Skip to content

Commit

Permalink
Change: Update codespell exclusion.
Browse files Browse the repository at this point in the history
  • Loading branch information
cfi-gb authored and mbrinkhoff committed Oct 11, 2023
1 parent c6d5e89 commit dbb64c1
Showing 1 changed file with 19 additions and 7 deletions.
26 changes: 19 additions & 7 deletions troubadix/codespell/codespell.exclude
Original file line number Diff line number Diff line change
Expand Up @@ -227,6 +227,7 @@ Corrected a badly constracted file which could have allowed treating of
CPE = "cpe:/a:mapp:webtrekk:";
cpe = "cpe:/a:mitre:ovaldi";
CPE = "cpe:/a:netsparker:wass";
CPE = "cpe:/a:tawk:tawk.to_live_chat";
CPU' could have occured because a retry loop continually finds the same
crafted IFF ILBM file. NOTE: some of these details are obtained from
crapData = string("ALLO ", crap(length: 25000),"\r\n");
Expand Down Expand Up @@ -361,6 +362,7 @@ extended EAP-SIM/AKA fast re-authentication to allow use with FILS
# Fedora Update for tre FEDORA-2016-0a952a3bc0
# Fedora Update for tre FEDORA-2016-0ff6c3d84b
# Fedora Update for tre FEDORA-2016-cd09eab674
Festplatten- und Dateiverschluesselung eingesetzt werden. Alternativ SOLLTE 'dm-crypt' in
files. If a user were tricked into opening a specially-crafted CAF file, a
files to potentially execute code and it is tracked by the Mitre CVE
file_xml = '\t\t<file_item' + status + ' xmlns="http://oval.mitre.org/XMLSchema/' +
Expand Down Expand Up @@ -475,12 +477,11 @@ if( model =~ '^TE[3456]0' && revcomp( a: version, b: "v600r006c00spc500" ) < 0 )
if "nvd.nist.gov/vuln/detail/CVE-" in match.group(2) or "cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-" in match.group(2):
if("petite annonce" >< res && ">DEPOSER UNE ANNONCE<" >< res) {
if ("presse" >< res1) {
if (prod == "BMX NOC 0401" || prod == "BMX NOE 0100" || prod = "BMX NOE 0110" || prod == "BMX NOE 0110H" ||
if (prod == "BMX NOC 0401" || prod == "BMX NOE 0100" || prod == "BMX NOE 0110" || prod == "BMX NOE 0110H" ||
if (prod == "BMX NOE 0100") {
if (prod == "BMX NOE 0100" || prod == "BMX NOE 0100H") {
if (prod == "BMX NOE 0110") {
if (prod == "BMX NOE 0110" || prod == "BMX NOE 0110H") {
if (prod =~ "^BMX\s*NOC\s*0401$" || prod =~ "^BMX\s*NOE\s*0100$" || prod =~ "^BMX\s*NOE\s*0110$" || prod =~ "^BMX\s*NOE\s*0110H$" ||
if (prod =~ "^BMX\s*NOE\s*0100$") {
if (prod =~ "^BMX\s*NOE\s*0100$" || prod =~ "^BMX\s*NOE\s*0100H$") {
if (prod =~ "^BMX\s*NOE\s*0110$") {
if (prod =~ "^BMX\s*NOE\s*0110$" || prod =~ "^BMX\s*NOE\s*0110H$") {
if( r =~ " (A\. A\. Milne|Albert Einstein|Anonimo|Antico proverbio cinese|Autor desconocido|Charles Dickens|Francisco de Quevedo y Villegas|George Bernard Shaw|Jaime Balmes|Johann Wolfgang von Goethe|Jil Sander|Juana de Asbaje|Konfucius|Lord Philip Chesterfield|Montaigne|Petrarca|Ralph Waldo Emerson|Seneca|Syrus|Werner von Siemens)" ||
if(rcvRes && '>iAm[i]nE<' >< rcvRes)
if( res =~ "^HTTP/1\.[01] 200" && "Powered by" >< res && "ANG" >< res ) {
Expand Down Expand Up @@ -576,6 +577,7 @@ Jouni Knuutinen from Synopsys discovered flaws in the Samba DCE-RPC code which c
key = "HostDetails/Cert/" + fpr + "/";
keyserv 100029 keyserver
"keyserver",
kJtP0F6mv/Afe/5s7yd3ZJ/72yT73NjLg0vWbmLkop6eOR+CKw4nxorWxpocAj0p
# Kubernetes Dashboard Public WAN (Internet) Accessible
L3: conring size for XEN HV's with huge memory to small. Inital Xen logs
leaks because of a missing check when transfering pages via
Expand Down Expand Up @@ -617,7 +619,7 @@ MM]7>[YM~GC^@?_WK0@W/F>UDL^Q8<TQ^+LTL*)6UG-,[V6-;N*W*79^&[ND/
MN*W*79^&[ND/.DM''*U8D?Q:.'+%RB;S$!.'6['*(;8>~A:>&GO>&&M7/36X
model = "TE Unknown Model";
mod = eregmatch(pattern: "Huawei (TE[0-9]0)", string: banner);
mod = eregmatch( pattern:"var Model(Nmae|Name) = '(EDR-[^']+)';", string:buf );
mod = eregmatch( pattern:"var Model(Nmae|Name) = '(EDR-[^']+)';", string:res );
# Modified by Tim Brown <[email protected]>
* Mon Aug 17 2009 Remi Collet 1.02.1-3
* Mon Jan 26 2009 Remi Collet - 0.71.4-1
Expand Down Expand Up @@ -793,6 +795,7 @@ RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remot
- S8168728, CVE-2016-5548: DSA signing improvments
SAML/CAS tokens in the session database, an attacker can open an anonymous
* Sat May 30 2009 Remi Collet 1.02.1-1
- SCALANCE M876-4 (NAM) (All versions < V7.1.2)
script_add_preference(name:"Delete hash test Programm after the test", type:"checkbox", value:"yes", id:3);
script_add_preference(name:"Install hash test Programm on the Target", type:"checkbox", value:"no", id:2);
script_add_preference(name:"Mark unrechable Hosts as dead (not scanning)", type:"checkbox", value:"yes", id:5); # nb: Don't change this name and id, these are hardcoded / used in GVMd
Expand Down Expand Up @@ -861,6 +864,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
script_name("Wireshark Steam IHS Discovery/CoAP Dissector DoS Vulnerabilities (Mac OS X)");
script_name("Wireshark Steam IHS Discovery/CoAP Dissector DoS Vulnerabilities (Windows)");
script_name("WordPress Annonces Plugin 'abspath' Parameter RFI Vulnerability");
script_name("WordPress Tawk.To Live Chat Plugin < 0.6.0 Broken Access Control Vulnerability");
* scripts/CAs.inc:
script_tag(name:"affected", value:"Apple Mac OS X Big Sur versions 11.x before
script_tag(name:"affected", value:"BA SYSTEMS BAS Web on BAS920 devices with
Expand All @@ -875,6 +879,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
script_tag(name:"affected", value:"Visicom Medias AceFTP Freeware/Pro Version 3.80.3 and prior on Windows.");
script_tag(name:"affected", value:"WAN Emulator 2.3 is vulnerable. Other versions may also be affected.");
script_tag(name:"affected", value:"WordPress Annonces plugin 1.2.0.0 is vulnerable. Other versions
script_tag(name:"affected", value:"WordPress Tawk.To Live Chat plugin prior to version 0.6.0.");
script_tag(name:"impact", value:"A successful exploit could allow the attacker to cause the wireless WAN (WWAN)
script_tag(name:"impact", value:"Successful exploit could allow an unauthenticated, remote attacker to cause an affected device to start dropping legitimate IPv6 neighbors as legitimate ND times out, leading to DOS.");
script_tag(name:"impact", value:"The use of flate.NewReader in crewjam/saml does not limit the
Expand Down Expand Up @@ -990,19 +995,22 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
script_tag(name:"summary", value:"The remote host is missing an update for the 'tre'
script_tag(name:"summary", value:"The remote host is missing an update to nd
script_tag(name:"summary", value:"The WordPress plugin 'Annonces' is prone to a remote file
script_tag(name:"summary", value:"The WordPress plugin 'Tawk.To Live Chat' is prone to a broken
script_tag(name:"summary", value:"Tim McLean discovered that pyjwt, a Python implementation of JSON Web
script_tag(name:"summary", value:"WAN Emulator is prone to a remote command-execution vulnerability because
script_tag(name:"summary", value:"Wen Bin discovered that bchunk, an application that converts a CD
script_tag(name:"summary", value:"Ziel des Bausteins SYS.2.2.3 ist der Schutz von Informationen,
script_tag(name:"vuldetect", value:"Checks if the Swarmpit UI is accessible from a public WAN
script_xref(name:"URL", value:"http://cpe.mitre.org/");
script_xref(name:"URL", value:"https://cwe.mitre.org/data/definitions/319.html");
script_xref(name:"URL", value:"https://github.com/soheilsamanabadi/vulnerabilitys/pull/1");
script_xref(name:"URL", value:"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10184");
script_xref(name:"URL", value:"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A447");
script_xref(name:"URL", value:"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9894");
script_xref(name:"URL", value:"https://packetstormsecurity.com/files/130797/raritanpoweriq-staticsecret.txt");
script_xref(name:"URL", value:"https://ths.sh/posts/zoomzoo/");
script_xref(name:"URL", value:"https://wordpress.org/plugins/annonces/");
script_xref(name:"URL", value:"https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Reaktion/CERT-Bund/CERT-Bund-Reports/HowTo/Offene-Portmapper-Dienste/Offene-Portmapper-Dienste.html");
script_xref(name:"URL", value:"https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Reaktion/CERT-Bund/CERT-Bund-Reports/HowTo/Offene-Sphinx-Server/Offene-Sphinx-Server_node.html");
script_xref(name:"URL", value:"https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03111/BSI-TR-03111_V-2-0_pdf.pdf");
script_xref(name:"URL", value:"https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf");
Expand All @@ -1011,6 +1019,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous
script_xref(name:"URL", value:"https://www.synacktiv.com/ressources/advisories/WordPress_Duplicator-1.2.40-RCE.pdf");
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/cve-2018-18907/");
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/cyrc-advisory-nagios-xi/");
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453.html");
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/opentsdb/");
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/path-traversal-defects-oracles-jsf2-implementation/");
script_xref(name:"URL", value:"http://tigger.uic.edu/~jlongs2/holes/cups2.txt");
Expand Down Expand Up @@ -1077,6 +1086,7 @@ send(socket: soc, data: triggerD);
service accessible from a public WAN (Internet) / public LAN.");
service_register( port:port, proto:"agobot.fo" );
service_report( port:port, svc:"agobot.fo", banner:banner );
services (found in logs, referers, caches, etc...)");
SessionTicket extention and ECDHE-ECDSA (bsc#1015499).
set_kb_item(name: "aas/detected", value: TRUE);
set_kb_item(name: "aas/http/detected", value: TRUE);
Expand Down Expand Up @@ -1152,6 +1162,7 @@ systems with HDA sound needing MSI support were added to the quirks
take priviliges into account for the connecting user,
"TANQ PRODUTO" >< res || "TANK PRODUKT" >< res || "REC 90" >< res ||
# Tarik El-Yassem <[email protected]>
"tawkto-live-chat/readme.txt", "Tawk.To Live Chat#---#=== Tawk\.To Live Chat#---#Stable tag: ([0-9.]+)#---#cpe:/a:tawk:tawk.to_live_chat",
## TC and CE affected but pattern coming like(TE)
TCP 1005 Theef
TCP 1040 Medias, Sedepex
Expand Down Expand Up @@ -1381,6 +1392,7 @@ Work around CVE-2019-11059 by disabling 64Bit descritptor size
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).");
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).
- Xephyr: Fix broken image when endianess of client machine and
xmLgZFfN5a3bNlG8wHS1vMd3Gcpq2iaN5muwBMHSbANR7WF0HE8Snrdkx5xfd+tE
'xmlns:linux-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#linux" ',
'xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" ',
'xmlns:oval-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5" ',
Expand Down

0 comments on commit dbb64c1

Please sign in to comment.