From ee1f9347907bebc3282a0fba9a492ad8393e09bb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E6=88=91=E4=BC=9A=E5=95=8AD=2C=E6=98=8E=E5=B0=8F=E5=AD=90?= =?UTF-8?q?=2C=E5=BE=A1=E5=89=91?= <104293903+pwnhxl@users.noreply.github.com> Date: Sat, 30 Mar 2024 10:16:40 +0800 Subject: [PATCH] tags add --- http/cves/2024/CVE-2024-29059.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2024/CVE-2024-29059.yaml b/http/cves/2024/CVE-2024-29059.yaml index 2ca8ec6191..97cebd6a70 100644 --- a/http/cves/2024/CVE-2024-29059.yaml +++ b/http/cves/2024/CVE-2024-29059.yaml @@ -21,7 +21,7 @@ info: shodan-query: 'Server: MS .NET Remoting' vendor: microsoft product: .net_framework - tags: cve,cve2024,microsoft,deserialization + tags: cve,cve2024,dotnet,microsoft,remoting,deserialization http: - raw: @@ -75,4 +75,4 @@ http: - "contains(body_1,'ObjRef')" - "contains(x_vuln_test,'{{randstr}}')" condition: and -# digest: 490a0046304402206d7dab3211d0afc324e728a92a2d5b2dbcd379b459faa590c120b34a03f4c2be0220525afee240652d31fc0821f72a6391a7339bf9276a91f1d8de0093f8892d1974:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 490a0046304402206d7dab3211d0afc324e728a92a2d5b2dbcd379b459faa590c120b34a03f4c2be0220525afee240652d31fc0821f72a6391a7339bf9276a91f1d8de0093f8892d1974:922c64590222798bb761d5b6d8e72950