* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
* Create CVE-2021-21804.yaml
* Added Advantech R-SeeNet Detection Template
* added shodan dork
* Update rseenet-detect.yaml
* Create rseenet-default-login.yaml
* Update CVE-2021-21804.yaml
* payload update
* Requires guest or any user to be logged in
> To trigger the described above vulnerability the attacker must be logged-in into the R-SeeNet website
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>