feat: apply suggestions from code review
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
b11bd352bb
commit
8a06af1364
+1
-1
@@ -1,7 +1,7 @@
|
||||
title: Potential CVE-2023-25717 Exploitation Attempt
|
||||
id: 043c1609-0e32-4462-a6f2-5a0c2da3fafe
|
||||
status: experimental
|
||||
description: Detects the potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin
|
||||
description: Detects a potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin
|
||||
references:
|
||||
- https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
+1
-1
@@ -1,7 +1,7 @@
|
||||
title: Potentially Suspicious PowerShell Child Processes
|
||||
id: e4b6d2a7-d8a4-4f19-acbd-943c16d90647
|
||||
status: experimental
|
||||
description: Detects potential suspicious child processes spawned by PowerShell
|
||||
description: Detects potentially suspicious child processes spawned by PowerShell
|
||||
references:
|
||||
- https://twitter.com/ankit_anubhav/status/1518835408502620162
|
||||
author: Florian Roth (Nextron Systems), Tim Shelton
|
||||
|
||||
Reference in New Issue
Block a user