34 lines
1.0 KiB
YAML
34 lines
1.0 KiB
YAML
scenarios:
|
|
- crowdsecurity/http-cve-2021-41773
|
|
- crowdsecurity/http-cve-2021-42013
|
|
- crowdsecurity/grafana-cve-2021-43798
|
|
- crowdsecurity/vmware-vcenter-vmsa-2021-0027
|
|
- crowdsecurity/fortinet-cve-2018-13379
|
|
- crowdsecurity/pulse-secure-sslvpn-cve-2019-11510
|
|
- crowdsecurity/f5-big-ip-cve-2020-5902
|
|
- crowdsecurity/thinkphp-cve-2018-20062
|
|
- crowdsecurity/apache_log4j2_cve-2021-44228
|
|
- crowdsecurity/jira_cve-2021-26086
|
|
- crowdsecurity/spring4shell_cve-2022-22965
|
|
- crowdsecurity/vmware-cve-2022-22954
|
|
- crowdsecurity/CVE-2022-37042
|
|
- crowdsecurity/CVE-2022-41082
|
|
- crowdsecurity/CVE-2022-35914
|
|
- crowdsecurity/CVE-2022-40684
|
|
- crowdsecurity/CVE-2022-26134
|
|
- crowdsecurity/CVE-2022-42889
|
|
- crowdsecurity/CVE-2022-41697
|
|
- crowdsecurity/CVE-2022-46169
|
|
- crowdsecurity/CVE-2022-44877
|
|
- crowdsecurity/CVE-2019-18935
|
|
- crowdsecurity/netgear_rce
|
|
- crowdsecurity/CVE-2023-22515
|
|
- crowdsecurity/CVE-2023-22518
|
|
author: crowdsecurity
|
|
description: "Detect CVE exploitation in http logs"
|
|
tags:
|
|
- web
|
|
- exploit
|
|
- cve
|
|
- http
|