scenarios: - crowdsecurity/http-cve-2021-41773 - crowdsecurity/http-cve-2021-42013 - crowdsecurity/grafana-cve-2021-43798 - crowdsecurity/vmware-vcenter-vmsa-2021-0027 - crowdsecurity/fortinet-cve-2018-13379 - crowdsecurity/pulse-secure-sslvpn-cve-2019-11510 - crowdsecurity/f5-big-ip-cve-2020-5902 - crowdsecurity/thinkphp-cve-2018-20062 - crowdsecurity/apache_log4j2_cve-2021-44228 - crowdsecurity/jira_cve-2021-26086 - crowdsecurity/spring4shell_cve-2022-22965 - crowdsecurity/vmware-cve-2022-22954 - crowdsecurity/CVE-2022-37042 - crowdsecurity/CVE-2022-41082 - crowdsecurity/CVE-2022-35914 - crowdsecurity/CVE-2022-40684 - crowdsecurity/CVE-2022-26134 - crowdsecurity/CVE-2022-42889 - crowdsecurity/CVE-2022-41697 - crowdsecurity/CVE-2022-46169 - crowdsecurity/CVE-2022-44877 - crowdsecurity/CVE-2019-18935 - crowdsecurity/netgear_rce - crowdsecurity/CVE-2023-22515 - crowdsecurity/CVE-2023-22518 author: crowdsecurity description: "Detect CVE exploitation in http logs" tags: - web - exploit - cve - http