* Add description and enhance one where the UI failed to save properly.
dos2unix on a template
* Change cvedetails link to nvd
* make severities match
* Enhancement: cves/2015/CVE-2015-2863.yaml by md
* Enhancement: cves/2017/CVE-2017-14524.yaml by md
* Enhancement: cves/2017/CVE-2017-5638.yaml by md
* Enhancement: cves/2019/CVE-2019-16759.yaml by md
* Enhancement: cves/2021/CVE-2021-22986.yaml by md
* Enhancement: cves/2021/CVE-2021-24145.yaml by md
* Enhancement: cves/2021/CVE-2021-24145.yaml by md
* Enhancement: cves/2021/CVE-2021-24155.yaml by md
* Enhancement: cves/2021/CVE-2021-24145.yaml by md
* Enhancement: cves/2021/CVE-2021-24145.yaml by md
* Enhancement: cves/2021/CVE-2021-24347.yaml by md
* Enhancement: cves/2021/CVE-2021-25003.yaml by md
* Enhancement: cves/2021/CVE-2021-25296.yaml by md
* Enhancement: cves/2021/CVE-2021-25297.yaml by md
* Enhancement: cves/2021/CVE-2021-25296.yaml by md
* Enhancement: cves/2021/CVE-2021-25297.yaml by md
* Enhancement: cves/2021/CVE-2021-25298.yaml by md
* Enhancement: cves/2021/CVE-2021-25297.yaml by md
* Enhancement: cves/2021/CVE-2021-28151.yaml by md
* Enhancement: cves/2021/CVE-2021-30128.yaml by md
* Enhancement: cves/2022/CVE-2022-0824.yaml by md
* Enhancement: cves/2022/CVE-2022-0824.yaml by md
* Enhancement: cves/2022/CVE-2022-0885.yaml by md
* Enhancement: cves/2022/CVE-2022-21587.yaml by md
* Enhancement: cves/2022/CVE-2022-2314.yaml by md
* Enhancement: cves/2022/CVE-2022-24816.yaml by md
* Enhancement: cves/2022/CVE-2022-31499.yaml by md
* Enhancement: cves/2022/CVE-2022-21587.yaml by md
* Enhancement: cves/2021/CVE-2021-24155.yaml by md
* Enhancement: cves/2017/CVE-2017-5638.yaml by md
* Enhancement: cves/2015/CVE-2015-2863.yaml by md
* Enhancement: cves/2022/CVE-2022-33901.yaml by md
* Enhancement: cves/2022/CVE-2022-2314.yaml by md
* Enhancement: cves/2022/CVE-2022-33901.yaml by md
* Enhancement: cves/2022/CVE-2022-34753.yaml by md
* Enhancement: cves/2022/CVE-2022-39952.yaml by md
* Enhancement: cves/2022/CVE-2022-4060.yaml by md
* Enhancement: cves/2022/CVE-2022-44877.yaml by md
* Enhancement: cves/2023/CVE-2023-0669.yaml by md
* Enhancement: cves/2023/CVE-2023-26255.yaml by md
* Enhancement: cves/2023/CVE-2023-26256.yaml by md
* Enhancement: exposures/files/salesforce-credentials.yaml by md
* Enhancement: misconfiguration/hadoop-unauth-rce.yaml by md
* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by md
* Enhancement: network/backdoor/backdoored-zte.yaml by md
* Enhancement: network/detection/ibm-d2b-database-server.yaml by md
* Enhancement: network/detection/ibm-d2b-database-server.yaml by md
* Enhancement: technologies/oracle/oracle-atg-commerce.yaml by md
* Enhancement: token-spray/api-abuseipdb.yaml by md
* Enhancement: token-spray/api-abuseipdb.yaml by md
* Enhancement: token-spray/api-dbt.yaml by md
* Enhancement: vulnerabilities/avaya/avaya-aura-rce.yaml by md
* Enhancement: vulnerabilities/avaya/avaya-aura-xss.yaml by md
* Enhancement: vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml by md
* Enhancement: vulnerabilities/froxlor-xss.yaml by md
* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md
* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md
* Enhancement: vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml by md
* Enhancement: vulnerabilities/opencpu/opencpu-rce.yaml by md
* Enhancement: vulnerabilities/other/academy-lms-xss.yaml by md
* Enhancement: vulnerabilities/other/caucho-resin-info-disclosure.yaml by md
* Enhancement: vulnerabilities/other/ckan-dom-based-xss.yaml by md
* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by md
* Enhancement: vulnerabilities/other/graylog-log4j.yaml by md
* Enhancement: vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml by md
* Initial cleanups for syntax errors
* dashboard gremlins
* Add log4j back to name
* Enhancement: exposures/files/salesforce-credentials.yaml by cs
* Enhancement: misconfiguration/installer/nopcommerce-installer.yaml by cs
* Enhancement: network/backdoor/backdoored-zte.yaml by cs
* Enhancement: vulnerabilities/other/couchdb-adminparty.yaml by cs
* Sev and other info tweaks
* Merge conflict
* Run dos2unix against all templates
* too many newlines error
* Fix too many blank lines error
* Fix severity mismatches
Cleanup language on a new test
---------
Co-authored-by: sullo <sullo@cirt.net>
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes