Skip to content

Commit 5df3467

Browse files
Merge pull request #10724 from projectdiscovery/missing-cpe-tag
Add missing cpes, vendor and product information
2 parents da50c18 + 7d276eb commit 5df3467

File tree

1,077 files changed

+5438
-1153
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,077 files changed

+5438
-1153
lines changed

http/cnvd/2020/CNVD-2020-63964.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,12 @@ info:
88
jshERP that can reveal sensitive information including system credentials without credentials.
99
reference:
1010
- https://cn-sec.com/archives/1798444.html
11+
classification:
12+
cpe: cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:*
1113
metadata:
1214
max-request: 1
15+
vendor: jishenghua
16+
product: jsherp
1317
shodan-query: http.favicon.hash:-1298131932
1418
fofa-query: jshERP-boot
1519
tags: cnvd,cnvd2020,jsherp,disclosure
@@ -36,4 +40,5 @@ http:
3640
- type: status
3741
status:
3842
- 200
43+
3944
# digest: 490a00463044022001094e317be5b989e3d7461dd099453f1237356ce28affa5ee58239edd6affa502205957345e5569e5b78bc928736bd415c0445ca550661c57cd1e27f9d66d6520a3:922c64590222798bb761d5b6d8e72950

http/cnvd/2021/CNVD-2021-14536.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,12 @@ info:
1111
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
1212
cvss-score: 8.3
1313
cwe-id: CWE-522
14+
cpe: cpe:2.3:h:ruijie:rg-uac:*:*:*:*:*:*:*:*
1415
metadata:
1516
max-request: 1
1617
fofa-query: title="RG-UAC登录页面"
18+
product: rg-uac
19+
vendor: ruijie
1720
tags: cnvd2021,cnvd,ruijie,disclosure
1821

1922
http:
@@ -42,4 +45,4 @@ http:
4245
group: 1
4346
regex:
4447
- '"role":"super_admin",(["a-z:,0-9]+),"lastpwdtime":'
45-
# digest: 490a00463044022046fa27ed559165bee99e3f0591f1ca5ee488637fb236c6b1c81fe49ee2c93865022045c885a0df3ac7a1fbada587a1785a09b40212dc68eeb662117a4e7bccac59d5:922c64590222798bb761d5b6d8e72950
48+
# digest: 490a00463044022046fa27ed559165bee99e3f0591f1ca5ee488637fb236c6b1c81fe49ee2c93865022045c885a0df3ac7a1fbada587a1785a09b40212dc68eeb662117a4e7bccac59d5:922c64590222798bb761d5b6d8e72950

http/cnvd/2021/CNVD-2021-15822.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,13 @@ info:
88
ShopXO is an open source enterprise-level open source e-commerce system. ShopXO has an arbitrary file reading vulnerability, which can be used by attackers to obtain sensitive information.
99
reference:
1010
- https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
11+
classification:
12+
cpe: cpe:2.3:a:shopxo:shopxo:*:*:*:*:*:*:*:*
1113
metadata:
1214
verified: true
1315
max-request: 1
16+
vendor: shopxo
17+
product: shopxo
1418
shodan-query: title:"ShopXO企业级B2C电商系统提供商"
1519
fofa-query: app="ShopXO企业级B2C电商系统提供商"
1620
tags: cnvd2021,cnvd,shopxo,lfi
@@ -31,4 +35,5 @@ http:
3135
- type: status
3236
status:
3337
- 200
38+
3439
# digest: 490a0046304402206735e750a62b437583ca1e1cae33666b4c2ce3b8a8310c3d1212a98fcb018a69022066c8a339f06f76b3df20a5c624b054d356f219e1e77661921c541dc2d7ee4dc5:922c64590222798bb761d5b6d8e72950

http/cnvd/2021/CNVD-2021-28277.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,12 @@ info:
1212
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1313
cvss-score: 8.6
1414
cwe-id: CWE-22
15+
cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
1516
metadata:
1617
max-request: 2
1718
fofa-query: app="Landray OA system"
19+
product: landray_office_automation
20+
vendor: landray
1821
tags: cnvd,cnvd2021,landray,lfi
1922

2023
http:
@@ -47,4 +50,4 @@ http:
4750
- type: status
4851
status:
4952
- 200
50-
# digest: 4b0a00483046022100b98b4479ab9f48943be02a1d2b3a0cebe9d3d5389705d58d3d7ca1f306dcdebc022100d07fed00db3b41b001193fcbaf37522bdd576917c02364b840beb62c96d46a32:922c64590222798bb761d5b6d8e72950
53+
# digest: 4b0a00483046022100b98b4479ab9f48943be02a1d2b3a0cebe9d3d5389705d58d3d7ca1f306dcdebc022100d07fed00db3b41b001193fcbaf37522bdd576917c02364b840beb62c96d46a32:922c64590222798bb761d5b6d8e72950

http/cnvd/2021/CNVD-2021-33202.yaml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,16 @@ info:
99
reference:
1010
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20LoginSSO.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CNVD-2021-33202.md
1111
- https://www.cnblogs.com/0day-li/p/14637680.html
12+
classification:
13+
cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
1214
metadata:
1315
verified: true
1416
max-request: 1
1517
fofa-query: app="泛微-协同办公OA"
18+
product: e-cology
19+
vendor: weaver
1620
tags: cnvd2021,cnvd,e-cology,sqli
21+
1722
variables:
1823
num: "999999999"
1924

@@ -33,4 +38,4 @@ http:
3338
- type: status
3439
status:
3540
- 200
36-
# digest: 4a0a0047304502202c3b8ac764f980a41094f1c98193a9080c65ceaff64975f42b69ef53477bb196022100bb0b3e66abdc94f608aefecaf03255af930789468009df696c1eedb8dff2d283:922c64590222798bb761d5b6d8e72950
41+
# digest: 4a0a0047304502202c3b8ac764f980a41094f1c98193a9080c65ceaff64975f42b69ef53477bb196022100bb0b3e66abdc94f608aefecaf03255af930789468009df696c1eedb8dff2d283:922c64590222798bb761d5b6d8e72950

http/cnvd/2022/CNVD-2022-42853.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,14 @@ info:
1313
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1414
cvss-score: 10
1515
cwe-id: CWE-89
16+
cpe: cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*
1617
metadata:
1718
verified: true
1819
max-request: 1
1920
shodan-query: http.title:"zentao"
2021
fofa-query: "Zentao"
22+
product: zentao
23+
vendor: easycorp
2124
tags: cnvd,cnvd2022,zentao,sqli
2225
variables:
2326
num: "999999999"

http/cnvd/2022/CNVD-2022-43245.yaml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,13 @@ info:
66
severity: high
77
description: |
88
e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.
9+
classification:
10+
cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
911
metadata:
1012
verified: true
1113
max-request: 1
14+
vendor: weaver
15+
product: e-office
1216
fofa-query: app="泛微-协同办公OA"
1317
tags: cnvd,cnvd2022,weaver,e-office,oa,lfi
1418

@@ -40,4 +44,4 @@ http:
4044
status:
4145
- 200
4246

43-
# digest: 490a004630440220409f4c0eb8fc6b1d328944400c499675e5df4db2478f76a4855474ade6b0f01c02201cf7cb9d1eac68921863599f86b3360bf2d1c81bfc642de585a9bb41a2b006ff:922c64590222798bb761d5b6d8e72950
47+
# digest: 490a004630440220409f4c0eb8fc6b1d328944400c499675e5df4db2478f76a4855474ade6b0f01c02201cf7cb9d1eac68921863599f86b3360bf2d1c81bfc642de585a9bb41a2b006ff:922c64590222798bb761d5b6d8e72950

http/cnvd/2024/CNVD-2024-15077.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,13 @@ info:
99
reference:
1010
- https://github.com/wy876/POC/blob/main/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
1111
- https://github.com/vulhub/vulhub/blob/master/aj-report/CNVD-2024-15077/README.md
12+
classification:
13+
cpe: cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
1214
metadata:
1315
verified: true
1416
max-request: 1
17+
vendor: anji-plus
18+
product: aj-report
1519
fofa-query: title="AJ-Report"
1620
tags: cnvd,cnvd2024,aj-report,rce
1721

@@ -42,4 +46,5 @@ http:
4246
- type: status
4347
status:
4448
- 200
49+
4550
# digest: 4a0a00473045022100a0ad6d10ef5ed64fff1a44a4efb42b8c18de347907d77e68fec2a9f796030e8c022003c9c9bcfc6d56d3a3c7988f48874841753487e2ce57d91740ffbe99e3627448:922c64590222798bb761d5b6d8e72950

http/credential-stuffing/self-hosted/grafana-login-check.yaml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,14 @@ info:
77
description: Checks for a valid login on self hosted Grafana instance.
88
reference:
99
- https://owasp.org/www-community/attacks/Credential_stuffing
10+
classification:
11+
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
1012
metadata:
1113
max-request: 1
1214
shodan-query: title:"Grafana"
1315
fofa-query: title="Grafana"
16+
product: grafana
17+
vendor: grafana
1418
tags: self-hosted,creds-stuffing,login-check,grafana
1519
variables:
1620
username: "{{username}}"
@@ -51,4 +55,4 @@ http:
5155
- type: status
5256
status:
5357
- 200
54-
# digest: 4b0a00483046022100a3f034e7179bdf079b1dc2684546e0aed572c531bfde778a670188f30ca5394d022100b2af74dbd182c70308b657aa3c1481e2b815a5c98dc49d5471f66cd4d4ccf527:922c64590222798bb761d5b6d8e72950
58+
# digest: 4b0a00483046022100a3f034e7179bdf079b1dc2684546e0aed572c531bfde778a670188f30ca5394d022100b2af74dbd182c70308b657aa3c1481e2b815a5c98dc49d5471f66cd4d4ccf527:922c64590222798bb761d5b6d8e72950

http/cves/2021/CVE-2021-27748.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,13 @@ info:
1616
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748
1717
classification:
1818
cve-id: CVE-2021-27748
19+
cpe: cpe:2.3:a:ibm:websphere:*:*:*:*:*:*:*:*
1920
metadata:
2021
verified: true
2122
max-request: 3
2223
shodan-query: http.html:"IBM WebSphere Portal"
24+
product: websphere
25+
vendor: ibm
2326
tags: cve2021,cve,hcl,ibm,ssrf,websphere
2427

2528
flow: http(1) && http(2)
@@ -52,4 +55,4 @@ http:
5255
part: body
5356
words:
5457
- "Interactsh Server"
55-
# digest: 490a0046304402206c32c2de4201bdd15007eb3bf05d67820708447ab1c65ca0c81c782de9453dfb02202a678eb5d692039657fdff391b654c0bd3cb6c409e784102e62b31e77792bc22:922c64590222798bb761d5b6d8e72950
58+
# digest: 490a0046304402206c32c2de4201bdd15007eb3bf05d67820708447ab1c65ca0c81c782de9453dfb02202a678eb5d692039657fdff391b654c0bd3cb6c409e784102e62b31e77792bc22:922c64590222798bb761d5b6d8e72950

0 commit comments

Comments
 (0)