-45917.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"ILIAS" - verified: "true" + verified: true tags: redirect,packetstorm,seclists,cve,cve2022,ilias http: diff --git a/http/cves/2022/CVE-2022-45933.yaml b/http/cves/2022/CVE-2022-45933.yaml index 0177f14bed..f42affb43b 100644 --- a/http/cves/2022/CVE-2022-45933.yaml +++ b/http/cves/2022/CVE-2022-45933.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"KubeView" - verified: "true" + verified: true tags: cve,cve2022,kubeview,kubernetes,exposure http: diff --git a/http/cves/2022/CVE-2022-46020.yaml b/http/cves/2022/CVE-2022-46020.yaml index b1a4ddc6a4..26e7e1f239 100644 --- a/http/cves/2022/CVE-2022-46020.yaml +++ b/http/cves/2022/CVE-2022-46020.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-434 metadata: max-request: 6 - verified: "true" + verified: true tags: cve,cve2022,rce,wbce,cms,authenticated http: diff --git a/http/cves/2022/CVE-2022-46169.yaml b/http/cves/2022/CVE-2022-46169.yaml index 9e44ef5380..375b92b287 100644 --- a/http/cves/2022/CVE-2022-46169.yaml +++ b/http/cves/2022/CVE-2022-46169.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: title:"Login to Cacti" - verified: "true" + verified: true tags: cve,cve2022,auth-bypass,cacti,kev,rce,unauth variables: diff --git a/http/cves/2022/CVE-2022-46381.yaml b/http/cves/2022/CVE-2022-46381.yaml index a7b6331a70..c3570d2bd6 100644 --- a/http/cves/2022/CVE-2022-46381.yaml +++ b/http/cves/2022/CVE-2022-46381.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"Linear eMerge" - verified: "true" + verified: true tags: cve,cve2022,xss,emerge,linear http: diff --git a/http/cves/2022/CVE-2022-46888.yaml b/http/cves/2022/CVE-2022-46888.yaml index 0d497829be..a5f0431c62 100644 --- a/http/cves/2022/CVE-2022-46888.yaml +++ b/http/cves/2022/CVE-2022-46888.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:-582931176 - verified: "true" + verified: true tags: cve,cve2022,nexus,php,nexusphp,xss http: diff --git a/http/cves/2022/CVE-2022-46934.yaml b/http/cves/2022/CVE-2022-46934.yaml index 8b3333813c..3db06bc160 100644 --- a/http/cves/2022/CVE-2022-46934.yaml +++ b/http/cves/2022/CVE-2022-46934.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"kkFileView" - verified: "true" + verified: true tags: xss,cve,cve2022 http: diff --git a/http/cves/2022/CVE-2022-47002.yaml b/http/cves/2022/CVE-2022-47002.yaml index 73f3e79ee7..c0daa3e6f4 100644 --- a/http/cves/2022/CVE-2022-47002.yaml +++ b/http/cves/2022/CVE-2022-47002.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 3 shodan-query: 'Generator: Masa CMS' - verified: "true" + verified: true tags: cve,cve2022,auth-bypass,cms,masa http: diff --git a/http/cves/2022/CVE-2022-47003.yaml b/http/cves/2022/CVE-2022-47003.yaml index 5694c37c89..4c5832c58a 100644 --- a/http/cves/2022/CVE-2022-47003.yaml +++ b/http/cves/2022/CVE-2022-47003.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 3 shodan-query: 'Generator: Musa CMS' - verified: "true" + verified: true tags: cve,cve2022,auth-bypass,cms,mura http: diff --git a/http/cves/2022/CVE-2022-47945.yaml b/http/cves/2022/CVE-2022-47945.yaml index c440236e47..e6de54df9b 100644 --- a/http/cves/2022/CVE-2022-47945.yaml +++ b/http/cves/2022/CVE-2022-47945.yaml @@ -21,7 +21,7 @@ info: max-request: 2 fofa-query: header="think_lang" shodan-query: title:"Thinkphp" - verified: "true" + verified: true tags: cve,cve2022,thinkphp,lfi http: diff --git a/http/cves/2022/CVE-2022-47966.yaml b/http/cves/2022/CVE-2022-47966.yaml index 8770465828..8795325ac8 100644 --- a/http/cves/2022/CVE-2022-47966.yaml +++ b/http/cves/2022/CVE-2022-47966.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: title:"ManageEngine" - verified: "true" + verified: true tags: cve,cve2022,rce,zoho,manageengine,oast,kev variables: diff --git a/http/cves/2022/CVE-2022-47986.yaml b/http/cves/2022/CVE-2022-47986.yaml index 1e502f18b1..b1fff0c545 100644 --- a/http/cves/2022/CVE-2022-47986.yaml +++ b/http/cves/2022/CVE-2022-47986.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: html:"Aspera Faspex" - verified: "true" + verified: true tags: cve,cve2022,ibm,aspera,faspex,kev,packetstorm http: diff --git a/http/cves/2022/CVE-2022-48012.yaml b/http/cves/2022/CVE-2022-48012.yaml index e9feefb047..1de0ee76ca 100644 --- a/http/cves/2022/CVE-2022-48012.yaml +++ b/http/cves/2022/CVE-2022-48012.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 3 shodan-query: title:"opencats" - verified: "true" + verified: true tags: cve,cve2022,xss,opencats,authenticated http: diff --git a/http/cves/2022/CVE-2022-48165.yaml b/http/cves/2022/CVE-2022-48165.yaml index 8a247166e9..56556cd850 100644 --- a/http/cves/2022/CVE-2022-48165.yaml +++ b/http/cves/2022/CVE-2022-48165.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:-1350437236 - verified: "true" + verified: true tags: cve,cve2022,wavlink,router,exposure http: diff --git a/http/cves/2022/CVE-2022-4897.yaml b/http/cves/2022/CVE-2022-4897.yaml index 9d77e1babe..03aa38dacc 100644 --- a/http/cves/2022/CVE-2022-4897.yaml +++ b/http/cves/2022/CVE-2022-4897.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00323 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,xss,backupbuddy,wordpress,wp-plugin,wpscan,wp,authenticated http: diff --git a/http/cves/2023/CVE-2023-0099.yaml b/http/cves/2023/CVE-2023-0099.yaml index 05c55b6a88..c496671733 100644 --- a/http/cves/2023/CVE-2023-0099.yaml +++ b/http/cves/2023/CVE-2023-0099.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2023-0099 metadata: max-request: 2 - verified: "true" + verified: true tags: xss,simple-urls,authenticated,wpscan,wordpress,wp,wp-plugin,cve,cve2023 http: diff --git a/http/cves/2023/CVE-2023-0236.yaml b/http/cves/2023/CVE-2023-0236.yaml index b27af69b95..b669114909 100644 --- a/http/cves/2023/CVE-2023-0236.yaml +++ b/http/cves/2023/CVE-2023-0236.yaml @@ -19,7 +19,7 @@ info: epss-score: 0.00071 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2022,xss,tutorlms,wpscan,wordpress,wp-plugin,authenticated http: diff --git a/http/cves/2023/CVE-2023-0261.yaml b/http/cves/2023/CVE-2023-0261.yaml index 0002522737..60b3b2e234 100644 --- a/http/cves/2023/CVE-2023-0261.yaml +++ b/http/cves/2023/CVE-2023-0261.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.03734 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2023,wordpress,wp,wp-tripadvisor-review-slider,auth,cve,sqli,wp-plugin,wpscan http: diff --git a/http/cves/2023/CVE-2023-0552.yaml b/http/cves/2023/CVE-2023-0552.yaml index 8db648950f..3461c99d0e 100644 --- a/http/cves/2023/CVE-2023-0552.yaml +++ b/http/cves/2023/CVE-2023-0552.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.00078 metadata: max-request: 1 - verified: "true" + verified: true tags: cve2023,redirect,pie,pie-register,wpscan,cve http: diff --git a/http/cves/2023/CVE-2023-0669.yaml b/http/cves/2023/CVE-2023-0669.yaml index 871c73ed8a..0574092eab 100644 --- a/http/cves/2023/CVE-2023-0669.yaml +++ b/http/cves/2023/CVE-2023-0669.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:1484947000 - verified: "true" + verified: true tags: cve,cve2023,rce,goanywhere,oast,kev http: diff --git a/http/cves/2023/CVE-2023-0942.yaml b/http/cves/2023/CVE-2023-0942.yaml index 723956880e..0f0660735d 100644 --- a/http/cves/2023/CVE-2023-0942.yaml +++ b/http/cves/2023/CVE-2023-0942.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.00322 metadata: max-request: 2 - verified: "true" + verified: true tags: cve2023,woocommerce-for-japan,wp,wpscan,wordpress,authenticated,cve,xss,woocommerce,plugin http: diff --git a/http/cves/2023/CVE-2023-0968.yaml b/http/cves/2023/CVE-2023-0968.yaml index b4242640b3..8d6238b283 100644 --- a/http/cves/2023/CVE-2023-0968.yaml +++ b/http/cves/2023/CVE-2023-0968.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.0069 metadata: max-request: 2 - verified: "true" + verified: true tags: wordpress,cve,cve2023,wp,wp-plugin,xss,watu,authenticated,wpscan http: diff --git a/http/cves/2023/CVE-2023-1020.yaml b/http/cves/2023/CVE-2023-1020.yaml index b51d0d92fe..4ee456da49 100644 --- a/http/cves/2023/CVE-2023-1020.yaml +++ b/http/cves/2023/CVE-2023-1020.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-89 metadata: max-request: 1 - verified: "true" + verified: true tags: wpscan,cve,cve2023,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat http: diff --git a/http/cves/2023/CVE-2023-1080.yaml b/http/cves/2023/CVE-2023-1080.yaml index 46de1c2427..22010453c1 100644 --- a/http/cves/2023/CVE-2023-1080.yaml +++ b/http/cves/2023/CVE-2023-1080.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.00522 metadata: max-request: 2 - verified: "true" + verified: true tags: wp-plugin,wordpress,gn-publisher,authenticated,cve2023,wp,xss,wpscan,cve http: diff --git a/http/cves/2023/CVE-2023-1177.yaml b/http/cves/2023/CVE-2023-1177.yaml index 556b268880..4c8b66dba1 100644 --- a/http/cves/2023/CVE-2023-1177.yaml +++ b/http/cves/2023/CVE-2023-1177.yaml @@ -22,7 +22,7 @@ info: metadata: max-request: 3 shodan-query: http.title:"mlflow" - verified: "true" + verified: true tags: mlflow,oss,lfi,huntr,cve,cve2023 http: diff --git a/http/cves/2023/CVE-2023-1362.yaml b/http/cves/2023/CVE-2023-1362.yaml index 59af77231b..c993ac399f 100644 --- a/http/cves/2023/CVE-2023-1362.yaml +++ b/http/cves/2023/CVE-2023-1362.yaml @@ -17,7 +17,7 @@ info: cpe: cpe:2.3:a:bumsys_project:bumsys:*:*:*:*:*:*:*:* metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2023,bumsys,clickjacking,huntr http: diff --git a/http/cves/2023/CVE-2023-1434.yaml b/http/cves/2023/CVE-2023-1434.yaml index 2316f2df73..daf51cf9f7 100644 --- a/http/cves/2023/CVE-2023-1434.yaml +++ b/http/cves/2023/CVE-2023-1434.yaml @@ -8,7 +8,7 @@ info: - https://www.sonarsource.com/blog/odoo-get-your-content-type-right-or-else metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Odoo" tags: cve,cve2023,odoo,xss diff --git a/http/cves/2023/CVE-2023-1671.yaml b/http/cves/2023/CVE-2023-1671.yaml index 2068c1e494..dc09161e16 100644 --- a/http/cves/2023/CVE-2023-1671.yaml +++ b/http/cves/2023/CVE-2023-1671.yaml @@ -18,7 +18,7 @@ info: fofa-query: title="Sophos Web Appliance" max-request: 1 shodan-query: title:"Sophos Web Appliance" - verified: "true" + verified: true tags: cve,cve2023,rce,sophos,oast http: diff --git a/http/cves/2023/CVE-2023-22620.yaml b/http/cves/2023/CVE-2023-22620.yaml index 44212918e4..cb771d4e53 100644 --- a/http/cves/2023/CVE-2023-22620.yaml +++ b/http/cves/2023/CVE-2023-22620.yaml @@ -14,7 +14,7 @@ info: - https://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Securepoint UTM" tags: utm,leak,memory,packetstorm,cve,cve2023,securepoint diff --git a/http/cves/2023/CVE-2023-22897.yaml b/http/cves/2023/CVE-2023-22897.yaml index 3dc1ca9e8e..7bb66e1508 100644 --- a/http/cves/2023/CVE-2023-22897.yaml +++ b/http/cves/2023/CVE-2023-22897.yaml @@ -12,7 +12,7 @@ info: - https://www.rcesecurity.com/2023/04/securepwn-part-2-leaking-remote-memory-contents-cve-2023-22897/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Securepoint UTM" tags: cve,cve2023,securepoint,utm,exposure,memory diff --git a/http/cves/2023/CVE-2023-23488.yaml b/http/cves/2023/CVE-2023-23488.yaml index eb707c9060..7d60455205 100644 --- a/http/cves/2023/CVE-2023-23488.yaml +++ b/http/cves/2023/CVE-2023-23488.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.05246 metadata: max-request: 2 - verified: "true" + verified: true tags: paid-memberships-pro,cve2023,wordpress,tenable,packetstorm,wp-plugin,sqli,cve,wp http: diff --git a/http/cves/2023/CVE-2023-23489.yaml b/http/cves/2023/CVE-2023-23489.yaml index 96dd007912..f9cfe4551f 100644 --- a/http/cves/2023/CVE-2023-23489.yaml +++ b/http/cves/2023/CVE-2023-23489.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.81787 metadata: max-request: 2 - verified: "true" + verified: true tags: easy-digital-downloads,unauth,cve,wpscan,wordpress,wp,wp-plugin,cve2023,sqli,tenable http: diff --git a/http/cves/2023/CVE-2023-23492.yaml b/http/cves/2023/CVE-2023-23492.yaml index 96b0538544..f4eca4aefc 100644 --- a/http/cves/2023/CVE-2023-23492.yaml +++ b/http/cves/2023/CVE-2023-23492.yaml @@ -21,7 +21,7 @@ info: epss-score: 0.01376 metadata: max-request: 1 - verified: "true" + verified: true tags: login-with-phonenumber,wordpress,wp,wp-plugin,xss,tenable,cve,cve2023 http: diff --git a/http/cves/2023/CVE-2023-2356.yaml b/http/cves/2023/CVE-2023-2356.yaml index c688e4e05c..127a010417 100644 --- a/http/cves/2023/CVE-2023-2356.yaml +++ b/http/cves/2023/CVE-2023-2356.yaml @@ -18,7 +18,7 @@ info: fofa-query: app="MLflow" max-request: 3 shodan-query: http.title:"mlflow" - verified: "true" + verified: true tags: cve,cve2023,lfi,huntr,mlflow,oss variables: diff --git a/http/cves/2023/CVE-2023-23752.yaml b/http/cves/2023/CVE-2023-23752.yaml index 895959614a..84825ca176 100644 --- a/http/cves/2023/CVE-2023-23752.yaml +++ b/http/cves/2023/CVE-2023-23752.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 2 shodan-query: html:"Joomla! - Open Source Content Management" - verified: "true" + verified: true tags: cve,cve2023,joomla http: diff --git a/http/cves/2023/CVE-2023-24044.yaml b/http/cves/2023/CVE-2023-24044.yaml index 4e19b71210..838ae0c6b4 100644 --- a/http/cves/2023/CVE-2023-24044.yaml +++ b/http/cves/2023/CVE-2023-24044.yaml @@ -22,7 +22,7 @@ info: max-request: 1 fofa-query: title="Plesk Obsidian" shodan-query: title:"Plesk Obsidian" - verified: "true" + verified: true tags: cve,cve2023,header,injection,plesk,obsidian http: diff --git a/http/cves/2023/CVE-2023-24278.yaml b/http/cves/2023/CVE-2023-24278.yaml index 70acbc5c39..1cc8920da4 100644 --- a/http/cves/2023/CVE-2023-24278.yaml +++ b/http/cves/2023/CVE-2023-24278.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:1099097618 - verified: "true" + verified: true tags: cve,cve2023,xss,squidex,cms,unauth http: diff --git a/http/cves/2023/CVE-2023-24322.yaml b/http/cves/2023/CVE-2023-24322.yaml index 88e2bd4030..95036e8cfc 100644 --- a/http/cves/2023/CVE-2023-24322.yaml +++ b/http/cves/2023/CVE-2023-24322.yaml @@ -21,7 +21,7 @@ info: metadata: max-request: 1 shodan-query: html:"mojoPortal" - verified: "true" + verified: true tags: cves,cve2023,mojoportal,xss http: diff --git a/http/cves/2023/CVE-2023-24367.yaml b/http/cves/2023/CVE-2023-24367.yaml index 499144c6fb..ae44b54a66 100644 --- a/http/cves/2023/CVE-2023-24367.yaml +++ b/http/cves/2023/CVE-2023-24367.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: title:"T24 Sign in" - verified: "true" + verified: true tags: cve,cve2023,xss,temenos http: diff --git a/http/cves/2023/CVE-2023-24657.yaml b/http/cves/2023/CVE-2023-24657.yaml index 1522594ef3..b792ac7ff0 100644 --- a/http/cves/2023/CVE-2023-24657.yaml +++ b/http/cves/2023/CVE-2023-24657.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: html:"phpIPAM IP address management" - verified: "true" + verified: true tags: cve,cve2023,xss,phpipam,authenticated http: diff --git a/http/cves/2023/CVE-2023-24733.yaml b/http/cves/2023/CVE-2023-24733.yaml index 83a7f0538f..8d4c9bd222 100644 --- a/http/cves/2023/CVE-2023-24733.yaml +++ b/http/cves/2023/CVE-2023-24733.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:1469328760 - verified: "true" + verified: true tags: cve,cve2023,unauth,xss,pmb http: diff --git a/http/cves/2023/CVE-2023-24735.yaml b/http/cves/2023/CVE-2023-24735.yaml index 1748a0f816..5ca6a10ae4 100644 --- a/http/cves/2023/CVE-2023-24735.yaml +++ b/http/cves/2023/CVE-2023-24735.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:1469328760 - verified: "true" + verified: true tags: cve,cve2023,redirect,pmb http: diff --git a/http/cves/2023/CVE-2023-24737.yaml b/http/cves/2023/CVE-2023-24737.yaml index c36dd4d6ad..fb75002929 100644 --- a/http/cves/2023/CVE-2023-24737.yaml +++ b/http/cves/2023/CVE-2023-24737.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:1469328760 - verified: "true" + verified: true tags: cve,cve2023,xss,pmb http: diff --git a/http/cves/2023/CVE-2023-25135.yaml b/http/cves/2023/CVE-2023-25135.yaml index c3dc3d40a2..b12d08712a 100644 --- a/http/cves/2023/CVE-2023-25135.yaml +++ b/http/cves/2023/CVE-2023-25135.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-502 metadata: max-request: 1 - verified: "true" + verified: true google-query: intext:"Powered By vBulletin" shodan-query: http.component:"vBulletin" tags: cve,cve2023,vbulletin,rce,kev diff --git a/http/cves/2023/CVE-2023-25717.yaml b/http/cves/2023/CVE-2023-25717.yaml index 82f3a145a0..34667cd203 100644 --- a/http/cves/2023/CVE-2023-25717.yaml +++ b/http/cves/2023/CVE-2023-25717.yaml @@ -19,7 +19,7 @@ info: cpe: cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:* metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"ruckus wireless" fofa-query: title="ruckus wireless" tags: cve,cve2023,ruckus,rce,kev diff --git a/http/cves/2023/CVE-2023-26360.yaml b/http/cves/2023/CVE-2023-26360.yaml index f87f8c22d0..db5d77e4e8 100644 --- a/http/cves/2023/CVE-2023-26360.yaml +++ b/http/cves/2023/CVE-2023-26360.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: http.component:"Adobe ColdFusion" - verified: "true" + verified: true tags: cve,cve2023,adobe,coldfusion,lfi,kev http: diff --git a/http/cves/2023/CVE-2023-27008.yaml b/http/cves/2023/CVE-2023-27008.yaml index 1a87dc98e0..73adcc9a2e 100644 --- a/http/cves/2023/CVE-2023-27008.yaml +++ b/http/cves/2023/CVE-2023-27008.yaml @@ -13,7 +13,7 @@ info: cve-id: CVE-2023-27008 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"Atutor" tags: cve,cve2023,xss,atutor diff --git a/http/cves/2023/CVE-2023-27159.yaml b/http/cves/2023/CVE-2023-27159.yaml index e7560456d9..0369f2abb0 100644 --- a/http/cves/2023/CVE-2023-27159.yaml +++ b/http/cves/2023/CVE-2023-27159.yaml @@ -17,7 +17,7 @@ info: cve-id: CVE-2023-27159 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Sign In - Appwrite" tags: cve,cve2023,appwrite,ssrf,oast diff --git a/http/cves/2023/CVE-2023-27179.yaml b/http/cves/2023/CVE-2023-27179.yaml index 785be768ce..62eb9f6278 100644 --- a/http/cves/2023/CVE-2023-27179.yaml +++ b/http/cves/2023/CVE-2023-27179.yaml @@ -14,7 +14,7 @@ info: cve-id: CVE-2023-27179 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2023,file-download,gdidees,lfr http: diff --git a/http/cves/2023/CVE-2023-27292.yaml b/http/cves/2023/CVE-2023-27292.yaml index 3334618398..0fcd5f462c 100644 --- a/http/cves/2023/CVE-2023-27292.yaml +++ b/http/cves/2023/CVE-2023-27292.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 2 shodan-query: title:"opencats" - verified: "true" + verified: true tags: authenticated,tenable,cve,cve2023,opencats,redirect http: diff --git a/http/cves/2023/CVE-2023-2732.yaml b/http/cves/2023/CVE-2023-2732.yaml index 86c97ffc01..b64b6841d9 100644 --- a/http/cves/2023/CVE-2023-2732.yaml +++ b/http/cves/2023/CVE-2023-2732.yaml @@ -17,7 +17,7 @@ info: cwe-id: CWE-288 metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,mstore-api http: diff --git a/http/cves/2023/CVE-2023-27350.yaml b/http/cves/2023/CVE-2023-27350.yaml index ffa57d59e8..a6ab5eea37 100644 --- a/http/cves/2023/CVE-2023-27350.yaml +++ b/http/cves/2023/CVE-2023-27350.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 10 shodan-query: http.html:"PaperCut" - verified: "true" + verified: true tags: cve,cve2023,papercut,rce,oast,unauth,kev variables: diff --git a/http/cves/2023/CVE-2023-27482.yaml b/http/cves/2023/CVE-2023-27482.yaml index 0b764ab5b5..d3187c00c3 100644 --- a/http/cves/2023/CVE-2023-27482.yaml +++ b/http/cves/2023/CVE-2023-27482.yaml @@ -22,7 +22,7 @@ info: cwe-id: CWE-287 metadata: max-request: 3 - verified: "true" + verified: true shodan-query: title:"Home Assistant" tags: cve,cve2023,homeassistant,auth-bypass,rce diff --git a/http/cves/2023/CVE-2023-27524.yaml b/http/cves/2023/CVE-2023-27524.yaml index 08ffb4fdd8..0fc950fc8f 100644 --- a/http/cves/2023/CVE-2023-27524.yaml +++ b/http/cves/2023/CVE-2023-27524.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-1188 metadata: max-request: 45 - verified: "true" + verified: true shodan-query: html:"Apache Superset" tags: cve,cve2023,apache,superset,auth-bypass diff --git a/http/cves/2023/CVE-2023-2780.yaml b/http/cves/2023/CVE-2023-2780.yaml index 3b92945cfb..ec84bbaa4e 100644 --- a/http/cves/2023/CVE-2023-2780.yaml +++ b/http/cves/2023/CVE-2023-2780.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 3 shodan-query: http.title:"mlflow" - verified: "true" + verified: true tags: mlflow,oss,lfi,huntr,cve,cve2023 http: diff --git a/http/cves/2023/CVE-2023-2825.yaml b/http/cves/2023/CVE-2023-2825.yaml index fc3f265dae..ba85242d39 100644 --- a/http/cves/2023/CVE-2023-2825.yaml +++ b/http/cves/2023/CVE-2023-2825.yaml @@ -16,7 +16,7 @@ info: metadata: max-request: 16 shodan-query: title:"Gitlab" - verified: "true" + verified: true tags: cve,cve2023,gitlab,lfi,kev,authenticated variables: diff --git a/http/cves/2023/CVE-2023-28432.yaml b/http/cves/2023/CVE-2023-28432.yaml index 2b6d09cfc1..e4ee6e2a71 100644 --- a/http/cves/2023/CVE-2023-28432.yaml +++ b/http/cves/2023/CVE-2023-28432.yaml @@ -24,7 +24,7 @@ info: max-request: 1 fofa-query: app="Minio" shodan-query: title:"Minio Console" - verified: "true" + verified: true tags: cve,cve2023,minio,console,exposure,kev http: diff --git a/http/cves/2023/CVE-2023-29489.yaml b/http/cves/2023/CVE-2023-29489.yaml index 4d767e72f4..591415aaad 100644 --- a/http/cves/2023/CVE-2023-29489.yaml +++ b/http/cves/2023/CVE-2023-29489.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: title:"cPanel" - verified: "true" + verified: true tags: cve,cve2023,cpanel,xss http: diff --git a/http/cves/2023/CVE-2023-29887.yaml b/http/cves/2023/CVE-2023-29887.yaml index 0ddb1abd8e..0904437829 100644 --- a/http/cves/2023/CVE-2023-29887.yaml +++ b/http/cves/2023/CVE-2023-29887.yaml @@ -18,7 +18,7 @@ info: cpe: cpe:2.3:a:nuovo:spreadsheet-reader:0.5.11:*:*:*:*:*:*:* metadata: max-request: 2 - verified: "true" + verified: true tags: cve,cve2023,nuovo,spreadsheet-reader,lfi http: diff --git a/http/cves/2023/CVE-2023-29919.yaml b/http/cves/2023/CVE-2023-29919.yaml index b49df440fe..cdfd34d765 100644 --- a/http/cves/2023/CVE-2023-29919.yaml +++ b/http/cves/2023/CVE-2023-29919.yaml @@ -13,7 +13,7 @@ info: cve-id: CVE-2023-29919 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"SolarView Compact" tags: cve,cve2023,lfi,solarview,edb diff --git a/http/cves/2023/CVE-2023-29922.yaml b/http/cves/2023/CVE-2023-29922.yaml index 5e9d74270e..f4d84c20eb 100644 --- a/http/cves/2023/CVE-2023-29922.yaml +++ b/http/cves/2023/CVE-2023-29922.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-1188 metadata: max-request: 1 - verified: "true" + verified: true fofa-query: app="PowerJob" shodan-query: html:"PowerJob" tags: cve,cve2023,auth-bypass,powerjob diff --git a/http/cves/2023/CVE-2023-29923.yaml b/http/cves/2023/CVE-2023-29923.yaml index e8cae4b452..100907fc5c 100644 --- a/http/cves/2023/CVE-2023-29923.yaml +++ b/http/cves/2023/CVE-2023-29923.yaml @@ -12,7 +12,7 @@ info: metadata: fofa-query: app="PowerJob" max-request: 1 - verified: "true" + verified: true tags: cve,cve2023,powerjob,unauth http: diff --git a/http/cves/2023/CVE-2023-30210.yaml b/http/cves/2023/CVE-2023-30210.yaml index 5fb25f57f0..961fbcf166 100644 --- a/http/cves/2023/CVE-2023-30210.yaml +++ b/http/cves/2023/CVE-2023-30210.yaml @@ -12,7 +12,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2023-30210 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2023,xss,ourphp,unauthenticated http: diff --git a/http/cves/2023/CVE-2023-30212.yaml b/http/cves/2023/CVE-2023-30212.yaml index 5ab21bf2a2..ff2ae82e49 100644 --- a/http/cves/2023/CVE-2023-30212.yaml +++ b/http/cves/2023/CVE-2023-30212.yaml @@ -14,7 +14,7 @@ info: cve-id: CVE-2023-30212 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2023,xss,ourphp http: diff --git a/http/cves/2023/CVE-2023-31059.yaml b/http/cves/2023/CVE-2023-31059.yaml index ff622af5d0..f62339ae0a 100644 --- a/http/cves/2023/CVE-2023-31059.yaml +++ b/http/cves/2023/CVE-2023-31059.yaml @@ -18,7 +18,7 @@ info: cpe: cpe:2.3:a:repetier-server:repetier-server:*:*:*:*:*:*:*:* metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Repetier-Server" fofa-query: title="Repetier-Server" tags: cve,cve2023,repetier,lfi diff --git a/http/cves/2023/CVE-2023-32235.yaml b/http/cves/2023/CVE-2023-32235.yaml index cc2b8b824f..6308d15adf 100644 --- a/http/cves/2023/CVE-2023-32235.yaml +++ b/http/cves/2023/CVE-2023-32235.yaml @@ -14,7 +14,7 @@ info: cve-id: CVE-2023-32235 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.component:"Ghost" tags: cve,cve2023,lfi,ghostcms diff --git a/http/cves/2023/CVE-2023-32243.yaml b/http/cves/2023/CVE-2023-32243.yaml index 8dcc9d75e8..cb7bdadc5b 100644 --- a/http/cves/2023/CVE-2023-32243.yaml +++ b/http/cves/2023/CVE-2023-32243.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-287 metadata: max-request: 3 - verified: "true" + verified: true google-query: inurl:/wp-content/plugins/essential-addons-for-elementor-lite tags: cve,cve2023,wordpress,wp,wp-plugin,auth-bypass,intrusive diff --git a/http/cves/2023/CVE-2023-32315.yaml b/http/cves/2023/CVE-2023-32315.yaml index ab5dea66a1..58c11e6478 100644 --- a/http/cves/2023/CVE-2023-32315.yaml +++ b/http/cves/2023/CVE-2023-32315.yaml @@ -18,7 +18,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"openfire" tags: cve,cve2023,auth-bypass,openfire,console diff --git a/http/default-logins/adminer-default-login.yaml b/http/default-logins/adminer-default-login.yaml index 5b090cd05f..cdcfe95056 100644 --- a/http/default-logins/adminer-default-login.yaml +++ b/http/default-logins/adminer-default-login.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-522 metadata: max-request: 5 - verified: "true" + verified: true shodan-query: http.title:adminer tags: default-login,adminer diff --git a/http/default-logins/jboss/jboss-jbpm-default-login.yaml b/http/default-logins/jboss/jboss-jbpm-default-login.yaml index 86da265d40..f7fb29a561 100644 --- a/http/default-logins/jboss/jboss-jbpm-default-login.yaml +++ b/http/default-logins/jboss/jboss-jbpm-default-login.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-522 metadata: max-request: 12 - verified: "true" + verified: true shodan-query: html:"JBossWS" tags: jboss,jbpm,default-login diff --git a/http/default-logins/magnolia-default-login.yaml b/http/default-logins/magnolia-default-login.yaml index e34d99af0e..a176dbfd86 100644 --- a/http/default-logins/magnolia-default-login.yaml +++ b/http/default-logins/magnolia-default-login.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 3 - verified: "true" + verified: true shodan-query: html:"Magnolia is a registered trademark" tags: magnolia,default-login diff --git a/http/default-logins/nagios/nagiosxi-default-login.yaml b/http/default-logins/nagios/nagiosxi-default-login.yaml index bdd9668905..72ce455cee 100644 --- a/http/default-logins/nagios/nagiosxi-default-login.yaml +++ b/http/default-logins/nagios/nagiosxi-default-login.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-1391 metadata: max-request: 6 - verified: "true" + verified: true shodan-query: title:"Nagios XI" tags: nagios,nagiosxi,default-login diff --git a/http/default-logins/powerjob-default-login.yaml b/http/default-logins/powerjob-default-login.yaml index 98323cc806..49a190a323 100644 --- a/http/default-logins/powerjob-default-login.yaml +++ b/http/default-logins/powerjob-default-login.yaml @@ -12,7 +12,7 @@ info: fofa-query: title="PowerJob" max-request: 1 shodan-query: http.title:"PowerJob" - verified: "true" + verified: true tags: powerjob,default-login http: diff --git a/http/default-logins/trassir/trassir-default-login.yaml b/http/default-logins/trassir/trassir-default-login.yaml index 1705fe36c4..3a82caf1b6 100644 --- a/http/default-logins/trassir/trassir-default-login.yaml +++ b/http/default-logins/trassir/trassir-default-login.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-522 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Trassir Webview" tags: default-login,trassir,webview diff --git a/http/default-logins/xui-weak-login.yaml b/http/default-logins/xui-weak-login.yaml index d338094f5d..6b6733d862 100644 --- a/http/default-logins/xui-weak-login.yaml +++ b/http/default-logins/xui-weak-login.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-798 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"X-UI Login" tags: x-ui,default-login diff --git a/http/exposed-panels/appwrite-panel.yaml b/http/exposed-panels/appwrite-panel.yaml index 2acbbcba5f..a52807af71 100644 --- a/http/exposed-panels/appwrite-panel.yaml +++ b/http/exposed-panels/appwrite-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.favicon.hash:-633108100 tags: panel,appwrite,detect diff --git a/http/exposed-panels/arcgis/arcgis-services.yaml b/http/exposed-panels/arcgis/arcgis-services.yaml index 7a18b18cbe..30bc4d5ed0 100644 --- a/http/exposed-panels/arcgis/arcgis-services.yaml +++ b/http/exposed-panels/arcgis/arcgis-services.yaml @@ -7,9 +7,9 @@ info: description: Check for the existence of the "/arcgis/rest/services" path on an ArcGIS server. reference: - https://enterprise.arcgis.com/en/ - metadata: + metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"ArcGIS" tags: panel,arcgis,rest,api,detect diff --git a/http/exposed-panels/arcgis/arcgis-tokens.yaml b/http/exposed-panels/arcgis/arcgis-tokens.yaml index 44c5d494cf..bee4c3a7b6 100644 --- a/http/exposed-panels/arcgis/arcgis-tokens.yaml +++ b/http/exposed-panels/arcgis/arcgis-tokens.yaml @@ -7,9 +7,9 @@ info: description: Check for the existence of the ArcGIS Token Service on an ArcGIS server. reference: - https://enterprise.arcgis.com/en/ - metadata: + metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"ArcGIS" tags: panel,arcgis,tokens,detect diff --git a/http/exposed-panels/aspect-control-panel.yaml b/http/exposed-panels/aspect-control-panel.yaml index 54ea099adb..62b1a5a20d 100644 --- a/http/exposed-panels/aspect-control-panel.yaml +++ b/http/exposed-panels/aspect-control-panel.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:1011076161 tags: panel,aspect,login diff --git a/http/exposed-panels/axway-api-manager-panel.yaml b/http/exposed-panels/axway-api-manager-panel.yaml index 6c4ae6e802..0d8e575c3e 100644 --- a/http/exposed-panels/axway-api-manager-panel.yaml +++ b/http/exposed-panels/axway-api-manager-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shoda-query: http.title:"Axway API Manager Login" tags: panel,axway,detect diff --git a/http/exposed-panels/axway-securetransport-panel.yaml b/http/exposed-panels/axway-securetransport-panel.yaml index efcb63a069..86c9ee699f 100644 --- a/http/exposed-panels/axway-securetransport-panel.yaml +++ b/http/exposed-panels/axway-securetransport-panel.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"SecureTransport" || http.favicon.hash:1330269434 tags: panel,axway,securetransport diff --git a/http/exposed-panels/c2/metasploit-c2.yaml b/http/exposed-panels/c2/metasploit-c2.yaml index c5385d75e7..ae5f9a5723 100644 --- a/http/exposed-panels/c2/metasploit-c2.yaml +++ b/http/exposed-panels/c2/metasploit-c2.yaml @@ -10,7 +10,7 @@ info: https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: ssl:"MetasploitSelfSignedCA" tags: c2,ir,osint,metasploit diff --git a/http/exposed-panels/c2/mythic-c2.yaml b/http/exposed-panels/c2/mythic-c2.yaml index 79603e855d..85951cd9ec 100644 --- a/http/exposed-panels/c2/mythic-c2.yaml +++ b/http/exposed-panels/c2/mythic-c2.yaml @@ -11,7 +11,7 @@ info: https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: 'ssl:Mythic port:7443' tags: c2,ir,osint,mythic diff --git a/http/exposed-panels/caton-network-manager-system.yaml b/http/exposed-panels/caton-network-manager-system.yaml index d6f3a16468..0f8350e148 100644 --- a/http/exposed-panels/caton-network-manager-system.yaml +++ b/http/exposed-panels/caton-network-manager-system.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Caton Network Manager System" tags: caton,manager,login,panel diff --git a/http/exposed-panels/dynatrace-panel.yaml b/http/exposed-panels/dynatrace-panel.yaml index 15e9badac2..6c36cf29f3 100644 --- a/http/exposed-panels/dynatrace-panel.yaml +++ b/http/exposed-panels/dynatrace-panel.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:1828614783 tags: dynatrace,login,panel diff --git a/http/exposed-panels/eclipse-birt-panel.yaml b/http/exposed-panels/eclipse-birt-panel.yaml index b485214e91..bd7fea78ec 100644 --- a/http/exposed-panels/eclipse-birt-panel.yaml +++ b/http/exposed-panels/eclipse-birt-panel.yaml @@ -13,7 +13,7 @@ info: - https://eclipse.github.io/birt-website/ metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Eclipse BIRT Home" google-query: intitle:"Eclipse BIRT Home" tags: panel,eclipsebirt,detect diff --git a/http/exposed-panels/elemiz-network-manager.yaml b/http/exposed-panels/elemiz-network-manager.yaml index 2465726775..5c3717a6cb 100644 --- a/http/exposed-panels/elemiz-network-manager.yaml +++ b/http/exposed-panels/elemiz-network-manager.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Elemiz Network Manager" tags: elemiz,manager,login,panel diff --git a/http/exposed-panels/fortinet/fortinet-fortiddos-panel.yaml b/http/exposed-panels/fortinet/fortinet-fortiddos-panel.yaml index 457988f498..926de0a272 100644 --- a/http/exposed-panels/fortinet/fortinet-fortiddos-panel.yaml +++ b/http/exposed-panels/fortinet/fortinet-fortiddos-panel.yaml @@ -10,7 +10,7 @@ info: - https://www.fortinet.com/products/ddos/fortiddos metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"FortiDDoS" tags: panel,fortinet,fortiddos,login diff --git a/http/exposed-panels/fortinet/fortinet-fortinac-panel.yaml b/http/exposed-panels/fortinet/fortinet-fortinac-panel.yaml index 0888d69ebe..a4792d0e0f 100644 --- a/http/exposed-panels/fortinet/fortinet-fortinac-panel.yaml +++ b/http/exposed-panels/fortinet/fortinet-fortinac-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Fortinac" tags: panel,fortinet,fortinac,login diff --git a/http/exposed-panels/freeipa-panel.yaml b/http/exposed-panels/freeipa-panel.yaml index c6c0ce1a06..f379101e71 100644 --- a/http/exposed-panels/freeipa-panel.yaml +++ b/http/exposed-panels/freeipa-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: html:"FreeIPA" tags: panel,login,freeipa diff --git a/http/exposed-panels/freepbx-administration-panel.yaml b/http/exposed-panels/freepbx-administration-panel.yaml index 5c1e4284f9..9679d05897 100644 --- a/http/exposed-panels/freepbx-administration-panel.yaml +++ b/http/exposed-panels/freepbx-administration-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"FreePBX Administration" tags: freepbx,panel diff --git a/http/exposed-panels/gnu-mailman.yaml b/http/exposed-panels/gnu-mailman.yaml index bbb754b5c3..4e8ea7eb24 100644 --- a/http/exposed-panels/gnu-mailman.yaml +++ b/http/exposed-panels/gnu-mailman.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Mailing Lists" tags: exposure,mailman diff --git a/http/exposed-panels/group-ib-panel.yaml b/http/exposed-panels/group-ib-panel.yaml index aeda87b63e..c4826aa792 100644 --- a/http/exposed-panels/group-ib-panel.yaml +++ b/http/exposed-panels/group-ib-panel.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Group-IB Managed XDR" tags: panel,groupib diff --git a/http/exposed-panels/hestia-panel.yaml b/http/exposed-panels/hestia-panel.yaml index 021aeb89d4..1823a6138b 100644 --- a/http/exposed-panels/hestia-panel.yaml +++ b/http/exposed-panels/hestia-panel.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Hestia Control Panel" tags: panel,hestia,detect diff --git a/http/exposed-panels/i-mscp-panel.yaml b/http/exposed-panels/i-mscp-panel.yaml index fddd11d1b3..f3c840e1e0 100644 --- a/http/exposed-panels/i-mscp-panel.yaml +++ b/http/exposed-panels/i-mscp-panel.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"i-MSCP - Multi Server Control Panel" tags: panel,i-mscp,detect diff --git a/http/exposed-panels/interactsoftware-interact.yaml b/http/exposed-panels/interactsoftware-interact.yaml index e3c0b881ff..b2ab17f1a5 100644 --- a/http/exposed-panels/interactsoftware-interact.yaml +++ b/http/exposed-panels/interactsoftware-interact.yaml @@ -9,7 +9,7 @@ info: - https://www.interactsoftware.com metadata: max-request: 1 - verified: "true" + verified: true tags: panel,interactsoftware,interact,detect http: diff --git a/http/exposed-panels/isams-panel.yaml b/http/exposed-panels/isams-panel.yaml index 6e687b8967..b7bda16aa9 100644 --- a/http/exposed-panels/isams-panel.yaml +++ b/http/exposed-panels/isams-panel.yaml @@ -10,7 +10,7 @@ info: - https://www.isams.com/platform/the-platform metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-81573405 tags: panel,isams,login diff --git a/http/exposed-panels/jboss/jboss-jbpm-admin.yaml b/http/exposed-panels/jboss/jboss-jbpm-admin.yaml index 086b1e13ef..569538401f 100644 --- a/http/exposed-panels/jboss/jboss-jbpm-admin.yaml +++ b/http/exposed-panels/jboss/jboss-jbpm-admin.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"JBossWS" tags: jboss,panel,login diff --git a/http/exposed-panels/jedox-web-panel.yaml b/http/exposed-panels/jedox-web-panel.yaml index 93d33c71aa..b15c895634 100644 --- a/http/exposed-panels/jedox-web-panel.yaml +++ b/http/exposed-panels/jedox-web-panel.yaml @@ -10,7 +10,7 @@ info: - https://www.jedox.com metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Jedox Web - Login" google-query: intitle:"Jedox Web Login" tags: panel,jedox,detect diff --git a/http/exposed-panels/kubeview-dashboard.yaml b/http/exposed-panels/kubeview-dashboard.yaml index c60b5c2b35..2fb91135f0 100644 --- a/http/exposed-panels/kubeview-dashboard.yaml +++ b/http/exposed-panels/kubeview-dashboard.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-379154636 tags: exposure,k8s,kubernetes,kubeview,dashboard diff --git a/http/exposed-panels/lancom-router-panel.yaml b/http/exposed-panels/lancom-router-panel.yaml index e08b5fc916..088223077a 100644 --- a/http/exposed-panels/lancom-router-panel.yaml +++ b/http/exposed-panels/lancom-router-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"LANCOM Systems GmbH" tags: panel,lancom,router diff --git a/http/exposed-panels/magnolia-panel.yaml b/http/exposed-panels/magnolia-panel.yaml index 6400628455..d8d395cc76 100644 --- a/http/exposed-panels/magnolia-panel.yaml +++ b/http/exposed-panels/magnolia-panel.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: html:"Magnolia is a registered trademark" tags: magnolia,panel,login diff --git a/http/exposed-panels/metasploit-setup-page.yaml b/http/exposed-panels/metasploit-setup-page.yaml index 6cbef36680..e6d06a87c1 100644 --- a/http/exposed-panels/metasploit-setup-page.yaml +++ b/http/exposed-panels/metasploit-setup-page.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Metasploit - Setup and Configuration" tags: panel,metasploit,setup diff --git a/http/exposed-panels/mystrom-panel.yaml b/http/exposed-panels/mystrom-panel.yaml index 25da83756c..9257d0c315 100644 --- a/http/exposed-panels/mystrom-panel.yaml +++ b/http/exposed-panels/mystrom-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"myStrom" tags: panel,mystrom,iot diff --git a/http/exposed-panels/o2-easy-panel.yaml b/http/exposed-panels/o2-easy-panel.yaml index 0e7392ce27..23d7020a05 100644 --- a/http/exposed-panels/o2-easy-panel.yaml +++ b/http/exposed-panels/o2-easy-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"O2 Easy Setup" tags: panel,o2,easy,iot,router diff --git a/http/exposed-panels/odoo-panel.yaml b/http/exposed-panels/odoo-panel.yaml index ddf675052d..0d9579e96f 100644 --- a/http/exposed-panels/odoo-panel.yaml +++ b/http/exposed-panels/odoo-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Odoo" tags: login,panel,odoo diff --git a/http/exposed-panels/oracle-opera-login.yaml b/http/exposed-panels/oracle-opera-login.yaml index 470b73d4ca..35f6804ed1 100644 --- a/http/exposed-panels/oracle-opera-login.yaml +++ b/http/exposed-panels/oracle-opera-login.yaml @@ -8,7 +8,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Oracle Opera" tags: panel,opera,oracle,detect diff --git a/http/exposed-panels/papercut-ng-panel.yaml b/http/exposed-panels/papercut-ng-panel.yaml index ad7b8d3712..bcfaed6100 100644 --- a/http/exposed-panels/papercut-ng-panel.yaml +++ b/http/exposed-panels/papercut-ng-panel.yaml @@ -8,7 +8,7 @@ info: PaperCut is a print management system. Log in to manage your print quotas, see your print history and configure your system. metadata: max-request: 1 - verified: "true" + verified: true google-query: html:'content="PaperCut' tags: panel,papercut,detect diff --git a/http/exposed-panels/proxmox-panel.yaml b/http/exposed-panels/proxmox-panel.yaml index 9305aed12e..7e22cac7ee 100644 --- a/http/exposed-panels/proxmox-panel.yaml +++ b/http/exposed-panels/proxmox-panel.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:213144638 tags: panel,proxmox,login diff --git a/http/exposed-panels/red-lion-panel.yaml b/http/exposed-panels/red-lion-panel.yaml index bedceea0b8..f78de8e303 100644 --- a/http/exposed-panels/red-lion-panel.yaml +++ b/http/exposed-panels/red-lion-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true tags: panel,redlion,detect,iot http: diff --git a/http/exposed-panels/redis-enterprise-panel.yaml b/http/exposed-panels/redis-enterprise-panel.yaml index 06c384d4c3..fa0887857e 100644 --- a/http/exposed-panels/redis-enterprise-panel.yaml +++ b/http/exposed-panels/redis-enterprise-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Enterprise-Class Redis for Developers" tags: panel,redis,enterprise diff --git a/http/exposed-panels/repetier-server-panel.yaml b/http/exposed-panels/repetier-server-panel.yaml index 623087833f..9eb7c10914 100644 --- a/http/exposed-panels/repetier-server-panel.yaml +++ b/http/exposed-panels/repetier-server-panel.yaml @@ -8,7 +8,7 @@ info: Repetier Server login panel detected. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Repetier-Server" tags: panel,repetier,detect diff --git a/http/exposed-panels/sap-cloud-analytics.yaml b/http/exposed-panels/sap-cloud-analytics.yaml index f0e086a3cd..0cd5ed35a9 100644 --- a/http/exposed-panels/sap-cloud-analytics.yaml +++ b/http/exposed-panels/sap-cloud-analytics.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"SAP Analytics Cloud" tags: panel,sap,cloudanalytics diff --git a/http/exposed-panels/sap-successfactors-detect.yaml b/http/exposed-panels/sap-successfactors-detect.yaml index 12da9ee42c..0447999ff6 100644 --- a/http/exposed-panels/sap-successfactors-detect.yaml +++ b/http/exposed-panels/sap-successfactors-detect.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Login - SAP SuccessFactors" tags: sap,detect diff --git a/http/exposed-panels/sauter-moduwebvision-panel.yaml b/http/exposed-panels/sauter-moduwebvision-panel.yaml index 689e1dbcd0..9d07606940 100644 --- a/http/exposed-panels/sauter-moduwebvision-panel.yaml +++ b/http/exposed-panels/sauter-moduwebvision-panel.yaml @@ -10,7 +10,7 @@ info: - https://www.sauter-controls.com metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-1663319756 tags: panel,moduweb,sauter,login diff --git a/http/exposed-panels/seagate-nas-login.yaml b/http/exposed-panels/seagate-nas-login.yaml index e9f1d70769..b0d95bffbe 100644 --- a/http/exposed-panels/seagate-nas-login.yaml +++ b/http/exposed-panels/seagate-nas-login.yaml @@ -8,7 +8,7 @@ info: Seagate NAS - SEAGATE Login was detected. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Seagate NAS - SEAGATE" tags: panel,seagate,login diff --git a/http/exposed-panels/sensu-panel.yaml b/http/exposed-panels/sensu-panel.yaml index fcd30d71db..e21ba748fd 100644 --- a/http/exposed-panels/sensu-panel.yaml +++ b/http/exposed-panels/sensu-panel.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-749942143 tags: panel,sensu,sumo,detect diff --git a/http/exposed-panels/sevone-nms-network-manager.yaml b/http/exposed-panels/sevone-nms-network-manager.yaml index 9bb4b32277..14d25d7f54 100644 --- a/http/exposed-panels/sevone-nms-network-manager.yaml +++ b/http/exposed-panels/sevone-nms-network-manager.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"SevOne NMS - Network Manager" tags: sevone,manager,login,panel diff --git a/http/exposed-panels/shardingsphere-panel.yaml b/http/exposed-panels/shardingsphere-panel.yaml index 1f6d22c65a..69a17972a8 100644 --- a/http/exposed-panels/shardingsphere-panel.yaml +++ b/http/exposed-panels/shardingsphere-panel.yaml @@ -10,7 +10,7 @@ info: metadata: max-request: 1 shodan-query: http.favicon.hash:816588900 - verified: "true" + verified: true tags: panel,shardingsphere,login diff --git a/http/exposed-panels/sonic-wall-login.yaml b/http/exposed-panels/sonic-wall-login.yaml index c0193b668d..24700689db 100644 --- a/http/exposed-panels/sonic-wall-login.yaml +++ b/http/exposed-panels/sonic-wall-login.yaml @@ -7,7 +7,7 @@ info: description: SonicWall Network Security Login panel was detected. metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"SonicWall Network Security Login" tags: panel,sonicwall,login diff --git a/http/exposed-panels/sophos-web-appliance.yaml b/http/exposed-panels/sophos-web-appliance.yaml index 1dc002720e..ccfac147af 100644 --- a/http/exposed-panels/sophos-web-appliance.yaml +++ b/http/exposed-panels/sophos-web-appliance.yaml @@ -8,7 +8,7 @@ info: - https://docs.sophos.com/nsg/swa/help/en-us/nsg/swa/concepts/AboutYourAppliance.html metadata: max-request: 1 - verified: "true" + verified: true shodan-query: 'http.favicon.hash:-893681401' tags: panel,login,sophos diff --git a/http/exposed-panels/veriz0wn-osint.yaml b/http/exposed-panels/veriz0wn-osint.yaml index 0375e5e824..8f2be49593 100644 --- a/http/exposed-panels/veriz0wn-osint.yaml +++ b/http/exposed-panels/veriz0wn-osint.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Veriz0wn" tags: veriz0wn,panel diff --git a/http/exposed-panels/watcher-panel.yaml b/http/exposed-panels/watcher-panel.yaml index 571f628c34..5c6dff7676 100644 --- a/http/exposed-panels/watcher-panel.yaml +++ b/http/exposed-panels/watcher-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"/vsaas/v2/static/" tags: panel,watcher,login diff --git a/http/exposed-panels/watershed-panel.yaml b/http/exposed-panels/watershed-panel.yaml index d6372c0ea4..41efc9866c 100644 --- a/http/exposed-panels/watershed-panel.yaml +++ b/http/exposed-panels/watershed-panel.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Watershed LRS" tags: panel,watershed diff --git a/http/exposed-panels/web-viewer-panel.yaml b/http/exposed-panels/web-viewer-panel.yaml index 5dfce52da7..d9dff05b46 100644 --- a/http/exposed-panels/web-viewer-panel.yaml +++ b/http/exposed-panels/web-viewer-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Web Viewer for Samsung DVR" tags: panel,web-viewer,detect diff --git a/http/exposed-panels/yellowfin-panel.yaml b/http/exposed-panels/yellowfin-panel.yaml index b77e29ac02..7cc3391900 100644 --- a/http/exposed-panels/yellowfin-panel.yaml +++ b/http/exposed-panels/yellowfin-panel.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Yellowfin Information Collaboration" tags: yellowfin,panel,login diff --git a/http/exposed-panels/zoho/manageengine-network-config.yaml b/http/exposed-panels/zoho/manageengine-network-config.yaml index 3c8eef5a2f..48adf14140 100644 --- a/http/exposed-panels/zoho/manageengine-network-config.yaml +++ b/http/exposed-panels/zoho/manageengine-network-config.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Network Configuration Manager" tags: panel,zoho,manageengine diff --git a/http/exposures/apis/jeecg-boot-swagger.yaml b/http/exposures/apis/jeecg-boot-swagger.yaml index 70317fc256..446731b0b8 100644 --- a/http/exposures/apis/jeecg-boot-swagger.yaml +++ b/http/exposures/apis/jeecg-boot-swagger.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Jeecg-Boot" fofa-query: title="JeecgBoot 企业级低代码平台" tags: jeecg,swagger,detect,exposure diff --git a/http/exposures/configs/blazor-boot.yaml b/http/exposures/configs/blazor-boot.yaml index 840d9c47f6..a5f8678e3a 100644 --- a/http/exposures/configs/blazor-boot.yaml +++ b/http/exposures/configs/blazor-boot.yaml @@ -8,7 +8,7 @@ info: - https://github.com/freakyclown/Nuclei_templates/blob/main/blazor_server.yaml metadata: max-request: 1 - verified: "true" + verified: true github-query: 'blazor.boot.json language:JSON' tags: blazor,boot,exposure,config,disclosure diff --git a/http/exposures/configs/config-properties.yaml b/http/exposures/configs/config-properties.yaml index 647d9a349a..7defa8fd7f 100644 --- a/http/exposures/configs/config-properties.yaml +++ b/http/exposures/configs/config-properties.yaml @@ -7,7 +7,7 @@ info: reference: - https://twitter.com/win3zz/status/1657624974851702784/photo/1 metadata: - verified: "true" + verified: true max-request: 3 tags: exposure,config,properties diff --git a/http/exposures/configs/ftp-credentials-exposure.yaml b/http/exposures/configs/ftp-credentials-exposure.yaml index 726bbdd208..828222742e 100644 --- a/http/exposures/configs/ftp-credentials-exposure.yaml +++ b/http/exposures/configs/ftp-credentials-exposure.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true google-query: inurl:"/ftpsync.settings" tags: config,ftp,exposure diff --git a/http/exposures/configs/jkstatus-manager.yaml b/http/exposures/configs/jkstatus-manager.yaml index 79a9403327..10150a6bc7 100644 --- a/http/exposures/configs/jkstatus-manager.yaml +++ b/http/exposures/configs/jkstatus-manager.yaml @@ -8,7 +8,7 @@ info: - https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/JKStatus.java metadata: max-request: 8 - verified: "true" + verified: true shodan-query: html:"JK Status Manager" tags: config,jk,status diff --git a/http/exposures/configs/ovpn-config-exposed.yaml b/http/exposures/configs/ovpn-config-exposed.yaml index 84df31af11..0b94a58fd6 100644 --- a/http/exposures/configs/ovpn-config-exposed.yaml +++ b/http/exposures/configs/ovpn-config-exposed.yaml @@ -9,7 +9,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"OVPN Config Download" tags: config,ovpn,exposure diff --git a/http/exposures/configs/platformio-ini.yaml b/http/exposures/configs/platformio-ini.yaml index 99027c5a4a..e25b58e6d5 100644 --- a/http/exposures/configs/platformio-ini.yaml +++ b/http/exposures/configs/platformio-ini.yaml @@ -9,7 +9,7 @@ info: - https://docs.platformio.org/en/stable/projectconf/index.html metadata: max-request: 1 - verified: "true" + verified: true google-query: inurl:"/platformio.ini" github-query: '[platformio] language:INI' tags: config,exposure,platformio diff --git a/http/exposures/configs/svnserve-config.yaml b/http/exposures/configs/svnserve-config.yaml index f9b8d3f2fb..fa80e6bacf 100644 --- a/http/exposures/configs/svnserve-config.yaml +++ b/http/exposures/configs/svnserve-config.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true google-query: intext:"configuration of the svnserve daemon" tags: config,exposure,svnserve diff --git a/http/exposures/files/reactapp-env-js.yaml b/http/exposures/files/reactapp-env-js.yaml index 962e1ca69b..c419696263 100644 --- a/http/exposures/files/reactapp-env-js.yaml +++ b/http/exposures/files/reactapp-env-js.yaml @@ -6,7 +6,7 @@ info: severity: unknown metadata: max-request: 2 - verified: "true" + verified: true github-query: "REACT_APP_" tags: react,exposure,config,js,javascript diff --git a/http/exposures/logs/opentsdb-status.yaml b/http/exposures/logs/opentsdb-status.yaml index 2c9b1b07ea..46392067e5 100644 --- a/http/exposures/logs/opentsdb-status.yaml +++ b/http/exposures/logs/opentsdb-status.yaml @@ -8,7 +8,7 @@ info: http://opentsdb.net/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:407286339 tags: opentsdb,exposure,logs diff --git a/http/exposures/logs/production-log.yaml b/http/exposures/logs/production-log.yaml index e2ae0030e0..a97a9653cc 100644 --- a/http/exposures/logs/production-log.yaml +++ b/http/exposures/logs/production-log.yaml @@ -6,7 +6,7 @@ info: severity: low metadata: max-request: 3 - verified: "true" + verified: true github-query: filename:production.log Connecting to database specified by database.yml tags: exposure,files,logs diff --git a/http/exposures/logs/yii-error-page.yaml b/http/exposures/logs/yii-error-page.yaml index 1f72491ba3..f7b79bc774 100644 --- a/http/exposures/logs/yii-error-page.yaml +++ b/http/exposures/logs/yii-error-page.yaml @@ -6,7 +6,7 @@ info: severity: unknown metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"yii\base\ErrorException" tags: exposure,yii,logs diff --git a/http/exposures/tokens/adobe/adobe-oauth-secret.yaml b/http/exposures/tokens/adobe/adobe-oauth-secret.yaml index 10a124eb75..774c4de47f 100644 --- a/http/exposures/tokens/adobe/adobe-oauth-secret.yaml +++ b/http/exposures/tokens/adobe/adobe-oauth-secret.yaml @@ -11,7 +11,7 @@ info: - https://developer.adobe.com/developer-console/docs/guides/authentication/OAuth/ metadata: max-request: 1 - verified: "true" + verified: true tags: adobe,oauth,exposure,tokens http: diff --git a/http/exposures/tokens/age/age-public-key.yaml b/http/exposures/tokens/age/age-public-key.yaml index 3678012366..9968a14e1a 100644 --- a/http/exposures/tokens/age/age-public-key.yaml +++ b/http/exposures/tokens/age/age-public-key.yaml @@ -10,7 +10,7 @@ info: - https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type metadata: max-request: 1 - verified: "true" + verified: true tags: age-encryption,exposure,tokens http: diff --git a/http/exposures/tokens/age/age-secret-key.yaml b/http/exposures/tokens/age/age-secret-key.yaml index c7b2306ee2..cbd1f2c2cb 100644 --- a/http/exposures/tokens/age/age-secret-key.yaml +++ b/http/exposures/tokens/age/age-secret-key.yaml @@ -10,7 +10,7 @@ info: - https://github.com/C2SP/C2SP/blob/8b6a842e0360d35111c46be2a8019b2276295914/age.md#the-x25519-recipient-type metadata: max-request: 1 - verified: "true" + verified: true tags: age-encryption,exposure,tokens http: diff --git a/http/exposures/tokens/amazon/aws-access-secret-key.yaml b/http/exposures/tokens/amazon/aws-access-secret-key.yaml index 92aef307bb..0a70c7109c 100644 --- a/http/exposures/tokens/amazon/aws-access-secret-key.yaml +++ b/http/exposures/tokens/amazon/aws-access-secret-key.yaml @@ -6,7 +6,7 @@ info: severity: unknown metadata: max-request: 1 - verified: "true" + verified: true tags: disclosure,aws,generic,exposure,amazon http: diff --git a/http/exposures/tokens/amazon/aws-account-id.yaml b/http/exposures/tokens/amazon/aws-account-id.yaml index c88d41fdce..b3b30c83ec 100644 --- a/http/exposures/tokens/amazon/aws-account-id.yaml +++ b/http/exposures/tokens/amazon/aws-account-id.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/aws.yml metadata: max-request: 1 - verified: "true" + verified: true tags: aws,amazon,token,exposure http: diff --git a/http/exposures/tokens/amazon/aws-api-key.yaml b/http/exposures/tokens/amazon/aws-api-key.yaml index 73593baffd..39567ebb5d 100644 --- a/http/exposures/tokens/amazon/aws-api-key.yaml +++ b/http/exposures/tokens/amazon/aws-api-key.yaml @@ -12,7 +12,7 @@ info: - https://docs.aws.amazon.com/accounts/latest/reference/credentials-access-keys-best-practices.html metadata: max-request: 1 - verified: "true" + verified: true tags: aws,amazon,token,exposure http: diff --git a/http/exposures/tokens/amazon/aws-session-token.yaml b/http/exposures/tokens/amazon/aws-session-token.yaml index f83dd66c6d..b8d92df46f 100644 --- a/http/exposures/tokens/amazon/aws-session-token.yaml +++ b/http/exposures/tokens/amazon/aws-session-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/aws.yml metadata: max-request: 1 - verified: "true" + verified: true tags: aws,amazon,token,exposure,session http: diff --git a/http/exposures/tokens/azure/azure-connection.yaml b/http/exposures/tokens/azure/azure-connection.yaml index 03e6a72007..bff088b94a 100644 --- a/http/exposures/tokens/azure/azure-connection.yaml +++ b/http/exposures/tokens/azure/azure-connection.yaml @@ -10,7 +10,7 @@ info: - https://docs.microsoft.com/en-us/azure/storage/common/storage-configure-connection-string metadata: max-request: 1 - verified: "true" + verified: true tags: azure,exposure,token http: diff --git a/http/exposures/tokens/codeclimate/codeclimate-token.yaml b/http/exposures/tokens/codeclimate/codeclimate-token.yaml index f48370c236..b84799fd03 100644 --- a/http/exposures/tokens/codeclimate/codeclimate-token.yaml +++ b/http/exposures/tokens/codeclimate/codeclimate-token.yaml @@ -9,7 +9,7 @@ info: - https://github.com/codeclimate/ruby-test-reporter/issues/34 metadata: max-request: 1 - verified: "true" + verified: true tags: codeclimate,token,exposure http: diff --git a/http/exposures/tokens/crates/crates-api-key.yaml b/http/exposures/tokens/crates/crates-api-key.yaml index 05931eea3e..00ea7cbd12 100644 --- a/http/exposures/tokens/crates/crates-api-key.yaml +++ b/http/exposures/tokens/crates/crates-api-key.yaml @@ -10,7 +10,7 @@ info: - https://github.com/rust-lang/crates.io/blob/master/src/util/token.rs metadata: max-request: 1 - verified: "true" + verified: true tags: crates,token,exposure http: diff --git a/http/exposures/tokens/digitalocean/digital-ocean-personal-token.yaml b/http/exposures/tokens/digitalocean/digital-ocean-personal-token.yaml index 6e1fe2242d..bf07f0129f 100644 --- a/http/exposures/tokens/digitalocean/digital-ocean-personal-token.yaml +++ b/http/exposures/tokens/digitalocean/digital-ocean-personal-token.yaml @@ -9,7 +9,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: max-request: 1 - verified: "true" + verified: true tags: digitalocean,exposure,token http: diff --git a/http/exposures/tokens/digitalocean/digitalocean-app-token.yaml b/http/exposures/tokens/digitalocean/digitalocean-app-token.yaml index ef86e8fcf7..760da3de91 100644 --- a/http/exposures/tokens/digitalocean/digitalocean-app-token.yaml +++ b/http/exposures/tokens/digitalocean/digitalocean-app-token.yaml @@ -9,7 +9,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: max-request: 1 - verified: "true" + verified: true tags: digitalocean,exposure,token http: diff --git a/http/exposures/tokens/digitalocean/digitalocean-refresh.yaml b/http/exposures/tokens/digitalocean/digitalocean-refresh.yaml index 0b97a8b72e..2bb5689e23 100644 --- a/http/exposures/tokens/digitalocean/digitalocean-refresh.yaml +++ b/http/exposures/tokens/digitalocean/digitalocean-refresh.yaml @@ -9,7 +9,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: max-request: 1 - verified: "true" + verified: true tags: digitalocean,exposure,token http: diff --git a/http/exposures/tokens/dynatrace/dynatrace-api-token.yaml b/http/exposures/tokens/dynatrace/dynatrace-api-token.yaml index 7737a2eaf3..871ee4d02f 100644 --- a/http/exposures/tokens/dynatrace/dynatrace-api-token.yaml +++ b/http/exposures/tokens/dynatrace/dynatrace-api-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/dynatrace.yml metadata: max-request: 1 - verified: "true" + verified: true tags: dynatrace,token,exposure http: diff --git a/http/exposures/tokens/facebook/facebook-access-token.yaml b/http/exposures/tokens/facebook/facebook-access-token.yaml index 8cfd2aa2bb..1a9f14dbd0 100644 --- a/http/exposures/tokens/facebook/facebook-access-token.yaml +++ b/http/exposures/tokens/facebook/facebook-access-token.yaml @@ -9,7 +9,7 @@ info: - https://developers.facebook.com/docs/facebook-login/access-tokens/ metadata: max-request: 1 - verified: "true" + verified: true tags: facebook,token,exposure http: diff --git a/http/exposures/tokens/figma/figma-personal-token.yaml b/http/exposures/tokens/figma/figma-personal-token.yaml index 64b1bc1f77..0be233e4bf 100644 --- a/http/exposures/tokens/figma/figma-personal-token.yaml +++ b/http/exposures/tokens/figma/figma-personal-token.yaml @@ -9,7 +9,7 @@ info: - https://www.figma.com/developers/api metadata: max-request: 1 - verified: "true" + verified: true tags: figma,exposure,token http: diff --git a/http/exposures/tokens/github/github-app.yaml b/http/exposures/tokens/github/github-app.yaml index d3a179a510..2bb89da6a6 100644 --- a/http/exposures/tokens/github/github-app.yaml +++ b/http/exposures/tokens/github/github-app.yaml @@ -11,7 +11,7 @@ info: - https://github.blog/2021-04-05-behind-githubs-new-authentication-token-formats/ metadata: max-request: 1 - verified: "true" + verified: true tags: github,app,token,exposure http: diff --git a/http/exposures/tokens/github/github-oauth-access.yaml b/http/exposures/tokens/github/github-oauth-access.yaml index 8c470c5760..d677c217ca 100644 --- a/http/exposures/tokens/github/github-oauth-access.yaml +++ b/http/exposures/tokens/github/github-oauth-access.yaml @@ -11,7 +11,7 @@ info: - https://github.blog/2021-04-05-behind-githubs-new-authentication-token-formats/ metadata: max-request: 1 - verified: "true" + verified: true tags: github,oauth,token,exposure http: diff --git a/http/exposures/tokens/github/github-personal-access.yaml b/http/exposures/tokens/github/github-personal-access.yaml index a300bb8b39..e188b7f498 100644 --- a/http/exposures/tokens/github/github-personal-access.yaml +++ b/http/exposures/tokens/github/github-personal-access.yaml @@ -11,7 +11,7 @@ info: - https://github.blog/2021-04-05-behind-githubs-new-authentication-token-formats/ metadata: max-request: 1 - verified: "true" + verified: true tags: github,token,exposure http: diff --git a/http/exposures/tokens/github/github-refresh.yaml b/http/exposures/tokens/github/github-refresh.yaml index ad9b26801b..ee9e9a14b3 100644 --- a/http/exposures/tokens/github/github-refresh.yaml +++ b/http/exposures/tokens/github/github-refresh.yaml @@ -11,7 +11,7 @@ info: - https://github.blog/2021-04-05-behind-githubs-new-authentication-token-formats/ metadata: max-request: 1 - verified: "true" + verified: true tags: github,refresh,token,exposure http: diff --git a/http/exposures/tokens/gitlab/gitlab-personal-token.yaml b/http/exposures/tokens/gitlab/gitlab-personal-token.yaml index 3ef5d66ec4..5ec5e26fab 100644 --- a/http/exposures/tokens/gitlab/gitlab-personal-token.yaml +++ b/http/exposures/tokens/gitlab/gitlab-personal-token.yaml @@ -9,7 +9,7 @@ info: - https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html metadata: max-request: 1 - verified: "true" + verified: true tags: gitlab,token,exposure http: diff --git a/http/exposures/tokens/gitlab/gitlab-pipeline-token.yaml b/http/exposures/tokens/gitlab/gitlab-pipeline-token.yaml index c0e540c71a..126b139d4e 100644 --- a/http/exposures/tokens/gitlab/gitlab-pipeline-token.yaml +++ b/http/exposures/tokens/gitlab/gitlab-pipeline-token.yaml @@ -11,7 +11,7 @@ info: - https://gitlab.com/gitlab-org/gitlab/-/issues/388379 metadata: max-request: 1 - verified: "true" + verified: true tags: gitlab,token,exposure http: diff --git a/http/exposures/tokens/gitlab/gitlab-runner-token.yaml b/http/exposures/tokens/gitlab/gitlab-runner-token.yaml index f6d6d98d4a..8568f86b66 100644 --- a/http/exposures/tokens/gitlab/gitlab-runner-token.yaml +++ b/http/exposures/tokens/gitlab/gitlab-runner-token.yaml @@ -11,7 +11,7 @@ info: - https://docs.gitlab.com/ee/security/token_overview.html#security-considerations metadata: max-request: 1 - verified: "true" + verified: true tags: gitlab,runner,token,exposure http: diff --git a/http/exposures/tokens/google/google-client-id.yaml b/http/exposures/tokens/google/google-client-id.yaml index a03f4b6585..06955dfad4 100644 --- a/http/exposures/tokens/google/google-client-id.yaml +++ b/http/exposures/tokens/google/google-client-id.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml metadata: max-request: 1 - verified: "true" + verified: true tags: google,token,exposure http: diff --git a/http/exposures/tokens/google/google-oauth-prefixed.yaml b/http/exposures/tokens/google/google-oauth-prefixed.yaml index c2c7cd84b0..59cefd817d 100644 --- a/http/exposures/tokens/google/google-oauth-prefixed.yaml +++ b/http/exposures/tokens/google/google-oauth-prefixed.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/google.yml metadata: max-request: 1 - verified: "true" + verified: true tags: google,token,exposure http: diff --git a/http/exposures/tokens/heroku/heroku-api-key.yaml b/http/exposures/tokens/heroku/heroku-api-key.yaml index 0a3adc8637..b1fe197e97 100644 --- a/http/exposures/tokens/heroku/heroku-api-key.yaml +++ b/http/exposures/tokens/heroku/heroku-api-key.yaml @@ -9,7 +9,7 @@ info: - https://devcenter.heroku.com/articles/authentication metadata: max-request: 1 - verified: "true" + verified: true tags: heroku,token,exposure http: diff --git a/http/exposures/tokens/jenkins/jenkins-crumb-token.yaml b/http/exposures/tokens/jenkins/jenkins-crumb-token.yaml index 600e2b7c96..51286204b8 100644 --- a/http/exposures/tokens/jenkins/jenkins-crumb-token.yaml +++ b/http/exposures/tokens/jenkins/jenkins-crumb-token.yaml @@ -10,7 +10,7 @@ info: - https://www.jenkins.io/doc/book/security/csrf-protection/ metadata: max-request: 1 - verified: "true" + verified: true tags: jenkins,crumb,token,exposure http: diff --git a/http/exposures/tokens/mailgun/mailgun-api-token.yaml b/http/exposures/tokens/mailgun/mailgun-api-token.yaml index f52f024fb0..db07d4e5cc 100644 --- a/http/exposures/tokens/mailgun/mailgun-api-token.yaml +++ b/http/exposures/tokens/mailgun/mailgun-api-token.yaml @@ -9,7 +9,7 @@ info: - https://documentation.mailgun.com/en/latest/api-intro.html#authentication-1 metadata: max-request: 1 - verified: "true" + verified: true tags: mailgun,token,exposure http: diff --git a/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml b/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml index d298e3f266..280ac7df61 100644 --- a/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml +++ b/http/exposures/tokens/mapbox/mapbox-token-disclosure.yaml @@ -9,7 +9,7 @@ info: - https://github.com/zricethezav/gitleaks/blob/master/cmd/generate/config/rules/mapbox.go metadata: max-request: 1 - verified: "true" + verified: true tags: token,exposure,mapbox,disclosure http: diff --git a/http/exposures/tokens/newrelic/newrelic-pixie-api-key.yaml b/http/exposures/tokens/newrelic/newrelic-pixie-api-key.yaml index 2ebf07d790..fb3bd6054a 100644 --- a/http/exposures/tokens/newrelic/newrelic-pixie-api-key.yaml +++ b/http/exposures/tokens/newrelic/newrelic-pixie-api-key.yaml @@ -9,7 +9,7 @@ info: - https://docs.px.dev/reference/admin/api-keys/ metadata: max-request: 1 - verified: "true" + verified: true tags: newrelic,pixie,token,exposure http: diff --git a/http/exposures/tokens/newrelic/newrelic-pixie-deploy-key.yaml b/http/exposures/tokens/newrelic/newrelic-pixie-deploy-key.yaml index cd9631ba61..606e356df5 100644 --- a/http/exposures/tokens/newrelic/newrelic-pixie-deploy-key.yaml +++ b/http/exposures/tokens/newrelic/newrelic-pixie-deploy-key.yaml @@ -9,7 +9,7 @@ info: - https://docs.px.dev/reference/admin/api-keys/ metadata: max-request: 1 - verified: "true" + verified: true tags: newrelic,pixie,token,exposure http: diff --git a/http/exposures/tokens/npm/npm-access-token.yaml b/http/exposures/tokens/npm/npm-access-token.yaml index 1345457eee..a277ef6930 100644 --- a/http/exposures/tokens/npm/npm-access-token.yaml +++ b/http/exposures/tokens/npm/npm-access-token.yaml @@ -11,7 +11,7 @@ info: - https://github.blog/changelog/2022-12-06-limit-scope-of-npm-tokens-with-the-new-granular-access-tokens/ metadata: max-request: 1 - verified: "true" + verified: true tags: npm,token,exposure http: diff --git a/http/exposures/tokens/nuget/nuget-api-key.yaml b/http/exposures/tokens/nuget/nuget-api-key.yaml index 08a7be7543..d3bda7df62 100644 --- a/http/exposures/tokens/nuget/nuget-api-key.yaml +++ b/http/exposures/tokens/nuget/nuget-api-key.yaml @@ -9,7 +9,7 @@ info: - https://docs.microsoft.com/en-us/nuget/nuget-org/publish-a-package#create-api-keys metadata: max-request: 1 - verified: "true" + verified: true tags: nuget,token,exposure http: diff --git a/http/exposures/tokens/openai/openai-api-key.yaml b/http/exposures/tokens/openai/openai-api-key.yaml index a3454c62d4..8c69e862ae 100644 --- a/http/exposures/tokens/openai/openai-api-key.yaml +++ b/http/exposures/tokens/openai/openai-api-key.yaml @@ -10,7 +10,7 @@ info: - https://platform.openai.com/docs/api-reference/authentication metadata: max-request: 1 - verified: "true" + verified: true tags: openai,token,exposure http: diff --git a/http/exposures/tokens/postman/postman-key.yaml b/http/exposures/tokens/postman/postman-key.yaml index 41d05e3a2c..18bb29a324 100644 --- a/http/exposures/tokens/postman/postman-key.yaml +++ b/http/exposures/tokens/postman/postman-key.yaml @@ -9,7 +9,7 @@ info: - https://learning.postman.com/docs/developer/intro-api/ metadata: max-request: 1 - verified: "true" + verified: true tags: postman,keys,token,api,exposure http: diff --git a/http/exposures/tokens/pypi/pypi-upload-token.yaml b/http/exposures/tokens/pypi/pypi-upload-token.yaml index 6eb462cf44..24a28ce77e 100644 --- a/http/exposures/tokens/pypi/pypi-upload-token.yaml +++ b/http/exposures/tokens/pypi/pypi-upload-token.yaml @@ -10,7 +10,7 @@ info: - https://pypi.org/project/pypitoken/ metadata: max-request: 1 - verified: "true" + verified: true tags: pypi,token,exposure http: diff --git a/http/exposures/tokens/ruby/rubygems-api-key.yaml b/http/exposures/tokens/ruby/rubygems-api-key.yaml index 1a3c2a2410..a119fb2e9b 100644 --- a/http/exposures/tokens/ruby/rubygems-api-key.yaml +++ b/http/exposures/tokens/ruby/rubygems-api-key.yaml @@ -10,7 +10,7 @@ info: - https://guides.rubygems.org/api-key-scopes/ metadata: max-request: 1 - verified: "true" + verified: true tags: rubygems,token,exposure,ruby http: diff --git a/http/exposures/tokens/sauce/sauce-token.yaml b/http/exposures/tokens/sauce/sauce-token.yaml index 94a977da85..fc536fb8d8 100644 --- a/http/exposures/tokens/sauce/sauce-token.yaml +++ b/http/exposures/tokens/sauce/sauce-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/sauce.yml metadata: max-request: 1 - verified: "true" + verified: true tags: sauce,token,exposure http: diff --git a/http/exposures/tokens/segment/segment-public-token.yaml b/http/exposures/tokens/segment/segment-public-token.yaml index 1cbddc4ddb..cf9451aa05 100644 --- a/http/exposures/tokens/segment/segment-public-token.yaml +++ b/http/exposures/tokens/segment/segment-public-token.yaml @@ -10,7 +10,7 @@ info: - https://segment.com/blog/how-segment-proactively-protects-customer-api-tokens/ metadata: max-request: 1 - verified: "true" + verified: true tags: segment,token,exposure http: diff --git a/http/exposures/tokens/shopify/shopify-app-secret.yaml b/http/exposures/tokens/shopify/shopify-app-secret.yaml index 80d6f7ca76..bca109e24a 100644 --- a/http/exposures/tokens/shopify/shopify-app-secret.yaml +++ b/http/exposures/tokens/shopify/shopify-app-secret.yaml @@ -10,7 +10,7 @@ info: - https://shopify.dev/changelog/app-secret-key-length-has-increased metadata: max-request: 1 - verified: "true" + verified: true tags: shopify,token,exposure http: diff --git a/http/exposures/tokens/shopify/shopify-customapp-token.yaml b/http/exposures/tokens/shopify/shopify-customapp-token.yaml index 682ffc6203..4c5a774e94 100644 --- a/http/exposures/tokens/shopify/shopify-customapp-token.yaml +++ b/http/exposures/tokens/shopify/shopify-customapp-token.yaml @@ -10,7 +10,7 @@ info: - https://shopify.dev/changelog/app-secret-key-length-has-increased metadata: max-request: 1 - verified: "true" + verified: true tags: shopify,token,exposure http: diff --git a/http/exposures/tokens/shopify/shopify-legacy-token.yaml b/http/exposures/tokens/shopify/shopify-legacy-token.yaml index 40afbe0562..730cd5408c 100644 --- a/http/exposures/tokens/shopify/shopify-legacy-token.yaml +++ b/http/exposures/tokens/shopify/shopify-legacy-token.yaml @@ -10,7 +10,7 @@ info: - https://shopify.dev/changelog/app-secret-key-length-has-increased metadata: max-request: 1 - verified: "true" + verified: true tags: shopify,token,exposure http: diff --git a/http/exposures/tokens/shopify/shopify-public-token.yaml b/http/exposures/tokens/shopify/shopify-public-token.yaml index e12ed7319d..9cb37c6357 100644 --- a/http/exposures/tokens/shopify/shopify-public-token.yaml +++ b/http/exposures/tokens/shopify/shopify-public-token.yaml @@ -10,7 +10,7 @@ info: - https://shopify.dev/changelog/app-secret-key-length-has-increased metadata: max-request: 1 - verified: "true" + verified: true tags: shopify,token,exposure http: diff --git a/http/exposures/tokens/square/square-access.yaml b/http/exposures/tokens/square/square-access.yaml index 6e25e33897..d939d9dd92 100644 --- a/http/exposures/tokens/square/square-access.yaml +++ b/http/exposures/tokens/square/square-access.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/square.yml metadata: max-request: 1 - verified: "true" + verified: true tags: square,token,exposure http: diff --git a/http/exposures/tokens/square/square-oauth-secret-token.yaml b/http/exposures/tokens/square/square-oauth-secret-token.yaml index 9a3d087529..7d8fd0029a 100644 --- a/http/exposures/tokens/square/square-oauth-secret-token.yaml +++ b/http/exposures/tokens/square/square-oauth-secret-token.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/square.yml metadata: max-request: 1 - verified: "true" + verified: true tags: square,token,exposure,oauth http: diff --git a/http/exposures/tokens/stackhawk/stackhawk-api.yaml b/http/exposures/tokens/stackhawk/stackhawk-api.yaml index 357635e127..53d6076ae5 100644 --- a/http/exposures/tokens/stackhawk/stackhawk-api.yaml +++ b/http/exposures/tokens/stackhawk/stackhawk-api.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/stackhawk.yml metadata: max-request: 1 - verified: "true" + verified: true tags: stackhawk,token,exposure http: diff --git a/http/exposures/tokens/telegram/telegram-bot-token.yaml b/http/exposures/tokens/telegram/telegram-bot-token.yaml index f19a030aba..84200dd449 100644 --- a/http/exposures/tokens/telegram/telegram-bot-token.yaml +++ b/http/exposures/tokens/telegram/telegram-bot-token.yaml @@ -10,7 +10,7 @@ info: - https://core.telegram.org/bots/features#botfather metadata: max-request: 1 - verified: "true" + verified: true tags: telegram,token,exposure http: diff --git a/http/exposures/tokens/twilio/twilio-api-key.yaml b/http/exposures/tokens/twilio/twilio-api-key.yaml index c1db292327..1817e57b89 100644 --- a/http/exposures/tokens/twilio/twilio-api-key.yaml +++ b/http/exposures/tokens/twilio/twilio-api-key.yaml @@ -8,7 +8,7 @@ info: - https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/twilio.yml metadata: max-request: 1 - verified: "true" + verified: true tags: twilio,token,exposure http: diff --git a/http/iot/ampguard-wifi-setup.yaml b/http/iot/ampguard-wifi-setup.yaml index a46716bc51..5abd129ee9 100644 --- a/http/iot/ampguard-wifi-setup.yaml +++ b/http/iot/ampguard-wifi-setup.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"AmpGuard wifi setup" tags: ampguard,iot,setup,wifi diff --git a/http/iot/loytec-device.yaml b/http/iot/loytec-device.yaml index 985ac19318..73de173001 100644 --- a/http/iot/loytec-device.yaml +++ b/http/iot/loytec-device.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: "loytec" tags: iot,loytec diff --git a/http/iot/snapdrop-detect.yaml b/http/iot/snapdrop-detect.yaml index 100e77f5aa..480956775d 100644 --- a/http/iot/snapdrop-detect.yaml +++ b/http/iot/snapdrop-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Snapdrop" tags: iot,snapdrop diff --git a/http/miscellaneous/gpc-json.yaml b/http/miscellaneous/gpc-json.yaml index 9edf7f0f17..744beff519 100644 --- a/http/miscellaneous/gpc-json.yaml +++ b/http/miscellaneous/gpc-json.yaml @@ -8,7 +8,7 @@ info: The website defines a Global Privacy Control policy. metadata: max-request: 2 - verified: "true" + verified: true tags: misc,generic,gpc http: diff --git a/http/miscellaneous/old-copyright.yaml b/http/miscellaneous/old-copyright.yaml index 26ae88bb74..3a6f03eb82 100644 --- a/http/miscellaneous/old-copyright.yaml +++ b/http/miscellaneous/old-copyright.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true tags: misc http: diff --git a/http/miscellaneous/sitemap-detect.yaml b/http/miscellaneous/sitemap-detect.yaml index d97c77b002..c38521d5b0 100644 --- a/http/miscellaneous/sitemap-detect.yaml +++ b/http/miscellaneous/sitemap-detect.yaml @@ -8,7 +8,7 @@ info: A sitemap is a file where you provide information about the pages, videos, and other files on your site, and the relationships between them. metadata: max-request: 3 - verified: "true" + verified: true google-query: intext:"sitemap" filetype:txt,filetype:xml inurl:sitemap,inurl:"/sitemap.xsd" ext:xsd tags: misc,generic,sitemap diff --git a/http/misconfiguration/aem/aem-secrets.yaml b/http/misconfiguration/aem/aem-secrets.yaml index 8802ac39ae..0eab636ffc 100644 --- a/http/misconfiguration/aem/aem-secrets.yaml +++ b/http/misconfiguration/aem/aem-secrets.yaml @@ -10,7 +10,7 @@ info: Possible Juicy Files can be discovered at this endpoint. Search / Grep for secrets like hashed passwords ( SHA ) , internal email disclosure etc. metadata: max-request: 2 - verified: "true" + verified: true tags: aem,adobe,misconfig,exposure http: diff --git a/http/misconfiguration/akamai/akamai-s3-cache-poisoning.yaml b/http/misconfiguration/akamai/akamai-s3-cache-poisoning.yaml index d4659626f1..07ee7cafdb 100644 --- a/http/misconfiguration/akamai/akamai-s3-cache-poisoning.yaml +++ b/http/misconfiguration/akamai/akamai-s3-cache-poisoning.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-44 metadata: max-request: 204 - verified: "true" + verified: true tags: cache,poisoning,generic,xss,akamai,s3 variables: diff --git a/http/misconfiguration/apache-struts-showcase.yaml b/http/misconfiguration/apache-struts-showcase.yaml index 2613b353de..db630a9676 100644 --- a/http/misconfiguration/apache-struts-showcase.yaml +++ b/http/misconfiguration/apache-struts-showcase.yaml @@ -8,7 +8,7 @@ info: - https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/ApacheStrutsWebConsole.java metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Struts2 Showcase" tags: apache,struts,showcase,misconfig,exposure diff --git a/http/misconfiguration/apache/apache-nifi-unauth.yaml b/http/misconfiguration/apache/apache-nifi-unauth.yaml index 1007ac0164..ecf1e0b54d 100644 --- a/http/misconfiguration/apache/apache-nifi-unauth.yaml +++ b/http/misconfiguration/apache/apache-nifi-unauth.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-285 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"NiFi" fofa-query: title="nifi" && body="Did you mean" tags: misconfig,apache,nifi,unauth diff --git a/http/misconfiguration/apache/apache-zeppelin-unauth.yaml b/http/misconfiguration/apache/apache-zeppelin-unauth.yaml index 5c11025597..dfc456cab0 100644 --- a/http/misconfiguration/apache/apache-zeppelin-unauth.yaml +++ b/http/misconfiguration/apache/apache-zeppelin-unauth.yaml @@ -13,7 +13,7 @@ info: cvss-score: 8.6 cwe-id: CWE-285 metadata: - verified: "true" + verified: true shodan-query: title:"Zeppelin" fofa-query: title="Zeppelin" tags: misconfig,apache,zeppelin,unauth diff --git a/http/misconfiguration/apollo-adminservice-unauth.yaml b/http/misconfiguration/apollo-adminservice-unauth.yaml index 02b5e83b0a..cf40df6cad 100644 --- a/http/misconfiguration/apollo-adminservice-unauth.yaml +++ b/http/misconfiguration/apollo-adminservice-unauth.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-522 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"apollo-adminservice" tags: misconfig,unauth,apollo,apolloadminservice diff --git a/http/misconfiguration/cluster-panel.yaml b/http/misconfiguration/cluster-panel.yaml index 19182392a1..22170a3909 100644 --- a/http/misconfiguration/cluster-panel.yaml +++ b/http/misconfiguration/cluster-panel.yaml @@ -6,7 +6,7 @@ info: severity: medium metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Cluster Overview - Trino" tags: cluster,unauth,trino diff --git a/http/misconfiguration/default-spx-key.yaml b/http/misconfiguration/default-spx-key.yaml index c007e0262b..a42f063485 100644 --- a/http/misconfiguration/default-spx-key.yaml +++ b/http/misconfiguration/default-spx-key.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-522 metadata: max-request: 11 - verified: "true" + verified: true tags: spx-php,debug,misconfig,spx http: diff --git a/http/misconfiguration/ibm-websphere-xml.yaml b/http/misconfiguration/ibm-websphere-xml.yaml index 41eaa4eac1..32b7711d41 100644 --- a/http/misconfiguration/ibm-websphere-xml.yaml +++ b/http/misconfiguration/ibm-websphere-xml.yaml @@ -10,7 +10,7 @@ info: - https://www.acunetix.com/vulnerabilities/web/ibm-websphere-weblogic-application-source-file-exposure/ metadata: max-request: 1 - verified: "true" + verified: true tags: ibm,websphere,exposure http: diff --git a/http/misconfiguration/installer/indegy-sensor-installer.yaml b/http/misconfiguration/installer/indegy-sensor-installer.yaml index 06a4683913..47b2c2fbbf 100644 --- a/http/misconfiguration/installer/indegy-sensor-installer.yaml +++ b/http/misconfiguration/installer/indegy-sensor-installer.yaml @@ -6,7 +6,7 @@ info: severity: high metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Setup Wizard" http.favicon.hash:-1851491385 tags: misconfig,indegy,sensor,installer diff --git a/http/misconfiguration/installer/jira-setup.yaml b/http/misconfiguration/installer/jira-setup.yaml index c0180f1f8a..7ff2b27932 100644 --- a/http/misconfiguration/installer/jira-setup.yaml +++ b/http/misconfiguration/installer/jira-setup.yaml @@ -6,7 +6,7 @@ info: severity: high metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"JIRA - JIRA setup" tags: misconfig,jira,atlassian,installer diff --git a/http/misconfiguration/installer/magnolia-installer.yaml b/http/misconfiguration/installer/magnolia-installer.yaml index a0a10a09e0..2df455cf73 100644 --- a/http/misconfiguration/installer/magnolia-installer.yaml +++ b/http/misconfiguration/installer/magnolia-installer.yaml @@ -8,7 +8,7 @@ info: - https://www.magnolia-cms.com/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Magnolia Installation" tags: magnolia,exposure,installer diff --git a/http/misconfiguration/jboss-web-service.yaml b/http/misconfiguration/jboss-web-service.yaml index 70276b7f22..4e4a6df353 100644 --- a/http/misconfiguration/jboss-web-service.yaml +++ b/http/misconfiguration/jboss-web-service.yaml @@ -11,7 +11,7 @@ info: - https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/JBossWS.java metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"JBossWS" tags: jboss,misconfig diff --git a/http/misconfiguration/kubernetes/kube-state-metrics.yaml b/http/misconfiguration/kubernetes/kube-state-metrics.yaml index 54878b1fb7..25b0a450ac 100644 --- a/http/misconfiguration/kubernetes/kube-state-metrics.yaml +++ b/http/misconfiguration/kubernetes/kube-state-metrics.yaml @@ -8,7 +8,7 @@ info: An attacker can detect the public instance of a Kube-State-Metrics metrics. The Kubernetes API server exposes data about the count, health, and availability of pods, nodes, and other Kubernetes objects. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:Kube-state-metrics tags: misconfig,exposure,kube-state-metrics,k8s,kubernetes diff --git a/http/misconfiguration/kubernetes/unauth-etcd-server.yaml b/http/misconfiguration/kubernetes/unauth-etcd-server.yaml index 37d7806b66..365506c7a5 100644 --- a/http/misconfiguration/kubernetes/unauth-etcd-server.yaml +++ b/http/misconfiguration/kubernetes/unauth-etcd-server.yaml @@ -11,7 +11,7 @@ info: remediation: https://etcd.io/docs/v2.3/authentication metadata: max-request: 1 - verified: "true" + verified: true shodan-query: product:"etcd" tags: tech,k8s,kubernetes,devops,etcd,unauth,anonymous diff --git a/http/misconfiguration/laravel-debug-infoleak.yaml b/http/misconfiguration/laravel-debug-infoleak.yaml index 17587f7116..df48d96e7e 100644 --- a/http/misconfiguration/laravel-debug-infoleak.yaml +++ b/http/misconfiguration/laravel-debug-infoleak.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-215 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: Laravel-Framework fofa-query: app="Laravel-Framework" tags: misconfig,laravel,debug,infoleak diff --git a/http/misconfiguration/laravel-horizon-unauth.yaml b/http/misconfiguration/laravel-horizon-unauth.yaml index fcec9bbe5b..f0e052ce92 100644 --- a/http/misconfiguration/laravel-horizon-unauth.yaml +++ b/http/misconfiguration/laravel-horizon-unauth.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 2 shodan-query: http.favicon.hash:450899026 - verified: "true" + verified: true tags: laravel,unauth,dashboard,misconfig http: diff --git a/http/misconfiguration/mlflow-unauth.yaml b/http/misconfiguration/mlflow-unauth.yaml index 6f3b03558c..e98c28d34c 100644 --- a/http/misconfiguration/mlflow-unauth.yaml +++ b/http/misconfiguration/mlflow-unauth.yaml @@ -9,7 +9,7 @@ info: remediation: Add User Authentication metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"mlflow" tags: unauth,mlflow,oss diff --git a/http/misconfiguration/moleculer-microservices.yaml b/http/misconfiguration/moleculer-microservices.yaml index e7f8e5e429..13c926b0c8 100644 --- a/http/misconfiguration/moleculer-microservices.yaml +++ b/http/misconfiguration/moleculer-microservices.yaml @@ -8,7 +8,7 @@ info: Moleculer microservice was able to be accessed with no required authentication in place. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Moleculer Microservices Project" tags: misconfig,microservice,moleculer,exposure diff --git a/http/misconfiguration/mongodb-exporter-metrics.yaml b/http/misconfiguration/mongodb-exporter-metrics.yaml index 5723546f2f..6c68135daa 100644 --- a/http/misconfiguration/mongodb-exporter-metrics.yaml +++ b/http/misconfiguration/mongodb-exporter-metrics.yaml @@ -7,7 +7,7 @@ info: description: MongoDB exporter was detected. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"MongoDB exporter" classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N diff --git a/http/misconfiguration/multilaser-pro-setup.yaml b/http/misconfiguration/multilaser-pro-setup.yaml index f61a8a126b..431ae522ab 100644 --- a/http/misconfiguration/multilaser-pro-setup.yaml +++ b/http/misconfiguration/multilaser-pro-setup.yaml @@ -7,7 +7,7 @@ info: description: This allows the user to access quick setup settings and configuration page through /wizard.htm. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Setup Wizard" http.favicon.hash:2055322029 tags: misconfig,multilaser,setup,config diff --git a/http/misconfiguration/nacos-authentication-bypass.yaml b/http/misconfiguration/nacos-authentication-bypass.yaml index 97b1f78c26..5f41e419fa 100644 --- a/http/misconfiguration/nacos-authentication-bypass.yaml +++ b/http/misconfiguration/nacos-authentication-bypass.yaml @@ -13,7 +13,7 @@ info: remediation: Change value of jwt secret in the configurations metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"Nacos" tags: auth-bypass,nacos,misconfig,jwt diff --git a/http/misconfiguration/oneinstack-control-center.yaml b/http/misconfiguration/oneinstack-control-center.yaml index 5371dbcc8b..6f2b06c0cb 100644 --- a/http/misconfiguration/oneinstack-control-center.yaml +++ b/http/misconfiguration/oneinstack-control-center.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"OneinStack" tags: misconfig,exposure,panel,oneinstack diff --git a/http/misconfiguration/roxyfileman-fileupload.yaml b/http/misconfiguration/roxyfileman-fileupload.yaml index f4b3af1574..d3be1c8e52 100644 --- a/http/misconfiguration/roxyfileman-fileupload.yaml +++ b/http/misconfiguration/roxyfileman-fileupload.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-434 metadata: max-request: 4 - verified: "true" + verified: true google-query: intitle:"Roxy file manager" tags: intrusive,misconfig,edb,roxy,fileman,rce,fileupload diff --git a/http/misconfiguration/sitecore-lfi.yaml b/http/misconfiguration/sitecore-lfi.yaml index 420efec13c..74857e0a2e 100644 --- a/http/misconfiguration/sitecore-lfi.yaml +++ b/http/misconfiguration/sitecore-lfi.yaml @@ -8,7 +8,7 @@ info: - https://blog.assetnote.io/2023/05/10/sitecore-round-two/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Sitecore" tags: sitecore,lfi diff --git a/http/misconfiguration/sql-server-report-viewer.yaml b/http/misconfiguration/sql-server-report-viewer.yaml index afa9889976..88fa143a35 100644 --- a/http/misconfiguration/sql-server-report-viewer.yaml +++ b/http/misconfiguration/sql-server-report-viewer.yaml @@ -8,7 +8,7 @@ info: - https://learn.microsoft.com/en-us/sql/reporting-services/create-deploy-and-manage-mobile-and-paginated-reports?view=sql-server-ver16 metadata: max-request: 2 - verified: "true" + verified: true google-query: inurl:"/Reports/Pages/Folder.aspx" tags: misconfig,sql,report,exposure diff --git a/http/misconfiguration/struts-ognl-console.yaml b/http/misconfiguration/struts-ognl-console.yaml index 04efa99fd1..a781359707 100644 --- a/http/misconfiguration/struts-ognl-console.yaml +++ b/http/misconfiguration/struts-ognl-console.yaml @@ -11,7 +11,7 @@ info: - https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/ApacheStrutsWebConsole.java metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"Struts Problem Report" tags: apache,struts,ognl,panel diff --git a/http/misconfiguration/syncthing-dashboard.yaml b/http/misconfiguration/syncthing-dashboard.yaml index 763fc83ded..74241d85e0 100644 --- a/http/misconfiguration/syncthing-dashboard.yaml +++ b/http/misconfiguration/syncthing-dashboard.yaml @@ -8,7 +8,7 @@ info: - https://syncthing.net/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:'ng-app="syncthing"' tags: misconfig,syncthing,exposure diff --git a/http/misconfiguration/teslamate-unauth-access.yaml b/http/misconfiguration/teslamate-unauth-access.yaml index 26babbadb7..b6afb557b2 100644 --- a/http/misconfiguration/teslamate-unauth-access.yaml +++ b/http/misconfiguration/teslamate-unauth-access.yaml @@ -8,7 +8,7 @@ info: A misconfig in Teslamate allows unauthorized access to /settings endpoint. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-1478287554 fofa-query: title="teslamate" tags: misconfig,teslamate,unauth diff --git a/http/misconfiguration/thinkphp-errors.yaml b/http/misconfiguration/thinkphp-errors.yaml index c9180cfbbf..a45e16ea17 100644 --- a/http/misconfiguration/thinkphp-errors.yaml +++ b/http/misconfiguration/thinkphp-errors.yaml @@ -6,7 +6,7 @@ info: severity: medium metadata: max-request: 1 - verified: "true" + verified: true fofa-query: app="ThinkPHP" && title="System Error" tags: thinkphp,misconfig,exposure diff --git a/http/misconfiguration/unauth-ldap-account-manager.yaml b/http/misconfiguration/unauth-ldap-account-manager.yaml index 8a6a9fdbf8..e36ee97a5b 100644 --- a/http/misconfiguration/unauth-ldap-account-manager.yaml +++ b/http/misconfiguration/unauth-ldap-account-manager.yaml @@ -6,7 +6,7 @@ info: severity: medium metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"LDAP Account Manager" tags: ldap,misconfig,unauth diff --git a/http/misconfiguration/unauth-mautic-upgrade.yaml b/http/misconfiguration/unauth-mautic-upgrade.yaml index c146868259..0b281915e0 100644 --- a/http/misconfiguration/unauth-mautic-upgrade.yaml +++ b/http/misconfiguration/unauth-mautic-upgrade.yaml @@ -6,7 +6,7 @@ info: severity: high metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Mautic" tags: misconfig,unauth,mautic diff --git a/http/misconfiguration/unauth-zwave-mqtt.yaml b/http/misconfiguration/unauth-zwave-mqtt.yaml index 78cae7ce17..1d51cfb7e1 100644 --- a/http/misconfiguration/unauth-zwave-mqtt.yaml +++ b/http/misconfiguration/unauth-zwave-mqtt.yaml @@ -8,7 +8,7 @@ info: - https://github.com/OpenZWave/Zwave2Mqtt metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"ZWave To MQTT" tags: misconfig,zwave,mqtt,unauth diff --git a/http/misconfiguration/webalizer-statistics.yaml b/http/misconfiguration/webalizer-statistics.yaml index 24be5bd615..15b62d0d41 100644 --- a/http/misconfiguration/webalizer-statistics.yaml +++ b/http/misconfiguration/webalizer-statistics.yaml @@ -12,7 +12,7 @@ info: - https://www.tenable.com/plugins/nnm/2506 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: html:"Generated by The Webalizer" tags: webalizer,logs,statistics,tenable diff --git a/http/misconfiguration/webdav-enabled.yaml b/http/misconfiguration/webdav-enabled.yaml index a39f1c1d0a..1b1d85d755 100644 --- a/http/misconfiguration/webdav-enabled.yaml +++ b/http/misconfiguration/webdav-enabled.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-200 metadata: max-request: 3 - verified: "true" + verified: true shodan-query: "Ms-Author-Via: DAV" tags: webdav,misconfig,exposure diff --git a/http/technologies/ambassador-edge-stack-detect.yaml b/http/technologies/ambassador-edge-stack-detect.yaml index ed55960ce4..d338265a03 100644 --- a/http/technologies/ambassador-edge-stack-detect.yaml +++ b/http/technologies/ambassador-edge-stack-detect.yaml @@ -8,7 +8,7 @@ info: Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Ambassador Edge Stack" tags: tech,ambassador,gateway diff --git a/http/technologies/cvsweb-detect.yaml b/http/technologies/cvsweb-detect.yaml index 846c87486e..fd7b2766e3 100644 --- a/http/technologies/cvsweb-detect.yaml +++ b/http/technologies/cvsweb-detect.yaml @@ -10,7 +10,7 @@ info: - https://cvsweb.openbsd.org/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"cvsweb" fofa-query: title="cvsweb" zoomeye-query: title:cvsweb diff --git a/http/technologies/dash-panel-detect.yaml b/http/technologies/dash-panel-detect.yaml index fc5db00bed..48d8dca8b2 100644 --- a/http/technologies/dash-panel-detect.yaml +++ b/http/technologies/dash-panel-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"DashRenderer" tags: tech,dash diff --git a/http/technologies/default-apache-shiro.yaml b/http/technologies/default-apache-shiro.yaml index 457e28f7b5..4cf9e82622 100644 --- a/http/technologies/default-apache-shiro.yaml +++ b/http/technologies/default-apache-shiro.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Apache Shiro Quickstart" tags: tech,apache,shiro diff --git a/http/technologies/default-sitecore-page.yaml b/http/technologies/default-sitecore-page.yaml index ad6e3a7ed4..72d99a89f0 100644 --- a/http/technologies/default-sitecore-page.yaml +++ b/http/technologies/default-sitecore-page.yaml @@ -10,7 +10,7 @@ info: https://www.sitecore.com/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"Welcome to Sitecore" tags: tech,sitecore,cms diff --git a/http/technologies/icecast-mediaserver-detect.yaml b/http/technologies/icecast-mediaserver-detect.yaml index 22d5db8126..78c21e92c4 100644 --- a/http/technologies/icecast-mediaserver-detect.yaml +++ b/http/technologies/icecast-mediaserver-detect.yaml @@ -11,7 +11,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Icecast Streaming Media Server" tags: tech,icecast,media-server,detect diff --git a/http/technologies/kubernetes/etcd/etcd-version.yaml b/http/technologies/kubernetes/etcd/etcd-version.yaml index 30d0144de6..85eca278e2 100644 --- a/http/technologies/kubernetes/etcd/etcd-version.yaml +++ b/http/technologies/kubernetes/etcd/etcd-version.yaml @@ -9,7 +9,7 @@ info: - https://etcd.io/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: product:"etcd" tags: tech,k8s,kubernetes,devops,etcd diff --git a/http/technologies/moveit-transfer-detect.yaml b/http/technologies/moveit-transfer-detect.yaml index 1445a715d9..941b5b3099 100644 --- a/http/technologies/moveit-transfer-detect.yaml +++ b/http/technologies/moveit-transfer-detect.yaml @@ -7,7 +7,7 @@ info: metadata: max-request: 2 shodan-query: html:"human.aspx" - verified: "true" + verified: true tags: tech,moveit http: diff --git a/http/technologies/nacos-version.yaml b/http/technologies/nacos-version.yaml index 21ec6ffce0..57967f7e0a 100644 --- a/http/technologies/nacos-version.yaml +++ b/http/technologies/nacos-version.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Nacos" tags: tech,detect,nacos diff --git a/http/technologies/nimplant-c2.yaml b/http/technologies/nimplant-c2.yaml index 49624f0941..3dc3bd2abc 100644 --- a/http/technologies/nimplant-c2.yaml +++ b/http/technologies/nimplant-c2.yaml @@ -10,7 +10,7 @@ info: - https://github.com/chvancooten/NimPlant metadata: max-request: 1 - verified: "true" + verified: true shodan-query: "nimplant C2 server" tags: tech,nimplant,c2 diff --git a/http/technologies/openai-plugin.yaml b/http/technologies/openai-plugin.yaml index 1133e27606..2ab3fd6a22 100644 --- a/http/technologies/openai-plugin.yaml +++ b/http/technologies/openai-plugin.yaml @@ -10,7 +10,7 @@ info: - https://platform.openai.com/docs/plugins/introduction metadata: max-request: 1 - verified: "true" + verified: true tags: tech,openai,plugin http: diff --git a/http/technologies/openhap-detect.yaml b/http/technologies/openhap-detect.yaml index d9f6735b52..fd08aad0c7 100644 --- a/http/technologies/openhap-detect.yaml +++ b/http/technologies/openhap-detect.yaml @@ -8,7 +8,7 @@ info: - https://www.openhab.org/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.title:"openHAB" tags: tech,iot,openhab diff --git a/http/technologies/pagespeed-detect.yaml b/http/technologies/pagespeed-detect.yaml index bf0fb5d567..706bf5361c 100644 --- a/http/technologies/pagespeed-detect.yaml +++ b/http/technologies/pagespeed-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: "X-Mod-Pagespeed:" tags: tech,pagespeed diff --git a/http/technologies/sitecore-cms.yaml b/http/technologies/sitecore-cms.yaml index 2b1ac5199e..cfd32cfda1 100644 --- a/http/technologies/sitecore-cms.yaml +++ b/http/technologies/sitecore-cms.yaml @@ -10,7 +10,7 @@ info: https://www.sitecore.com metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"sitecore" tags: cms,sitecore diff --git a/http/technologies/splash-rendering-service.yaml b/http/technologies/splash-rendering-service.yaml index 21a076af67..6e6901f126 100644 --- a/http/technologies/splash-rendering-service.yaml +++ b/http/technologies/splash-rendering-service.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Splash" hunter-query: web.title="Splash" && header="TwistedWeb" tags: tech,splash,detect diff --git a/http/technologies/switch-protocol.yaml b/http/technologies/switch-protocol.yaml index db492c2fcf..7c0b46e378 100644 --- a/http/technologies/switch-protocol.yaml +++ b/http/technologies/switch-protocol.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: '"connection: upgrade"' tags: protocol,switching,tech,websocket,h2c diff --git a/http/technologies/utility-service-detect.yaml b/http/technologies/utility-service-detect.yaml index 430e619187..d6b153a71a 100644 --- a/http/technologies/utility-service-detect.yaml +++ b/http/technologies/utility-service-detect.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Utility Services Administration" tags: tech,avaya,aura diff --git a/http/token-spray/api-networksdb.yaml b/http/token-spray/api-networksdb.yaml index aab0567c30..083de16298 100644 --- a/http/token-spray/api-networksdb.yaml +++ b/http/token-spray/api-networksdb.yaml @@ -9,7 +9,7 @@ info: - https://networksdb.io/api/docs metadata: max-request: 1 - verified: "true" + verified: true tags: token-spray,networkdb self-contained: true diff --git a/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml b/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml index 8841d138fa..eb793e2eca 100644 --- a/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml +++ b/http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: html:"Apache Druid" - verified: "true" + verified: true tags: cve,cve2023,apache,druid,kafka,rce,jndi,oast http: diff --git a/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml b/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml index 33c6af9415..cdbb315953 100644 --- a/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml +++ b/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml @@ -20,7 +20,7 @@ info: cwe-id: CWE-77 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: http.html:"Apache Solr" tags: vulhub,cve,solr,oast,log4j,cve2021,rce,apache,jndi,kev diff --git a/http/vulnerabilities/apache/log4j/jamf-pro-log4j-rce.yaml b/http/vulnerabilities/apache/log4j/jamf-pro-log4j-rce.yaml index 3227490596..59051614ca 100644 --- a/http/vulnerabilities/apache/log4j/jamf-pro-log4j-rce.yaml +++ b/http/vulnerabilities/apache/log4j/jamf-pro-log4j-rce.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: title:"Jamf Pro" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,jamf,oast,kev variables: diff --git a/http/vulnerabilities/avaya/avaya-aura-rce.yaml b/http/vulnerabilities/avaya/avaya-aura-rce.yaml index ca027f58ca..9b6bc8562d 100644 --- a/http/vulnerabilities/avaya/avaya-aura-rce.yaml +++ b/http/vulnerabilities/avaya/avaya-aura-rce.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-94 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: html:"Avaya Aura" tags: rce,avaya,aura,iot diff --git a/http/vulnerabilities/avaya/avaya-aura-xss.yaml b/http/vulnerabilities/avaya/avaya-aura-xss.yaml index 99c0256351..f4770a224f 100644 --- a/http/vulnerabilities/avaya/avaya-aura-xss.yaml +++ b/http/vulnerabilities/avaya/avaya-aura-xss.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-80 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: html:"Avaya Aura" tags: xss,avaya,aura,iot diff --git a/http/vulnerabilities/avtech/avtech-auth-bypass.yaml b/http/vulnerabilities/avtech/avtech-auth-bypass.yaml index 9b8f1188c1..58881d5537 100644 --- a/http/vulnerabilities/avtech/avtech-auth-bypass.yaml +++ b/http/vulnerabilities/avtech/avtech-auth-bypass.yaml @@ -8,7 +8,7 @@ info: AVTECH Video Surveillance Products password disclosure through /cgi-bin/user/Config.cgi. metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" tags: exposure,avtech,auth-bypass,password diff --git a/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml b/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml index 288ba680ac..8080e8b076 100644 --- a/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml +++ b/http/vulnerabilities/avtech/avtech-dvr-ssrf.yaml @@ -8,7 +8,7 @@ info: AVTECH DVR device, Search.cgi can be accessed directly. Search.cgi is responsible for searching and accessing cameras in the local network. Search.cgi provides the cgi_query function. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" tags: ssrf,avtech,unauth,iot diff --git a/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml b/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml index 6d53fdfbf7..caeee81c43 100644 --- a/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml +++ b/http/vulnerabilities/avtech/avtech-unauth-file-download.yaml @@ -8,7 +8,7 @@ info: AVTECH video surveillance products unauthenticated file download from web root through /cgi-bin/cgibox, Since the .cab string is verified by the strstr method, the file download can be realized by adding ?.cab at the end of the file name. metadata: max-request: 2 - verified: "true" + verified: true shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" tags: exposure,avtech,unauth,download,iot diff --git a/http/vulnerabilities/avtech/avtech-verification-bypass.yaml b/http/vulnerabilities/avtech/avtech-verification-bypass.yaml index 85414e83c6..96f13596e8 100644 --- a/http/vulnerabilities/avtech/avtech-verification-bypass.yaml +++ b/http/vulnerabilities/avtech/avtech-verification-bypass.yaml @@ -8,7 +8,7 @@ info: AVTECH DVR products are vulnerable to verification code bypass just by entering the "login=quick" parameter to bypass verification code. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"login" product:"Avtech" fofa-query: app="AVTECH-视频监控" tags: avtech,verify,bypass,iot diff --git a/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml b/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml index 90553b57bf..6b4311a8f6 100644 --- a/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml +++ b/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"Cisco Unified" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,cisco,kev,oast variables: diff --git a/http/vulnerabilities/cisco/cisco-vmanage-log4j.yaml b/http/vulnerabilities/cisco/cisco-vmanage-log4j.yaml index 703640362b..86b13bc089 100644 --- a/http/vulnerabilities/cisco/cisco-vmanage-log4j.yaml +++ b/http/vulnerabilities/cisco/cisco-vmanage-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"vManage" - verified: "true" + verified: true tags: log4j,cisco,tenable,cve,cve2021,rce,jndi,kev,oast variables: diff --git a/http/vulnerabilities/gitea/gitea-rce.yaml b/http/vulnerabilities/gitea/gitea-rce.yaml index 9af3f2eb97..1f91bfa41c 100644 --- a/http/vulnerabilities/gitea/gitea-rce.yaml +++ b/http/vulnerabilities/gitea/gitea-rce.yaml @@ -11,7 +11,7 @@ info: - https://github.com/kacperszurek/exploits/blob/master/Gitea/gitea_lfs_rce.py metadata: max-request: 3 - verified: "true" + verified: true shodan-query: 'title:"Installation - Gitea: Git with a cup of tea"' tags: gitea,rce,unauth,edb diff --git a/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml b/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml index 9b06fe7cab..33591745e4 100644 --- a/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml +++ b/http/vulnerabilities/huawei/huawei-firewall-lfi.yaml @@ -10,7 +10,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"HUAWEI" tags: huawei,firewall,lfi diff --git a/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml b/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml index cfde4d8c4e..79de2db9d4 100644 --- a/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml +++ b/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"JamF" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,jamf,oast,kev variables: diff --git a/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml b/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml index 4f79fc42be..6ce3287d84 100644 --- a/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml +++ b/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"MobileIron" - verified: "true" + verified: true tags: jndi,log4j,rce,cve,cve2021,ivanti,oast,mobileiron,kev variables: diff --git a/http/vulnerabilities/other/academy-lms-xss.yaml b/http/vulnerabilities/other/academy-lms-xss.yaml index dbf4eb2f8d..a7e9bac5ec 100644 --- a/http/vulnerabilities/other/academy-lms-xss.yaml +++ b/http/vulnerabilities/other/academy-lms-xss.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-80 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"Academy LMS" tags: packetstorm,lms,academy,xss diff --git a/http/vulnerabilities/other/ckan-dom-based-xss.yaml b/http/vulnerabilities/other/ckan-dom-based-xss.yaml index 444ea1ce97..e206d4f078 100644 --- a/http/vulnerabilities/other/ckan-dom-based-xss.yaml +++ b/http/vulnerabilities/other/ckan-dom-based-xss.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: html:"ckan 2.8.2" || html:"ckan 2.3" tags: dom,xss diff --git a/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml b/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml index 72954c6ec5..49720a979b 100644 --- a/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml +++ b/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: elastic indices - verified: "true" + verified: true tags: jndi,log4j,rce,oast,elasticsearch,cve,cve2021,kev variables: diff --git a/http/vulnerabilities/other/goanywhere-mft-log4j-rce.yaml b/http/vulnerabilities/other/goanywhere-mft-log4j-rce.yaml index 065c5577b3..0733f88a9e 100644 --- a/http/vulnerabilities/other/goanywhere-mft-log4j-rce.yaml +++ b/http/vulnerabilities/other/goanywhere-mft-log4j-rce.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"GoAnywhere Managed File Transfer" - verified: "true" + verified: true tags: cve,cve2021,jndi,log4j,rce,oast,goanywhere,kev variables: diff --git a/http/vulnerabilities/other/graylog-log4j.yaml b/http/vulnerabilities/other/graylog-log4j.yaml index 0e48100e8b..15b945a9c6 100644 --- a/http/vulnerabilities/other/graylog-log4j.yaml +++ b/http/vulnerabilities/other/graylog-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"Graylog Web Interface" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,graylog,kev,oast variables: diff --git a/http/vulnerabilities/other/metabase-log4j.yaml b/http/vulnerabilities/other/metabase-log4j.yaml index 36791dbde1..20c8a19981 100644 --- a/http/vulnerabilities/other/metabase-log4j.yaml +++ b/http/vulnerabilities/other/metabase-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"Metabase" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,metabase,kev,oast variables: diff --git a/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml b/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml index b3652f3f84..97b57f5151 100644 --- a/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml +++ b/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: title:"OpenNMS Web Console" - verified: "true" + verified: true tags: jndi,log4j,rce,opennms,cve,cve2021,kev,oast variables: diff --git a/http/vulnerabilities/other/pmb-xss.yaml b/http/vulnerabilities/other/pmb-xss.yaml index 08b464220f..1294ed4a6b 100644 --- a/http/vulnerabilities/other/pmb-xss.yaml +++ b/http/vulnerabilities/other/pmb-xss.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-80 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:1469328760 tags: xss,pmb,cms diff --git a/http/vulnerabilities/other/rundeck-log4j.yaml b/http/vulnerabilities/other/rundeck-log4j.yaml index e75aff0a70..8c31d5082a 100644 --- a/http/vulnerabilities/other/rundeck-log4j.yaml +++ b/http/vulnerabilities/other/rundeck-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"Rundeck" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,rundeck,kev,oast variables: diff --git a/http/vulnerabilities/other/slims-xss.yaml b/http/vulnerabilities/other/slims-xss.yaml index ff2e5112e4..a20f3317c2 100644 --- a/http/vulnerabilities/other/slims-xss.yaml +++ b/http/vulnerabilities/other/slims-xss.yaml @@ -10,7 +10,7 @@ info: - https://packetstormsecurity.com/files/170182/Senayan-Library-Management-System-9.4.0-Cross-Site-Scripting.html metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"SLIMS" tags: senayan,packetstorm,xss,slims diff --git a/http/vulnerabilities/other/sound4-file-disclosure.yaml b/http/vulnerabilities/other/sound4-file-disclosure.yaml index 8f21f70572..24e24f94ea 100644 --- a/http/vulnerabilities/other/sound4-file-disclosure.yaml +++ b/http/vulnerabilities/other/sound4-file-disclosure.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"SOUND4" - verified: "true" + verified: true tags: packetstorm,lfi,sound4,unauth,disclosure http: diff --git a/http/vulnerabilities/other/tikiwiki-xss.yaml b/http/vulnerabilities/other/tikiwiki-xss.yaml index d1a13cbfcd..421d43cad1 100644 --- a/http/vulnerabilities/other/tikiwiki-xss.yaml +++ b/http/vulnerabilities/other/tikiwiki-xss.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 shodan-query: http.html:"tiki wiki" - verified: "true" + verified: true tags: edb,xss,tikiwiki,packetstorm,acketstorm http: diff --git a/http/vulnerabilities/other/unifi-network-log4j-rce.yaml b/http/vulnerabilities/other/unifi-network-log4j-rce.yaml index a69ef0488f..e9e8d3dc02 100644 --- a/http/vulnerabilities/other/unifi-network-log4j-rce.yaml +++ b/http/vulnerabilities/other/unifi-network-log4j-rce.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"UniFi Network" - verified: "true" + verified: true tags: cve,cve2021,rce,log4j,ubnt,unifi,oast,jndi,kev variables: diff --git a/http/vulnerabilities/other/vmware-siterecovery-log4j-rce.yaml b/http/vulnerabilities/other/vmware-siterecovery-log4j-rce.yaml index 05b40f2f35..7ce45b6809 100644 --- a/http/vulnerabilities/other/vmware-siterecovery-log4j-rce.yaml +++ b/http/vulnerabilities/other/vmware-siterecovery-log4j-rce.yaml @@ -18,7 +18,7 @@ info: metadata: max-request: 1 shodan-query: title:"VMware Site Recovery Manager" - verified: "true" + verified: true tags: cve,cve2021,jndi,log4j,rce,oast,vmware,siterecovery,kev variables: diff --git a/http/vulnerabilities/others/universal-media-xss.yaml b/http/vulnerabilities/others/universal-media-xss.yaml index 799e85b6a3..3019d163bb 100644 --- a/http/vulnerabilities/others/universal-media-xss.yaml +++ b/http/vulnerabilities/others/universal-media-xss.yaml @@ -11,7 +11,7 @@ info: - https://packetstormsecurity.com/files/171754/Universal-Media-Server-13.2.1-Cross-Site-Scripting.html metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.favicon.hash:-902890504 tags: xss,universal,media,unauth,packetstorm diff --git a/http/vulnerabilities/phpmyadmin-unauth.yaml b/http/vulnerabilities/phpmyadmin-unauth.yaml index eb1a34c03b..4664d52cd3 100644 --- a/http/vulnerabilities/phpmyadmin-unauth.yaml +++ b/http/vulnerabilities/phpmyadmin-unauth.yaml @@ -9,7 +9,7 @@ info: - https://www.phpmyadmin.net metadata: max-request: 6 - verified: "true" + verified: true shodan-query: html:"server_databases.php" fofa-query: body="server_databases.php" tags: misconfig,phpmyadmin,unauth diff --git a/http/vulnerabilities/splash/splash-render-ssrf.yaml b/http/vulnerabilities/splash/splash-render-ssrf.yaml index c5ff1a9ef4..638ed25031 100644 --- a/http/vulnerabilities/splash/splash-render-ssrf.yaml +++ b/http/vulnerabilities/splash/splash-render-ssrf.yaml @@ -9,7 +9,7 @@ info: - https://b1ngz.github.io/splash-ssrf-to-get-server-root-privilege/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"Splash" hunter-query: web.title="Splash" && header="TwistedWeb" tags: splash,ssrf,oast,oss diff --git a/http/vulnerabilities/ueditor/ueditor-ssrf.yaml b/http/vulnerabilities/ueditor/ueditor-ssrf.yaml index 09f7ea50b9..61b0ff50f4 100644 --- a/http/vulnerabilities/ueditor/ueditor-ssrf.yaml +++ b/http/vulnerabilities/ueditor/ueditor-ssrf.yaml @@ -10,7 +10,7 @@ info: - https://www.seebug.org/vuldb/ssvid-97311 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: html:"UEditor" tags: ueditor,ssrf diff --git a/http/vulnerabilities/ueditor/ueditor-xss.yaml b/http/vulnerabilities/ueditor/ueditor-xss.yaml index 4341c09475..246e2b21d4 100644 --- a/http/vulnerabilities/ueditor/ueditor-xss.yaml +++ b/http/vulnerabilities/ueditor/ueditor-xss.yaml @@ -15,7 +15,7 @@ info: cwe-id: CWE-79 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: title:"ueditor" tags: ueditor,xss diff --git a/http/vulnerabilities/vmware/vmware-hcx-log4j.yaml b/http/vulnerabilities/vmware/vmware-hcx-log4j.yaml index 20857cd01f..e1e2618627 100644 --- a/http/vulnerabilities/vmware/vmware-hcx-log4j.yaml +++ b/http/vulnerabilities/vmware/vmware-hcx-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"VMware HCX" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,vmware,kev,oast variables: diff --git a/http/vulnerabilities/vmware/vmware-horizon-log4j-jndi-rce.yaml b/http/vulnerabilities/vmware/vmware-horizon-log4j-jndi-rce.yaml index 36ed4e3989..6e196345ae 100644 --- a/http/vulnerabilities/vmware/vmware-horizon-log4j-jndi-rce.yaml +++ b/http/vulnerabilities/vmware/vmware-horizon-log4j-jndi-rce.yaml @@ -19,7 +19,7 @@ info: metadata: max-request: 1 shodan-query: http.html:"VMware Horizon" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,horizon,vmware,oast,kev http: diff --git a/http/vulnerabilities/vmware/vmware-nsx-log4j.yaml b/http/vulnerabilities/vmware/vmware-nsx-log4j.yaml index fdc815da88..cfe55e29d5 100644 --- a/http/vulnerabilities/vmware/vmware-nsx-log4j.yaml +++ b/http/vulnerabilities/vmware/vmware-nsx-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: html:"vmw_nsx_logo-black-triangle-500w.png" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,graylog,kev,oast variables: diff --git a/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml b/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml index 8980a6643e..42d0de9360 100644 --- a/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml +++ b/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 1 shodan-query: title:"vRealize Operations Manager" - verified: "true" + verified: true tags: cve,cve2021,rce,jndi,log4j,vmware,kev,oast variables: diff --git a/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml b/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml index d37d281e1c..595023c139 100644 --- a/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml +++ b/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml @@ -20,7 +20,7 @@ info: metadata: max-request: 1 shodan-query: http.title:"vRealize Operations Tenant App" - verified: "true" + verified: true tags: cve,cve2021,oast,rce,log4j,vmware,vrealize,kev variables: diff --git a/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml b/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml index c3332b6824..dd8ceaba2f 100644 --- a/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml +++ b/http/vulnerabilities/weaver/ecology/ecology-mysql-config.yaml @@ -8,7 +8,7 @@ info: Fanwei E-Office mysql_config.ini file can be directly accessed, leaking database account password and other information. metadata: max-request: 1 - verified: "true" + verified: true fofa-query: app="泛微-EOffice" tags: fanwei,ecology,exposure,config diff --git a/http/vulnerabilities/wordpress/3d-print-lite-xss.yaml b/http/vulnerabilities/wordpress/3d-print-lite-xss.yaml index fa2cc2bd8d..56bc4c8954 100644 --- a/http/vulnerabilities/wordpress/3d-print-lite-xss.yaml +++ b/http/vulnerabilities/wordpress/3d-print-lite-xss.yaml @@ -12,7 +12,7 @@ info: - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-3dprint-lite-cross-site-scripting-1-9-1-5/ metadata: max-request: 2 - verified: "true" + verified: true tags: 3dprint,lite,authenticated,wpscan,xss,wordpress,wp-plugin,wp http: diff --git a/http/vulnerabilities/wordpress/advanced-booking-calendar-sqli.yaml b/http/vulnerabilities/wordpress/advanced-booking-calendar-sqli.yaml index 989b815bcf..d16dd1f6be 100644 --- a/http/vulnerabilities/wordpress/advanced-booking-calendar-sqli.yaml +++ b/http/vulnerabilities/wordpress/advanced-booking-calendar-sqli.yaml @@ -12,7 +12,7 @@ info: remediation: Fixed in version 1.6.2 metadata: max-request: 1 - verified: "true" + verified: true tags: sqli,wpscan,wordpress,wp-plugin,wp,advanced-booking-calendar,unauthenticated http: diff --git a/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml b/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml index c3bc12e5db..c8f9fde220 100644 --- a/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml +++ b/http/vulnerabilities/wordpress/ldap-wp-login-xss.yaml @@ -11,7 +11,7 @@ info: - https://wpscan.com/vulnerability/1dc2cec8-e3dd-414b-8ccb-d73d51b051ee metadata: max-request: 2 - verified: "true" + verified: true tags: xss,wp-plugin,wordpress,wp,ldap-wp-login-integration-with-active-directory,wpscan http: diff --git a/http/vulnerabilities/wordpress/seatreg-redirect.yaml b/http/vulnerabilities/wordpress/seatreg-redirect.yaml index e0bff1a537..5dc5d051a3 100644 --- a/http/vulnerabilities/wordpress/seatreg-redirect.yaml +++ b/http/vulnerabilities/wordpress/seatreg-redirect.yaml @@ -10,7 +10,7 @@ info: - https://packetstormsecurity.com/files/167888/WordPress-SeatReg-1.23.0-Open-Redirect.html metadata: max-request: 3 - verified: "true" + verified: true tags: redirect,packetstorm,seatreg,wp-plugin,wp,wordpress,authenticated http: diff --git a/http/vulnerabilities/wordpress/watu-xss.yaml b/http/vulnerabilities/wordpress/watu-xss.yaml index bdb8e37d16..14830169c2 100644 --- a/http/vulnerabilities/wordpress/watu-xss.yaml +++ b/http/vulnerabilities/wordpress/watu-xss.yaml @@ -13,7 +13,7 @@ info: - https://plugins.trac.wordpress.org/changeset?reponame=&new=2114019%40watu&old=2112579%40watu& metadata: max-request: 2 - verified: "true" + verified: true tags: watu,quiz,authenticated,wpscan,xss http: diff --git a/http/vulnerabilities/wordpress/wp-autosuggest-sql-injection.yaml b/http/vulnerabilities/wordpress/wp-autosuggest-sql-injection.yaml index 7f7a84e9cb..1e82a7f971 100644 --- a/http/vulnerabilities/wordpress/wp-autosuggest-sql-injection.yaml +++ b/http/vulnerabilities/wordpress/wp-autosuggest-sql-injection.yaml @@ -11,7 +11,7 @@ info: - https://wordpress.org/plugins/wp-autosuggest/ metadata: max-request: 1 - verified: "true" + verified: true tags: wp-plugin,wp,wp-autosuggest,wpscan,sqli,wordpress http: diff --git a/http/vulnerabilities/wordpress/wp-touch-redirect.yaml b/http/vulnerabilities/wordpress/wp-touch-redirect.yaml index 413afc4e71..26b86d8e3f 100644 --- a/http/vulnerabilities/wordpress/wp-touch-redirect.yaml +++ b/http/vulnerabilities/wordpress/wp-touch-redirect.yaml @@ -10,7 +10,7 @@ info: - https://packetstormsecurity.com/files/170568/WordPress-WPtouch-3.7.5-Open-Redirection.html metadata: max-request: 1 - verified: "true" + verified: true google-query: "inurl:/wp-content/plugins/wptouch" tags: wp-plugin,wp,packetstorm,wptouch,unauth,redirect,wordpress diff --git a/http/vulnerabilities/wordpress/wpml-xss.yaml b/http/vulnerabilities/wordpress/wpml-xss.yaml index 6424edfe67..d872619157 100644 --- a/http/vulnerabilities/wordpress/wpml-xss.yaml +++ b/http/vulnerabilities/wordpress/wpml-xss.yaml @@ -13,7 +13,7 @@ info: Update the WPML plugin to 4.6.1 version. metadata: max-request: 1 - verified: "true" + verified: true tags: xss,wp,wordpress,wpml,wp-plugin http: diff --git a/http/vulnerabilities/zyxel/unauth-lfd-zhttpd.yaml b/http/vulnerabilities/zyxel/unauth-lfd-zhttpd.yaml index a841deace5..ee19f74a76 100644 --- a/http/vulnerabilities/zyxel/unauth-lfd-zhttpd.yaml +++ b/http/vulnerabilities/zyxel/unauth-lfd-zhttpd.yaml @@ -16,7 +16,7 @@ info: cwe-id: CWE-22 metadata: max-request: 1 - verified: "true" + verified: true shodan-query: http.html:"VMG1312-B10D" tags: misconfig,unauth,zyxel,lfi,msf diff --git a/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml b/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml index 0cc16a3b1f..6f7e8209af 100644 --- a/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml +++ b/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml @@ -13,7 +13,7 @@ info: metadata: max-request: 1 shodan-query: title:"USG FLEX" - verified: "true" + verified: true tags: misconfig,unauth,zyxel,ztp,rce,oast http: diff --git a/network/cves/2011/CVE-2011-2523.yaml b/network/cves/2011/CVE-2011-2523.yaml index b0b0be0fb2..818f6ffe2f 100644 --- a/network/cves/2011/CVE-2011-2523.yaml +++ b/network/cves/2011/CVE-2011-2523.yaml @@ -15,7 +15,7 @@ info: cve-id: CVE-2011-2523 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: product:"vsftpd" tags: cve,cve2011,network,vsftpd,ftp,backdoor diff --git a/network/cves/2016/CVE-2016-3510.yaml b/network/cves/2016/CVE-2016-3510.yaml index 567cd48b65..d4f453bc75 100644 --- a/network/cves/2016/CVE-2016-3510.yaml +++ b/network/cves/2016/CVE-2016-3510.yaml @@ -10,7 +10,7 @@ info: - https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2016,weblogic,t3,rce,oast,deserialization variables: diff --git a/network/cves/2020/CVE-2020-11981.yaml b/network/cves/2020/CVE-2020-11981.yaml index ae05a73507..b8b483c5a5 100644 --- a/network/cves/2020/CVE-2020-11981.yaml +++ b/network/cves/2020/CVE-2020-11981.yaml @@ -17,7 +17,7 @@ info: metadata: max-request: 2 shodan-query: product:"redis" - verified: "true" + verified: true tags: network,redis,unauth,apache,airflow,vulhub variables: diff --git a/network/cves/2022/CVE-2022-31793.yaml b/network/cves/2022/CVE-2022-31793.yaml index 2ba507bfa9..c5a8792251 100644 --- a/network/cves/2022/CVE-2022-31793.yaml +++ b/network/cves/2022/CVE-2022-31793.yaml @@ -20,7 +20,7 @@ info: epss-score: 0.36068 metadata: max-request: 1 - verified: "true" + verified: true tags: cve,cve2022,network,muhttpd,lfi,unauth tcp: diff --git a/network/detection/msmq-detect.yaml b/network/detection/msmq-detect.yaml index 7ae9edc5ac..619301c3cb 100644 --- a/network/detection/msmq-detect.yaml +++ b/network/detection/msmq-detect.yaml @@ -12,7 +12,7 @@ info: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: MSMQ censys-query: services.service_name:MSMQ tags: network,msmq,detect diff --git a/network/detection/rtsp-detect.yaml b/network/detection/rtsp-detect.yaml index 57248b8d10..39e5a3022b 100644 --- a/network/detection/rtsp-detect.yaml +++ b/network/detection/rtsp-detect.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: RTSP/1.0 tags: network,rtsp,detect diff --git a/network/enumeration/beanstalk-service.yaml b/network/enumeration/beanstalk-service.yaml index 529598d863..364078788d 100644 --- a/network/enumeration/beanstalk-service.yaml +++ b/network/enumeration/beanstalk-service.yaml @@ -10,7 +10,7 @@ info: - https://jhadiary.wordpress.com/2016/05/18/beanstalk-helping-commands/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: port:11300 "cmd-peek" tags: network,beanstalk,detect,enum diff --git a/network/enumeration/kafka-topics-list.yaml b/network/enumeration/kafka-topics-list.yaml index f894c3e03a..7bc3dfa4f4 100644 --- a/network/enumeration/kafka-topics-list.yaml +++ b/network/enumeration/kafka-topics-list.yaml @@ -8,7 +8,7 @@ info: Kafka topics are logical data streams that store and organize messages in Apache Kafka. They provide a way for data to be published, subscribed to, and processed by Kafka consumers. metadata: max-request: 1 - verified: "true" + verified: true shodan-query: product:"Kafka" tags: network,detect,enum,kafka,apache diff --git a/network/enumeration/mongodb-info-enum.yaml b/network/enumeration/mongodb-info-enum.yaml index 15489708ef..19275674e6 100644 --- a/network/enumeration/mongodb-info-enum.yaml +++ b/network/enumeration/mongodb-info-enum.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: max-request: 2 - verified: "true" + verified: true shodan-query: mongodb server information tags: network,mongodb,enum diff --git a/network/enumeration/smtp-commands-enum.yaml b/network/enumeration/smtp-commands-enum.yaml index 2578abf925..e87c3b61e0 100644 --- a/network/enumeration/smtp-commands-enum.yaml +++ b/network/enumeration/smtp-commands-enum.yaml @@ -10,7 +10,7 @@ info: - https://nmap.org/nsedoc/scripts/smtp-commands.html metadata: max-request: 2 - verified: "true" + verified: true shodan-query: 'smtp' tags: network,enum,smtp,mail diff --git a/network/enumeration/smtp/smtp-user-enum.yaml b/network/enumeration/smtp/smtp-user-enum.yaml index 90c4fd8982..4a8cc9d900 100644 --- a/network/enumeration/smtp/smtp-user-enum.yaml +++ b/network/enumeration/smtp/smtp-user-enum.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 shodan-query: smtp - verified: "true" + verified: true tags: network,enum,smtp,mail tcp: diff --git a/ssl/kubernetes-fake-certificate.yaml b/ssl/kubernetes-fake-certificate.yaml index 07f1f343c5..42339c74da 100644 --- a/ssl/kubernetes-fake-certificate.yaml +++ b/ssl/kubernetes-fake-certificate.yaml @@ -11,7 +11,7 @@ info: - https://snyk.io/blog/setting-up-ssl-tls-for-kubernetes-ingress/ metadata: max-request: 1 - verified: "true" + verified: true shodan-query: ssl:"Kubernetes Ingress Controller Fake Certificate" tags: ssl,kubernetes,tls,self-signed