Skip to content

Commit ae5211e

Browse files
authored
update labels to be more human friendly (#1717)
1 parent 850d7f4 commit ae5211e

File tree

80 files changed

+80
-80
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+80
-80
lines changed

appsec-rules/crowdsecurity/experimental-no-user-agent.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ labels:
2727
confidence: 0
2828
spoofable: 0
2929
behavior: "http:exploit"
30-
label: "Protect against no user agent"
30+
label: "Missing User-Agent Header"
3131
classification:
3232
- attack.T1595
3333
- attack.T1190

appsec-rules/crowdsecurity/generic-freemarker-ssti.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ labels:
1717
confidence: 2
1818
spoofable: 0
1919
behavior: "http:exploit"
20-
label: "Generic FreeMarker SSTI"
20+
label: "FreeMarker - Server-Side Template Injection"
2121
classification:
2222
- attack.T1595
2323
- attack.T1190

appsec-rules/crowdsecurity/generic-wordpress-uploads-listing.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ labels:
2222
confidence: 2
2323
spoofable: 0
2424
behavior: "http:exploit"
25-
label: "Protect Wordpress uploads directory from listing files"
25+
label: "WordPress Uploads - Directory Listing"
2626
classification:
2727
- attack.T1595
2828
- attack.T1190

appsec-rules/crowdsecurity/generic-wordpress-uploads-php.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ labels:
1717
confidence: 2
1818
spoofable: 0
1919
behavior: "http:exploit"
20-
label: "Detect Wordpress PHP execution in uploads directory"
20+
label: "WordPress Uploads - PHP Execution"
2121
classification:
2222
- attack.T1595
2323
- attack.T1190

appsec-rules/crowdsecurity/vpatch-CVE-2014-5181.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ labels:
2828
confidence: 3
2929
spoofable: 0
3030
behavior: 'http:exploit'
31-
label: 'Last.fm Rotation - LFI'
31+
label: "Last.fm Rotation - Local File Inclusion"
3232
classification:
3333
- cve.CVE-2014-5181
3434
- attack.T1190

appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ labels:
1515
confidence: 3
1616
spoofable: 0
1717
behavior: "http:exploit"
18-
label: "PHPUnit RCE"
18+
label: "PHPUnit - RCE"
1919
classification:
2020
- cve.CVE-2017-9841
2121
- attack.T1595

appsec-rules/crowdsecurity/vpatch-CVE-2018-10562.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ labels:
2828
confidence: 3
2929
spoofable: 0
3030
behavior: "http:exploit"
31-
label: "Dasan GPON RCE"
31+
label: "Dasan GPON - RCE"
3232
classification:
3333
- cve.CVE-2018-10562
3434
- attack.T1595

appsec-rules/crowdsecurity/vpatch-CVE-2018-11511.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ labels:
2727
confidence: 3
2828
spoofable: 0
2929
behavior: 'http:exploit'
30-
label: 'ASUSTOR ADM - SQLI'
30+
label: "ASUSTOR ADM - SQL Injection"
3131
classification:
3232
- cve.CVE-2018-11511
3333
- attack.T1190

appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ labels:
3535
confidence: 3
3636
spoofable: 0
3737
behavior: "http:exploit"
38-
label: "Citrix SQLi"
38+
label: "Citrix - SQL Injection"
3939
classification:
4040
- cve.CVE-2019-12989
4141
- attack.T1595

appsec-rules/crowdsecurity/vpatch-CVE-2019-5418.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ labels:
1919
confidence: 3
2020
spoofable: 0
2121
behavior: 'http:exploit'
22-
label: 'Rails - LFI'
22+
label: "Rails - Local File Inclusion"
2323
classification:
2424
- cve.CVE-2019-5418
2525
- attack.T1005

0 commit comments

Comments
 (0)