Commit Graph

4 Commits (8a3c673767c61fd0f65861820365383a23778844)

Author SHA1 Message Date
forgedhallpass 209538baa6 refactor: Description field uniformization
* info field reorder
* reference values refactored to list
* added new lines after the id and before the protocols
* removed extra new lines
* split really long descriptions to multiple lines (part 1)
* other minor fixes
2022-04-22 13:38:41 +03:00
MostInterestingBotInTheWorld 892fc497c8 Enhancement: default-logins/rseenet/rseenet-default-login.yaml by mp 2022-03-11 14:51:46 -05:00
MostInterestingBotInTheWorld cdc14d282e Enhancement: default-logins/rseenet/rseenet-default-login.yaml by mp 2022-03-11 13:27:32 -05:00
alph4byt3 3364d16799
Added R-SeeNet Detection and Default login template (#3441)
* Create CVE-2021-21804.yaml

* Added Advantech R-SeeNet Detection Template

* added shodan dork

* Update rseenet-detect.yaml

* Create rseenet-default-login.yaml

* Update CVE-2021-21804.yaml

* payload update

* Requires guest or any user to be logged in

> To trigger the described above vulnerability the attacker must be logged-in into the R-SeeNet website

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
2021-12-30 14:29:45 +05:30